Vulnerabilities (CVE)

Filtered by CWE-1321
Total 341 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-7699 2 Express-fileupload Project, Netapp 2 Express-fileupload, Max Data 2024-11-21 7.5 HIGH 7.5 HIGH
This affects the package express-fileupload before 1.1.8. If the parseNested option is enabled, sending a corrupt HTTP request can lead to denial of service or arbitrary code execution.
CVE-2020-7679 1 Casperjs 1 Casperjs 2024-11-21 7.5 HIGH 7.3 HIGH
In all versions of package casperjs, the mergeObjects utility function is susceptible to Prototype Pollution.
CVE-2020-7644 1 Fun-map Project 1 Fun-map 2024-11-21 6.8 MEDIUM 8.1 HIGH
fun-map through 3.3.1 is vulnerable to Prototype Pollution. The function assocInM could be tricked into adding or modifying properties of 'Object.prototype' using a '__proto__' payload.
CVE-2020-7643 1 Idea 1 Paypal-adaptive 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
paypal-adaptive through 0.4.2 manipulation of JavaScript objects resulting in Prototype Pollution. The PayPal function could be tricked into adding or modifying properties of Object.prototype using a __proto__ payload.
CVE-2020-7641 1 Grunt-util-property Project 1 Grunt-util-property 2024-11-21 N/A 4.0 MEDIUM
This affects all versions of package grunt-util-property. The function call could be tricked into adding or modifying properties of Object.prototype using a __proto__ payload.
CVE-2020-7639 1 Dot Project 1 Dot 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
eivindfjeldstad-dot below 1.0.3 is vulnerable to Prototype Pollution.The function 'set' could be tricked into adding or modifying properties of 'Object.prototype' using a '__proto__' payload.
CVE-2020-7638 1 Confinit Project 1 Confinit 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
confinit through 0.3.0 is vulnerable to Prototype Pollution.The 'setDeepProperty' function could be tricked into adding or modifying properties of 'Object.prototype' using a '__proto__' payload.
CVE-2020-7637 1 Class-transformer Project 1 Class-transformer 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
class-transformer before 0.3.1 allow attackers to perform Prototype Pollution. The classToPlainFromExist function could be tricked into adding or modifying properties of Object.prototype using a __proto__ payload.
CVE-2020-7618 1 Sds Project 1 Sds 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
sds through 3.2.0 is vulnerable to Prototype Pollution.The library could be tricked into adding or modifying properties of the 'Object.prototype' by abusing the 'set' function located in 'js/set.js'.
CVE-2020-7617 1 Ini-parser Project 1 Ini-parser 2024-11-21 7.5 HIGH 4.4 MEDIUM
ini-parser through 0.0.2 is vulnerable to Prototype Pollution.The library could be tricked into adding or modifying properties of Object.prototype using a '__proto__' payload.
CVE-2020-7616 1 Express-mock-middleware Project 1 Express-mock-middleware 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
express-mock-middleware through 0.0.6 is vulnerable to Prototype Pollution. Exported functions by the package can be tricked into adding or modifying properties of the `Object.prototype`. Exploitation of this vulnerability requires creation of a new directory where an attack code can be placed which will then be exported by `express-mock-middleware`. As such, this is considered to be a low risk.
CVE-2020-7608 1 Yargs 1 Yargs-parser 2024-11-21 4.6 MEDIUM 5.3 MEDIUM
yargs-parser could be tricked into adding or modifying properties of Object.prototype using a "__proto__" payload.
CVE-2020-7600 1 Querymen Project 1 Querymen 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
querymen prior to 2.1.4 allows modification of object properties. The parameters of exported function handler(type, name, fn) can be controlled by users without any sanitization. This could be abused for Prototype Pollution attacks.
CVE-2020-7598 2 Opensuse, Substack 2 Leap, Minimist 2024-11-21 6.8 MEDIUM 5.6 MEDIUM
minimist before 1.2.2 could be tricked into adding or modifying properties of Object.prototype using a "constructor" or "__proto__" payload.
CVE-2020-36632 1 Flat Project 1 Flat 2024-11-21 N/A 6.3 MEDIUM
A vulnerability, which was classified as critical, was found in hughsk flat up to 5.0.0. This affects the function unflatten of the file index.js. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). It is possible to initiate the attack remotely. Upgrading to version 5.0.1 is able to address this issue. The name of the patch is 20ef0ef55dfa028caddaedbcb33efbdb04d18e13. It is recommended to upgrade the affected component. The identifier VDB-216777 was assigned to this vulnerability.
CVE-2020-36618 1 Furqansofware 1 Node Whois 2024-11-21 N/A 6.3 MEDIUM
A vulnerability classified as critical has been found in Furqan node-whois. Affected is an unknown function of the file index.coffee. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). It is possible to launch the attack remotely. The name of the patch is 46ccc2aee8d063c7b6b4dee2c2834113b7286076. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216252.
CVE-2020-36604 1 Hapijs 1 Hoek 2024-11-21 N/A 8.1 HIGH
hoek before 8.5.1 and 9.x before 9.0.3 allows prototype poisoning in the clone function.
CVE-2020-28471 1 Properties-reader Project 1 Properties-reader 2024-11-21 N/A 7.3 HIGH
This affects the package properties-reader before 2.2.0.
CVE-2020-28462 1 Ion-parser Project 1 Ion-parser 2024-11-21 N/A 7.3 HIGH
This affects all versions of package ion-parser. If an attacker submits a malicious INI file to an application that parses it with parse , they will pollute the prototype on the application. This can be exploited further depending on the context.
CVE-2020-28461 1 Js-ini Project 1 Js-ini 2024-11-21 N/A 7.3 HIGH
This affects the package js-ini before 1.3.0. If an attacker submits a malicious INI file to an application that parses it with parse , they will pollute the prototype on the application. This can be exploited further depending on the context.