Description
All versions of the package rangy are vulnerable to Prototype Pollution when using the extend() function in file rangy-core.js.The function uses recursive merge which can lead an attacker to modify properties of the Object.prototype
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-0637 | All versions of the package rangy are vulnerable to Prototype Pollution when using the extend() function in file rangy-core.js.The function uses recursive merge which can lead an attacker to modify properties of the Object.prototype |
Github GHSA |
GHSA-65rp-mhqf-8gj3 | rangy vulnerable to Prototype Pollution |
References
History
Tue, 11 Mar 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2025-03-11T15:52:25.411Z
Reserved: 2023-02-20T10:28:48.921Z
Link: CVE-2023-26102
Updated: 2024-08-02T11:39:06.632Z
Status : Modified
Published: 2023-02-24T05:15:15.140
Modified: 2025-03-11T16:15:14.070
Link: CVE-2023-26102
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA