Description


All versions of package querymen are vulnerable to Prototype Pollution if the parameters of exported function handler(type, name, fn) can be controlled by users without any sanitization. Note: This vulnerability derives from an incomplete fix of [CVE-2020-7600](https://security.snyk.io/vuln/SNYK-JS-QUERYMEN-559867).

Related CPE's


References



Weaknesses



CWE-1321

CVSS impact metrics


CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

5.9 · Medium

Information


Source identifier

[email protected]

Vulnerability status

Modified

Published

2022-06-17T18:15:10.670Z

3 years ago

Last modified

2024-11-21T05:53:08.677Z

1 year ago