2 results (0.002 seconds)

CVSS: 6.9EPSS: 0%CPEs: 2EXPL: 0

@intlify/shared is a shared library for the intlify project. The latest version of @intlify/shared (10.0.4) is vulnerable to Prototype Pollution through the entry function(s) lib.deepCopy. An attacker can supply a payload with Object.prototype setter to introduce or modify properties within the global prototype chain, causing denial of service (DoS) as the minimum consequence. Moreover, the consequences of this vulnerability can escalate to other injection-based attacks, depending on how the library integrates within the application. For instance, if the polluted property propagates to sensitive Node.js APIs (e.g., exec, eval), it could enable an attacker to execute arbitrary commands within the application's context. • https://github.com/intlify/vue-i18n/commit/9f20909ef8c9232a1072d7818e12ed6d6451024d https://github.com/intlify/vue-i18n/security/advisories/GHSA-hjwq-mjwj-4x6c • CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') •

CVSS: 5.3EPSS: 0%CPEs: 2EXPL: 0

vue-i18n is an internationalization plugin for Vue.js. In affected versions vue-i18n can be passed locale messages to `createI18n` or `useI18n`. When locale message ASTs are generated in development mode there is a possibility of Cross-site Scripting attack. This issue has been addressed in versions 9.14.2, and 10.0.5. Users are advised to upgrade. • https://github.com/intlify/vue-i18n/commit/72f0d323006fc7363b18cab62d4522dadd874411 https://github.com/intlify/vue-i18n/commit/9f20909ef8c9232a1072d7818e12ed6d6451024d https://github.com/intlify/vue-i18n/security/advisories/GHSA-9r9m-ffp6-9x4v • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •