This affects the package conf-cfg-ini before 1.2.2. If an attacker submits a malicious INI file to an application that parses it with decode, they will pollute the prototype on the application. This can be exploited further depending on the context.
| Package (Ecosystem) | Introduced | Fixed | Limit |
|---|---|---|---|
| conf-cfg-ini(npm) | 0 | 1.2.2 | N/A |
CVSS Metrics