|
|
|
@ -38,6 +38,13 @@ To receive fixes for security vulnerabilities it is required to always upgrade t
|
|
|
|
|
| V 0.6.18 | Possible SQL Injection is prevented in user table Thanks to Iman Sharafaldin (Forward Security) |CVE-2022-30765|
|
|
|
|
|
| V 0.6.18 | The SSRF protection no longer can be bypassed by IPV6/IPV4 embedding. Thanks to @416e6e61 |CVE-2022-0939|
|
|
|
|
|
| V 0.6.18 | The SSRF protection no longer can be bypassed to connect to other servers in the local network. Thanks to @michaellrowley |CVE-2022-0990|
|
|
|
|
|
| V 0.6.20 | Credentials for emails are now stored encrypted ||
|
|
|
|
|
| V 0.6.20 | Login is rate limited ||
|
|
|
|
|
| V 0.6.20 | Passwordstrength can be forced ||
|
|
|
|
|
| V 0.6.21 | SMTP server credentials are no longer returned to client ||
|
|
|
|
|
| V 0.6.21 | Cross-site scripting (XSS) stored in href bypasses filter using data wrapper no longer possible ||
|
|
|
|
|
| V 0.6.21 | Cross-site scripting (XSS) is no longer possible via pathchooser ||
|
|
|
|
|
| V 0.6.21 | Error Handling at non existent rating, language, and user downloaded books was fixed ||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
## Statement regarding Log4j (CVE-2021-44228 and related)
|
|
|
|
|