Lookup for vulnerable packages by Package URL.

Purlpkg:npm/mixin-deep@1.1.3
Typenpm
Namespace
Namemixin-deep
Version1.1.3
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version1.3.2
Latest_non_vulnerable_version2.0.1
Affected_by_vulnerabilities
0
url VCID-3ypb-mgu7-s7c4
vulnerability_id VCID-3ypb-mgu7-s7c4
summary
Denial of Service and remote code execution.
Utilities function in mixin-deep can be tricked into modify the prototype of "Object" when the attacker control part of the structure passed to these function. This can let an attacker add or modify existing property that will exist on all object, leading to denial of service or remote code execution.
references
0
reference_url https://github.com/jonschlinkert/mixin-deep/commit/578b0bc5e74e14de9ef4975f504dc698796bdf9c
reference_id
reference_type
scores
url https://github.com/jonschlinkert/mixin-deep/commit/578b0bc5e74e14de9ef4975f504dc698796bdf9c
1
reference_url https://hackerone.com/reports/311236
reference_id
reference_type
scores
url https://hackerone.com/reports/311236
fixed_packages
0
url pkg:npm/mixin-deep@1.3.1
purl pkg:npm/mixin-deep@1.3.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-75cr-t5b7-67d8
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/mixin-deep@1.3.1
aliases GMS-2018-14
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3ypb-mgu7-s7c4
1
url VCID-75cr-t5b7-67d8
vulnerability_id VCID-75cr-t5b7-67d8
summary
Prototype Pollution in mixin-deep
Versions of `mixin-deep` prior to 2.0.1 or 1.3.2 are vulnerable to Prototype Pollution. The `mixinDeep` function fails to validate which Object properties it updates. This allows attackers to modify the prototype of Object, causing the addition or modification of an existing property on all objects.


## Recommendation

If you are using `mixin-deep` 2.x, upgrade to version 2.0.1 or later.
If you are using `mixin-deep` 1.x, upgrade to version 1.3.2 or later.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10746.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10746.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-10746
reference_id
reference_type
scores
0
value 0.01131
scoring_system epss
scoring_elements 0.78406
published_at 2026-04-29T12:55:00Z
1
value 0.01131
scoring_system epss
scoring_elements 0.7839
published_at 2026-04-26T12:55:00Z
2
value 0.01131
scoring_system epss
scoring_elements 0.78383
published_at 2026-04-24T12:55:00Z
3
value 0.01131
scoring_system epss
scoring_elements 0.7835
published_at 2026-04-21T12:55:00Z
4
value 0.01131
scoring_system epss
scoring_elements 0.78352
published_at 2026-04-18T12:55:00Z
5
value 0.01131
scoring_system epss
scoring_elements 0.78354
published_at 2026-04-16T12:55:00Z
6
value 0.01131
scoring_system epss
scoring_elements 0.78325
published_at 2026-04-13T12:55:00Z
7
value 0.01131
scoring_system epss
scoring_elements 0.78332
published_at 2026-04-12T12:55:00Z
8
value 0.01131
scoring_system epss
scoring_elements 0.78349
published_at 2026-04-11T12:55:00Z
9
value 0.01131
scoring_system epss
scoring_elements 0.78323
published_at 2026-04-09T12:55:00Z
10
value 0.01131
scoring_system epss
scoring_elements 0.78317
published_at 2026-04-08T12:55:00Z
11
value 0.01131
scoring_system epss
scoring_elements 0.78291
published_at 2026-04-07T12:55:00Z
12
value 0.01131
scoring_system epss
scoring_elements 0.78309
published_at 2026-04-04T12:55:00Z
13
value 0.01131
scoring_system epss
scoring_elements 0.78278
published_at 2026-04-02T12:55:00Z
14
value 0.01131
scoring_system epss
scoring_elements 0.78271
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-10746
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10746
3
reference_url https://github.com/jonschlinkert/mixin-deep/commit/8f464c8ce9761a8c9c2b3457eaeee9d404fa7af9
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/jonschlinkert/mixin-deep/commit/8f464c8ce9761a8c9c2b3457eaeee9d404fa7af9
4
reference_url https://github.com/jonschlinkert/mixin-deep/commit/90ee1fab375fccfd9b926df718243339b4976d50
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/jonschlinkert/mixin-deep/commit/90ee1fab375fccfd9b926df718243339b4976d50
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BFNIVG2XYFPZJY3DYYBJASZ7ZMKBMIJT/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BFNIVG2XYFPZJY3DYYBJASZ7ZMKBMIJT/
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UXRA365KZCUNXMU3KDH5JN5BEPNIGUKC/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UXRA365KZCUNXMU3KDH5JN5BEPNIGUKC/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFNIVG2XYFPZJY3DYYBJASZ7ZMKBMIJT
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFNIVG2XYFPZJY3DYYBJASZ7ZMKBMIJT
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFNIVG2XYFPZJY3DYYBJASZ7ZMKBMIJT/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFNIVG2XYFPZJY3DYYBJASZ7ZMKBMIJT/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UXRA365KZCUNXMU3KDH5JN5BEPNIGUKC
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UXRA365KZCUNXMU3KDH5JN5BEPNIGUKC
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UXRA365KZCUNXMU3KDH5JN5BEPNIGUKC/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UXRA365KZCUNXMU3KDH5JN5BEPNIGUKC/
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-10746
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2019-10746
12
reference_url https://snyk.io/vuln/SNYK-JS-MIXINDEEP-450212
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://snyk.io/vuln/SNYK-JS-MIXINDEEP-450212
13
reference_url https://www.npmjs.com/advisories/1013
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://www.npmjs.com/advisories/1013
14
reference_url https://www.oracle.com//security-alerts/cpujul2021.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://www.oracle.com//security-alerts/cpujul2021.html
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1795475
reference_id 1795475
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1795475
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=932500
reference_id 932500
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=932500
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mixin-deep_project:mixin-deep:2.0.0:*:*:*:*:node.js:*:*
reference_id cpe:2.3:a:mixin-deep_project:mixin-deep:2.0.0:*:*:*:*:node.js:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mixin-deep_project:mixin-deep:2.0.0:*:*:*:*:node.js:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mixin-deep_project:mixin-deep:*:*:*:*:*:node.js:*:*
reference_id cpe:2.3:a:mixin-deep_project:mixin-deep:*:*:*:*:*:node.js:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mixin-deep_project:mixin-deep:*:*:*:*:*:node.js:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:1.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:1.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:1.4.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
22
reference_url https://github.com/advisories/GHSA-fhjf-83wg-r2j9
reference_id GHSA-fhjf-83wg-r2j9
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-fhjf-83wg-r2j9
23
reference_url https://access.redhat.com/errata/RHSA-2021:0485
reference_id RHSA-2021:0485
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0485
24
reference_url https://access.redhat.com/errata/RHSA-2021:0549
reference_id RHSA-2021:0549
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0549
fixed_packages
0
url pkg:npm/mixin-deep@1.3.2
purl pkg:npm/mixin-deep@1.3.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/mixin-deep@1.3.2
1
url pkg:npm/mixin-deep@2.0.1
purl pkg:npm/mixin-deep@2.0.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/mixin-deep@2.0.1
aliases CVE-2019-10746, GHSA-fhjf-83wg-r2j9
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-75cr-t5b7-67d8
2
url VCID-f918-yz1e-q7h2
vulnerability_id VCID-f918-yz1e-q7h2
summary
Improper Input Validation
mixin-deep node suffers from a Modification of Assumed-Immutable Data (MAID) vulnerability, which allows a malicious user to modify the prototype of `Object` via `__proto__`, causing the addition or modification of an existing property that will exist on all objects.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3719.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3719.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-3719
reference_id
reference_type
scores
0
value 0.00542
scoring_system epss
scoring_elements 0.67763
published_at 2026-04-29T12:55:00Z
1
value 0.00542
scoring_system epss
scoring_elements 0.67748
published_at 2026-04-18T12:55:00Z
2
value 0.00542
scoring_system epss
scoring_elements 0.67657
published_at 2026-04-02T12:55:00Z
3
value 0.00542
scoring_system epss
scoring_elements 0.67678
published_at 2026-04-04T12:55:00Z
4
value 0.00542
scoring_system epss
scoring_elements 0.67658
published_at 2026-04-07T12:55:00Z
5
value 0.00542
scoring_system epss
scoring_elements 0.6771
published_at 2026-04-08T12:55:00Z
6
value 0.00542
scoring_system epss
scoring_elements 0.67724
published_at 2026-04-09T12:55:00Z
7
value 0.00542
scoring_system epss
scoring_elements 0.67747
published_at 2026-04-11T12:55:00Z
8
value 0.00542
scoring_system epss
scoring_elements 0.67732
published_at 2026-04-12T12:55:00Z
9
value 0.00542
scoring_system epss
scoring_elements 0.67699
published_at 2026-04-13T12:55:00Z
10
value 0.00542
scoring_system epss
scoring_elements 0.67735
published_at 2026-04-16T12:55:00Z
11
value 0.00542
scoring_system epss
scoring_elements 0.6776
published_at 2026-04-26T12:55:00Z
12
value 0.00542
scoring_system epss
scoring_elements 0.67749
published_at 2026-04-24T12:55:00Z
13
value 0.00542
scoring_system epss
scoring_elements 0.67621
published_at 2026-04-01T12:55:00Z
14
value 0.00542
scoring_system epss
scoring_elements 0.6773
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-3719
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3719
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3719
3
reference_url https://github.com/advisories/GHSA-3mpr-hq3p-49h9
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/advisories/GHSA-3mpr-hq3p-49h9
4
reference_url https://github.com/jonschlinkert/mixin-deep/commit/578b0bc5e74e14de9ef4975f504dc698796bdf9c
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/jonschlinkert/mixin-deep/commit/578b0bc5e74e14de9ef4975f504dc698796bdf9c
5
reference_url https://hackerone.com/reports/311236
reference_id
reference_type
scores
0
value 1.8
scoring_system cvssv3
scoring_elements
1
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://hackerone.com/reports/311236
6
reference_url https://www.npmjs.com/advisories/578
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.npmjs.com/advisories/578
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1576648
reference_id 1576648
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1576648
8
reference_url https://github.com/nodejs/security-wg/blob/main/vuln/npm/369.json
reference_id 369
reference_type
scores
0
value 1.8
scoring_system cvssv3
scoring_elements
url https://github.com/nodejs/security-wg/blob/main/vuln/npm/369.json
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=898315
reference_id 898315
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=898315
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mixin-deep_project:mixin-deep:*:*:*:*:*:node.js:*:*
reference_id cpe:2.3:a:mixin-deep_project:mixin-deep:*:*:*:*:*:node.js:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mixin-deep_project:mixin-deep:*:*:*:*:*:node.js:*:*
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-3719
reference_id CVE-2018-3719
reference_type
scores
0
value 6.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2018-3719
fixed_packages
0
url pkg:npm/mixin-deep@1.3.1
purl pkg:npm/mixin-deep@1.3.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-75cr-t5b7-67d8
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/mixin-deep@1.3.1
aliases CVE-2018-3719, GHSA-3mpr-hq3p-49h9
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f918-yz1e-q7h2
Fixing_vulnerabilities
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:npm/mixin-deep@1.1.3