{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-04T11:50:32.614","vulnerabilities":[{"cve":{"id":"CVE-2019-10805","sourceIdentifier":"report@snyk.io","published":"2020-02-28T21:15:13.180","lastModified":"2024-11-21T04:19:57.310","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"valib through 2.0.0 allows Internal Property Tampering. A maliciously crafted JavaScript object can bypass several inspection functions provided by valib. Valib uses a built-in function (hasOwnProperty) from the unsafe user-input to examine an object. It is possible for a crafted payload to overwrite this function to manipulate the inspection results to bypass security checks."},{"lang":"es","value":"valib versiones hasta 2.0.0, permite una Manipulación de Propiedad Interna. Un objeto JavaScript diseñado maliciosamente, puede omitir varias funciones de inspección proporcionadas por valib. Valib usa una funcionalidad incorporada (hasOwnProperty) a partir de la entrada de usuario no segura para examinar un objeto. Es posible para una carga útil diseñada sobrescribir esta función para manipular los resultados de la inspección para omitir los controles de seguridad."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-668"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sideralis:valib.js:*:*:*:*:*:node.js:*:*","versionEndIncluding":"2.0.0","matchCriteriaId":"C46D26A7-E87B-4089-83D6-7DE53537E2F7"}]}]}],"references":[{"url":"https://snyk.io/vuln/SNYK-JS-VALIB-559015","source":"report@snyk.io","tags":["Exploit","Third Party Advisory"]},{"url":"https://www.npmjs.com/package/valib","source":"report@snyk.io","tags":["Third Party Advisory"]},{"url":"https://snyk.io/vuln/SNYK-JS-VALIB-559015","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]},{"url":"https://www.npmjs.com/package/valib","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}