Filtered by CWE-1321
Total 344 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2022-21190 1 Mozilla 1 Convict 2024-09-17 7.5 High
This affects the package convict before 6.2.3. This is a bypass of [CVE-2022-22143](https://security.snyk.io/vuln/SNYK-JS-CONVICT-2340604). The [fix](https://github.com/mozilla/node-convict/commit/3b86be087d8f14681a9c889d45da7fe3ad9cd880) introduced, relies on the startsWith method and does not prevent the vulnerability: before splitting the path, it checks if it starts with __proto__ or this.constructor.prototype. To bypass this check it's possible to prepend the dangerous paths with any string value followed by a dot, like for example foo.__proto__ or foo.this.constructor.prototype.
CVE-2022-25645 2 Dset Project, Redhat 2 Dset, Acm 2024-09-17 6.5 Medium
All versions of package dset are vulnerable to Prototype Pollution via 'dset/merge' mode, as the dset function checks for prototype pollution by validating if the top-level path contains __proto__, constructor or protorype. By crafting a malicious object, it is possible to bypass this check and achieve prototype pollution.
CVE-2021-23403 1 Ts-nodash Project 1 Ts-nodash 2024-09-17 7.3 High
All versions of package ts-nodash are vulnerable to Prototype Pollution via the Merge() function due to lack of validation input.
CVE-2020-7699 2 Express-fileupload Project, Netapp 2 Express-fileupload, Max Data 2024-09-17 7.5 High
This affects the package express-fileupload before 1.1.8. If the parseNested option is enabled, sending a corrupt HTTP request can lead to denial of service or arbitrary code execution.
CVE-2020-7771 1 Asciitable.js Project 1 Asciitable.js 2024-09-17 7.5 High
The package asciitable.js before 1.0.3 are vulnerable to Prototype Pollution via the main function.
CVE-2020-28460 1 Multi-ini Project 1 Multi-ini 2024-09-17 5.6 Medium
This affects the package multi-ini before 2.1.2. It is possible to pollute an object's prototype by specifying the constructor.proto object as part of an array. This is a bypass of CVE-2020-28448.
CVE-2022-21231 1 Deep-get-set Project 1 Deep-get-set 2024-09-17 7.5 High
All versions of package deep-get-set are vulnerable to Prototype Pollution via the 'deep' function. **Note:** This vulnerability derives from an incomplete fix of [CVE-2020-7715](https://security.snyk.io/vuln/SNYK-JS-DEEPGETSET-598666)
CVE-2020-7748 1 Ts.ed Project 1 Ts.ed 2024-09-17 5.6 Medium
This affects the package @tsed/core before 5.65.7. This vulnerability relates to the deepExtend function which is used as part of the utils directory. Depending on if user input is provided, an attacker can overwrite and pollute the object prototype of a program.
CVE-2021-23421 1 Merge-change Project 1 Merge-change 2024-09-17 5.6 Medium
All versions of package merge-change are vulnerable to Prototype Pollution via the utils.set function.
CVE-2022-25324 1 Bignum Project 1 Bignum 2024-09-17 7.5 High
All versions of package bignum are vulnerable to Denial of Service (DoS) due to a type-check exception in V8, when verifying the type of the second argument to the .powm function, V8 will crash regardless of Node try/catch blocks.
CVE-2022-25352 1 Libnested Project 1 Libnested 2024-09-17 7.5 High
The package libnested before 1.5.2 are vulnerable to Prototype Pollution via the set function in index.js. **Note:** This vulnerability derives from an incomplete fix for [CVE-2020-28283](https://security.snyk.io/vuln/SNYK-JS-LIBNESTED-1054930)
CVE-2020-7704 1 Linux-cmdline Project 1 Linux-cmdline 2024-09-17 9.8 Critical
The package linux-cmdline before 1.0.1 are vulnerable to Prototype Pollution via the constructor.
CVE-2022-25878 1 Protobufjs Project 1 Protobufjs 2024-09-17 8.2 High
The package protobufjs before 6.11.3 are vulnerable to Prototype Pollution which can allow an attacker to add/modify properties of the Object.prototype. This vulnerability can occur in multiple ways: 1. by providing untrusted user input to util.setProperty or to ReflectionObject.setParsedOption functions 2. by parsing/loading .proto files
CVE-2020-7792 1 Moutjs 1 Mout 2024-09-17 7.5 High
This affects all versions of package mout. The deepFillIn function can be used to 'fill missing properties recursively', while the deepMixIn 'mixes objects into the target object, recursively mixing existing child objects as well'. In both cases, the key used to access the target object recursively is not checked, leading to a Prototype Pollution.
CVE-2022-22143 1 Mozilla 1 Convict 2024-09-17 7.5 High
The package convict before 6.2.2 are vulnerable to Prototype Pollution via the convict function due to missing validation of parentKey. **Note:** This vulnerability derives from an incomplete fix of another [vulnerability](https://security.snyk.io/vuln/SNYK-JS-CONVICT-1062508)
CVE-2021-23594 1 Agoric 1 Realms-shim 2024-09-17 9.8 Critical
All versions of package realms-shim are vulnerable to Sandbox Bypass via a Prototype Pollution attack vector.
CVE-2021-23449 1 Vm2 Project 1 Vm2 2024-09-17 9.8 Critical
This affects the package vm2 before 3.9.4 via a Prototype Pollution attack vector, which can lead to execution of arbitrary code on the host machine.
CVE-2021-23760 1 Keyget Project 1 Keyget 2024-09-17 5.6 Medium
The package keyget from 0.0.0 are vulnerable to Prototype Pollution via the methods set, push, and at which could allow an attacker to cause a denial of service and may lead to remote code execution. **Note:** This vulnerability derives from an incomplete fix to [CVE-2020-28272](https://security.snyk.io/vuln/SNYK-JS-KEYGET-1048048)
CVE-2020-7701 1 Springtree 1 Madlib-object-utils 2024-09-17 9.8 Critical
madlib-object-utils before 0.1.7 is vulnerable to Prototype Pollution via setValue.
CVE-2020-7719 1 Locutus 1 Locutus 2024-09-17 9.8 Critical
Versions of package locutus before 2.0.12 are vulnerable to prototype Pollution via the php.strings.parse_str function.