set-cookie-parser is vulnerable to Prototype Pollution
68
Medium Risk
Affected versions of this package are vulnerable to prototype pollution when using the parse function. This vulnerability enables an attacker to inject malicious properties into object prototypes, potentially leading to security issues, including remote code execution or denial of service.
You are affected if you are using a version that falls within the vulnerable range.
set-cookie-parser is vulnerable to Prototype Pollution in versions 2.0.0 - 2.7.1.
Upgrade the set-cookie-parser library to the patch version.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant