Alerts
Events
DCR
Explore Cyware Products
Alerts
Events
DCR
Go to listing page
Gogs Vulnerabilities May Put Your Source Code at Risk
Malware and Vulnerabilities
July 08, 2024
SC Magazine
Exploiting these flaws could allow attackers to execute arbitrary commands, read source code, and gain unauthorized access. The vulnerabilities require authentication, with one flaw specifically requiring the built-in SSH server to be enabled.
Read More
Gogs
Open Source Project
Argument Injection Vulnerability
File Deletion Vulnerability
SSH server
Publisher
Previous
Report: 47% of Corporate Data Stored in the Cloud Is Se ...
Trends, Reports, Analysis
Next
Vinted Fined $2.6m Over Data Protection Failure
Incident Response, Learnings