Arbitrary file read and/or write in dotmesh, unsafe handling of symbolic link
Reporter | Title | Published | Views | Family All 7 |
---|---|---|---|---|
![]() | dotmesh arbitrary file read and/or write | 14 May 202421:34 | β | osv |
![]() | dotmesh arbitrary file read and/or write in github.com/dotmesh-io/dotmesh | 5 Jun 202415:10 | β | osv |
![]() | CVE-2020-26312 | 14 May 202421:15 | β | nvd |
![]() | CVE-2020-26312 GHSL-2020-254: Arbitrary file read and/or write in dotmesh | 14 May 202420:22 | β | vulnrichment |
![]() | Arbitrary File Read | 14 May 202408:21 | β | veracode |
![]() | dotmesh arbitrary file read and/or write | 14 May 202421:34 | β | github |
![]() | CVE-2020-26312 | 14 May 202421:15 | β | cve |
[
{
"defaultStatus": "unaffected",
"packageName": "dotmesh",
"product": "dotmesh",
"repo": "https://github.com/dotmesh-io/dotmesh",
"vendor": "dotmesh-io",
"versions": [
{
"lessThanOrEqual": "0.8.1",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
]
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. ContactΒ us for a demo andΒ discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo