Description: "Thanks to thesnark and operhiem1 we have a fix to a way to circumvent the content filter. This could have resulted in handing an insecure file to an external (and potentially vulnerable) program without showing a warning to the user. Please update ASAP to avoid that. See CVE-2019-9673 for details." Fixed in 0.7.5_p1484.
MITRE: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9673 Alternative description (via MITRE): "Freenet 1483 has a MIME type bypass that allows arbitrary JavaScript execution via a crafted Freenet URI." Given that in the context of Freenet, this can be quite serious, changing to B2.
Versions prior to 0.7.5_p1484 removed.
Repository is clean. All done.