### [CVE-2021-25953](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25953) ![](https://img.shields.io/static/v1?label=Product&message=putil-merge&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=3.6.6%2C%203.6.5%2C%203.6.4%2C%203.6.3%2C%203.6.2%2C%203.6.1%2C%203.6.0%2C%203.5.2%2C%203.5.1%2C%203.5.0%2C%203.4.2%2C%203.4.1%2C%203.3.0%2C%203.2.0%2C%203.1.4%2C%203.1.3%2C%203.1.2%2C%203.1.1%2C%203.1.0%2C%203.0.0%2C%202.2.0%2C%202.1.0%2C%202.0.2%2C%202.0.1%2C%202.0.0%2C%201.2.0%2C%201.1.5%2C%201.1.4%2C%201.1.3%2C%201.1.2%2C%201.1.1%2C%201.1.0%2C%201.0.2%2C%201.0.1%2C%201.0.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Prototype%20Pollution&color=brightgreen) ### Description Prototype pollution vulnerability in 'putil-merge' versions1.0.0 through 3.6.6 allows attacker to cause a denial of service and may lead to remote code execution. ### POC #### Reference - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25953 #### Github No PoCs found on GitHub currently.