Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Aaptjs
(Aaptjs_project)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 7 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2021-10-31 | CVE-2020-26707 | An issue was discovered in the add function in Shenzhim AAPTJS 1.3.1 which allows attackers to execute arbitrary code via the filePath parameter. | Aaptjs | 9.8 | ||
2021-10-31 | CVE-2020-36376 | An issue was discovered in the list function in shenzhim aaptjs 1.3.1, allows attackers to execute arbitrary code via the filePath parameters. | Aaptjs | 9.8 | ||
2021-10-31 | CVE-2020-36377 | An issue was discovered in the dump function in shenzhim aaptjs 1.3.1, allows attackers to execute arbitrary code via the filePath parameters. | Aaptjs | 9.8 | ||
2021-10-31 | CVE-2020-36378 | An issue was discovered in the packageCmd function in shenzhim aaptjs 1.3.1, allows attackers to execute arbitrary code via the filePath parameters. | Aaptjs | 9.8 | ||
2021-10-31 | CVE-2020-36379 | An issue was discovered in the remove function in shenzhim aaptjs 1.3.1, allows attackers to execute arbitrary code via the filePath parameters. | Aaptjs | 9.8 | ||
2021-10-31 | CVE-2020-36380 | An issue was discovered in the crunch function in shenzhim aaptjs 1.3.1, allows attackers to execute arbitrary code via the filePath parameters. | Aaptjs | 9.8 | ||
2021-10-31 | CVE-2020-36381 | An issue was discovered in the singleCrunch function in shenzhim aaptjs 1.3.1, allows attackers to execute arbitrary code via the filePath parameters. | Aaptjs | 9.8 |