View | Details | Raw Unified | Return to bug 237303 | Differences between
and this patch

Collapse All | Expand All

(-)vuln.xml (+25 lines)
Lines 58-63 Link Here
58
  * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
58
  * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
59
-->
59
-->
60
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
60
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
61
  <vuln vid="b747783f-5fb6-11e9-b2ac-08002705f877">
62
    <topic>gitea -- remote code execution</topic>
63
    <affects>
64
      <package>
65
	<name>gitea</name>
66
	<range><lt>1.7.5</lt></range>
67
      </package>
68
    </affects>
69
    <description>
70
      <body xmlns="http://www.w3.org/1999/xhtml">
71
	<p>The Gitea team reports:</p>
72
	<blockquote cite="https://blog.gitea.io/2019/04/gitea-1.7.6-is-released/">
73
	  <p>Prevent remote code execution vulnerability with mirror repo URL settings</p>
74
	</blockquote>
75
      </body>
76
    </description>
77
    <references>
78
      <url>https://blog.gitea.io/2019/04/gitea-1.7.6-is-released/</url>
79
    </references>
80
    <dates>
81
      <discovery>2019-03-12</discovery>
82
      <entry>2019-03-20</entry>
83
    </dates>
84
  </vuln>
85
61
  <vuln vid="4e1997e8-5de0-11e9-b95c-b499baebfeaf">
86
  <vuln vid="4e1997e8-5de0-11e9-b95c-b499baebfeaf">
62
    <topic>MySQL -- multiple vulnerabilities</topic>
87
    <topic>MySQL -- multiple vulnerabilities</topic>
63
    <affects>
88
    <affects>

Return to bug 237303