logo
Vulnerability feed
CONTRIBUTE

Vulnerability

warn

CVE-2023-26102

Reference to the description:

https://nvd.nist.gov/vuln/detail/CVE-2023-26102

Description:
All versions of the package rangy are vulnerable to Prototype Pollution when using the extend() function in file rangy-core.js.The function uses recursive merge which can lead an attacker to modify properties of the Object.prototype
Last updated date:
03/02/2023
Type:
exploit
Confidence:
HIGH
Date of publishing:
03/02/2023
Reference url to background

https://github.com/timdown/rangy/issues/478

Type:
exploit
Confidence:
HIGH
Date of publishing:
03/02/2023
Vulnerability FeedContributorsAboutBlog

@inTheWild

©2024

Privacy Policy