Processing control commands:
> tags -1 + confirmed
Bug #1008168 [release.debian.org] bullseye-pu: package
node-url-parse/1.5.3-1+deb11u1
Added tag(s) confirmed.
--
1008168: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1008168
Debian Bug Tracking System
Contact ow...@bugs.debian.org with
Control: tags -1 + confirmed
On Mon, 2022-04-11 at 16:17 +0200, Yadd wrote:
> On 24/03/2022 15:12, Moritz Mühlenhoff wrote:
> > Am Wed, Mar 23, 2022 at 02:25:26PM +0100 schrieb Yadd:
> > > Package: release.debian.org
> > > Severity: normal
> > > Tags: bullseye
> > > User:
On 24/03/2022 15:12, Moritz Mühlenhoff wrote:
Am Wed, Mar 23, 2022 at 02:25:26PM +0100 schrieb Yadd:
Package: release.debian.org
Severity: normal
Tags: bullseye
User: release.debian@packages.debian.org
Usertags: pu
[ Reason ]
node-url-parse is vulnerable to an authorization Bypass Through
Am Wed, Mar 23, 2022 at 02:25:26PM +0100 schrieb Yadd:
> Package: release.debian.org
> Severity: normal
> Tags: bullseye
> User: release.debian@packages.debian.org
> Usertags: pu
>
> [ Reason ]
> node-url-parse is vulnerable to an authorization Bypass Through
> User-Controlled
Package: release.debian.org
Severity: normal
Tags: bullseye
User: release.debian@packages.debian.org
Usertags: pu
[ Reason ]
node-url-parse is vulnerable to an authorization Bypass Through
User-Controlled (CVE-2022-0686).
[ Impact ]
medium vulnerability
[ Tests ]
Test updated, passed
[
5 matches
Mail list logo