![]() ![]() This document is public and thus exposes this information publicly. The XWiki licensor application, which manages and enforce application licenses for paid extensions, includes the document `` that provides information for admins regarding active licenses. As a workaround, ensure that potentially untrusted user input does not contain any sequences which could be rendered as HTML. Versions before 0.10.0 are not affected by this security issue. The problem has been fixed in version 0.11.0 of this library. The attacker could control contents of email messages sent through the platform. ![]() The attacker must be able to control some data which is later injected in an mjml template which is then send out as email to other users. User input like `
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |