Prototype pollution vulnerability in 'dset' versions 1.0.0 through 2.0.1 allows attacker to cause a denial of service and may lead to remote code execution.
9.8CVSS
9.5AI Score
0.013EPSS
All versions of package dset are vulnerable to Prototype Pollution via 'dset/merge' mode, as the dset function checks for prototype pollution by validating if the top-level path contains proto , constructor or protorype. By crafting a malicious object, it is possible to bypass this check and achiev...
8.1CVSS
8AI Score
0.006EPSS