{"vulnerability": "cve-2020-2826", "sightings": [{"uuid": "a0bc1fba-95b1-4649-b085-95bb3ed11cbd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-28269", "type": "seen", "source": "https://t.me/cibsecurity/16247", "content": "\u203c CVE-2020-28269 \u203c\n\nPrototype pollution vulnerability in 'field' versions 0.0.1 through 1.0.1 allows attacker to cause a denial of service and may lead to remote code execution.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-11-12T20:37:59.000000Z"}, {"uuid": "f3aaf4fc-63f7-4635-938e-295f8cf43465", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-28268", "type": "seen", "source": "https://t.me/cibsecurity/16336", "content": "\u203c CVE-2020-28268 \u203c\n\nPrototype pollution vulnerability in 'controlled-merge' versions 1.0.0 through 1.2.0 allows attacker to cause a denial of service and may lead to remote code execution.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-11-16T02:36:48.000000Z"}, {"uuid": "2b438e39-3078-4fae-8116-38af8d542f43", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-28267", "type": "seen", "source": "https://t.me/cibsecurity/16091", "content": "\u203c CVE-2020-28267 \u203c\n\nPrototype pollution vulnerability in '@strikeentco/set' version 1.0.0 allows attacker to cause a denial of service and may lead to remote code execution.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-11-10T18:27:31.000000Z"}]}