{ "id": "CVE-2024-39013", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-01T13:15:05.650", "lastModified": "2024-07-01T16:37:39.040", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "2o3t-utility v0.1.2 was discovered to contain a prototype pollution via the function extend. This vulnerability allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via injecting arbitrary properties." }, { "lang": "es", "value": "Se descubri\u00f3 que 2o3t-utility v0.1.2 contiene un prototipo de contaminaci\u00f3n a trav\u00e9s de la funci\u00f3n extender. Esta vulnerabilidad permite a los atacantes ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio (DoS) mediante la inyecci\u00f3n de propiedades arbitrarias." } ], "metrics": {}, "references": [ { "url": "https://gist.github.com/mestrtee/a2be744675af5ece3240c19fd04fc5e1", "source": "cve@mitre.org" } ] }