"-Synchronized-Data."

This commit is contained in:
CVE Team 2020-05-13 19:01:23 +00:00
parent ee5d138917
commit e7f2c8f4f1
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
3 changed files with 5 additions and 5 deletions

View File

@ -35,7 +35,7 @@
"description_data": [
{
"lang": "eng",
"value": "The SVG Sanitizer extension for TYPO3 has a cross-site scripting vulnerability in versions before 1.0.3.\n\nSlightly invalid or incomplete SVG markup is not correctly processed and thus not sanitized at all. Albeit the markup is not valid it still is evaluated in browsers and leads to cross-site scripting.\n\nThis is fixed in version 1.0.3."
"value": "The SVG Sanitizer extension for TYPO3 has a cross-site scripting vulnerability in versions before 1.0.3. Slightly invalid or incomplete SVG markup is not correctly processed and thus not sanitized at all. Albeit the markup is not valid it still is evaluated in browsers and leads to cross-site scripting. This is fixed in version 1.0.3."
}
]
},

View File

@ -35,7 +35,7 @@
"description_data": [
{
"lang": "eng",
"value": "In Autoswitch Python Virtualenv before version 0.16.0, a user who enters a directory with a malicious `.venv` file could run arbitrary code without any user interaction.\n\nThis is fixed in version: 1.16.0"
"value": "In Autoswitch Python Virtualenv before version 0.16.0, a user who enters a directory with a malicious `.venv` file could run arbitrary code without any user interaction. This is fixed in version: 1.16.0"
}
]
},

View File

@ -4,7 +4,8 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-1714",
"ASSIGNER": "psampaio@redhat.com"
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -53,7 +54,6 @@
"name": "https://github.com/keycloak/keycloak/pull/7053",
"refsource": "CONFIRM"
}
]
},
"description": {
@ -74,4 +74,4 @@
]
]
}
}
}