Vulnerabilities > Gogs > Gogs > 0.4.0
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-03-11 | CVE-2022-0870 | Server-Side Request Forgery (SSRF) vulnerability in Gogs Server-Side Request Forgery (SSRF) in GitHub repository gogs/gogs prior to 0.12.5. | 5.0 |
2020-02-21 | CVE-2020-9329 | Race Condition vulnerability in Gogs Gogs through 0.11.91 allows attackers to violate the admin-specified repo-creation policy due to an internal/db/repo.go race condition. | 4.3 |
2018-12-20 | CVE-2018-20303 | Path Traversal vulnerability in Gogs In pkg/tool/path.go in Gogs before 0.11.82.1218, a directory traversal in the file-upload functionality can allow an attacker to create a file under data/sessions on the server, a similar issue to CVE-2018-18925. | 5.0 |
2018-11-04 | CVE-2018-18925 | Session Fixation vulnerability in Gogs Gogs 0.11.66 allows remote code execution because it does not properly validate session IDs, as demonstrated by a ".." session-file forgery in the file session provider in file.go. | 7.5 |
2018-08-08 | CVE-2018-15192 | Server-Side Request Forgery (SSRF) vulnerability in multiple products An SSRF vulnerability in webhooks in Gitea through 1.5.0-rc2 and Gogs through 0.11.53 allows remote attackers to access intranet services. | 5.0 |
2018-08-08 | CVE-2018-15178 | Open Redirect vulnerability in Gogs Open redirect vulnerability in Gogs before 0.12 allows remote attackers to redirect users to arbitrary websites and conduct phishing attacks via an initial /\ substring in the user/login redirect_to parameter, related to the function isValidRedirect in routes/user/auth.go. | 5.8 |