All versions of package dojo are vulnerable to Prototype Pollution via the setObject function.
CPE | Name | Operator | Version |
---|---|---|---|
dojo | eq | 1.11.0 | |
dojo | eq | 1.12.0-rc3 | |
dojo | eq | 1.13.0 | |
dojo | eq | 1.12.0-rc1 | |
dojo | eq | 1.11.0-rc2 | |
dojo | eq | 1.12.0 | |
dojo | eq | 1.10.0-rc1 | |
dojo | eq | 1.12.0-rc4 | |
dojo | eq | 1.11.0-rc4 | |
dojo | eq | 1.15.0 |
github.com/dojo/dojo/blob/4c39c14349408fc8274e19b399ffc660512ed07c/_base/lang.js%23L172
lists.debian.org/debian-lts-announce/2023/01/msg00030.html
snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-2313036
snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2313035
snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBDOJO-2313034
snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2313033
snyk.io/vuln/SNYK-JS-DOJO-1535223
www.oracle.com/security-alerts/cpuapr2022.html
www.oracle.com/security-alerts/cpujul2022.html