Total
314 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2020-7726 | 1 Safe-object2 Project | 1 Safe-object2 | 2022-12-02 | 7.5 HIGH | 9.8 CRITICAL |
All versions of package safe-object2 are vulnerable to Prototype Pollution via the setter function. | |||||
CVE-2020-7727 | 1 Gedi Project | 1 Gedi | 2022-12-02 | 7.5 HIGH | 9.8 CRITICAL |
All versions of package gedi are vulnerable to Prototype Pollution via the set function. | |||||
CVE-2020-7736 | 1 Bmoor Project | 1 Bmoor | 2022-12-02 | 7.5 HIGH | 9.8 CRITICAL |
The package bmoor before 0.8.12 are vulnerable to Prototype Pollution via the set function. | |||||
CVE-2020-7737 | 1 Safetydance Project | 1 Safetydance | 2022-12-02 | 7.5 HIGH | 9.8 CRITICAL |
All versions of package safetydance are vulnerable to Prototype Pollution via the set function. | |||||
CVE-2020-7748 | 1 Ts.ed Project | 1 Ts.ed | 2022-12-02 | 6.8 MEDIUM | 8.1 HIGH |
This affects the package @tsed/core before 5.65.7. This vulnerability relates to the deepExtend function which is used as part of the utils directory. Depending on if user input is provided, an attacker can overwrite and pollute the object prototype of a program. | |||||
CVE-2020-7766 | 1 Json-ptr Project | 1 Json-ptr | 2022-12-02 | 7.5 HIGH | 9.8 CRITICAL |
This affects all versions of package json-ptr. The issue occurs in the set operation (https://flitbit.github.io/json-ptr/classes/_src_pointer_.jsonpointer.htmlset) when the force flag is set to true. The function recursively set the property in the target object, however it does not properly check the key being set, leading to a prototype pollution. | |||||
CVE-2020-7770 | 1 Json8 Project | 1 Json8 | 2022-12-02 | 7.5 HIGH | 9.8 CRITICAL |
This affects the package json8 before 1.0.3. The function adds in the target object the property specified in the path, however it does not properly check the key being set, leading to a prototype pollution. | |||||
CVE-2020-7746 | 1 Chartjs | 1 Chart.js | 2022-12-02 | 5.0 MEDIUM | 9.8 CRITICAL |
This affects the package chart.js before 2.9.4. The options parameter is not properly sanitized when it is processed. When the options are processed, the existing options (or the defaults options) are deeply merged with provided options. However, during this operation, the keys of the object being set are not checked, leading to a prototype pollution. | |||||
CVE-2020-7768 | 1 Grpc | 1 Grpc | 2022-12-02 | 5.0 MEDIUM | 9.8 CRITICAL |
The package grpc before 1.24.4; the package @grpc/grpc-js before 1.1.8 are vulnerable to Prototype Pollution via loadPackageDefinition. | |||||
CVE-2020-28269 | 1 Exodus | 1 Field | 2022-12-02 | 7.5 HIGH | 9.8 CRITICAL |
Prototype pollution vulnerability in 'field' versions 0.0.1 through 1.0.1 allows attacker to cause a denial of service and may lead to remote code execution. | |||||
CVE-2020-28268 | 1 Controlled-merge Project | 1 Controlled-merge | 2022-12-02 | 5.0 MEDIUM | 7.5 HIGH |
Prototype pollution vulnerability in 'controlled-merge' versions 1.0.0 through 1.2.0 allows attacker to cause a denial of service and may lead to remote code execution. | |||||
CVE-2020-28271 | 1 Deephas Project | 1 Deephas | 2022-12-02 | 7.5 HIGH | 9.8 CRITICAL |
Prototype pollution vulnerability in 'deephas' versions 1.0.0 through 1.0.5 allows attacker to cause a denial of service and may lead to remote code execution. | |||||
CVE-2020-7788 | 2 Debian, Ini Project | 2 Debian Linux, Ini | 2022-12-02 | 7.5 HIGH | 9.8 CRITICAL |
This affects the package ini before 1.3.6. If an attacker submits a malicious INI file to an application that parses it with ini.parse, they will pollute the prototype on the application. This can be exploited further depending on the context. | |||||
CVE-2020-7774 | 3 Oracle, Siemens, Y18n Project | 3 Graalvm, Sinec Infrastructure Network Services, Y18n | 2022-12-02 | 7.5 HIGH | 9.8 CRITICAL |
The package y18n before 3.2.2, 4.0.1 and 5.0.5, is vulnerable to Prototype Pollution. | |||||
CVE-2020-28460 | 1 Multi-ini Project | 1 Multi-ini | 2022-12-02 | 7.5 HIGH | 8.1 HIGH |
This affects the package multi-ini before 2.1.2. It is possible to pollute an object's prototype by specifying the constructor.proto object as part of an array. This is a bypass of CVE-2020-28448. | |||||
CVE-2020-28448 | 1 Multi-ini Project | 1 Multi-ini | 2022-12-02 | 7.5 HIGH | 9.8 CRITICAL |
This affects the package multi-ini before 2.1.1. It is possible to pollute an object's prototype by specifying the proto object as part of an array. | |||||
CVE-2021-27582 | 1 Mitreid | 1 Connect | 2022-12-02 | 6.4 MEDIUM | 9.1 CRITICAL |
org/mitre/oauth2/web/OAuthConfirmationController.java in the OpenID Connect server implementation for MITREid Connect through 1.3.3 contains a Mass Assignment (aka Autobinding) vulnerability. This arises due to unsafe usage of the @ModelAttribute annotation during the OAuth authorization flow, in which HTTP request parameters affect an authorizationRequest. | |||||
CVE-2021-26707 | 2 Merge-deep Project, Netapp | 2 Merge-deep, E-series Performance Analyzer | 2022-12-02 | 7.5 HIGH | 9.8 CRITICAL |
The merge-deep library before 3.0.3 for Node.js can be tricked into overwriting properties of Object.prototype or adding new properties to it. These properties are then inherited by every object in the program, thus facilitating prototype-pollution attacks against applications using this library. | |||||
CVE-2020-24939 | 1 Stampit | 1 Supermixer | 2022-12-02 | 5.0 MEDIUM | 7.5 HIGH |
Prototype pollution in Stampit supermixer 1.0.3 allows an attacker to modify the prototype of a base object which can vary in severity depending on the implementation. | |||||
CVE-2019-10806 | 1 Vega Project | 1 Vega | 2022-12-02 | 4.0 MEDIUM | 4.3 MEDIUM |
vega-util prior to 1.13.1 allows manipulation of object prototype. The 'vega.mergeConfig' method within vega-util could be tricked into adding or modifying properties of the Object.prototype. |