roundup@1.4.13 vulnerabilities
A simple-to-use and -install issue-tracking system with command-line, web and e-mail interfaces. Highly customisable.
-
latest version
2.3.0
-
latest non vulnerable version
-
first published
19 years ago
-
latest version published
10 months ago
-
licenses detected
- [0.5.9,1.4.21)
Direct Vulnerabilities
Known vulnerabilities in the roundup package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
roundup is a simple-to-use and -install issue-tracking system with command-line, web and e-mail interfaces. Affected versions of this package are vulnerable to Insecure Defaults due to unsafe password handling. How to fix Insecure Defaults? Upgrade |
[,1.4.17)
|
roundup is a simple-to-use and -install issue-tracking system with command-line, web and e-mail interfaces. Affected versions of this package are vulnerable to Improper Access Control. A user who didn't have access to a property could deduce its content by crafting a clever search, group or sort query. How to fix Improper Access Control? Upgrade |
[,1.4.17)
|
roundup is a simple-to-use and -install issue-tracking system with command-line, web and e-mail interfaces. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) due to improper input sanitization. How to fix Cross-site Scripting (XSS)? Upgrade |
[,1.5.1)
|
roundup is a simple-to-use and -install issue-tracking system with command-line, web and e-mail interfaces. Affected versions of this package are vulnerable to Timing Attack via the How to fix Timing Attack? Upgrade |
[,2.1.0b1)
|
roundup is a simple-to-use and -install issue-tracking system with command-line, web and e-mail interfaces. Affected versions of this package are vulnerable to Improper Access Control due to the usage of the 'Access-Control-Allow-Credentials' header when using REST. Exploiting this vulnerability allows unauthorized third-party websites to use a user's credentials to access information in the tracker that is not publicly available. How to fix Improper Access Control? Upgrade |
[,2.3.0b2)
|
roundup is a simple-to-use and -install issue-tracking system with command-line, web and e-mail interfaces. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the How to fix Cross-site Scripting (XSS)? Upgrade |
[,1.4.20)
|
roundup is a simple-to-use and -install issue-tracking system with command-line, web and e-mail interfaces. Affected versions of this package are vulnerable to Cross-site Scripting (XSS)
via the URI because How to fix Cross-site Scripting (XSS)? Upgrade |
[0,2.0.0)
|
|
[,1.5.1)
|
Cross-site Scripting (XSS) vulnerability in cgi/client.py in Roundup before 1.4.20 allows remote attackers to inject arbitrary web script or HTML via the @action parameter to support/issue1. |
[,1.4.20)
|
Cross-site Scripting (XSS) vulnerability in Roundup before 1.4.20 allows remote attackers to inject arbitrary web script or HTML via the otk parameter. |
[,1.4.20)
|
Cross-site Scripting (XSS) vulnerability in the history display in Roundup before 1.4.20 allows remote attackers to inject arbitrary web script or HTML via a username, related to generating a link. |
[,1.4.20)
|
Cross-site Scripting (XSS) vulnerability in cgi/client.py in Roundup before 1.4.14 allows remote attackers to inject arbitrary web script or HTML via the template argument to the /issue program. |
[,1.4.14)
|