Vulnerability Details CVE-2020-8124
Insufficient validation and sanitization of user input exists in url-parse npm package version 1.4.4 and earlier may allow attacker to bypass security checks.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 17.3%
CVSS Severity
CVSS v3 Score 5.3
CVSS v2 Score 5.0
Products affected by CVE-2020-8124
-
cpe:2.3:a:url-parse_project:url-parse:0.0.4
-
cpe:2.3:a:url-parse_project:url-parse:0.1.0
-
cpe:2.3:a:url-parse_project:url-parse:0.1.1
-
cpe:2.3:a:url-parse_project:url-parse:0.1.2
-
cpe:2.3:a:url-parse_project:url-parse:0.1.3
-
cpe:2.3:a:url-parse_project:url-parse:0.1.4
-
cpe:2.3:a:url-parse_project:url-parse:0.1.5
-
cpe:2.3:a:url-parse_project:url-parse:0.2.0
-
cpe:2.3:a:url-parse_project:url-parse:0.2.1
-
cpe:2.3:a:url-parse_project:url-parse:0.2.2
-
cpe:2.3:a:url-parse_project:url-parse:0.2.3
-
cpe:2.3:a:url-parse_project:url-parse:1.0.0
-
cpe:2.3:a:url-parse_project:url-parse:1.0.1
-
cpe:2.3:a:url-parse_project:url-parse:1.0.2
-
cpe:2.3:a:url-parse_project:url-parse:1.0.3
-
cpe:2.3:a:url-parse_project:url-parse:1.0.4
-
cpe:2.3:a:url-parse_project:url-parse:1.0.5
-
cpe:2.3:a:url-parse_project:url-parse:1.1.0
-
cpe:2.3:a:url-parse_project:url-parse:1.1.1
-
cpe:2.3:a:url-parse_project:url-parse:1.1.2
-
cpe:2.3:a:url-parse_project:url-parse:1.1.3
-
cpe:2.3:a:url-parse_project:url-parse:1.1.4
-
cpe:2.3:a:url-parse_project:url-parse:1.1.5
-
cpe:2.3:a:url-parse_project:url-parse:1.1.6
-
cpe:2.3:a:url-parse_project:url-parse:1.1.7
-
cpe:2.3:a:url-parse_project:url-parse:1.1.8
-
cpe:2.3:a:url-parse_project:url-parse:1.1.9
-
cpe:2.3:a:url-parse_project:url-parse:1.2.0
-
cpe:2.3:a:url-parse_project:url-parse:1.3.0
-
cpe:2.3:a:url-parse_project:url-parse:1.4.0
-
cpe:2.3:a:url-parse_project:url-parse:1.4.1
-
cpe:2.3:a:url-parse_project:url-parse:1.4.2
-
cpe:2.3:a:url-parse_project:url-parse:1.4.3
-
cpe:2.3:a:url-parse_project:url-parse:1.4.4