Total
344 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2021-23543 | 1 Agoric | 1 Realms-shim | 2024-09-16 | 9.8 Critical |
All versions of package realms-shim are vulnerable to Sandbox Bypass via a Prototype Pollution attack vector. | ||||
CVE-2021-23433 | 1 Algolia | 1 Algoliasearch-helper | 2024-09-16 | 5.9 Medium |
The package algoliasearch-helper before 3.6.2 are vulnerable to Prototype Pollution due to use of the merge function in src/SearchParameters/index.jsSearchParameters._parseNumbers without any protection against prototype properties. Note that this vulnerability is only exploitable if the implementation allows users to define arbitrary search patterns. | ||||
CVE-2020-28448 | 1 Multi-ini Project | 1 Multi-ini | 2024-09-16 | 5.6 Medium |
This affects the package multi-ini before 2.1.1. It is possible to pollute an object's prototype by specifying the proto object as part of an array. | ||||
CVE-2020-7743 | 2 Mathjs, Redhat | 2 Mathjs, Ansible Tower | 2024-09-16 | 7.3 High |
The package mathjs before 7.5.1 are vulnerable to Prototype Pollution via the deepExtend function that runs upon configuration updates. | ||||
CVE-2020-7713 | 1 Arr-flatten-unflatten Project | 1 Arr-flatten-unflatten | 2024-09-16 | 9.8 Critical |
All versions of package arr-flatten-unflatten are vulnerable to Prototype Pollution via the constructor. | ||||
CVE-2020-7751 | 1 Chaijis | 1 Pathval | 2024-09-16 | 6 Medium |
pathval before version 1.1.1 is vulnerable to prototype pollution. | ||||
CVE-2022-21213 | 1 Moutjs | 1 Mout | 2024-09-16 | 7.5 High |
This affects all versions of package mout. The deepFillIn function can be used to 'fill missing properties recursively', while the deepMixIn mixes objects into the target object, recursively mixing existing child objects as well. In both cases, the key used to access the target object recursively is not checked, leading to exploiting this vulnerability. **Note:** This vulnerability derives from an incomplete fix of [CVE-2020-7792](https://security.snyk.io/vuln/SNYK-JS-MOUT-1014544). | ||||
CVE-2020-7746 | 2 Chartjs, Redhat | 2 Chart.js, Jboss Enterprise Bpms Platform | 2024-09-16 | 7.5 High |
This affects the package chart.js before 2.9.4. The options parameter is not properly sanitized when it is processed. When the options are processed, the existing options (or the defaults options) are deeply merged with provided options. However, during this operation, the keys of the object being set are not checked, leading to a prototype pollution. | ||||
CVE-2022-25862 | 1 Sds Project | 1 Sds | 2024-09-16 | 4 Medium |
This affects the package sds from 0.0.0. The library could be tricked into adding or modifying properties of the Object.prototype by abusing the set function located in js/set.js. **Note:** This vulnerability derives from an incomplete fix to [CVE-2020-7618](https://security.snyk.io/vuln/SNYK-JS-SDS-564123) | ||||
CVE-2021-23383 | 3 Handlebarsjs, Netapp, Redhat | 6 Handlebars, E-series Performance Analyzer, Acm and 3 more | 2024-09-16 | 5.6 Medium |
The package handlebars before 4.7.7 are vulnerable to Prototype Pollution when selecting certain compiling options to compile templates coming from an untrusted source. | ||||
CVE-2021-23397 | 1 Merge Project | 1 Merge | 2024-09-16 | 5.6 Medium |
All versions of package @ianwalter/merge are vulnerable to Prototype Pollution via the main (merge) function. Maintainer suggests using @generates/merger instead. | ||||
CVE-2021-23497 | 1 Set Project | 1 Set | 2024-09-16 | 7.5 High |
This affects the package @strikeentco/set before 1.0.2. It allows an attacker to cause a denial of service and may lead to remote code execution. **Note:** This vulnerability derives from an incomplete fix in https://security.snyk.io/vuln/SNYK-JS-STRIKEENTCOSET-1038821 | ||||
CVE-2021-23396 | 1 Lutils Project | 1 Lutils | 2024-09-16 | 5.6 Medium |
All versions of package lutils are vulnerable to Prototype Pollution via the main (merge) function. | ||||
CVE-2020-7736 | 1 Bmoor Project | 1 Bmoor | 2024-09-16 | 7.3 High |
The package bmoor before 0.8.12 are vulnerable to Prototype Pollution via the set function. | ||||
CVE-2021-23408 | 1 Graphhopper | 1 Graphhopper | 2024-09-16 | 5.4 Medium |
This affects the package com.graphhopper:graphhopper-web-bundle before 3.2, from 4.0-pre1 and before 4.0. The URL parser could be tricked into adding or modifying properties of Object.prototype using a constructor or __proto__ payload. | ||||
CVE-2021-23419 | 1 Open-graph Project | 1 Open-graph | 2024-09-16 | 7.3 High |
This affects the package open-graph before 0.2.6. The function parse could be tricked into adding or modifying properties of Object.prototype using a __proto__ or constructor payload. | ||||
CVE-2020-28461 | 1 Js-ini Project | 1 Js-ini | 2024-09-16 | 7.3 High |
This affects the package js-ini before 1.3.0. If an attacker submits a malicious INI file to an application that parses it with parse , they will pollute the prototype on the application. This can be exploited further depending on the context. | ||||
CVE-2020-7700 | 1 Php.js Project | 1 Php.js | 2024-09-16 | 9.8 Critical |
All versions of phpjs are vulnerable to Prototype Pollution via parse_str. | ||||
CVE-2021-23518 | 3 Cached-path-relative Project, Debian, Redhat | 3 Cached-path-relative, Debian Linux, Acm | 2024-09-16 | 7.3 High |
The package cached-path-relative before 1.1.0 are vulnerable to Prototype Pollution via the cache variable that is set as {} instead of Object.create(null) in the cachedPathRelative function, which allows access to the parent prototype properties when the object is used to create the cached relative path. When using the origin path as __proto__, the attribute of the object is accessed instead of a path. **Note:** This vulnerability derives from an incomplete fix in https://security.snyk.io/vuln/SNYK-JS-CACHEDPATHRELATIVE-72573 | ||||
CVE-2020-28441 | 1 Conf-cfg-ini Project | 1 Conf-cfg-ini | 2024-09-16 | 7.3 High |
This affects the package conf-cfg-ini before 1.2.2. If an attacker submits a malicious INI file to an application that parses it with decode, they will pollute the prototype on the application. This can be exploited further depending on the context. |