We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Vulnerability analysis of Plone 6.0.13 dependencies using Trivy. https://dist.plone.org/release/6.0.13/constraints.txt
Total: 18 (UNKNOWN: 0, LOW: 1, MEDIUM: 8, HIGH: 8, CRITICAL: 1)
GLOBALTRUST
The text was updated successfully, but these errors were encountered:
No branches or pull requests
Vulnerability analysis of Plone 6.0.13 dependencies using Trivy.
https://dist.plone.org/release/6.0.13/constraints.txt
Total: 18 (UNKNOWN: 0, LOW: 1, MEDIUM: 8, HIGH: 8, CRITICAL: 1)
--
CVE-2024-34064
--
3.1.4
--
jinja2: accepts keys containing non-attribute characters https://avd.aquasec.com/nvd/cve-2024-34064
--
CVE-2023-4863
--
CVE-2023-50447
--
GHSA-56pw-mpj4-fxww
--
CVE-2024-28219
--
MEDIUM
--
10.0.1
--
10.2.0
--
10.0.1
--
10.3.0
--
libwebp: Heap buffer overflow in WebP Codec https://avd.aquasec.com/nvd/cve-2023-4863
--
pillow: Arbitrary Code Execution via the environment parameter https://avd.aquasec.com/nvd/cve-2023-50447
--
Bundled libwebp in Pillow vulnerable GHSA-56pw-mpj4-fxww
--
python-pillow: buffer overflow in _imagingcms.c https://avd.aquasec.com/nvd/cve-2024-28219
GLOBALTRUST
from the root store https://avd.aquasec.com/nvd/cve-2024-39689--
CVE-2024-49769
--
HIGH
--
waitress: Waitress has a denial of service leading to high CPU usage/resource... https://avd.aquasec.com/nvd/cve-2024-49769
The text was updated successfully, but these errors were encountered: