Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-7326 | deep-parse-json version 1.0.2 allows an external attacker to edit or add new properties to an object. This is possible because the application does not correctly validate the incoming JSON keys, thus allowing the '__proto__' property to be edited. |
Github GHSA |
GHSA-ff9j-pwxg-q5p2 | deep-parse-json vulnerable to Prototype Pollution |
Wed, 03 Dec 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | deep-parse-json 1.0.2 - Prototype Pollution |
Mon, 05 May 2025 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Fluid Attacks
Published:
Updated: 2025-12-03T20:01:04.447Z
Reserved: 2022-10-10T00:00:00.000Z
Link: CVE-2022-42743
Updated: 2024-08-03T13:10:41.454Z
Status : Modified
Published: 2022-11-03T20:15:32.137
Modified: 2025-05-05T14:15:25.657
Link: CVE-2022-42743
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA