Total
341 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2021-23597 | 1 Fastify | 1 Fastify-multipart | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
This affects the package fastify-multipart before 5.3.1. By providing a name=constructor property it is still possible to crash the application. **Note:** This is a bypass of CVE-2020-8136 (https://security.snyk.io/vuln/SNYK-JS-FASTIFYMULTIPART-1290382). | |||||
CVE-2021-23594 | 1 Agoric | 1 Realms-shim | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
All versions of package realms-shim are vulnerable to Sandbox Bypass via a Prototype Pollution attack vector. | |||||
CVE-2021-23574 | 1 Js-data | 1 Js-data | 2024-11-21 | 7.5 HIGH | 7.5 HIGH |
All versions of package js-data are vulnerable to Prototype Pollution via the deepFillIn and the set functions. This is an incomplete fix of [CVE-2020-28442](https://snyk.io/vuln/SNYK-JS-JSDATA-1023655). | |||||
CVE-2021-23568 | 1 Eggjs | 1 Extend2 | 2024-11-21 | 7.5 HIGH | 7.3 HIGH |
The package extend2 before 1.0.1 are vulnerable to Prototype Pollution via the extend function due to unsafe recursive merge. | |||||
CVE-2021-23561 | 1 C2fo | 1 Comb | 2024-11-21 | 7.5 HIGH | 6.5 MEDIUM |
All versions of package comb are vulnerable to Prototype Pollution via the deepMerge() function. | |||||
CVE-2021-23558 | 1 Bmoor Project | 1 Bmoor | 2024-11-21 | 7.5 HIGH | 7.3 HIGH |
The package bmoor before 0.10.1 are vulnerable to Prototype Pollution due to missing sanitization in set function. **Note:** This vulnerability derives from an incomplete fix in [CVE-2020-7736](https://security.snyk.io/vuln/SNYK-JS-BMOOR-598664) | |||||
CVE-2021-23543 | 1 Agoric | 1 Realms-shim | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
All versions of package realms-shim are vulnerable to Sandbox Bypass via a Prototype Pollution attack vector. | |||||
CVE-2021-23518 | 2 Cached-path-relative Project, Debian | 2 Cached-path-relative, Debian Linux | 2024-11-21 | 7.5 HIGH | 7.3 HIGH |
The package cached-path-relative before 1.1.0 are vulnerable to Prototype Pollution via the cache variable that is set as {} instead of Object.create(null) in the cachedPathRelative function, which allows access to the parent prototype properties when the object is used to create the cached relative path. When using the origin path as __proto__, the attribute of the object is accessed instead of a path. **Note:** This vulnerability derives from an incomplete fix in https://security.snyk.io/vuln/SNYK-JS-CACHEDPATHRELATIVE-72573 | |||||
CVE-2021-23507 | 1 Skratchdot | 1 Object-path-set | 2024-11-21 | 7.5 HIGH | 7.5 HIGH |
The package object-path-set before 1.0.2 are vulnerable to Prototype Pollution via the setPath method, as it allows an attacker to merge object prototypes into it. *Note:* This vulnerability derives from an incomplete fix in https://security.snyk.io/vuln/SNYK-JS-OBJECTPATHSET-607908 | |||||
CVE-2021-23497 | 1 Set Project | 1 Set | 2024-11-21 | 7.5 HIGH | 7.5 HIGH |
This affects the package @strikeentco/set before 1.0.2. It allows an attacker to cause a denial of service and may lead to remote code execution. **Note:** This vulnerability derives from an incomplete fix in https://security.snyk.io/vuln/SNYK-JS-STRIKEENTCOSET-1038821 | |||||
CVE-2021-23470 | 1 Putil-merge Project | 1 Putil-merge | 2024-11-21 | 7.5 HIGH | 8.2 HIGH |
This affects the package putil-merge before 3.8.0. The merge() function does not check the values passed into the argument. An attacker can supply a malicious value by adjusting the value to include the constructor property. Note: This vulnerability derives from an incomplete fix in https://security.snyk.io/vuln/SNYK-JS-PUTILMERGE-1317077 | |||||
CVE-2021-23460 | 1 Camunda | 1 Min-dash | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
The package min-dash before 3.8.1 are vulnerable to Prototype Pollution via the set method due to missing enforcement of key types. | |||||
CVE-2021-23452 | 1 Binaryops | 1 X-assign | 2024-11-21 | 7.5 HIGH | 8.6 HIGH |
This affects all versions of package x-assign. The global proto object can be polluted using the __proto__ object. | |||||
CVE-2021-23450 | 3 Debian, Linuxfoundation, Oracle | 5 Debian Linux, Dojo, Communications Policy Management and 2 more | 2024-11-21 | 7.5 HIGH | 7.5 HIGH |
All versions of package dojo are vulnerable to Prototype Pollution via the setObject function. | |||||
CVE-2021-23449 | 1 Vm2 Project | 1 Vm2 | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
This affects the package vm2 before 3.9.4 via a Prototype Pollution attack vector, which can lead to execution of arbitrary code on the host machine. | |||||
CVE-2021-23448 | 1 Config-handler Project | 1 Config-handler | 2024-11-21 | 7.5 HIGH | 6.5 MEDIUM |
All versions of package config-handler are vulnerable to Prototype Pollution when loading config files. | |||||
CVE-2021-23442 | 1 Cookiex-deep Project | 1 Cookiex-deep | 2024-11-21 | 7.5 HIGH | 8.6 HIGH |
This affects all versions of package @cookiex/deep. The global proto object can be polluted using the __proto__ object. | |||||
CVE-2021-23433 | 1 Algolia | 1 Algoliasearch-helper | 2024-11-21 | 6.8 MEDIUM | 5.9 MEDIUM |
The package algoliasearch-helper before 3.6.2 are vulnerable to Prototype Pollution due to use of the merge function in src/SearchParameters/index.jsSearchParameters._parseNumbers without any protection against prototype properties. Note that this vulnerability is only exploitable if the implementation allows users to define arbitrary search patterns. | |||||
CVE-2021-23421 | 1 Merge-change Project | 1 Merge-change | 2024-11-21 | 7.5 HIGH | 5.6 MEDIUM |
All versions of package merge-change are vulnerable to Prototype Pollution via the utils.set function. | |||||
CVE-2021-23419 | 1 Open-graph Project | 1 Open-graph | 2024-11-21 | 5.0 MEDIUM | 7.3 HIGH |
This affects the package open-graph before 0.2.6. The function parse could be tricked into adding or modifying properties of Object.prototype using a __proto__ or constructor payload. |