[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-MGASA-2024-0279":6},{"stargazers_count":4,"fetched_at":5},5,"2026-04-28T13:22:40.146Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":11,"aliases":12,"duplicate_of":9,"upstream":13,"downstream":20,"duplicates":21,"related":22,"reserved_at":9,"published_at":26,"modified_at":27,"state":9,"summary":28,"references_raw":30,"kevs":47,"epss":9,"epss_history":48,"metrics":49,"affected":50},"MGASA-2024-0279","Updated roundcubemail packages fix security vulnerabilities\n\nFix XSS vulnerability in post-processing of sanitized HTML content\n[CVE-2024-42009]\nFix XSS vulnerability in serving of attachments other than HTML or SVG\n[CVE-2024-42008]\nFix information leak (access to remote content) via insufficient CSS\nfiltering [CVE-2024-42010]\n",null,[],[],[],[14,16,18],{"_key":15},"CVE-2024-42010",{"_key":17},"CVE-2024-42009",{"_key":19},"CVE-2024-42008",[],[],[23,24,25],{"_key":19},{"_key":17},{"_key":15},"2024-08-15T17:48:28Z","2026-04-16T04:20:58.048510Z",{"cisa_kev":29,"cisa_ransomware":29,"cisa_vendor":9,"epss_severity":9,"epss_score":9,"severity":9,"severity_score":9,"severity_version":9,"severity_source":9,"severity_vector":9,"severity_status":9},false,[31,37,42],{"url":32,"sources":33,"tags":35},"https://advisories.mageia.org/MGASA-2024-0279.html",[34],"osv_mageia",[36],"Advisory",{"url":38,"sources":39,"tags":40},"https://bugs.mageia.org/show_bug.cgi?id=33460",[34],[41],"REPORT",{"url":43,"sources":44,"tags":45},"https://github.com/roundcube/roundcubemail/releases/tag/1.6.8",[34],[41,46],"WEB",[],[],[],[51],{"ecosystem":52,"name":53,"vendor":54,"product":53,"cpe_part":9,"purl_type":55,"purl_namespace":54,"purl_name":53,"source":9,"versions":56},"Mageia","roundcubemail","mageia","rpm",[57],{"version":58,"is_range":59,"range_type":60,"version_start":9,"version_start_type":9,"version_end":61,"version_end_type":62,"fixed_in":9},"lt1_6_8_1_mga9",true,"ecosystem","1.6.8-1.mga9","excluding"]