|Description||set-value is vulnerable to Prototype Pollution in versions lower than 3.0.1. The function mixin-deep could be tricked into adding or modifying properties of Object.prototype using any of the constructor, prototype and _proto_ payloads.|
|Source||CVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)|
|NVD severity||high (attack range: remote)|
Vulnerable and fixed packages
The table below lists information on source packages.
|node-set-value (PTS)||buster, stretch||0.4.0-1||vulnerable|
The information below is based on the following data on fixed versions.
[buster] - node-set-value <no-dsa> (Minor issue, will be fixed via point release)
[stretch] - node-set-value <ignored> (Nodejs in stretch not covered by security support)