4 results (0.002 seconds)

CVSS: 9.0EPSS: 0%CPEs: 3EXPL: 0

15 Jan 2025 — Mongoose before 8.9.5 can improperly use a nested $where filter with a populate() match, leading to search injection. NOTE: this issue exists because of an incomplete fix for CVE-2024-53900. • https://github.com/Automattic/mongoose/blob/master/CHANGELOG.md • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 10.0EPSS: 0%CPEs: 3EXPL: 1

17 Jul 2023 — Prototype Pollution in GitHub repository automattic/mongoose prior to 7.3.4. • https://github.com/automattic/mongoose/commit/305ce4ff789261df7e3f6e72363d0703e025f80d • CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') •

CVSS: 10.0EPSS: 1%CPEs: 2EXPL: 2

28 Jul 2022 — Prototype Pollution in GitHub repository automattic/mongoose prior to 6.4.6. Una Contaminación de Prototipo en el repositorio de GitHub automattic/mongoose versiones anteriores a 6.4.6 • https://github.com/Automattic/mongoose/blob/51e758541763b6f14569744ced15cc23ab8b50c6/lib/schema.js#L88-L141 • CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') •

CVSS: 9.1EPSS: 0%CPEs: 1EXPL: 0

10 Oct 2019 — Automattic Mongoose through 5.7.4 allows attackers to bypass access control (in some applications) because any query object with a _bsontype attribute is ignored. For example, adding "_bsontype":"a" can sometimes interfere with a query filter. NOTE: this CVE is about Mongoose's failure to work around this _bsontype special case that exists in older versions of the bson parser (aka the mongodb/js-bson project). Automattic Mongoose versiones hasta 5.7.4, permite a atacantes omitir el control de acceso (en alg... • https://github.com/Automattic/mongoose/commit/f3eca5b94d822225c04e96cbeed9f095afb3c31c •