Количество 2
Количество 2
CVE-2023-26102
почти 3 года назад
All versions of the package rangy are vulnerable to Prototype Pollution when using the extend() function in file rangy-core.js.The function uses recursive merge which can lead an attacker to modify properties of the Object.prototype
CVSS3: 7.5
EPSS: Низкий
GHSA-65rp-mhqf-8gj3
почти 3 года назад
rangy vulnerable to Prototype Pollution
CVSS3: 8.2
EPSS: Низкий
Уязвимостей на страницу
20
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2023-26102 All versions of the package rangy are vulnerable to Prototype Pollution when using the extend() function in file rangy-core.js.The function uses recursive merge which can lead an attacker to modify properties of the Object.prototype | CVSS3: 7.5 | 0% Низкий | почти 3 года назад | |
GHSA-65rp-mhqf-8gj3 rangy vulnerable to Prototype Pollution | CVSS3: 8.2 | 0% Низкий | почти 3 года назад |
Уязвимостей на страницу
20