All vulnerabilities
CVE-2018-16492
Prototype Pollution in extend
Description
Versions of extend prior to 3.0.2 (for 3.x) and 2.0.2 (for 2.x) are vulnerable to Prototype Pollution. The extend() function allows attackers to modify the prototype of Object causing the addition or modification of an existing property that will exist on all objects.
Recommendation
If you're using extend 3.x upgrade to 3.0.2 or later.If you're using extend 2.x upgrade to 2.0.2 or later.
Patch Available
Fix available through Seal Security.
No upgrade required, protect your application instantly.
Fix without upgrading
Score
Severity
Ecosystem
JavaScript
Publish Date
February 7, 2019
Modified Date
November 7, 2023
Score Vector
Affected Versions

