[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-USN-4733-1":6},{"stargazers_count":4,"fetched_at":5},5,"2026-04-07T21:11:43.830Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":11,"aliases":12,"duplicate_of":9,"upstream":13,"downstream":18,"duplicates":19,"related":20,"reserved_at":9,"published_at":22,"modified_at":23,"state":9,"summary":24,"references_raw":26,"kevs":38,"epss":9,"epss_history":39,"metrics":40,"affected":41},"USN-4733-1","gnome-autoar vulnerability\n\nYiğit Can Yılmaz discovered that GNOME Autoar could extract files outside\nof the intended directory. If a user were tricked into extracting a\nspecially crafted archive, a remote attacker could create files in\narbitrary locations, possibly leading to code execution.\n",null,[],[],[],[14,16],{"_key":15},"CVE-2020-36241",{"_key":17},"UBUNTU-CVE-2020-36241",[],[],[21],{"_key":17},"2021-02-11T12:46:24.575502Z","2026-02-04T03:59:51.667991Z",{"cisa_kev":25,"cisa_ransomware":25,"cisa_vendor":9,"epss_severity":9,"epss_score":9,"severity":9,"severity_score":9,"severity_version":9,"severity_source":9,"severity_vector":9,"severity_status":9},false,[27,33],{"url":28,"sources":29,"tags":31},"https://ubuntu.com/security/notices/USN-4733-1",[30],"osv_ubuntu",[32],"Advisory",{"url":34,"sources":35,"tags":36},"https://ubuntu.com/security/CVE-2020-36241",[30],[37],"REPORT",[],[],[],[42],{"ecosystem":43,"name":44,"vendor":45,"product":44,"cpe_part":9,"purl_type":46,"purl_namespace":45,"purl_name":44,"source":9,"versions":47},"Ubuntu","gnome-autoar","ubuntu","deb",[48,54],{"version":49,"is_range":50,"range_type":51,"version_start":9,"version_start_type":9,"version_end":52,"version_end_type":53,"fixed_in":9},"lt0_2_3_1ubuntu0_1",true,"ecosystem","0.2.3-1ubuntu0.1","excluding",{"version":55,"is_range":50,"range_type":51,"version_start":9,"version_start_type":9,"version_end":56,"version_end_type":53,"fixed_in":9},"lt0_2_3_2ubuntu0_1","0.2.3-2ubuntu0.1"]