{"containers":{"cna":{"affected":[{"product":"object-hierarchy-access","vendor":"n/a","versions":[{"status":"affected","version":"0.32.0, 0.31.0, 0.30.0, 0.29.1, 0.29.0, 0.28.0, 0.27.1, 0.27.0, 0.26.0, 0.25.2, 0.25.1, 0.25.0, 0.24.0, 0.23.0, 0.22.0, 0.21.0, 0.20.2, 0.20.1, 0.20.0, 0.19.0, 0.18.0, 0.17.0, 0.16.0, 0.15.0, 0.14.1, 0.13.1, 0.12.0, 0.11.0, 0.10.0, 0.9.0, 0.8.0, 0.7.3, 0.7.2, 0.6.0, 0.5.2, 0.5.1, 0.4.3, 0.4.2, 0.4.1, 0.4.0, 0.2.0"}]}],"descriptions":[{"lang":"en","value":"Prototype pollution vulnerability in 'object-hierarchy-access' versions 0.2.0 through 0.32.0 allows attacker to cause a denial of service and may lead to remote code execution."}],"problemTypes":[{"descriptions":[{"description":"Prototype Pollution","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2020-12-04T14:45:16.000Z","orgId":"478c68dd-22c1-4a41-97cd-654224dfacff","shortName":"Mend"},"references":[{"tags":["x_refsource_MISC"],"url":"https://github.com/mjpclab/object-hierarchy-access/commit/7b1aa134a8bc4a376296bcfac5c3463aef2b7572"},{"tags":["x_refsource_MISC"],"url":"https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28270"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"vulnerabilitylab@whitesourcesoftware.com","ID":"CVE-2020-28270","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"object-hierarchy-access","version":{"version_data":[{"version_value":"0.32.0, 0.31.0, 0.30.0, 0.29.1, 0.29.0, 0.28.0, 0.27.1, 0.27.0, 0.26.0, 0.25.2, 0.25.1, 0.25.0, 0.24.0, 0.23.0, 0.22.0, 0.21.0, 0.20.2, 0.20.1, 0.20.0, 0.19.0, 0.18.0, 0.17.0, 0.16.0, 0.15.0, 0.14.1, 0.13.1, 0.12.0, 0.11.0, 0.10.0, 0.9.0, 0.8.0, 0.7.3, 0.7.2, 0.6.0, 0.5.2, 0.5.1, 0.4.3, 0.4.2, 0.4.1, 0.4.0, 0.2.0"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Prototype pollution vulnerability in 'object-hierarchy-access' versions 0.2.0 through 0.32.0 allows attacker to cause a denial of service and may lead to remote code execution."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Prototype Pollution"}]}]},"references":{"reference_data":[{"name":"https://github.com/mjpclab/object-hierarchy-access/commit/7b1aa134a8bc4a376296bcfac5c3463aef2b7572","refsource":"MISC","url":"https://github.com/mjpclab/object-hierarchy-access/commit/7b1aa134a8bc4a376296bcfac5c3463aef2b7572"},{"name":"https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28270","refsource":"MISC","url":"https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28270"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T16:33:58.388Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://github.com/mjpclab/object-hierarchy-access/commit/7b1aa134a8bc4a376296bcfac5c3463aef2b7572"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28270"}]}]},"cveMetadata":{"assignerOrgId":"478c68dd-22c1-4a41-97cd-654224dfacff","assignerShortName":"Mend","cveId":"CVE-2020-28270","datePublished":"2020-11-12T17:16:50.000Z","dateReserved":"2020-11-06T00:00:00.000Z","dateUpdated":"2024-08-04T16:33:58.388Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}