Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2021-23470: Prototype Pollution in putil-merge | CVE-2021-23470 | Snyk

This affects the package putil-merge before 3.8.0. The merge() function does not check the values passed into the argument. An attacker can supply a malicious value by adjusting the value to include the constructor property.

Note: This vulnerability derives from an incomplete fix in https://security.snyk.io/vuln/SNYK-JS-PUTILMERGE-1317077

CVE
#vulnerability#js
  • Attack Complexity

    Low

  • Availability

    High

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

  • snyk-id

    SNYK-JS-PUTILMERGE-2391487

  • published

    3 Feb 2022

  • disclosed

    2 Feb 2022

  • credit

    Cristian-Alexandru Staicu, Abdullah Alhamdan

How to fix?

Overview

Details

Types of attacks

Affected environments

How to prevent

References

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907