A Prototype Pollution issue in flatten-json 1.0.1 allows an attacker to execute arbitrary code via module.exports.unflattenJSON (flatten-json/index.js:42)
{
"severity": "MODERATE",
"github_reviewed": true,
"nvd_published_at": "2024-06-17T16:15:15Z",
"cwe_ids": [
"CWE-1321"
],
"github_reviewed_at": "2024-06-17T22:29:52Z"
}