A vulnerability was determined in 1024bit extend-deep up to 0.1.6. The impacted element is an unknown function of the file index.js. This manipulation of the argument __proto__ causes improperly controlled modification of object prototype attributes. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized. The code repository of the project has not been active for many years.
Metrics
Affected Vendors & Products
References
History
Mon, 20 Apr 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was determined in 1024bit extend-deep up to 0.1.6. The impacted element is an unknown function of the file index.js. This manipulation of the argument __proto__ causes improperly controlled modification of object prototype attributes. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized. The code repository of the project has not been active for many years. | |
| Title | 1024bit extend-deep index.js prototype pollution | |
| Weaknesses | CWE-1321 CWE-94 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published: 2026-04-20T08:30:14.457Z
Updated: 2026-04-20T08:30:14.457Z
Reserved: 2026-04-19T16:26:25.296Z
Link: CVE-2026-6621
No data.
Status : Received
Published: 2026-04-20T09:16:10.170
Modified: 2026-04-20T09:16:10.170
Link: CVE-2026-6621
No data.