Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-cu35-t78a-wfcj
Summary
Prototype Pollution in set-value
Versions of `set-value` prior to 3.0.1 or 2.0.1 are vulnerable to Prototype Pollution. The `set` function fails to validate which Object properties it updates. This allows attackers to modify the prototype of Object, causing the addition or modification of an existing property on all objects.




## Recommendation

If you are using `set-value` 3.x, upgrade to version 3.0.1 or later.
If you are using `set-value` 2.x, upgrade to version 2.0.1 or later.
Aliases
0
alias CVE-2019-10747
1
alias GHSA-4g88-fppr-53pp
Fixed_packages
0
url pkg:deb/debian/node-set-value@0.4.0-2?distro=trixie
purl pkg:deb/debian/node-set-value@0.4.0-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-set-value@0.4.0-2%3Fdistro=trixie
1
url pkg:deb/debian/node-set-value@3.0.1-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/node-set-value@3.0.1-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-set-value@3.0.1-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/node-set-value@3.0.1-2%2Bdeb11u1
purl pkg:deb/debian/node-set-value@3.0.1-2%2Bdeb11u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-set-value@3.0.1-2%252Bdeb11u1
3
url pkg:deb/debian/node-set-value@4.1.0%2B~4.0.1-2?distro=trixie
purl pkg:deb/debian/node-set-value@4.1.0%2B~4.0.1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-set-value@4.1.0%252B~4.0.1-2%3Fdistro=trixie
4
url pkg:deb/debian/node-set-value@4.1.0%2B~4.0.3-1?distro=trixie
purl pkg:deb/debian/node-set-value@4.1.0%2B~4.0.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-set-value@4.1.0%252B~4.0.3-1%3Fdistro=trixie
5
url pkg:npm/set-value@2.0.1
purl pkg:npm/set-value@2.0.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/set-value@2.0.1
6
url pkg:npm/set-value@3.0.1
purl pkg:npm/set-value@3.0.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-eq42-z92a-ffet
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/set-value@3.0.1
Affected_packages
0
url pkg:deb/debian/node-set-value@0.4.0-1
purl pkg:deb/debian/node-set-value@0.4.0-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-cu35-t78a-wfcj
1
vulnerability VCID-eq42-z92a-ffet
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-set-value@0.4.0-1
1
url pkg:deb/debian/node-set-value@0.4.0-1%2Bdeb10u1
purl pkg:deb/debian/node-set-value@0.4.0-1%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-cu35-t78a-wfcj
1
vulnerability VCID-eq42-z92a-ffet
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-set-value@0.4.0-1%252Bdeb10u1
2
url pkg:npm/set-value@0.1.0
purl pkg:npm/set-value@0.1.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-cu35-t78a-wfcj
1
vulnerability VCID-eq42-z92a-ffet
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/set-value@0.1.0
3
url pkg:npm/set-value@0.1.1
purl pkg:npm/set-value@0.1.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-cu35-t78a-wfcj
1
vulnerability VCID-eq42-z92a-ffet
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/set-value@0.1.1
4
url pkg:npm/set-value@0.1.2
purl pkg:npm/set-value@0.1.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-cu35-t78a-wfcj
1
vulnerability VCID-eq42-z92a-ffet
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/set-value@0.1.2
5
url pkg:npm/set-value@0.1.3
purl pkg:npm/set-value@0.1.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-cu35-t78a-wfcj
1
vulnerability VCID-eq42-z92a-ffet
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/set-value@0.1.3
6
url pkg:npm/set-value@0.1.4
purl pkg:npm/set-value@0.1.4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-cu35-t78a-wfcj
1
vulnerability VCID-eq42-z92a-ffet
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/set-value@0.1.4
7
url pkg:npm/set-value@0.1.6
purl pkg:npm/set-value@0.1.6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-cu35-t78a-wfcj
1
vulnerability VCID-eq42-z92a-ffet
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/set-value@0.1.6
8
url pkg:npm/set-value@0.2.0
purl pkg:npm/set-value@0.2.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-cu35-t78a-wfcj
1
vulnerability VCID-eq42-z92a-ffet
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/set-value@0.2.0
9
url pkg:npm/set-value@0.3.0
purl pkg:npm/set-value@0.3.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-cu35-t78a-wfcj
1
vulnerability VCID-eq42-z92a-ffet
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/set-value@0.3.0
10
url pkg:npm/set-value@0.3.1
purl pkg:npm/set-value@0.3.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-cu35-t78a-wfcj
1
vulnerability VCID-eq42-z92a-ffet
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/set-value@0.3.1
11
url pkg:npm/set-value@0.3.2
purl pkg:npm/set-value@0.3.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-cu35-t78a-wfcj
1
vulnerability VCID-eq42-z92a-ffet
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/set-value@0.3.2
12
url pkg:npm/set-value@0.3.3
purl pkg:npm/set-value@0.3.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-cu35-t78a-wfcj
1
vulnerability VCID-eq42-z92a-ffet
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/set-value@0.3.3
13
url pkg:npm/set-value@0.4.0
purl pkg:npm/set-value@0.4.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-cu35-t78a-wfcj
1
vulnerability VCID-eq42-z92a-ffet
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/set-value@0.4.0
14
url pkg:npm/set-value@0.4.1
purl pkg:npm/set-value@0.4.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-cu35-t78a-wfcj
1
vulnerability VCID-eq42-z92a-ffet
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/set-value@0.4.1
15
url pkg:npm/set-value@0.4.2
purl pkg:npm/set-value@0.4.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-cu35-t78a-wfcj
1
vulnerability VCID-eq42-z92a-ffet
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/set-value@0.4.2
16
url pkg:npm/set-value@0.4.3
purl pkg:npm/set-value@0.4.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-cu35-t78a-wfcj
1
vulnerability VCID-eq42-z92a-ffet
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/set-value@0.4.3
17
url pkg:npm/set-value@1.0.0
purl pkg:npm/set-value@1.0.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-cu35-t78a-wfcj
1
vulnerability VCID-eq42-z92a-ffet
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/set-value@1.0.0
18
url pkg:npm/set-value@2.0.0
purl pkg:npm/set-value@2.0.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-cu35-t78a-wfcj
1
vulnerability VCID-eq42-z92a-ffet
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/set-value@2.0.0
19
url pkg:npm/set-value@3.0.0
purl pkg:npm/set-value@3.0.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-cu35-t78a-wfcj
1
vulnerability VCID-eq42-z92a-ffet
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/set-value@3.0.0
20
url pkg:rpm/redhat/rh-nodejs12-nodejs@12.20.1-1?arch=el7
purl pkg:rpm/redhat/rh-nodejs12-nodejs@12.20.1-1?arch=el7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-75cr-t5b7-67d8
1
vulnerability VCID-7tyw-ppyt-zqgr
2
vulnerability VCID-cu35-t78a-wfcj
3
vulnerability VCID-k6bh-s1cq-n3a7
4
vulnerability VCID-v5h1-gpt1-97bj
5
vulnerability VCID-zj4d-e8r7-ufg3
6
vulnerability VCID-ztt4-vnk7-7ycq
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-nodejs12-nodejs@12.20.1-1%3Farch=el7
21
url pkg:rpm/redhat/rh-nodejs12-nodejs-nodemon@2.0.3-1?arch=el7
purl pkg:rpm/redhat/rh-nodejs12-nodejs-nodemon@2.0.3-1?arch=el7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-75cr-t5b7-67d8
1
vulnerability VCID-7tyw-ppyt-zqgr
2
vulnerability VCID-cu35-t78a-wfcj
3
vulnerability VCID-k6bh-s1cq-n3a7
4
vulnerability VCID-v5h1-gpt1-97bj
5
vulnerability VCID-zj4d-e8r7-ufg3
6
vulnerability VCID-ztt4-vnk7-7ycq
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-nodejs12-nodejs-nodemon@2.0.3-1%3Farch=el7
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10747.json
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10747.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-10747
reference_id
reference_type
scores
0
value 0.00503
scoring_system epss
scoring_elements 0.66287
published_at 2026-05-14T12:55:00Z
1
value 0.00503
scoring_system epss
scoring_elements 0.66097
published_at 2026-04-04T12:55:00Z
2
value 0.00503
scoring_system epss
scoring_elements 0.66065
published_at 2026-04-07T12:55:00Z
3
value 0.00503
scoring_system epss
scoring_elements 0.66114
published_at 2026-04-08T12:55:00Z
4
value 0.00503
scoring_system epss
scoring_elements 0.66126
published_at 2026-04-09T12:55:00Z
5
value 0.00503
scoring_system epss
scoring_elements 0.66145
published_at 2026-04-11T12:55:00Z
6
value 0.00503
scoring_system epss
scoring_elements 0.66133
published_at 2026-04-12T12:55:00Z
7
value 0.00503
scoring_system epss
scoring_elements 0.66103
published_at 2026-04-13T12:55:00Z
8
value 0.00503
scoring_system epss
scoring_elements 0.66138
published_at 2026-04-16T12:55:00Z
9
value 0.00503
scoring_system epss
scoring_elements 0.66152
published_at 2026-04-18T12:55:00Z
10
value 0.00503
scoring_system epss
scoring_elements 0.66139
published_at 2026-04-21T12:55:00Z
11
value 0.00503
scoring_system epss
scoring_elements 0.6616
published_at 2026-04-24T12:55:00Z
12
value 0.00503
scoring_system epss
scoring_elements 0.66173
published_at 2026-04-26T12:55:00Z
13
value 0.00503
scoring_system epss
scoring_elements 0.66172
published_at 2026-04-29T12:55:00Z
14
value 0.00503
scoring_system epss
scoring_elements 0.6615
published_at 2026-05-05T12:55:00Z
15
value 0.00503
scoring_system epss
scoring_elements 0.66194
published_at 2026-05-07T12:55:00Z
16
value 0.00503
scoring_system epss
scoring_elements 0.66237
published_at 2026-05-09T12:55:00Z
17
value 0.00503
scoring_system epss
scoring_elements 0.66209
published_at 2026-05-11T12:55:00Z
18
value 0.00503
scoring_system epss
scoring_elements 0.66229
published_at 2026-05-12T12:55:00Z
19
value 0.00503
scoring_system epss
scoring_elements 0.66028
published_at 2026-04-01T12:55:00Z
20
value 0.00503
scoring_system epss
scoring_elements 0.66069
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-10747
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10747
3
reference_url https://github.com/jonschlinkert/set-value/commit/95e9d9923f8a8b4a01da1ea138fcc39ec7b6b15f
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/jonschlinkert/set-value/commit/95e9d9923f8a8b4a01da1ea138fcc39ec7b6b15f
4
reference_url https://github.com/jonschlinkert/set-value/commit/cb12f14955dde6e61829d70d1851bfea6a3c31ad
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/jonschlinkert/set-value/commit/cb12f14955dde6e61829d70d1851bfea6a3c31ad
5
reference_url https://lists.apache.org/thread.html/b46f35559c4a97cf74d2dd7fe5a48f8abf2ff37f879083920af9b292@%3Cdev.drat.apache.org%3E
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/b46f35559c4a97cf74d2dd7fe5a48f8abf2ff37f879083920af9b292@%3Cdev.drat.apache.org%3E
6
reference_url https://lists.apache.org/thread.html/b46f35559c4a97cf74d2dd7fe5a48f8abf2ff37f879083920af9b292%40%3Cdev.drat.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/b46f35559c4a97cf74d2dd7fe5a48f8abf2ff37f879083920af9b292%40%3Cdev.drat.apache.org%3E
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3EJ36KV6MXQPUYTFCCTDY54E5Y7QP3AV/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3EJ36KV6MXQPUYTFCCTDY54E5Y7QP3AV/
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E3HNLQZQINMZK6GYB2UTKK4VU7WBV2OT/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E3HNLQZQINMZK6GYB2UTKK4VU7WBV2OT/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EJ36KV6MXQPUYTFCCTDY54E5Y7QP3AV
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EJ36KV6MXQPUYTFCCTDY54E5Y7QP3AV
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EJ36KV6MXQPUYTFCCTDY54E5Y7QP3AV/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EJ36KV6MXQPUYTFCCTDY54E5Y7QP3AV/
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E3HNLQZQINMZK6GYB2UTKK4VU7WBV2OT
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E3HNLQZQINMZK6GYB2UTKK4VU7WBV2OT
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E3HNLQZQINMZK6GYB2UTKK4VU7WBV2OT/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E3HNLQZQINMZK6GYB2UTKK4VU7WBV2OT/
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-10747
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2019-10747
14
reference_url https://snyk.io/vuln/SNYK-JS-SETVALUE-450213
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://snyk.io/vuln/SNYK-JS-SETVALUE-450213
15
reference_url https://www.npmjs.com/advisories/1012
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://www.npmjs.com/advisories/1012
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1795479
reference_id 1795479
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1795479
17
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=941189
reference_id 941189
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=941189
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:set-value_project:set-value:*:*:*:*:*:node.js:*:*
reference_id cpe:2.3:a:set-value_project:set-value:*:*:*:*:*:node.js:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:set-value_project:set-value:*:*:*:*:*:node.js:*:*
19
reference_url https://github.com/advisories/GHSA-4g88-fppr-53pp
reference_id GHSA-4g88-fppr-53pp
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-4g88-fppr-53pp
20
reference_url https://access.redhat.com/errata/RHSA-2021:0485
reference_id RHSA-2021:0485
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0485
21
reference_url https://access.redhat.com/errata/RHSA-2021:0549
reference_id RHSA-2021:0549
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0549
Weaknesses
0
cwe_id 1321
name Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
description The product receives input from an upstream component that specifies attributes that are to be initialized or updated in an object, but it does not properly control modifications of attributes of the object prototype.
1
cwe_id 471
name Modification of Assumed-Immutable Data (MAID)
description The product does not properly protect an assumed-immutable element from being modified by an attacker.
2
cwe_id 1035
name OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017.
3
cwe_id 400
name Uncontrolled Resource Consumption
description The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.
4
cwe_id 937
name OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013.
Exploits
Severity_range_score4.2 - 10.0
Exploitability0.5
Weighted_severity9.0
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-cu35-t78a-wfcj