{"id":"CVE-2022-24279","details":"The package madlib-object-utils before 0.1.8 are vulnerable to Prototype Pollution via the setValue method, as it allows an attacker to merge object prototypes into it. *Note:* This vulnerability derives from an incomplete fix of [CVE-2020-7701](https://security.snyk.io/vuln/SNYK-JS-MADLIBOBJECTUTILS-598676)","aliases":["GHSA-pfv6-prqm-85q8"],"modified":"2026-03-13T22:01:04.859756Z","published":"2022-04-15T20:15:11.010Z","related":["SNYK-JS-MADLIBOBJECTUTILS-2388572"],"references":[{"type":"FIX","url":"https://github.com/Qwerios/madlib-object-utils/commit/8d5d54c11c8fb9a7980a99778329acd13e3ef98f"},{"type":"FIX","url":"https://snyk.io/vuln/SNYK-JS-MADLIBOBJECTUTILS-2388572"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/qwerios/madlib-object-utils","events":[{"introduced":"0"},{"fixed":"91aea0d9cdef8bd2ece2a189f819404f9abc7737"},{"fixed":"8d5d54c11c8fb9a7980a99778329acd13e3ef98f"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"0.1.8"}]}}],"versions":["v0.1.7"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-24279.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}]}