Bugs fixes in "jinja2"
Origin | Bug number | Title | Date fixed |
---|---|---|---|
CVE | CVE-2024-22195 | Jinja is an extensible templating engine. Special placeholders in the template allow writing code similar to Python syntax. It is possible to inject | 2024-01-25 |
CVE | CVE-2020-28493 | This affects the package jinja2 from 0.0.0 and before 2.11.3. The ReDoS vulnerability is mainly due to the `_punctuation_re regex` operator and its u | 2024-01-25 |
CVE | CVE-2024-22195 | Jinja is an extensible templating engine. Special placeholders in the template allow writing code similar to Python syntax. It is possible to inject | 2024-01-25 |
CVE | CVE-2024-22195 | Jinja is an extensible templating engine. Special placeholders in the template allow writing code similar to Python syntax. It is possible to inject | 2024-01-25 |
CVE | CVE-2019-10906 | In Pallets Jinja before 2.10.1, str.format_map allows a sandbox escape. | 2019-06-06 |
CVE | CVE-2016-10745 | In Pallets Jinja before 2.8.1, str.format allows a sandbox escape. | 2019-06-06 |
CVE | CVE-2019-10906 | In Pallets Jinja before 2.10.1, str.format_map allows a sandbox escape. | 2019-06-06 |
CVE | CVE-2016-10745 | In Pallets Jinja before 2.8.1, str.format allows a sandbox escape. | 2019-06-06 |
CVE | CVE-2019-10906 | In Pallets Jinja before 2.10.1, str.format_map allows a sandbox escape. | 2019-06-06 |
CVE | CVE-2019-10906 | In Pallets Jinja before 2.10.1, str.format_map allows a sandbox escape. | 2019-06-06 |
About
-
Send Feedback to @ubuntu_updates