<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="FeedCreator 1.8" -->
<?xml-stylesheet href="https://flab.cesnet.cz/lib/exe/css.php?s=feed" type="text/css"?>
<rdf:RDF
    xmlns="http://purl.org/rss/1.0/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
    xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel rdf:about="https://flab.cesnet.cz/feed.php">
        <title>FLAB - advisories</title>
        <description></description>
        <link>https://flab.cesnet.cz/</link>
        <image rdf:resource="https://flab.cesnet.cz/_media/logo.png" />
       <dc:date>2026-04-22T15:45:26+00:00</dc:date>
        <items>
            <rdf:Seq>
                <rdf:li rdf:resource="https://flab.cesnet.cz/advisories/cve-2019-11217?rev=1556269085&amp;do=diff"/>
                <rdf:li rdf:resource="https://flab.cesnet.cz/advisories/cve-2019-11218?rev=1556269096&amp;do=diff"/>
                <rdf:li rdf:resource="https://flab.cesnet.cz/advisories/cve-2020-27958?rev=1604609052&amp;do=diff"/>
            </rdf:Seq>
        </items>
    </channel>
    <image rdf:about="https://flab.cesnet.cz/_media/logo.png">
        <title>FLAB</title>
        <link>https://flab.cesnet.cz/</link>
        <url>https://flab.cesnet.cz/_media/logo.png</url>
    </image>
    <item rdf:about="https://flab.cesnet.cz/advisories/cve-2019-11217?rev=1556269085&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2019-04-26T08:58:05+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>CVE-2019-11217: Arbitraty command execution in Bonobo Git Server GitController</title>
        <link>https://flab.cesnet.cz/advisories/cve-2019-11217?rev=1556269085&amp;do=diff</link>
        <description>CVE-2019-11217: Arbitraty command execution in Bonobo Git Server GitController

	*  Vulnerability Type: CWE-77: Improper Neutralization of Special Elements used in a Command (&#039;Command Injection&#039;)
	*  Vendor: Jakub Chodounsky
	*  Affected Product: Bonobo Git Server - 6.3.0 (other versions has not been assessed)</description>
    </item>
    <item rdf:about="https://flab.cesnet.cz/advisories/cve-2019-11218?rev=1556269096&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2019-04-26T08:58:16+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>CVE-2019-11218: Privilege escalation in Bonobo Git Server AccountController</title>
        <link>https://flab.cesnet.cz/advisories/cve-2019-11218?rev=1556269096&amp;do=diff</link>
        <description>CVE-2019-11218: Privilege escalation in Bonobo Git Server AccountController

	*  Vulnerability Type: CWE-235: Improper Handling of Extra Parameters
	*  Vendor: Jakub Chodounsky
	*  Affected Product: Bonobo Git Server - 6.3.0 (other versions has not been assessed)</description>
    </item>
    <item rdf:about="https://flab.cesnet.cz/advisories/cve-2020-27958?rev=1604609052&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2020-11-05T20:44:12+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>CVE-2020-27958: Arbitraty command execution in Open OnDemand</title>
        <link>https://flab.cesnet.cz/advisories/cve-2020-27958?rev=1604609052&amp;do=diff</link>
        <description>CVE-2020-27958: Arbitraty command execution in Open OnDemand

	*  Vulnerability Type: CWE-78: Improper Neutralization of Special Elements used in an OS Command (&#039;OS Command Injection&#039;)
	*  Vendor: Ohio Supercomputer Center
	*  Affected Product: Open OnDeman 1.8.15 (other versions has not been tested)</description>
    </item>
</rdf:RDF>
