Affected by GO-2023-1592
and 27 other vulnerabilities
GO-2023-1592: Answer vulnerable to Cross-site Scripting in github.com/answerdev/answer
GO-2023-1612: Answer vulnerable to Cross-site Scripting in github.com/answerdev/answer
GO-2023-1613: Answer vulnerable to Cross-site Scripting in github.com/answerdev/answer
GO-2023-1614: Answer vulnerable to Cross-site Scripting in github.com/answerdev/answer
GO-2023-1615: Answer vulnerable to Cross-site Scripting in github.com/answerdev/answer
GO-2023-1616: Answer vulnerable to Cross-site Scripting in github.com/answerdev/answer
GO-2023-1617: Answer vulnerable to Cross-site Scripting in github.com/answerdev/answer
GO-2023-1618: Answer vulnerable to Cross-site Scripting in github.com/answerdev/answer
GO-2023-1619: Answer vulnerable to Cross-site Scripting in github.com/answerdev/answer
GO-2023-1620: Answer vulnerable to Cross-site Scripting in github.com/answerdev/answer
GO-2023-1654: Answer has Observable Response Discrepancy in github.com/answerdev/answer
GO-2023-1655: Answer vulnerable to Insufficient Session Expiration in github.com/answerdev/answer
GO-2023-1656: Answer vulnerable to Stored Cross-site Scripting in github.com/answerdev/answer
GO-2023-1657: Answer has Guessable CAPTCHA in github.com/answerdev/answer
GO-2023-1658: Answer vulnerable to Business Logic Errors in github.com/answerdev/answer
GO-2023-1659: Answer vulnerable to Authentication Bypass by Capture-replay in github.com/answerdev/answer
GO-2023-1660: Answer vulnerable to Business Logic Errors in github.com/answerdev/answer
GO-2023-1661: Answer has Observable Timing Discrepancy in github.com/answerdev/answer
GO-2023-1662: Answer vulnerable to Stored Cross-site Scripting in github.com/answerdev/answer
GO-2023-1716: Answer vulnerable to Insertion of Sensitive Information Into Sent Data in github.com/answerdev/answer
GO-2023-1718: Answer vulnerable to Exposure of Sensitive Information Through Metadata in github.com/answerdev/answer
GO-2023-1719: Answer vulnerable to account takeover because password reset links do not expire in github.com/answerdev/answer
GO-2023-1774: Answer Missing Authorization vulnerability in github.com/answerdev/answer
GO-2023-1995: Answer has Race Condition within a Thread in github.com/answerdev/answer
GO-2023-1996: Answer Insufficient Session Expiration vulnerability in github.com/answerdev/answer
GO-2023-1997: Answer Missing Authorization vulnerability in github.com/answerdev/answer
GO-2023-2001: Answer has Weak Password Requirements in github.com/answerdev/answer
GO-2023-2051: Answer Missing Authentication for Critical Function in github.com/answerdev/answer
package
Version:
v1.0.4
Opens a new window with list of versions in this module.
Published: Feb 7, 2023
License: Apache-2.0
Opens a new window with license information.
Imports: 13
Opens a new window with list of imports.
Imported by: 0
Opens a new window with list of known importers.
Documentation
¶
NewCache new cache instance
NewDB new database instance
type CacheConf struct {
FilePath string `json:"file_path" mapstructure:"file_path" yaml:"file_path"`
}
CacheConf cache
Data data
NewData new data instance
type Database struct {
Driver string `json:"driver" mapstructure:"driver" yaml:"driver"`
Connection string `json:"connection" mapstructure:"connection" yaml:"connection"`
ConnMaxLifeTime int `json:"conn_max_life_time" mapstructure:"conn_max_life_time" yaml:"conn_max_life_time,omitempty"`
MaxOpenConn int `json:"max_open_conn" mapstructure:"max_open_conn" yaml:"max_open_conn,omitempty"`
MaxIdleConn int `json:"max_idle_conn" mapstructure:"max_idle_conn" yaml:"max_idle_conn,omitempty"`
}
Database database config
Source Files
¶
Click to show internal directories.
Click to hide internal directories.