Show filters
19 Total Results
Displaying 1-10 of 19
Sort by:
Attacker Value
Unknown

CVE-2022-24913

Disclosure Date: January 12, 2023 (last updated October 08, 2023)
Versions of the package com.fasterxml.util:java-merge-sort before 1.1.0 are vulnerable to Insecure Temporary File in the StdTempFileProvider() function in StdTempFileProvider.java, which uses the permissive File.createTempFile() function, exposing temporary file contents.
Attacker Value
Unknown

CVE-2022-25907

Disclosure Date: August 09, 2022 (last updated October 08, 2023)
The package ts-deepmerge before 2.0.2 are vulnerable to Prototype Pollution due to missing sanitization of the merge function.
Attacker Value
Unknown

CVE-2021-23397

Disclosure Date: July 25, 2022 (last updated October 07, 2023)
All versions of package @ianwalter/merge are vulnerable to Prototype Pollution via the main (merge) function. Maintainer suggests using @generates/merger instead.
Attacker Value
Unknown

CVE-2022-24802

Disclosure Date: April 01, 2022 (last updated October 07, 2023)
deepmerge-ts is a typescript library providing functionality to deep merging of javascript objects. deepmerge-ts is vulnerable to Prototype Pollution via file deepmerge.ts, function defaultMergeRecords(). This issue has been patched in version 4.0.2. There are no known workarounds for this issue.
Attacker Value
Unknown

CVE-2021-23470

Disclosure Date: February 04, 2022 (last updated February 23, 2025)
This affects the package putil-merge before 3.8.0. The merge() function does not check the values passed into the argument. An attacker can supply a malicious value by adjusting the value to include the constructor property. Note: This vulnerability derives from an incomplete fix in https://security.snyk.io/vuln/SNYK-JS-PUTILMERGE-1317077
Attacker Value
Unknown

CVE-2021-23700

Disclosure Date: December 10, 2021 (last updated February 23, 2025)
All versions of package merge-deep2 are vulnerable to Prototype Pollution via the mergeDeep() function.
Attacker Value
Unknown

CVE-2021-3645

Disclosure Date: September 10, 2021 (last updated February 23, 2025)
merge is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
Attacker Value
Unknown

CVE-2021-23421

Disclosure Date: August 11, 2021 (last updated February 23, 2025)
All versions of package merge-change are vulnerable to Prototype Pollution via the utils.set function.
Attacker Value
Unknown

CVE-2021-25953

Disclosure Date: July 14, 2021 (last updated February 23, 2025)
Prototype pollution vulnerability in 'putil-merge' versions1.0.0 through 3.6.6 allows attacker to cause a denial of service and may lead to remote code execution.
Attacker Value
Unknown

CVE-2021-26707

Disclosure Date: June 02, 2021 (last updated February 22, 2025)
The merge-deep library before 3.0.3 for Node.js can be tricked into overwriting properties of Object.prototype or adding new properties to it. These properties are then inherited by every object in the program, thus facilitating prototype-pollution attacks against applications using this library.