Back to bug 2020365
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Guilherme de Almeida Suckevicz | 2021-11-04 16:43:51 UTC | Depends On | 2020366 | |
| Guilherme de Almeida Suckevicz | 2021-11-04 16:45:59 UTC | Blocks | 2020367 | |
| RaTasha Tillery-Smith | 2021-11-24 14:07:05 UTC | CC | sd-operator-metering, tflannag | |
| Doc Text | A Type Confusion vulnerability was found in node-jsonpointer that can lead to a bypass of a previous Prototype Pollution fix when the pointer components are arrays. An attacker can use objects of incompatible base type that can eventually lead to a | |||
| Doc Text | Remote Code Execution. | |||
| Doc Text | A Type Confusion vulnerability was found in node-jsonpointer that can lead to a bypass of a previous Prototype Pollution fix when the pointer components are arrays. An attacker can use objects of incompatible base type that can eventually lead to a Remote Code Execution. | A Type Confusion vulnerability was found in node-jsonpointer. This issue leads to the bypass of a previous Prototype Pollution fix when the pointer components are arrays. This flaw allows an attacker to use objects of incompatible base types, leading to remote code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. | ||
| Red Hat Bugzilla | 2022-01-08 05:30:42 UTC | CC | jokerman | |
| Red Hat Bugzilla | 2022-11-19 05:30:30 UTC | CC | tflannag | |
| Red Hat Bugzilla | 2022-11-27 08:34:23 UTC | CC | sd-operator-metering | |
| Red Hat Bugzilla | 2023-07-07 08:31:39 UTC | Assignee | security-response-team | nobody |
Back to bug 2020365