JavaScript is vulnerable to prototype pollution in Mafintosh's protocol-buffers-schema Version 3.6.0, where an attacker may alter the application logic, bypass security checks, cause a DoS or achieve remote code execution.
Project Subscriptions
No data.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 15 Apr 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | JavaScript is vulnerable to prototype pollution in Mafintosh's protocol-buffers-schema Version 3.6.0, where an attacker may alter the application logic, bypass security checks, cause a DoS or achieve remote code execution. | |
| Title | Mafintosh's protocol-buffers-schema is vulnerable to prototype pollution | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2026-04-15T17:23:02.336Z
Reserved: 2026-04-07T17:20:03.756Z
Link: CVE-2026-5758
No data.
Status : Received
Published: 2026-04-15T18:17:24.920
Modified: 2026-04-15T18:17:24.920
Link: CVE-2026-5758
No data.
OpenCVE Enrichment
No data.
Weaknesses
No weakness.