Total
344 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2022-21190 | 1 Mozilla | 1 Convict | 2024-09-17 | 7.5 High |
This affects the package convict before 6.2.3. This is a bypass of [CVE-2022-22143](https://security.snyk.io/vuln/SNYK-JS-CONVICT-2340604). The [fix](https://github.com/mozilla/node-convict/commit/3b86be087d8f14681a9c889d45da7fe3ad9cd880) introduced, relies on the startsWith method and does not prevent the vulnerability: before splitting the path, it checks if it starts with __proto__ or this.constructor.prototype. To bypass this check it's possible to prepend the dangerous paths with any string value followed by a dot, like for example foo.__proto__ or foo.this.constructor.prototype. | ||||
CVE-2022-25645 | 2 Dset Project, Redhat | 2 Dset, Acm | 2024-09-17 | 6.5 Medium |
All versions of package dset are vulnerable to Prototype Pollution via 'dset/merge' mode, as the dset function checks for prototype pollution by validating if the top-level path contains __proto__, constructor or protorype. By crafting a malicious object, it is possible to bypass this check and achieve prototype pollution. | ||||
CVE-2021-23403 | 1 Ts-nodash Project | 1 Ts-nodash | 2024-09-17 | 7.3 High |
All versions of package ts-nodash are vulnerable to Prototype Pollution via the Merge() function due to lack of validation input. | ||||
CVE-2020-7699 | 2 Express-fileupload Project, Netapp | 2 Express-fileupload, Max Data | 2024-09-17 | 7.5 High |
This affects the package express-fileupload before 1.1.8. If the parseNested option is enabled, sending a corrupt HTTP request can lead to denial of service or arbitrary code execution. | ||||
CVE-2020-7771 | 1 Asciitable.js Project | 1 Asciitable.js | 2024-09-17 | 7.5 High |
The package asciitable.js before 1.0.3 are vulnerable to Prototype Pollution via the main function. | ||||
CVE-2020-28460 | 1 Multi-ini Project | 1 Multi-ini | 2024-09-17 | 5.6 Medium |
This affects the package multi-ini before 2.1.2. It is possible to pollute an object's prototype by specifying the constructor.proto object as part of an array. This is a bypass of CVE-2020-28448. | ||||
CVE-2022-21231 | 1 Deep-get-set Project | 1 Deep-get-set | 2024-09-17 | 7.5 High |
All versions of package deep-get-set are vulnerable to Prototype Pollution via the 'deep' function. **Note:** This vulnerability derives from an incomplete fix of [CVE-2020-7715](https://security.snyk.io/vuln/SNYK-JS-DEEPGETSET-598666) | ||||
CVE-2020-7748 | 1 Ts.ed Project | 1 Ts.ed | 2024-09-17 | 5.6 Medium |
This affects the package @tsed/core before 5.65.7. This vulnerability relates to the deepExtend function which is used as part of the utils directory. Depending on if user input is provided, an attacker can overwrite and pollute the object prototype of a program. | ||||
CVE-2021-23421 | 1 Merge-change Project | 1 Merge-change | 2024-09-17 | 5.6 Medium |
All versions of package merge-change are vulnerable to Prototype Pollution via the utils.set function. | ||||
CVE-2022-25324 | 1 Bignum Project | 1 Bignum | 2024-09-17 | 7.5 High |
All versions of package bignum are vulnerable to Denial of Service (DoS) due to a type-check exception in V8, when verifying the type of the second argument to the .powm function, V8 will crash regardless of Node try/catch blocks. | ||||
CVE-2022-25352 | 1 Libnested Project | 1 Libnested | 2024-09-17 | 7.5 High |
The package libnested before 1.5.2 are vulnerable to Prototype Pollution via the set function in index.js. **Note:** This vulnerability derives from an incomplete fix for [CVE-2020-28283](https://security.snyk.io/vuln/SNYK-JS-LIBNESTED-1054930) | ||||
CVE-2020-7704 | 1 Linux-cmdline Project | 1 Linux-cmdline | 2024-09-17 | 9.8 Critical |
The package linux-cmdline before 1.0.1 are vulnerable to Prototype Pollution via the constructor. | ||||
CVE-2022-25878 | 1 Protobufjs Project | 1 Protobufjs | 2024-09-17 | 8.2 High |
The package protobufjs before 6.11.3 are vulnerable to Prototype Pollution which can allow an attacker to add/modify properties of the Object.prototype. This vulnerability can occur in multiple ways: 1. by providing untrusted user input to util.setProperty or to ReflectionObject.setParsedOption functions 2. by parsing/loading .proto files | ||||
CVE-2020-7792 | 1 Moutjs | 1 Mout | 2024-09-17 | 7.5 High |
This affects all versions of package mout. The deepFillIn function can be used to 'fill missing properties recursively', while the deepMixIn 'mixes objects into the target object, recursively mixing existing child objects as well'. In both cases, the key used to access the target object recursively is not checked, leading to a Prototype Pollution. | ||||
CVE-2022-22143 | 1 Mozilla | 1 Convict | 2024-09-17 | 7.5 High |
The package convict before 6.2.2 are vulnerable to Prototype Pollution via the convict function due to missing validation of parentKey. **Note:** This vulnerability derives from an incomplete fix of another [vulnerability](https://security.snyk.io/vuln/SNYK-JS-CONVICT-1062508) | ||||
CVE-2021-23594 | 1 Agoric | 1 Realms-shim | 2024-09-17 | 9.8 Critical |
All versions of package realms-shim are vulnerable to Sandbox Bypass via a Prototype Pollution attack vector. | ||||
CVE-2021-23449 | 1 Vm2 Project | 1 Vm2 | 2024-09-17 | 9.8 Critical |
This affects the package vm2 before 3.9.4 via a Prototype Pollution attack vector, which can lead to execution of arbitrary code on the host machine. | ||||
CVE-2021-23760 | 1 Keyget Project | 1 Keyget | 2024-09-17 | 5.6 Medium |
The package keyget from 0.0.0 are vulnerable to Prototype Pollution via the methods set, push, and at which could allow an attacker to cause a denial of service and may lead to remote code execution. **Note:** This vulnerability derives from an incomplete fix to [CVE-2020-28272](https://security.snyk.io/vuln/SNYK-JS-KEYGET-1048048) | ||||
CVE-2020-7701 | 1 Springtree | 1 Madlib-object-utils | 2024-09-17 | 9.8 Critical |
madlib-object-utils before 0.1.7 is vulnerable to Prototype Pollution via setValue. | ||||
CVE-2020-7719 | 1 Locutus | 1 Locutus | 2024-09-17 | 9.8 Critical |
Versions of package locutus before 2.0.12 are vulnerable to prototype Pollution via the php.strings.parse_str function. |