{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/8101?format=json","vulnerability_id":"VCID-tg74-5nzy-33e5","summary":"This package is vulnerable to Arbitrary File Download. A client can use backslashes to escape the directory the files where exposed from. Note: Only if the host server is a windows-based operating system.","aliases":[{"alias":"GMS-2017-180"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/6911?format=json","purl":"pkg:pypi/flask@0.6.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6f2e-66xz-t7cu"},{"vulnerability":"VCID-bmjp-tau8-bugq"},{"vulnerability":"VCID-rx8q-6dwq-a3hs"},{"vulnerability":"VCID-y5ke-uj7u-rydk"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:pypi/flask@0.6.1"}],"affected_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/6902?format=json","purl":"pkg:pypi/flask@0.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6f2e-66xz-t7cu"},{"vulnerability":"VCID-bmjp-tau8-bugq"},{"vulnerability":"VCID-rx8q-6dwq-a3hs"},{"vulnerability":"VCID-tg74-5nzy-33e5"},{"vulnerability":"VCID-y5ke-uj7u-rydk"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:pypi/flask@0.1"},{"url":"http://public2.vulnerablecode.io/api/packages/6903?format=json","purl":"pkg:pypi/flask@0.2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6f2e-66xz-t7cu"},{"vulnerability":"VCID-bmjp-tau8-bugq"},{"vulnerability":"VCID-rx8q-6dwq-a3hs"},{"vulnerability":"VCID-tg74-5nzy-33e5"},{"vulnerability":"VCID-y5ke-uj7u-rydk"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:pypi/flask@0.2"},{"url":"http://public2.vulnerablecode.io/api/packages/6904?format=json","purl":"pkg:pypi/flask@0.3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6f2e-66xz-t7cu"},{"vulnerability":"VCID-bmjp-tau8-bugq"},{"vulnerability":"VCID-rx8q-6dwq-a3hs"},{"vulnerability":"VCID-tg74-5nzy-33e5"},{"vulnerability":"VCID-y5ke-uj7u-rydk"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:pypi/flask@0.3"},{"url":"http://public2.vulnerablecode.io/api/packages/6905?format=json","purl":"pkg:pypi/flask@0.3.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6f2e-66xz-t7cu"},{"vulnerability":"VCID-bmjp-tau8-bugq"},{"vulnerability":"VCID-rx8q-6dwq-a3hs"},{"vulnerability":"VCID-tg74-5nzy-33e5"},{"vulnerability":"VCID-y5ke-uj7u-rydk"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:pypi/flask@0.3.1"},{"url":"http://public2.vulnerablecode.io/api/packages/6906?format=json","purl":"pkg:pypi/flask@0.4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6f2e-66xz-t7cu"},{"vulnerability":"VCID-bmjp-tau8-bugq"},{"vulnerability":"VCID-rx8q-6dwq-a3hs"},{"vulnerability":"VCID-tg74-5nzy-33e5"},{"vulnerability":"VCID-y5ke-uj7u-rydk"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:pypi/flask@0.4"},{"url":"http://public2.vulnerablecode.io/api/packages/6907?format=json","purl":"pkg:pypi/flask@0.5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6f2e-66xz-t7cu"},{"vulnerability":"VCID-bmjp-tau8-bugq"},{"vulnerability":"VCID-rx8q-6dwq-a3hs"},{"vulnerability":"VCID-tg74-5nzy-33e5"},{"vulnerability":"VCID-y5ke-uj7u-rydk"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:pypi/flask@0.5"},{"url":"http://public2.vulnerablecode.io/api/packages/6908?format=json","purl":"pkg:pypi/flask@0.5.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6f2e-66xz-t7cu"},{"vulnerability":"VCID-bmjp-tau8-bugq"},{"vulnerability":"VCID-rx8q-6dwq-a3hs"},{"vulnerability":"VCID-tg74-5nzy-33e5"},{"vulnerability":"VCID-y5ke-uj7u-rydk"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:pypi/flask@0.5.1"},{"url":"http://public2.vulnerablecode.io/api/packages/6909?format=json","purl":"pkg:pypi/flask@0.5.2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6f2e-66xz-t7cu"},{"vulnerability":"VCID-bmjp-tau8-bugq"},{"vulnerability":"VCID-rx8q-6dwq-a3hs"},{"vulnerability":"VCID-tg74-5nzy-33e5"},{"vulnerability":"VCID-y5ke-uj7u-rydk"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:pypi/flask@0.5.2"},{"url":"http://public2.vulnerablecode.io/api/packages/6910?format=json","purl":"pkg:pypi/flask@0.6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6f2e-66xz-t7cu"},{"vulnerability":"VCID-bmjp-tau8-bugq"},{"vulnerability":"VCID-rx8q-6dwq-a3hs"},{"vulnerability":"VCID-tg74-5nzy-33e5"},{"vulnerability":"VCID-y5ke-uj7u-rydk"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:pypi/flask@0.6"}],"references":[{"reference_url":"https://github.com/pallets/flask/blob/master/CHANGES","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/pallets/flask/blob/master/CHANGES"},{"reference_url":"https://github.com/pallets/flask/commit/aeed530e3221c1b445c13269dcd2fb67548bcefc","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/pallets/flask/commit/aeed530e3221c1b445c13269dcd2fb67548bcefc"}],"weaknesses":[{"cwe_id":1035,"name":"OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities","description":"Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017."},{"cwe_id":937,"name":"OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities","description":"Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013."}],"exploits":[],"severity_range_score":null,"exploitability":"0.5","weighted_severity":"0.0","risk_score":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tg74-5nzy-33e5"}