CVE-2020-14001
Published at:
-
17-07-2020 06:15
Last modified:
-
28-04-2022 08:57
Total changes:
-
3
Description
Common Vulnerability Scoring System (CVSS)
Low
Attack complexity
Network
Attack vector
High
Availability
High
Confidentiality
High
Integrity
None
Privileges required
Unchanged
Scope
None
User interaction
9.8
Base score
3.9
5.9
Exploitability score
Impact score
Verification logic
Reference
- https://kramdown.gettalong.org
- https://kramdown.gettalong.org/news.html
- https://github.com/gettalong/kramdown/compare/REL_2_2_1...REL_2_3_0
- https://github.com/gettalong/kramdown
- https://github.com/gettalong/kramdown/commit/1b8fd33c3120bfc6e5164b449e2c2fc9c9306fde
- https://rubygems.org/gems/kramdown
- https://security.netapp.com/advisory/ntap-20200731-0004/
- [fluo-notifications] 20200808 [GitHub] [fluo-website] ctubbsii opened a new pull request #194: Update gems-Mailing List, Third Party Advisory
- [debian-lts-announce] 20200809 [SECURITY] [DLA 2316-1] ruby-kramdown security update-Mailing List, Third Party Advisory
- DSA-4743-Third Party Advisory
- FEDORA-2020-5c70d97eca-Mailing List, Third Party Advisory
- FEDORA-2020-f6eee9a2d3-Mailing List, Third Party Advisory
- USN-4562-1-Third Party Advisory
Keywords