CVE | CVE-2023-26102 |
CVE Title | |
Published Date | 2023-02-24T05:15Z |
Modified Date | 2023-03-02T17:29Z |
CWE Type | CWE-1321 |
CVSS 3.x | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H |
Description | All versions of the package rangy are vulnerable to Prototype Pollution when using the extend() function in file rangy-core.js.The function uses recursive merge which can lead an attacker to modify properties of the Object.prototype |
References | |
By clicking these links you will leave this website. We do not endorse and will not be held accountable for any activity on external sites. | |
Reference URL | https://github.com/timdown/rangy/issues/478 |
Reference Description | MISC https://github.com/timdown/rangy/issues/478 |
Reference URL | https://security.snyk.io/vuln/SNYK-JS-RANGY-3175702 |
Reference Description | MISC https://security.snyk.io/vuln/SNYK-JS-RANGY-3175702 |
Tags | Exploit Issue Tracking Third Party Advisory |
Sources | NIST MITRE |