Description
Versions of deeply
prior to 1.0.1 are vulnerable to Prototype Pollution. The package fails to validate which Object properties it updates. This allows attackers to modify the prototype of Object, causing the addition or modification of an existing property on all objects.
Recommendation
Update the deeply
package to the latest compatible version. Followings are version details:
- Affected version(s): < 3.1.0
- Patched version(s): 3.1.0
References
Related Issues
- jsPDF Denial of Service (DoS) - CVE-2025-57810
- MailDev Remote Code Execution - CVE-2024-27448
- vxe-table prototype pollution - CVE-2024-57080
- Cross-Site Scripting in jquery - CVE-2020-7656
- Tags:
- npm
- deeply
Anything's wrong? Let us know Last updated on January 09, 2023