2.4.0
20 years ago
9 months ago
Known vulnerabilities in the roundup package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
roundup is a simple-to-use and -install issue-tracking system with command-line, web and e-mail interfaces. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) through the How to fix Cross-site Scripting (XSS)? Upgrade | [,2.4.0) |
roundup is a simple-to-use and -install issue-tracking system with command-line, web and e-mail interfaces. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via JavaScript in PDF, XML, and SVG documents. An attacker can inject malicious scripts that may be executed in the context of the user's session by embedding them into the affected document types. How to fix Cross-site Scripting (XSS)? Upgrade | [,2.4.0) |
roundup is a simple-to-use and -install issue-tracking system with command-line, web and e-mail interfaces. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the HTTP How to fix Cross-site Scripting (XSS)? Upgrade | [,2.4.0) |
roundup is a simple-to-use and -install issue-tracking system with command-line, web and e-mail interfaces. Affected versions of this package are vulnerable to Path Traversal through the Note: This vulnerability was fixed in version 0.7.3 How to fix Path Traversal? Upgrade | [,0.7.12) |
roundup is a simple-to-use and -install issue-tracking system with command-line, web and e-mail interfaces. Affected versions of this package are vulnerable to Insecure Defaults due to unsafe password handling. How to fix Insecure Defaults? Upgrade | [,1.4.17) |
roundup is a simple-to-use and -install issue-tracking system with command-line, web and e-mail interfaces. Affected versions of this package are vulnerable to Improper Access Control. If the user hasn't permission on a message (notably files and content properties) and is on the nosy list, the content is sent via email. How to fix Improper Access Control? Upgrade | [,1.4.11) |
roundup is a simple-to-use and -install issue-tracking system with command-line, web and e-mail interfaces. Affected versions of this package are vulnerable to Improper Access Control. A user who didn't have access to a property could deduce its content by crafting a clever search, group or sort query. How to fix Improper Access Control? Upgrade | [,1.4.17) |
roundup is a simple-to-use and -install issue-tracking system with command-line, web and e-mail interfaces. Affected versions of this package are vulnerable to Privilege Escalation via the How to fix Privilege Escalation? Upgrade | [,1.4.11) |
roundup is a simple-to-use and -install issue-tracking system with command-line, web and e-mail interfaces. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) due to improper input sanitization. How to fix Cross-site Scripting (XSS)? Upgrade | [,1.5.1) |
roundup is a simple-to-use and -install issue-tracking system with command-line, web and e-mail interfaces. Affected versions of this package are vulnerable to Timing Attack via the How to fix Timing Attack? Upgrade | [,2.1.0b1) |
roundup is a simple-to-use and -install issue-tracking system with command-line, web and e-mail interfaces. Affected versions of this package are vulnerable to Insecure Defaults when it is serving uploaded HTML files content as HTML by default. How to fix Insecure Defaults? Upgrade | [,1.4.7) |
roundup is a simple-to-use and -install issue-tracking system with command-line, web and e-mail interfaces. Affected versions of this package are vulnerable to Improper Access Control due to the usage of the 'Access-Control-Allow-Credentials' header when using REST. Exploiting this vulnerability allows unauthorized third-party websites to use a user's credentials to access information in the tracker that is not publicly available. How to fix Improper Access Control? Upgrade | [,2.3.0b2) |
roundup is a simple-to-use and -install issue-tracking system with command-line, web and e-mail interfaces. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the How to fix Cross-site Scripting (XSS)? Upgrade | [,1.4.20) |
roundup is a simple-to-use and -install issue-tracking system with command-line, web and e-mail interfaces. Affected versions of this package are vulnerable to Authorization Bypass. The xml-rpc server in Roundup does not check property permissions, which allows attackers to bypass restrictions and edit or read restricted properties via the How to fix Authorization Bypass? Upgrade | [,1.4.5.1) |
roundup is a simple-to-use and -install issue-tracking system with command-line, web and e-mail interfaces. Affected versions of this package are vulnerable to Cross-site Scripting (XSS). Multiple unspecified vulnerabilities in Roundup have unknown impact and attack vectors, some of which may be related to cross-site scripting (XSS). How to fix Cross-site Scripting (XSS)? Upgrade | [,1.4.4) |
roundup is a simple-to-use and -install issue-tracking system with command-line, web and e-mail interfaces. Affected versions of this package are vulnerable to Cross-site Scripting (XSS)
via the URI because How to fix Cross-site Scripting (XSS)? Upgrade | [0,2.0.0) |
| [,1.5.1) |
Cross-site Scripting (XSS) vulnerability in cgi/client.py in Roundup before 1.4.20 allows remote attackers to inject arbitrary web script or HTML via the @action parameter to support/issue1. | [,1.4.20) |
Cross-site Scripting (XSS) vulnerability in Roundup before 1.4.20 allows remote attackers to inject arbitrary web script or HTML via the otk parameter. | [,1.4.20) |
Cross-site Scripting (XSS) vulnerability in the history display in Roundup before 1.4.20 allows remote attackers to inject arbitrary web script or HTML via a username, related to generating a link. | [,1.4.20) |
Cross-site Scripting (XSS) vulnerability in cgi/client.py in Roundup before 1.4.14 allows remote attackers to inject arbitrary web script or HTML via the template argument to the /issue program. | [,1.4.14) |