Vulnerabilities (CVE)

Filtered by CWE-1321
Total 314 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-7726 1 Safe-object2 Project 1 Safe-object2 2022-12-02 7.5 HIGH 9.8 CRITICAL
All versions of package safe-object2 are vulnerable to Prototype Pollution via the setter function.
CVE-2020-7727 1 Gedi Project 1 Gedi 2022-12-02 7.5 HIGH 9.8 CRITICAL
All versions of package gedi are vulnerable to Prototype Pollution via the set function.
CVE-2020-7736 1 Bmoor Project 1 Bmoor 2022-12-02 7.5 HIGH 9.8 CRITICAL
The package bmoor before 0.8.12 are vulnerable to Prototype Pollution via the set function.
CVE-2020-7737 1 Safetydance Project 1 Safetydance 2022-12-02 7.5 HIGH 9.8 CRITICAL
All versions of package safetydance are vulnerable to Prototype Pollution via the set function.
CVE-2020-7748 1 Ts.ed Project 1 Ts.ed 2022-12-02 6.8 MEDIUM 8.1 HIGH
This affects the package @tsed/core before 5.65.7. This vulnerability relates to the deepExtend function which is used as part of the utils directory. Depending on if user input is provided, an attacker can overwrite and pollute the object prototype of a program.
CVE-2020-7766 1 Json-ptr Project 1 Json-ptr 2022-12-02 7.5 HIGH 9.8 CRITICAL
This affects all versions of package json-ptr. The issue occurs in the set operation (https://flitbit.github.io/json-ptr/classes/_src_pointer_.jsonpointer.htmlset) when the force flag is set to true. The function recursively set the property in the target object, however it does not properly check the key being set, leading to a prototype pollution.
CVE-2020-7770 1 Json8 Project 1 Json8 2022-12-02 7.5 HIGH 9.8 CRITICAL
This affects the package json8 before 1.0.3. The function adds in the target object the property specified in the path, however it does not properly check the key being set, leading to a prototype pollution.
CVE-2020-7746 1 Chartjs 1 Chart.js 2022-12-02 5.0 MEDIUM 9.8 CRITICAL
This affects the package chart.js before 2.9.4. The options parameter is not properly sanitized when it is processed. When the options are processed, the existing options (or the defaults options) are deeply merged with provided options. However, during this operation, the keys of the object being set are not checked, leading to a prototype pollution.
CVE-2020-7768 1 Grpc 1 Grpc 2022-12-02 5.0 MEDIUM 9.8 CRITICAL
The package grpc before 1.24.4; the package @grpc/grpc-js before 1.1.8 are vulnerable to Prototype Pollution via loadPackageDefinition.
CVE-2020-28269 1 Exodus 1 Field 2022-12-02 7.5 HIGH 9.8 CRITICAL
Prototype pollution vulnerability in 'field' versions 0.0.1 through 1.0.1 allows attacker to cause a denial of service and may lead to remote code execution.
CVE-2020-28268 1 Controlled-merge Project 1 Controlled-merge 2022-12-02 5.0 MEDIUM 7.5 HIGH
Prototype pollution vulnerability in 'controlled-merge' versions 1.0.0 through 1.2.0 allows attacker to cause a denial of service and may lead to remote code execution.
CVE-2020-28271 1 Deephas Project 1 Deephas 2022-12-02 7.5 HIGH 9.8 CRITICAL
Prototype pollution vulnerability in 'deephas' versions 1.0.0 through 1.0.5 allows attacker to cause a denial of service and may lead to remote code execution.
CVE-2020-7788 2 Debian, Ini Project 2 Debian Linux, Ini 2022-12-02 7.5 HIGH 9.8 CRITICAL
This affects the package ini before 1.3.6. If an attacker submits a malicious INI file to an application that parses it with ini.parse, they will pollute the prototype on the application. This can be exploited further depending on the context.
CVE-2020-7774 3 Oracle, Siemens, Y18n Project 3 Graalvm, Sinec Infrastructure Network Services, Y18n 2022-12-02 7.5 HIGH 9.8 CRITICAL
The package y18n before 3.2.2, 4.0.1 and 5.0.5, is vulnerable to Prototype Pollution.
CVE-2020-28460 1 Multi-ini Project 1 Multi-ini 2022-12-02 7.5 HIGH 8.1 HIGH
This affects the package multi-ini before 2.1.2. It is possible to pollute an object's prototype by specifying the constructor.proto object as part of an array. This is a bypass of CVE-2020-28448.
CVE-2020-28448 1 Multi-ini Project 1 Multi-ini 2022-12-02 7.5 HIGH 9.8 CRITICAL
This affects the package multi-ini before 2.1.1. It is possible to pollute an object's prototype by specifying the proto object as part of an array.
CVE-2021-27582 1 Mitreid 1 Connect 2022-12-02 6.4 MEDIUM 9.1 CRITICAL
org/mitre/oauth2/web/OAuthConfirmationController.java in the OpenID Connect server implementation for MITREid Connect through 1.3.3 contains a Mass Assignment (aka Autobinding) vulnerability. This arises due to unsafe usage of the @ModelAttribute annotation during the OAuth authorization flow, in which HTTP request parameters affect an authorizationRequest.
CVE-2021-26707 2 Merge-deep Project, Netapp 2 Merge-deep, E-series Performance Analyzer 2022-12-02 7.5 HIGH 9.8 CRITICAL
The merge-deep library before 3.0.3 for Node.js can be tricked into overwriting properties of Object.prototype or adding new properties to it. These properties are then inherited by every object in the program, thus facilitating prototype-pollution attacks against applications using this library.
CVE-2020-24939 1 Stampit 1 Supermixer 2022-12-02 5.0 MEDIUM 7.5 HIGH
Prototype pollution in Stampit supermixer 1.0.3 allows an attacker to modify the prototype of a base object which can vary in severity depending on the implementation.
CVE-2019-10806 1 Vega Project 1 Vega 2022-12-02 4.0 MEDIUM 4.3 MEDIUM
vega-util prior to 1.13.1 allows manipulation of object prototype. The 'vega.mergeConfig' method within vega-util could be tricked into adding or modifying properties of the Object.prototype.