3.3.5
9 years ago
1 months ago
Known vulnerabilities in the indico package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
indico is a conference lifecycle management and meeting/lecture scheduling tool. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via confirmation prompts. Exploitation requires someone with at least submission privileges (such as a speaker) and then someone else to attempt to delete this content. How to fix Cross-site Scripting (XSS)? Upgrade | [,3.2.6) |
indico is a conference lifecycle management and meeting/lecture scheduling tool. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) due to improper user-input sanitization when using How to fix Cross-site Scripting (XSS)? Upgrade | [,3.2.5) |
indico is a conference lifecycle management and meeting/lecture scheduling tool. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) due to improper user-input sanitization in global announcement messages. How to fix Cross-site Scripting (XSS)? Upgrade | [,3.2.3) |
indico is a conference lifecycle management and meeting/lecture scheduling tool. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) in the category picker (via category titles), location widget (via room and venue names defined by an How to fix Cross-site Scripting (XSS)? Upgrade | [,2.3.5) |
indico is a conference lifecycle management and meeting/lecture scheduling tool. Affected versions of this package are vulnerable to Open Redirect. The How to fix Open Redirect? Upgrade | [,2.3.4) |
indico is a conference lifecycle management and meeting/lecture scheduling tool. Affected versions of this package are vulnerable to Information Exposure. Malicious users can run unsafe How to fix Information Exposure? Upgrade | [,2.1.10)[2.2.0,2.2.3) |