A prototype pollution in the component Module.mergeObjects (redoc/bundles/redoc.lib.js:2) of redoc <= 2.2.0 allows attackers to cause a Denial of Service (DoS) via supplying a crafted payload.
Metrics
Affected Vendors & Products
References
History
Thu, 29 May 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:openshift_gitops:1.14::el8 |
Fri, 16 May 2025 02:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat openshift Gitops
|
|
| CPEs | cpe:/a:redhat:openshift_gitops:1.15::el8 | |
| Vendors & Products |
Redhat openshift Gitops
|
Wed, 16 Apr 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat
Redhat advanced Cluster Security |
|
| CPEs | cpe:/a:redhat:advanced_cluster_security:4.5::el8 cpe:/a:redhat:advanced_cluster_security:4.6::el8 cpe:/a:redhat:advanced_cluster_security:4.7::el8 |
|
| Vendors & Products |
Redhat
Redhat advanced Cluster Security |
Mon, 14 Apr 2025 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redocly
Redocly redoc |
|
| CPEs | cpe:2.3:a:redocly:redoc:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Redocly
Redocly redoc |
Wed, 02 Apr 2025 02:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | redoc: Prototype Pollution in redoc | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Tue, 01 Apr 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-1321 | |
| Metrics |
cvssV3_1
|
Fri, 28 Mar 2025 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A prototype pollution in the component Module.mergeObjects (redoc/bundles/redoc.lib.js:2) of redoc <= 2.2.0 allows attackers to cause a Denial of Service (DoS) via supplying a crafted payload. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published: 2025-03-28T00:00:00.000Z
Updated: 2025-04-01T19:13:06.925Z
Reserved: 2025-01-09T00:00:00.000Z
Link: CVE-2024-57083
Updated: 2025-04-01T19:12:43.967Z
Status : Analyzed
Published: 2025-03-28T21:15:17.307
Modified: 2025-04-14T17:02:15.813
Link: CVE-2024-57083