summaryrefslogtreecommitdiffstats
path: root/meta-python/recipes-devtools/python/python3-sqlparse/CVE-2024-4340.patch
diff options
context:
space:
mode:
authorZhang Peng <peng.zhang1.cn@windriver.com>2025-01-16 21:45:01 +0800
committerArmin Kuster <akuster808@gmail.com>2025-01-20 19:45:27 -0500
commitf8840edf8c474ea410744f92624da66dcac9e816 (patch)
tree7ef3ab08dff92e605201903134e5c6f7796dfdcf /meta-python/recipes-devtools/python/python3-sqlparse/CVE-2024-4340.patch
parentc4d91d1673023ab0a6f445822c506672969e5f81 (diff)
downloadmeta-openembedded-f8840edf8c474ea410744f92624da66dcac9e816.tar.gz
opensc: fix CVE-2024-8443
CVE-2024-8443: The Easy Mega Menu Plugin for WordPress – ThemeHunk plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘themehunk_megamenu_bg_image' parameter in all versions up to, and including, 1.1.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Please note that this was partially fixed in 1.1.0 due to the missing authorization protection that was added. Reference: [https://nvd.nist.gov/vuln/detail/CVE-2024-8433] Upstream patches: [https://github.com/OpenSC/OpenSC/commit/02e847458369c08421fd2d5e9a16a5f272c2de9e] [https://github.com/OpenSC/OpenSC/commit/b28a3cef416fcfb92fbb9ea7fd3c71df52c6c9fc] Signed-off-by: Zhang Peng <peng.zhang1.cn@windriver.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
Diffstat (limited to 'meta-python/recipes-devtools/python/python3-sqlparse/CVE-2024-4340.patch')
0 files changed, 0 insertions, 0 deletions