CVE-2024-54148
- EPSS 0.64%
- Veröffentlicht 23.12.2024 16:15:07
- Zuletzt bearbeitet 10.04.2025 14:48:03
Gogs is an open source self-hosted Git service. A malicious user is able to commit and edit a crafted symlink file to a repository to gain SSH access to the server. The vulnerability is fixed in 0.13.1.
CVE-2024-44625
- EPSS 70.88%
- Veröffentlicht 15.11.2024 17:15:20
- Zuletzt bearbeitet 21.11.2024 09:36:48
Gogs <=0.13.0 is vulnerable to Directory Traversal via the editFilePost function of internal/route/repo/editor.go.
CVE-2022-1884
- EPSS 9.82%
- Veröffentlicht 15.11.2024 11:15:07
- Zuletzt bearbeitet 19.11.2024 14:47:48
A remote command execution vulnerability exists in gogs/gogs versions <=0.12.7 when deployed on a Windows server. The vulnerability arises due to improper validation of the `tree_path` parameter during file uploads. An attacker can set `tree_path=.gi...
CVE-2024-39932
- EPSS 2.82%
- Veröffentlicht 04.07.2024 16:15:02
- Zuletzt bearbeitet 10.04.2025 13:44:52
Gogs through 0.13.0 allows argument injection during the previewing of changes.
CVE-2024-39933
- EPSS 0.3%
- Veröffentlicht 04.07.2024 16:15:02
- Zuletzt bearbeitet 10.04.2025 13:45:38
Gogs through 0.13.0 allows argument injection during the tagging of a new release.
CVE-2024-39931
- EPSS 7.23%
- Veröffentlicht 04.07.2024 16:15:02
- Zuletzt bearbeitet 10.04.2025 13:43:51
Gogs through 0.13.0 allows deletion of internal files.
CVE-2024-39930
- EPSS 11.88%
- Veröffentlicht 04.07.2024 16:15:02
- Zuletzt bearbeitet 11.04.2025 15:14:27
The built-in SSH server of Gogs through 0.13.0 allows argument injection in internal/ssh/ssh.go, leading to remote code execution. Authenticated attackers can exploit this by opening an SSH connection and sending a malicious --split-string env reques...
CVE-2022-2024
- EPSS 38.65%
- Veröffentlicht 25.02.2023 08:15:09
- Zuletzt bearbeitet 21.11.2024 07:00:11
OS Command Injection in GitHub repository gogs/gogs prior to 0.12.11.
- EPSS 2.66%
- Veröffentlicht 11.10.2022 15:15:09
- Zuletzt bearbeitet 27.05.2025 21:09:53
In Gogs, versions v0.6.5 through v0.12.10 are vulnerable to Stored Cross-Site Scripting (XSS) that leads to an account takeover.
CVE-2022-31038
- EPSS 0.26%
- Veröffentlicht 09.06.2022 17:15:09
- Zuletzt bearbeitet 21.11.2024 07:03:45
Gogs is an open source self-hosted Git service. In versions of gogs prior to 0.12.9 `DisplayName` does not filter characters input from users, which leads to an XSS vulnerability when directly displayed in the issue list. This issue has been resolved...