Vulnerabilities (CVE)

Filtered by CWE-1321
Total 342 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-23561 1 C2fo 1 Comb 2024-11-21 7.5 HIGH 6.5 MEDIUM
All versions of package comb are vulnerable to Prototype Pollution via the deepMerge() function.
CVE-2021-23558 1 Bmoor Project 1 Bmoor 2024-11-21 7.5 HIGH 7.3 HIGH
The package bmoor before 0.10.1 are vulnerable to Prototype Pollution due to missing sanitization in set function. **Note:** This vulnerability derives from an incomplete fix in [CVE-2020-7736](https://security.snyk.io/vuln/SNYK-JS-BMOOR-598664)
CVE-2021-23543 1 Agoric 1 Realms-shim 2024-11-21 7.5 HIGH 9.8 CRITICAL
All versions of package realms-shim are vulnerable to Sandbox Bypass via a Prototype Pollution attack vector.
CVE-2021-23518 1 Cached-path-relative Project 1 Cached-path-relative 2024-11-21 7.5 HIGH 7.3 HIGH
The package cached-path-relative before 1.1.0 are vulnerable to Prototype Pollution via the cache variable that is set as {} instead of Object.create(null) in the cachedPathRelative function, which allows access to the parent prototype properties when the object is used to create the cached relative path. When using the origin path as __proto__, the attribute of the object is accessed instead of a path. **Note:** This vulnerability derives from an incomplete fix in https://security.snyk.io/vuln/SNYK-JS-CACHEDPATHRELATIVE-72573
CVE-2021-23507 1 Skratchdot 1 Object-path-set 2024-11-21 7.5 HIGH 7.5 HIGH
The package object-path-set before 1.0.2 are vulnerable to Prototype Pollution via the setPath method, as it allows an attacker to merge object prototypes into it. *Note:* This vulnerability derives from an incomplete fix in https://security.snyk.io/vuln/SNYK-JS-OBJECTPATHSET-607908
CVE-2021-23497 1 Set Project 1 Set 2024-11-21 7.5 HIGH 7.5 HIGH
This affects the package @strikeentco/set before 1.0.2. It allows an attacker to cause a denial of service and may lead to remote code execution. **Note:** This vulnerability derives from an incomplete fix in https://security.snyk.io/vuln/SNYK-JS-STRIKEENTCOSET-1038821
CVE-2021-23470 1 Putil-merge Project 1 Putil-merge 2024-11-21 7.5 HIGH 8.2 HIGH
This affects the package putil-merge before 3.8.0. The merge() function does not check the values passed into the argument. An attacker can supply a malicious value by adjusting the value to include the constructor property. Note: This vulnerability derives from an incomplete fix in https://security.snyk.io/vuln/SNYK-JS-PUTILMERGE-1317077
CVE-2021-23460 1 Camunda 1 Min-dash 2024-11-21 5.0 MEDIUM 7.5 HIGH
The package min-dash before 3.8.1 are vulnerable to Prototype Pollution via the set method due to missing enforcement of key types.
CVE-2021-23452 1 Binaryops 1 X-assign 2024-11-21 7.5 HIGH 8.6 HIGH
This affects all versions of package x-assign. The global proto object can be polluted using the __proto__ object.
CVE-2021-23450 2 Linuxfoundation, Oracle 3 Dojo, Communications Policy Management, Primavera Unifier 2024-11-21 7.5 HIGH 7.5 HIGH
All versions of package dojo are vulnerable to Prototype Pollution via the setObject function.
CVE-2021-23442 1 Cookiex-deep Project 1 Cookiex-deep 2024-11-21 7.5 HIGH 8.6 HIGH
This affects all versions of package @cookiex/deep. The global proto object can be polluted using the __proto__ object.
CVE-2021-23419 1 Open-graph Project 1 Open-graph 2024-11-21 5.0 MEDIUM 7.3 HIGH
This affects the package open-graph before 0.2.6. The function parse could be tricked into adding or modifying properties of Object.prototype using a __proto__ or constructor payload.
CVE-2021-23408 1 Graphhopper 1 Graphhopper 2024-11-21 4.3 MEDIUM 5.4 MEDIUM
This affects the package com.graphhopper:graphhopper-web-bundle before 3.2, from 4.0-pre1 and before 4.0. The URL parser could be tricked into adding or modifying properties of Object.prototype using a constructor or __proto__ payload.
CVE-2021-23397 1 Merge Project 1 Merge 2024-11-21 N/A 5.6 MEDIUM
All versions of package @ianwalter/merge are vulnerable to Prototype Pollution via the main (merge) function. Maintainer suggests using @generates/merger instead.
CVE-2021-23396 1 Lutils Project 1 Lutils 2024-11-21 7.5 HIGH 5.6 MEDIUM
All versions of package lutils are vulnerable to Prototype Pollution via the main (merge) function.
CVE-2021-23395 1 Nedb Project 1 Nedb 2024-11-21 5.0 MEDIUM 7.3 HIGH
This affects all versions of package nedb. The library could be tricked into adding or modifying properties of Object.prototype using a __proto__ or constructor.prototype payload.
CVE-2021-23383 2 Handlebarsjs, Netapp 2 Handlebars, E-series Performance Analyzer 2024-11-21 7.5 HIGH 5.6 MEDIUM
The package handlebars before 4.7.7 are vulnerable to Prototype Pollution when selecting certain compiling options to compile templates coming from an untrusted source.
CVE-2021-23373 1 Set-deep-prop Project 1 Set-deep-prop 2024-11-21 N/A 7.5 HIGH
All versions of package set-deep-prop are vulnerable to Prototype Pollution via the main functionality.
CVE-2021-23329 1 Getadigital 1 Nested-object-assign 2024-11-21 5.0 MEDIUM 7.5 HIGH
The package nested-object-assign before 1.0.4 are vulnerable to Prototype Pollution via the default function, as demonstrated by running the PoC below.
CVE-2021-21368 1 Msgpack5 Project 1 Msgpack5 2024-11-21 6.5 MEDIUM 6.7 MEDIUM
msgpack5 is a msgpack v5 implementation for node.js and the browser. In msgpack5 before versions 3.6.1, 4.5.1, and 5.2.1 there is a "Prototype Poisoning" vulnerability. When msgpack5 decodes a map containing a key "__proto__", it assigns the decoded value to __proto__. Object.prototype.__proto__ is an accessor property for the receiver's prototype. If the value corresponding to the key __proto__ decodes to an object or null, msgpack5 sets the decoded object's prototype to that value. An attacker who can submit crafted MessagePack data to a service can use this to produce values that appear to be of other types; may have unexpected prototype properties and methods (for example length, numeric properties, and push et al if __proto__'s value decodes to an Array); and/or may throw unexpected exceptions when used (for example if the __proto__ value decodes to a Map or Date). Other unexpected behavior might be produced for other types. There is no effect on the global prototype. This "prototype poisoning" is sort of a very limited inversion of a prototype pollution attack. Only the decoded value's prototype is affected, and it can only be set to msgpack5 values (though if the victim makes use of custom codecs, anything could be a msgpack5 value). We have not found a way to escalate this to true prototype pollution (absent other bugs in the consumer's code). This has been fixed in msgpack5 version 3.6.1, 4.5.1, and 5.2.1. See the referenced GitHub Security Advisory for an example and more details.