mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
e559dce801
commit
d068592889
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve-coordination@google.com",
|
||||
"ASSIGNER": "security@google.com",
|
||||
"ID": "CVE-2020-8910",
|
||||
"STATE": "PUBLIC",
|
||||
"TITLE": "Auth Bypass in Google's Closure-Library"
|
||||
@ -33,11 +33,11 @@
|
||||
"credit": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "David Schütz"
|
||||
"value": "David Sch\u00fctz"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "François Lajeunesse-Robert"
|
||||
"value": "Fran\u00e7ois Lajeunesse-Robert"
|
||||
}
|
||||
],
|
||||
"data_format": "MITRE",
|
||||
@ -107,5 +107,4 @@
|
||||
"source": {
|
||||
"discovery": "EXTERNAL"
|
||||
}
|
||||
}
|
||||
|
||||
}
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve-coordination@google.com",
|
||||
"ASSIGNER": "security@google.com",
|
||||
"ID": "CVE-2020-8923",
|
||||
"STATE": "PUBLIC",
|
||||
"TITLE": "XSS in Dart"
|
||||
@ -18,12 +18,12 @@
|
||||
{
|
||||
"version_affected": "<=",
|
||||
"version_name": "stable",
|
||||
"version_value": "2.7.1"
|
||||
"version_value": "2.7.1"
|
||||
},
|
||||
{
|
||||
"version_affected": "<=",
|
||||
"version_name": "dev",
|
||||
"version_value": "2.8.0-dev.16.0"
|
||||
"version_value": "2.8.0-dev.16.0"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -48,7 +48,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "An improper HTML sanitization in Dart versions up to and including 2.7.1 and dev versions 2.8.0-dev.16.0, allows an attacker leveraging DOM Clobbering techniques to skip the sanitization and inject custom html/javascript (XSS).\n\nMitigation: update your Dart SDK to 2.7.2, and 2.8.0-dev.17.0 for the dev version. If you cannot update, we recommend you review the way you use the affected APIs, and pay special attention to cases where user-provided data is used to populate DOM nodes. Consider using Element.innerText or Node.text to populate DOM elements."
|
||||
"value": "An improper HTML sanitization in Dart versions up to and including 2.7.1 and dev versions 2.8.0-dev.16.0, allows an attacker leveraging DOM Clobbering techniques to skip the sanitization and inject custom html/javascript (XSS). Mitigation: update your Dart SDK to 2.7.2, and 2.8.0-dev.17.0 for the dev version. If you cannot update, we recommend you review the way you use the affected APIs, and pay special attention to cases where user-provided data is used to populate DOM nodes. Consider using Element.innerText or Node.text to populate DOM elements."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -95,5 +95,4 @@
|
||||
"source": {
|
||||
"discovery": "EXTERNAL"
|
||||
}
|
||||
}
|
||||
|
||||
}
|
Loading…
x
Reference in New Issue
Block a user