lix through 15.8.7 allows man-in-the-middle attackers to execute arbitrary code by modifying the HTTP client-server data stream so that the Location header is associated with attacker-controlled executable content in the postDownload field.
References
| Link | Resource |
|---|---|
| https://www.npmjs.com/advisories/1306 | Third Party Advisory |
| https://www.npmjs.com/advisories/1306 | Third Party Advisory |
Configurations
History
21 Nov 2024, 04:56
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.npmjs.com/advisories/1306 - Third Party Advisory |
Information
Published : 2020-03-21 15:15
Updated : 2024-11-21 04:56
NVD link : CVE-2020-10800
Mitre link : CVE-2020-10800
CVE.ORG link : CVE-2020-10800
JSON object : View
Products Affected
lix_project
- lix
CWE
