Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-54326 | janryWang products depath v1.0.6 and cool-path v1.1.2 were discovered to contain a prototype pollution via the set() method at setIn (lib/index.js:90). This vulnerability allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via injecting arbitrary properties. |
Github GHSA |
GHSA-4h4x-4m75-47j4 | depath and cool-path vulnerable to Prototype Pollution via `set()` Method |
Wed, 30 Apr 2025 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Janrywang
Janrywang depath |
|
| CPEs | cpe:2.3:a:janrywang:depath:1.0.6:*:*:*:*:*:*:* cpe:2.3:a:janrywang:depath:1.1.2:*:*:*:*:*:*:* |
|
| Vendors & Products |
Janrywang
Janrywang depath |
Tue, 01 Apr 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-1321 | |
| Metrics |
cvssV3_1
|
Fri, 28 Mar 2025 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | janryWang products depath v1.0.6 and cool-path v1.1.2 were discovered to contain a prototype pollution via the set() method at setIn (lib/index.js:90). This vulnerability allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via injecting arbitrary properties. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-04-01T18:29:55.929Z
Reserved: 2024-06-21T00:00:00.000Z
Link: CVE-2024-38985
Updated: 2025-04-01T18:29:41.367Z
Status : Analyzed
Published: 2025-03-28T21:15:16.867
Modified: 2025-04-30T16:39:35.837
Link: CVE-2024-38985
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA