CVE-2024-32866: Conform contains a Prototype Pollution Vulnerability in `parseWith...` function
Conform allows the parsing of nested objects in the form of object.property. Due to an improper implementation of this feature, an attacker can exploit it to trigger prototype pollution by passing a crafted input to parseWith... functions.
References
Code Behaviors & Features
Detect and mitigate CVE-2024-32866 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →