We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
Project documentation with Markdown.
Library home page: https://files.pythonhosted.org/packages/db/f9/b0179afee0db21943120ea606eb68bda1257b96420df74b775280eb5850b/mkdocs-1.0.4-py2.py3-none-any.whl
Path to dependency file: /doc/mkdocs/requirements.txt
Path to vulnerable library: /doc/mkdocs/requirements.txt
Dependency Hierarchy:
Found in base branch: develop
** DISPUTED ** The mkdocs 1.2.2 built-in dev-server allows directory traversal using the port 8000, enabling remote exploitation to obtain :sensitive information. NOTE: the vendor has disputed this as described in https://github.com/mkdocs/mkdocs/issues/2601.] and nisdn/CVE-2021-40978#1.
Publish Date: 2021-10-07
URL: CVE-2021-40978
Base Score Metrics:
Type: Upgrade version
Origin: GHSA-q6j2-g8qf-wvf7
Release Date: 2021-10-07
Fix Resolution (mkdocs): 1.2.3
Direct dependency fix Resolution (mkdocs-minify-plugin): 0.4.0
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered:
No branches or pull requests
CVE-2021-40978 - High Severity Vulnerability
Vulnerable Library - mkdocs-1.0.4-py2.py3-none-any.whl
Project documentation with Markdown.
Library home page: https://files.pythonhosted.org/packages/db/f9/b0179afee0db21943120ea606eb68bda1257b96420df74b775280eb5850b/mkdocs-1.0.4-py2.py3-none-any.whl
Path to dependency file: /doc/mkdocs/requirements.txt
Path to vulnerable library: /doc/mkdocs/requirements.txt
Dependency Hierarchy:
Found in base branch: develop
Vulnerability Details
** DISPUTED ** The mkdocs 1.2.2 built-in dev-server allows directory traversal using the port 8000, enabling remote exploitation to obtain :sensitive information. NOTE: the vendor has disputed this as described in https://github.com/mkdocs/mkdocs/issues/2601.] and nisdn/CVE-2021-40978#1.
Publish Date: 2021-10-07
URL: CVE-2021-40978
CVSS 3 Score Details (7.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: GHSA-q6j2-g8qf-wvf7
Release Date: 2021-10-07
Fix Resolution (mkdocs): 1.2.3
Direct dependency fix Resolution (mkdocs-minify-plugin): 0.4.0
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: