Skip to content

Conversation

@github-actions
Copy link

Vulnerabilities associated with mixin-deep/1.3.1

BDSA-2019-2162 (HIGH): Mixin-deep is vulnerable to prototype pollution attack. This could allow an attacker to manipulate a function to add or modify properties of Object.prototype via a constructor payload. Successfully exploiting results in a denial-of-service (DoS) and code execution may be possible.

Click Here To See More Details On Server

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant