2o3t-utility v0.1.2 was discovered to contain a prototype pollution via the function extend. This vulnerability allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via injecting arbitrary properties.
[
{
"cpes": [
"cpe:2.3:a:2o3t:2o3t-utility:*:*:*:*:*:*:*:*"
],
"vendor": "2o3t",
"product": "2o3t-utility",
"versions": [
{
"status": "affected",
"version": "0.1.2"
}
],
"defaultStatus": "unknown"
}
]