All the vulnerabilities related to the version 2.0.0 of the package
Use of Potentially Dangerous Function in mixme
In Node.js mixme v0.5.0, an attacker can add or alter properties of an object via 'proto' through the mutate() and merge() functions. The polluted attribute will be directly assigned to every object in the program. This will put the availability of the program at risk causing a potential denial of service (DoS).
The problem is corrected starting with version 0.5.1.
Issue: https://github.com/adaltas/node-mixme/issues/1 Commit: https://github.com/adaltas/node-mixme/commit/cfd5fbfc32368bcf7e06d1c5985ea60e34cd4028
Prototype Pollution in mixme
Node.js mixme 0.5.0, an attacker can add or alter properties of an object via 'proto' through the mutate() and merge() functions. The polluted attribute will be directly assigned to every object in the program. This will put the availability of the program at risk causing a potential denial of service (DoS).
Prototype Pollution in mixme
When copying properties from a source object to a target object, the target object can gain access to certain properties of the source object and modify their content.
The problem was patch with a more agressive discovery of secured properties to filter out.