cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2020-36314,https://securityvulnerability.io/vulnerability/CVE-2020-36314,,"fr-archive-libarchive.c in GNOME file-roller through 3.38.0, as used by GNOME Shell and other software, allows Directory Traversal during extraction because it lacks a check of whether a file's parent is a symlink in certain complex situations. NOTE: this issue exists because of an incomplete fix for CVE-2020-11736.",Gnome,File-roller,3.9,LOW,0.0005600000149570405,false,,false,false,false,,,false,false,,2021-04-07T11:07:40.000Z,0 CVE-2020-11736,https://securityvulnerability.io/vulnerability/CVE-2020-11736,,fr-archive-libarchive.c in GNOME file-roller through 3.36.1 allows Directory Traversal during extraction because it lacks a check of whether a file's parent is a symlink to a directory outside of the intended extraction location.,Gnome,File-roller,3.9,LOW,0.00046999999904073775,false,,false,false,false,,,false,false,,2020-04-13T18:39:26.000Z,0 CVE-2019-16680,https://securityvulnerability.io/vulnerability/CVE-2019-16680,,"An issue was discovered in GNOME file-roller before 3.29.91. It allows a single ./../ path traversal via a filename contained in a TAR archive, possibly overwriting a file during extraction.",Gnome,File-roller,4.3,MEDIUM,0.004129999782890081,false,,false,false,false,,,false,false,,2019-09-21T20:33:21.000Z,0