{
    "componentChunkName": "component---src-templates-download-tsx",
    "path": "/download/3.11.3",
    "result": {"data":{"releases":{"nodes":[{"tag":"3.11.3","date":"2026-02-10","packages":[{"type":"unix","url":"https://packages.scm-manager.org/repository/releases/sonia/scm/packaging/unix/3.11.3/unix-3.11.3.tar.gz","checksum":"8f4123cef169e52a8c3892177af86527cbc680dd193e11b95c132bf1b29d5a0f"},{"type":"windows","url":"https://packages.scm-manager.org/repository/releases/sonia/scm/packaging/windows/3.11.3/windows-3.11.3.zip","checksum":"155248d8917c383f360a403dec2c42db4730e26eb76d980f700dcdcab1d78e45"},{"type":"debian","url":null,"checksum":null},{"type":"redhat","url":null,"checksum":null},{"type":"docker","url":null,"checksum":null},{"type":"k8s","url":null,"checksum":null},{"type":"ces","url":null,"checksum":null}]}]},"changelog":{"childChangelog":{"versions":[{"tag":"3.11.3","changes":{"html":"<h3>Fixed</h3>\n<ul>\n<li>IngressClassName to helm chart</li>\n<li>Enhanced error message including filename of corrupt file</li>\n<li>Internal server error for cat command on empty repository</li>\n<li>Application of mercurial configration (thanks to harbison72)</li>\n<li>Proxy exclusions with glob patterns</li>\n<li>External logos in plugin overview</li>\n</ul>\n<h3>Changed</h3>\n<ul>\n<li>Update IntelliJ IDEA configuration documentation</li>\n</ul>"}}]}},"alerts":{"nodes":[{"title":"Expat vulnerability","description":"Your instance is affected if you have the PlantUML-Plugin installed.","link":"https://scm-manager.org/blog/posts/2022-02-02-expat/","affectedVersions":">=2.0.0 <=2.30.1","fields":{"component":"core"}},{"title":"Potential leak of password details in trace log","description":"There is a potential leak that can give hints to passwords if the trace log is activated.","link":"https://scm-manager.org/blog/posts/2025-01-17-potential-password-leak/","affectedVersions":">=3.0.0 <=3.6.0 || <2.46.5 || >=2.47.0 <2.48.4","fields":{"component":"core"}},{"title":"Logback vulnerability","description":"The logback team announced a vulnerability in logback versions.","link":"https://scm-manager.org/blog/posts/2021-12-13-log4shell/","affectedVersions":"<2.27.3","fields":{"component":"core"}},{"title":"Namespace privilege escalation","description":"We found a vulnerability that allows users to escalate their privileges inside a namespace.","link":"https://scm-manager.org/blog/posts/2024-07-08-scm-manager-3-3-0/","affectedVersions":">=3.0.4 <=3.2.2","fields":{"component":"core"}},{"title":"CAS plugin account hijacking vulnerability","description":"We found a vulnerability that allows hijacking another user account.","link":"https://scm-manager.org/blog/posts/2025-05-16-cas-plugin-account-hijacking-vulnerability/","affectedVersions":">=2.5.0 <=3.3.0","fields":{"component":"core"}},{"title":"LDAP plugin account hijacking vulnerability","description":"We found a vulnerability that allows hijacking another user account.","link":"https://scm-manager.org/blog/posts/2025-05-22-ldap-plugin-account-hijacking-vulnerability/","affectedVersions":"<=3.1.0","fields":{"component":"core"}}]}},"pageContext":{"tag":"3.11.3","latest":false}},
    "staticQueryHashes": ["1973669194","2742214048","2956773653"]}