DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
History

Tue, 28 Jan 2025 20:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:requirejs:requirejs:*:*:*:*:*:*:*:*
Vendors & Products Requirejs
Requirejs requirejs
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L'}


Tue, 28 Jan 2025 20:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:jrburke:requirejs:2.3.6:*:*:*:*:*:*:*
Vendors & Products Jrburke
Jrburke requirejs
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}

cvssV3_1

{'score': 8.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Tue, 28 Jan 2025 20:00:00 +0000

Type Values Removed Values Added
Description jrburke requirejs v2.3.6 was discovered to contain a prototype pollution via the function config. This vulnerability allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via injecting arbitrary properties. NOTE: this is disputed by a third party because it is not plausible that any application would accept untrusted lib.s.contexts._.configure input. DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

Tue, 28 Jan 2025 19:45:00 +0000

Type Values Removed Values Added
Description jrburke requirejs v2.3.6 was discovered to contain a prototype pollution via the function config. This vulnerability allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via injecting arbitrary properties. jrburke requirejs v2.3.6 was discovered to contain a prototype pollution via the function config. This vulnerability allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via injecting arbitrary properties. NOTE: this is disputed by a third party because it is not plausible that any application would accept untrusted lib.s.contexts._.configure input.

Mon, 09 Sep 2024 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Requirejs
Requirejs requirejs
CPEs cpe:2.3:a:requirejs:requirejs:*:*:*:*:*:*:*:*
Vendors & Products Requirejs
Requirejs requirejs

cve-icon MITRE

Status: REJECTED

Assigner: mitre

Published: 2024-07-01T00:00:00.000Z

Updated: 2025-01-28T19:44:53.337Z

Reserved: 2024-06-21T00:00:00.000Z

Link: CVE-2024-38998

cve-icon Vulnrichment

Updated:

cve-icon NVD

Status : Rejected

Published: 2024-07-01T13:15:05.223

Modified: 2025-01-28T20:15:31.103

Link: CVE-2024-38998

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-07-01T00:00:00Z

Links: CVE-2024-38998 - Bugzilla