Show filters
19 Total Results
Displaying 1-10 of 19
Sort by:
Attacker Value
Unknown
CVE-2022-24913
Disclosure Date: January 12, 2023 (last updated October 08, 2023)
Versions of the package com.fasterxml.util:java-merge-sort before 1.1.0 are vulnerable to Insecure Temporary File in the StdTempFileProvider() function in StdTempFileProvider.java, which uses the permissive File.createTempFile() function, exposing temporary file contents.
0
Attacker Value
Unknown
CVE-2022-25907
Disclosure Date: August 09, 2022 (last updated October 08, 2023)
The package ts-deepmerge before 2.0.2 are vulnerable to Prototype Pollution due to missing sanitization of the merge function.
0
Attacker Value
Unknown
CVE-2021-23397
Disclosure Date: July 25, 2022 (last updated October 07, 2023)
All versions of package @ianwalter/merge are vulnerable to Prototype Pollution via the main (merge) function. Maintainer suggests using @generates/merger instead.
0
Attacker Value
Unknown
CVE-2022-24802
Disclosure Date: April 01, 2022 (last updated October 07, 2023)
deepmerge-ts is a typescript library providing functionality to deep merging of javascript objects. deepmerge-ts is vulnerable to Prototype Pollution via file deepmerge.ts, function defaultMergeRecords(). This issue has been patched in version 4.0.2. There are no known workarounds for this issue.
0
Attacker Value
Unknown
CVE-2021-23470
Disclosure Date: February 04, 2022 (last updated February 23, 2025)
This affects the package putil-merge before 3.8.0. The merge() function does not check the values passed into the argument. An attacker can supply a malicious value by adjusting the value to include the constructor property. Note: This vulnerability derives from an incomplete fix in https://security.snyk.io/vuln/SNYK-JS-PUTILMERGE-1317077
0
Attacker Value
Unknown
CVE-2021-23700
Disclosure Date: December 10, 2021 (last updated February 23, 2025)
All versions of package merge-deep2 are vulnerable to Prototype Pollution via the mergeDeep() function.
0
Attacker Value
Unknown
CVE-2021-3645
Disclosure Date: September 10, 2021 (last updated February 23, 2025)
merge is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
0
Attacker Value
Unknown
CVE-2021-23421
Disclosure Date: August 11, 2021 (last updated February 23, 2025)
All versions of package merge-change are vulnerable to Prototype Pollution via the utils.set function.
0
Attacker Value
Unknown
CVE-2021-25953
Disclosure Date: July 14, 2021 (last updated February 23, 2025)
Prototype pollution vulnerability in 'putil-merge' versions1.0.0 through 3.6.6 allows attacker to cause a denial of service and may lead to remote code execution.
0
Attacker Value
Unknown
CVE-2021-26707
Disclosure Date: June 02, 2021 (last updated February 22, 2025)
The merge-deep library before 3.0.3 for Node.js can be tricked into overwriting properties of Object.prototype or adding new properties to it. These properties are then inherited by every object in the program, thus facilitating prototype-pollution attacks against applications using this library.
0