Description
All versions of package querymen are vulnerable to Prototype Pollution if the parameters of exported function handler(type, name, fn) can be controlled by users without any sanitization. Note: This vulnerability derives from an incomplete fix of [CVE-2020-7600](https://security.snyk.io/vuln/SNYK-JS-QUERYMEN-559867).
Remediation
References
https://snyk.io/vuln/SNYK-JS-QUERYMEN-2391488
Related Vulnerabilities
CVE-2020-17519 Vulnerability in maven package org.apache.flink:flink-runtime_2.11
CVE-2021-34081 Vulnerability in npm package gitsome
CVE-2021-21341 Vulnerability in maven package com.thoughtworks.xstream:xstream
CVE-2023-44487 Vulnerability in maven package org.apache.tomcat.embed:tomcat-embed-core
CVE-2023-49382 Vulnerability in maven package com.jfinal:jfinal