All the vulnerabilities related to the version 1.5.0 of the package
Redoc Prototype Pollution via Module.mergeObjects
Component
A prototype pollution in the component Module.mergeObjects (redoc/bundles/redoc.lib.js:2) of redoc <= 2.2.0 allows attackers to cause a Denial of Service (DoS) via supplying a crafted payload.
Command Injection in lodash
lodash
versions prior to 4.17.21 are vulnerable to Command Injection via the template function.
json-pointer vulnerable to Prototype Pollution
A vulnerability, which was classified as critical, has been found in json-pointer up to 0.6.1. Affected by this issue is the function set of the file index.js. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). The attack may be launched remotely. Upgrading to version 0.6.2 is able to address this issue. The patch is identified as 859c9984b6c407fc2d5a0a7e47c7274daa681941. It is recommended to upgrade the affected component. VDB-216794 is the identifier assigned to this vulnerability.
Prototype pollution in json-pointer
This affects the package json-pointer before 0.6.1. Multiple reference of object using slash is supported.
Prototype Pollution in json-pointer
This affects versions of package json-pointer
up to and including 0.6.1
. A type confusion vulnerability can lead to a bypass of CVE-2020-7709 when the pointer components are arrays.
Inefficient Regular Expression Complexity in validator.js
validator.js prior to 13.7.0 is vulnerable to Inefficient Regular Expression Complexity