Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-sx44-1d9e-bban
Summary
gopkg.in/macaron.v1 Open Redirect vulnerability
macaron before 1.3.7 has an open redirect in the static handler. Due to improper request santization, a specifically crafted URL can cause the static file handler to redirect to an attacker chosen URL, allowing for open redirect attacks.
Aliases
0
alias CVE-2020-12666
1
alias GHSA-733f-44f3-3frw
Fixed_packages
0
url pkg:golang/gopkg.in/macaron.v1@1.3.7
purl pkg:golang/gopkg.in/macaron.v1@1.3.7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:golang/gopkg.in/macaron.v1@1.3.7
Affected_packages
0
url pkg:rpm/redhat/ior@1.1.6-1?arch=el8
purl pkg:rpm/redhat/ior@1.1.6-1?arch=el8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-37zk-9fax-v7e1
1
vulnerability VCID-44qf-p2rd-6qay
2
vulnerability VCID-cvxp-ctj9-guej
3
vulnerability VCID-n82z-sfd6-x3af
4
vulnerability VCID-sx44-1d9e-bban
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ior@1.1.6-1%3Farch=el8
1
url pkg:rpm/redhat/kiali@1.12.10.redhat2-1?arch=el7
purl pkg:rpm/redhat/kiali@1.12.10.redhat2-1?arch=el7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-37zk-9fax-v7e1
1
vulnerability VCID-44qf-p2rd-6qay
2
vulnerability VCID-cvxp-ctj9-guej
3
vulnerability VCID-n82z-sfd6-x3af
4
vulnerability VCID-sx44-1d9e-bban
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kiali@1.12.10.redhat2-1%3Farch=el7
2
url pkg:rpm/redhat/servicemesh@1.1.6-1?arch=el8
purl pkg:rpm/redhat/servicemesh@1.1.6-1?arch=el8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-37zk-9fax-v7e1
1
vulnerability VCID-44qf-p2rd-6qay
2
vulnerability VCID-cvxp-ctj9-guej
3
vulnerability VCID-n82z-sfd6-x3af
4
vulnerability VCID-sx44-1d9e-bban
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/servicemesh@1.1.6-1%3Farch=el8
3
url pkg:rpm/redhat/servicemesh-cni@1.1.6-1?arch=el8
purl pkg:rpm/redhat/servicemesh-cni@1.1.6-1?arch=el8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-37zk-9fax-v7e1
1
vulnerability VCID-44qf-p2rd-6qay
2
vulnerability VCID-cvxp-ctj9-guej
3
vulnerability VCID-n82z-sfd6-x3af
4
vulnerability VCID-sx44-1d9e-bban
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/servicemesh-cni@1.1.6-1%3Farch=el8
4
url pkg:rpm/redhat/servicemesh-grafana@6.4.3-13?arch=el8
purl pkg:rpm/redhat/servicemesh-grafana@6.4.3-13?arch=el8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-37zk-9fax-v7e1
1
vulnerability VCID-44qf-p2rd-6qay
2
vulnerability VCID-cvxp-ctj9-guej
3
vulnerability VCID-n82z-sfd6-x3af
4
vulnerability VCID-sx44-1d9e-bban
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/servicemesh-grafana@6.4.3-13%3Farch=el8
5
url pkg:rpm/redhat/servicemesh-operator@1.1.6-2?arch=el8
purl pkg:rpm/redhat/servicemesh-operator@1.1.6-2?arch=el8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-37zk-9fax-v7e1
1
vulnerability VCID-44qf-p2rd-6qay
2
vulnerability VCID-cvxp-ctj9-guej
3
vulnerability VCID-n82z-sfd6-x3af
4
vulnerability VCID-sx44-1d9e-bban
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/servicemesh-operator@1.1.6-2%3Farch=el8
6
url pkg:rpm/redhat/servicemesh-prometheus@2.14.0-14?arch=el8
purl pkg:rpm/redhat/servicemesh-prometheus@2.14.0-14?arch=el8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-37zk-9fax-v7e1
1
vulnerability VCID-44qf-p2rd-6qay
2
vulnerability VCID-cvxp-ctj9-guej
3
vulnerability VCID-n82z-sfd6-x3af
4
vulnerability VCID-sx44-1d9e-bban
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/servicemesh-prometheus@2.14.0-14%3Farch=el8
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12666.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12666.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-12666
reference_id
reference_type
scores
0
value 0.00159
scoring_system epss
scoring_elements 0.36735
published_at 2026-04-21T12:55:00Z
1
value 0.00159
scoring_system epss
scoring_elements 0.36826
published_at 2026-04-11T12:55:00Z
2
value 0.00159
scoring_system epss
scoring_elements 0.36795
published_at 2026-04-18T12:55:00Z
3
value 0.00159
scoring_system epss
scoring_elements 0.36812
published_at 2026-04-16T12:55:00Z
4
value 0.00159
scoring_system epss
scoring_elements 0.36766
published_at 2026-04-13T12:55:00Z
5
value 0.00159
scoring_system epss
scoring_elements 0.36791
published_at 2026-04-12T12:55:00Z
6
value 0.00159
scoring_system epss
scoring_elements 0.36731
published_at 2026-04-01T12:55:00Z
7
value 0.00159
scoring_system epss
scoring_elements 0.36887
published_at 2026-04-02T12:55:00Z
8
value 0.00159
scoring_system epss
scoring_elements 0.36918
published_at 2026-04-04T12:55:00Z
9
value 0.00159
scoring_system epss
scoring_elements 0.36751
published_at 2026-04-07T12:55:00Z
10
value 0.00159
scoring_system epss
scoring_elements 0.36802
published_at 2026-04-08T12:55:00Z
11
value 0.00159
scoring_system epss
scoring_elements 0.36816
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-12666
2
reference_url https://github.com/go-macaron/macaron
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/go-macaron/macaron
3
reference_url https://github.com/go-macaron/macaron/commit/addc7461c3a90a040e79aa75bfd245107a210245
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/go-macaron/macaron/commit/addc7461c3a90a040e79aa75bfd245107a210245
4
reference_url https://github.com/go-macaron/macaron/issues/198
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/go-macaron/macaron/issues/198
5
reference_url https://github.com/go-macaron/macaron/issues/198#issuecomment-622885959
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/go-macaron/macaron/issues/198#issuecomment-622885959
6
reference_url https://github.com/go-macaron/macaron/pull/199
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/go-macaron/macaron/pull/199
7
reference_url https://github.com/go-macaron/macaron/pull/199/commits/6bd9385542f7133467ab7d09a5f28f7d5dc52af7
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/go-macaron/macaron/pull/199/commits/6bd9385542f7133467ab7d09a5f28f7d5dc52af7
8
reference_url https://github.com/go-macaron/macaron/releases/tag/v1.3.7
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/go-macaron/macaron/releases/tag/v1.3.7
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3QEUOHRC4EN4WZ66EVFML2UCV7ZQ63XZ
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3QEUOHRC4EN4WZ66EVFML2UCV7ZQ63XZ
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-12666
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2020-12666
11
reference_url https://pkg.go.dev/vuln/GO-2020-0039
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://pkg.go.dev/vuln/GO-2020-0039
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1850034
reference_id 1850034
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1850034
13
reference_url https://access.redhat.com/errata/RHSA-2020:3369
reference_id RHSA-2020:3369
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3369
Weaknesses
0
cwe_id 601
name URL Redirection to Untrusted Site ('Open Redirect')
description A web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a Redirect. This simplifies phishing attacks.
Exploits
Severity_range_score4.0 - 6.9
Exploitability0.5
Weighted_severity6.2
Risk_score3.1
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-sx44-1d9e-bban