Hi
| CVE | Severity | Description |
|---|---|---|
| CVE-2022-1993 | High (8.1) | Path Traversal vulnerability on the endpoint '/info/refs' in gogs/gogs |
| CVE-2022-3607 | Medium (6) | ZipSlip Symlink variant allows to read any file within OctoPrint Box in octoprint/octoprint |
| CVE-2022-23530 | Medium (5.8) | GuardDog vulnerable to arbitrary file write when scanning a specially-crafted remote PyPI package |
| CVE-2023-25804 | Medium | Limited Path Traversal in name parameter hap-wi/roxy-wi |
| CVE-2023-25803 | High | Directory Traversal vulnerability in hap-wi/roxy-wi |
| CVE-2023-25802 | High | Path Traversal vulnerability in hap-wi/roxy-wi |
| CVE-2022-23522 | High | Arbitrary File Write when Extracting Tarballs retrieved from a remote location using shutil.unpack_archive() |
| CVE-2023-30620 | High | Arbitrary File Write when Extracting a Remotely retrieved Tarball using Tarfile.extractall() in mindsdb/mindsdb |
| CVE-2023-31131 | Medium | Arbitrary File Write when Extracting Tarballs retrieved from a remote location using shutil.unpack_archive() in greenplum-db/gpdb |
| CVE-2023-35932 | High | Configuration Injection in tanghaibao/jcvi due to unsanitized user input |
| GHSA-373w-rj84-pv6x | Low | Hostname blocklist does not block FQDNs in IncludeSecurity/safeurl-python |


