{"vulnerability": "CVE-2021-2332", "sightings": [{"uuid": "9d462f47-6532-478c-b144-457c8ec1c65b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-23326", "type": "seen", "source": "https://t.me/cibsecurity/22330", "content": "\u203c CVE-2021-23326 \u203c\n\nThis affects the package @graphql-tools/git-loader before 6.2.6. The use of exec and execSync in packages/loaders/git/src/load-git.ts allows arbitrary command injection.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-20T16:27:08.000000Z"}, {"uuid": "712f660f-5a2f-4cc8-bd28-6cc57f03cab2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-23328", "type": "seen", "source": "https://t.me/cibsecurity/22849", "content": "\u203c CVE-2021-23328 \u203c\n\nThis affects all versions of package iniparserjs. This vulnerability relates when ini_parser.js is concentrating arrays. Depending on if user input is provided, an attacker can overwrite and pollute the object prototype of a program.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-29T21:25:08.000000Z"}, {"uuid": "84017b74-71f3-40d4-a101-b662c77ab3bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-23329", "type": "published-proof-of-concept", "source": "https://t.me/cibsecurity/22878", "content": "\u203c CVE-2021-23329 \u203c\n\nThe package nested-object-assign before 1.0.4 are vulnerable to Prototype Pollution via the default function, as demonstrated by running the PoC below.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-31T19:25:15.000000Z"}]}