{ "schema_version": "1.4.0", "id": "GHSA-hxcm-v35h-mg2x", "modified": "2023-11-29T22:16:43Z", "published": "2019-06-07T21:12:50Z", "aliases": [], "summary": "Prototype Pollution in querystringify", "details": "A vulnerability was found in querystringify before 2.0.0. It's possible to override built-in properties of the resulting query string object if a malicious string is inserted in the query string.", "severity": [], "affected": [ { "package": { "ecosystem": "npm", "name": "querystringify" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "2.0.0" } ] } ] } ], "references": [ { "type": "WEB", "url": "https://github.com/unshiftio/querystringify/pull/19" }, { "type": "WEB", "url": "https://github.com/unshiftio/querystringify/commit/422eb4f6c7c28ee5f100dcc64177d3b68bb2b080" } ], "database_specific": { "cwe_ids": [ "CWE-1321" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2019-06-07T21:11:35Z", "nvd_published_at": null } }