### [CVE-2021-20084](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20084) ![](https://img.shields.io/static/v1?label=Product&message=jQuery%20Sparkle&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=1.5.2-beta%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Prototype%20Pollution&color=brightgreen) ### Description Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in jquery-sparkle 1.5.2-beta allows a malicious user to inject properties into Object.prototype. ### POC #### Reference - https://github.com/BlackFan/client-side-prototype-pollution/blob/master/pp/jquery-sparkle.md #### Github - https://github.com/B1gN0Se/prototype-pollution - https://github.com/BlackFan/client-side-prototype-pollution - https://github.com/PecentZero/prototype_pollution - https://github.com/retr0-13/client-side-prototype-pollution - https://github.com/tHeStRyNg/client-side-prototype-pollution