Show filters
6 Total Results
Displaying 1-6 of 6
Sort by:
Attacker Value
Unknown

CVE-2024-38986

Disclosure Date: July 30, 2024 (last updated August 09, 2024)
Prototype Pollution in 75lb deep-merge 1.1.1 allows attackers to execute arbitrary code or cause a Denial of Service (DoS) and cause other impacts via merge methods of lodash to merge objects.
Attacker Value
Unknown

CVE-2022-25907

Disclosure Date: August 09, 2022 (last updated October 08, 2023)
The package ts-deepmerge before 2.0.2 are vulnerable to Prototype Pollution due to missing sanitization of the merge function.
Attacker Value
Unknown

CVE-2022-24802

Disclosure Date: April 01, 2022 (last updated October 07, 2023)
deepmerge-ts is a typescript library providing functionality to deep merging of javascript objects. deepmerge-ts is vulnerable to Prototype Pollution via file deepmerge.ts, function defaultMergeRecords(). This issue has been patched in version 4.0.2. There are no known workarounds for this issue.
Attacker Value
Unknown

CVE-2021-23700

Disclosure Date: December 10, 2021 (last updated October 07, 2023)
All versions of package merge-deep2 are vulnerable to Prototype Pollution via the mergeDeep() function.
Attacker Value
Unknown

CVE-2021-26707

Disclosure Date: June 02, 2021 (last updated November 28, 2024)
The merge-deep library before 3.0.3 for Node.js can be tricked into overwriting properties of Object.prototype or adding new properties to it. These properties are then inherited by every object in the program, thus facilitating prototype-pollution attacks against applications using this library.
Attacker Value
Unknown

CVE-2018-3722

Disclosure Date: June 07, 2018 (last updated November 26, 2024)
merge-deep node module before 3.0.1 suffers from a Modification of Assumed-Immutable Data (MAID) vulnerability, which allows a malicious user to modify the prototype of "Object" via __proto__, causing the addition or modification of an existing property that will exist on all objects.
0