Search for packages
| purl | pkg:npm/immer@9.0.2 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-2xa5-ggz7-uudj
Aliases: CVE-2021-3757 GHSA-c36v-fmgq-m8hx |
Improperly Controlled Modification of Dynamically-Determined Object Attributes immer is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') |
Affected by 0 other vulnerabilities. |
|
VCID-48k4-6btj-9kha
Aliases: CVE-2021-23436 GHSA-33f9-j839-rf8h |
Access of Resource Using Incompatible Type (Type Confusion) A type confusion vulnerability can lead to a bypass of CVE-2020-28477 when the user-provided keys used in the path parameter are arrays. In particular, this bypass is possible because the condition `(p === "__proto__" || p === "constructor")` in `applyPatches_` returns false if `p` is `['__proto__']` (or `['constructor']`). The `===` operator (strict equality operator) returns false if the operands have different type. |
Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||