Affected by GO-2022-0310
and 18 other vulnerabilities
GO-2022-0310 : Capture-replay in Gitea in code.gitea.io/gitea
GO-2022-0315 : Reuse of one time passwords allowed in Gitea in code.gitea.io/gitea
GO-2022-0353 : Path Traversal in Gitea in code.gitea.io/gitea
GO-2022-0442 : Arbitrary file deletion in gitea in code.gitea.io/gitea
GO-2022-0450 : Shell command injection in gitea in code.gitea.io/gitea
GO-2022-0609 : Gitea Missing Authorization vulnerability in code.gitea.io/gitea
GO-2022-0612 : Stored Cross-site Scripting in gitea in code.gitea.io/gitea
GO-2022-0830 : Denial of Service in Gitea in code.gitea.io/gitea
GO-2022-0832 : Cross-site Scripting in Gitea in code.gitea.io/gitea
GO-2022-0844 : Gitea Remote Code Execution (RCE) in code.gitea.io/gitea
GO-2022-0982 : Improper Privilege Management in Gitea in code.gitea.io/gitea
GO-2022-1065 : Gitea vulnerable to Argument Injection in code.gitea.io/gitea
GO-2023-1894 : code.gitea.io/gitea Open Redirect vulnerability
GO-2023-1922 : Gitea XSS Vulnerability in code.gitea.io/gitea
GO-2023-1971 : Gogs and Gitea SSRF Vulnerability in code.gitea.io/gitea
GO-2023-1999 : Gitea erroneous repo clones in code.gitea.io/gitea
GO-2024-2769 : Gitea allowed assignment of private issues in code.gitea.io/gitea
GO-2024-3056 : Gitea Cross-site Scripting Vulnerability in code.gitea.io/gitea
Discover Packages
code.gitea.io/gitea
modules
bindata
package
Version:
v0.9.99
Opens a new window with list of versions in this module.
Published: Oct 17, 2016
License: MIT
Opens a new window with license information.
Imports: 9
Opens a new window with list of imports.
Imported by: 0
Opens a new window with list of known importers.
Documentation
Documentation
¶
Asset loads and returns the asset for the given name.
It returns an error if the asset could not be found or
could not be loaded.
AssetDir returns the file names below a certain
directory embedded in the file by go-bindata.
For example if you run go-bindata on data/... and data contains the
following hierarchy:
data/
foo.txt
img/
a.png
b.png
then AssetDir("data") would return []string{"foo.txt", "img"}
AssetDir("data/img") would return []string{"a.png", "b.png"}
AssetDir("foo.txt") and AssetDir("notexist") would return an error
AssetDir("") will return []string{"data"}.
AssetInfo loads and returns the asset info for the given name.
It returns an error if the asset could not be found or
could not be loaded.
AssetNames returns the names of the assets.
MustAsset is like Asset but panics when Asset would return an error.
It simplifies safe initialization of global variables.
RestoreAsset restores an asset under the given directory
RestoreAssets restores an asset under the given directory recursively
Source Files
¶
Click to show internal directories.
Click to hide internal directories.