| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2020-15143 | Remote Code Execution in SyliusResourceBundle | Sylius | SyliusResourceBundle | High | 7.7 | 2020-08-19 20:40:12 | Deep Dive |
| CVE-2020-15146 | Remote Code Execution in SyliusResourceBundle | Sylius | SyliusResourceBundle | Critical | 9.6 | 2020-08-19 20:20:12 | Deep Dive |
| CVE-2020-5218 | Ability in Sylius to switch channels via GET parameter enabled in production environments | Sylius | Sylius | Medium | 4.4 | 2020-01-27 20:25:13 | Deep Dive |
| CVE-2020-5220 | Ability to expose data in Sylius by using an unintended serialisation group | Sylius | SyliusResourceBundle | Medium | 4.4 | 2020-01-27 20:15:17 | Deep Dive |
| CVE-2019-16768 | Internal exception message exposure for login action in Sylius | Sylius | Sylius | Low | 3.5 | 2019-12-05 20:00:21 | Deep Dive |