### [CVE-2021-23470](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23470) ![](https://img.shields.io/static/v1?label=Product&message=putil-merge&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3C%203.8.0%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Prototype%20Pollution&color=brighgreen) ### Description This affects the package putil-merge before 3.8.0. The merge() function does not check the values passed into the argument. An attacker can supply a malicious value by adjusting the value to include the constructor property. Note: This vulnerability derives from an incomplete fix in https://security.snyk.io/vuln/SNYK-JS-PUTILMERGE-1317077 ### POC #### Reference - https://snyk.io/vuln/SNYK-JS-PUTILMERGE-2391487 #### Github No PoCs found on GitHub currently.