EPSS
Percentile
30.3%
madlib-object-utils is vulnerable to prototype pollution. The vulnerability exists in the utils.js due to lack of validation in setValue which allows an attacker to inject and execute arbitrary code
utils.js
setValue
github.com/advisories/GHSA-pfv6-prqm-85q8
github.com/Qwerios/madlib-object-utils/commit/8d5d54c11c8fb9a7980a99778329acd13e3ef98f