@@ -28,12 +28,12 @@ <h1>security-checker</h1>
28
28
* CVE-2014-5011: Information Disclosure
29
29
https://github.com/dompdf/dompdf/releases/tag/v0.6.2
30
30
31
- * CVE-2014-5013: Remote Code Execution (complement of CVE-2014-2383)
32
- https://github.com/dompdf/dompdf/releases/tag/v0.6.2
33
-
34
31
* CVE-2023-23924: Dompdf vulnerable to URI validation failure on SVG parsing
35
32
https://github.com/advisories/GHSA-3cw5-7cxw-v5qg
36
33
34
+ * CVE-2014-5013: Remote Code Execution (complement of CVE-2014-2383)
35
+ https://github.com/dompdf/dompdf/releases/tag/v0.6.2
36
+
37
37
drupal/core (8.9.13)
38
38
--------------------
39
39
@@ -43,12 +43,12 @@ <h1>security-checker</h1>
43
43
* CVE-2020-13672: Drupal core - Critical - Cross-site scripting - SA-CORE-2021-002
44
44
https://www.drupal.org/sa-core-2021-002
45
45
46
- * CVE-2022-25277: Drupal core - Critical - Arbitrary PHP code execution - SA-CORE-2022-014
47
- https://www.drupal.org/sa-core-2022-014
48
-
49
46
* Drupal core - Moderately critical - Third-party libraries - SA-CORE-2021-005
50
47
https://www.drupal.org/sa-core-2021-005
51
48
49
+ * CVE-2022-25277: Drupal core - Critical - Arbitrary PHP code execution - SA-CORE-2022-014
50
+ https://www.drupal.org/sa-core-2022-014
51
+
52
52
* CVE-2021-33829: Drupal core - Critical - Cross-site scripting - SA-CORE-2021-003
53
53
https://www.drupal.org/sa-core-2021-003
54
54
@@ -58,18 +58,18 @@ <h1>security-checker</h1>
58
58
guzzlehttp/guzzle (6.5.4)
59
59
-------------------------
60
60
61
- * CVE-2022-29248: Cross-domain cookie leakage
62
- https://github.com/guzzle/guzzle/security/advisories/GHSA-cwmx-hcrq-mhc3
63
-
64
- * CVE-2022-31091: Change in port should be considered a change in origin
65
- https://github.com/guzzle/guzzle/security/advisories/GHSA-q559-8m2m-g699
66
-
67
61
* CVE-2022-31090: CURLOPT_HTTPAUTH option not cleared on change of origin
68
62
https://github.com/guzzle/guzzle/security/advisories/GHSA-25mq-v84q-4j7r
69
63
70
64
* CVE-2022-31042: Failure to strip the Cookie header on change in host or HTTP downgrade
71
65
https://github.com/guzzle/guzzle/security/advisories/GHSA-f2wf-25xc-69c9
72
66
67
+ * CVE-2022-29248: Cross-domain cookie leakage
68
+ https://github.com/guzzle/guzzle/security/advisories/GHSA-cwmx-hcrq-mhc3
69
+
70
+ * CVE-2022-31091: Change in port should be considered a change in origin
71
+ https://github.com/guzzle/guzzle/security/advisories/GHSA-q559-8m2m-g699
72
+
73
73
* CVE-2022-31043: Fix failure to strip Authorization header on HTTP downgrade
74
74
https://github.com/guzzle/guzzle/security/advisories/GHSA-w248-ffj2-4v5q
75
75
0 commit comments