v1.1.1
#1171
Replies: 1 comment 2 replies
-
Why is this change not considered a breaking change? |
Beta Was this translation helpful? Give feedback.
2 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Warning
This release fixes a vulnerability (CVE-2024-36039).
All users are recommended to update to this version.
If you can not update soon, check the input value from untrusted source has an expected type.
Only dict input from untrusted source can be an attack vector.
What's Changed
Cursor.execute()
. It didn't produce valid SQLand might cause SQL injection. (CVE-2024-36039)
Merged PRs
New Contributors
Full Changelog: v1.1.0...v1.1.1
This discussion was created from the release v1.1.1.
Beta Was this translation helpful? Give feedback.
All reactions