CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
All versions of package gammautils are vulnerable to Prototype Pollution via the deepSet and deepMerge functions. |
All versions of package dot-notes are vulnerable to Prototype Pollution via the create function. |
All versions of package deeps are vulnerable to Prototype Pollution via the set function. |
All versions of package deep-get-set are vulnerable to Prototype Pollution via the main function. |
All versions of package confucious are vulnerable to Prototype Pollution via the set function. |
All versions of package arr-flatten-unflatten are vulnerable to Prototype Pollution via the constructor. |
The package irrelon-path before 4.7.0; the package @irrelon/path before 4.7.0 are vulnerable to Prototype Pollution via the set, unSet, pushVal and pullVal functions. |
The package property-expr before 2.0.3 are vulnerable to Prototype Pollution via the setter function. |
The package connie-lang before 0.1.1 are vulnerable to Prototype Pollution in the configuration language library used by connie. |
The package linux-cmdline before 1.0.1 are vulnerable to Prototype Pollution via the constructor. |
All versions of package nis-utils are vulnerable to Prototype Pollution via the setValue function. |
All versions of package templ8 are vulnerable to Prototype Pollution via the parse function. |
madlib-object-utils before 0.1.7 is vulnerable to Prototype Pollution via setValue. |
All versions of phpjs are vulnerable to Prototype Pollution via parse_str. |
This affects the package express-fileupload before 1.1.8. If the parseNested option is enabled, sending a corrupt HTTP request can lead to denial of service or arbitrary code execution. |
In all versions of package casperjs, the mergeObjects utility function is susceptible to Prototype Pollution. |
fun-map through 3.3.1 is vulnerable to Prototype Pollution. The function assocInM could be tricked into adding or modifying properties of 'Object.prototype' using a '__proto__' payload. |
paypal-adaptive through 0.4.2 manipulation of JavaScript objects resulting in Prototype Pollution. The PayPal function could be tricked into adding or modifying properties of Object.prototype using a __proto__ payload. |
This affects all versions of package grunt-util-property. The function call could be tricked into adding or modifying properties of Object.prototype using a __proto__ payload. |
eivindfjeldstad-dot below 1.0.3 is vulnerable to Prototype Pollution.The function 'set' could be tricked into adding or modifying properties of 'Object.prototype' using a '__proto__' payload. |