Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
All versions of the package safe-eval are vulnerable to Sandbox Bypass due to improper input sanitization. The vulnerability is derived from prototype pollution exploitation. Exploiting this vulnerability might result in remote code execution ("RCE"). **Vulnerable functions:** __defineGetter__, stack(), toLocaleString(), propertyIsEnumerable.call(), valueOf().
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Vulnerability Type
权限/沙箱问题
Vulnerability Title
safe-eval 安全漏洞
Vulnerability Description
safe-eval是Hage Yaapa个人开发者的一个 eval() 函数的更安全的版本。 safe-eval存在安全漏洞,该漏洞源于对输入清理不当。
CVSS Information
N/A
Vulnerability Type
N/A