Affected by GO-2023-1612
and 26 other vulnerabilities
GO-2023-1612: Answer vulnerable to Cross-site Scripting in github.com/answerdev/answer
GO-2023-1613: Answer vulnerable to Cross-site Scripting in github.com/answerdev/answer
GO-2023-1614: Answer vulnerable to Cross-site Scripting in github.com/answerdev/answer
GO-2023-1615: Answer vulnerable to Cross-site Scripting in github.com/answerdev/answer
GO-2023-1616: Answer vulnerable to Cross-site Scripting in github.com/answerdev/answer
GO-2023-1617: Answer vulnerable to Cross-site Scripting in github.com/answerdev/answer
GO-2023-1618: Answer vulnerable to Cross-site Scripting in github.com/answerdev/answer
GO-2023-1619: Answer vulnerable to Cross-site Scripting in github.com/answerdev/answer
GO-2023-1620: Answer vulnerable to Cross-site Scripting in github.com/answerdev/answer
GO-2023-1654: Answer has Observable Response Discrepancy in github.com/answerdev/answer
GO-2023-1655: Answer vulnerable to Insufficient Session Expiration in github.com/answerdev/answer
GO-2023-1656: Answer vulnerable to Stored Cross-site Scripting in github.com/answerdev/answer
GO-2023-1657: Answer has Guessable CAPTCHA in github.com/answerdev/answer
GO-2023-1658: Answer vulnerable to Business Logic Errors in github.com/answerdev/answer
GO-2023-1659: Answer vulnerable to Authentication Bypass by Capture-replay in github.com/answerdev/answer
GO-2023-1660: Answer vulnerable to Business Logic Errors in github.com/answerdev/answer
GO-2023-1661: Answer has Observable Timing Discrepancy in github.com/answerdev/answer
GO-2023-1662: Answer vulnerable to Stored Cross-site Scripting in github.com/answerdev/answer
GO-2023-1716: Answer vulnerable to Insertion of Sensitive Information Into Sent Data in github.com/answerdev/answer
GO-2023-1718: Answer vulnerable to Exposure of Sensitive Information Through Metadata in github.com/answerdev/answer
GO-2023-1719: Answer vulnerable to account takeover because password reset links do not expire in github.com/answerdev/answer
GO-2023-1774: Answer Missing Authorization vulnerability in github.com/answerdev/answer
GO-2023-1995: Answer has Race Condition within a Thread in github.com/answerdev/answer
GO-2023-1996: Answer Insufficient Session Expiration vulnerability in github.com/answerdev/answer
GO-2023-1997: Answer Missing Authorization vulnerability in github.com/answerdev/answer
GO-2023-2001: Answer has Weak Password Requirements in github.com/answerdev/answer
GO-2023-2051: Answer Missing Authentication for Critical Function in github.com/answerdev/answer
package
Version:
v1.0.5
Opens a new window with list of versions in this module.
Published: Feb 21, 2023
License: Apache-2.0
Opens a new window with license information.
Imports: 14
Opens a new window with list of imports.
Imported by: 0
Opens a new window with list of known importers.
Documentation
¶
RewriteConfig rewrite config file path
type AllConfig struct {
Debug bool `json:"debug" mapstructure:"debug" yaml:"debug"`
Server *Server `json:"server" mapstructure:"server" yaml:"server"`
Data *Data `json:"data" mapstructure:"data" yaml:"data"`
I18n *translator.I18n `json:"i18n" mapstructure:"i18n" yaml:"i18n"`
ServiceConfig *service_config.ServiceConfig `json:"service_config" mapstructure:"service_config" yaml:"service_config"`
Swaggerui *router.SwaggerConfig `json:"swaggerui" mapstructure:"swaggerui" yaml:"swaggerui"`
}
AllConfig all config
type Data struct {
Database *data.Database `json:"database" mapstructure:"database" yaml:"database"`
Cache *data.CacheConf `json:"cache" mapstructure:"cache" yaml:"cache"`
}
Data data config
type PathIgnore struct {
Users []string `yaml:"users"`
}
type Server struct {
HTTP *server.HTTP `json:"http" mapstructure:"http" yaml:"http"`
}
Server server config
Source Files
¶
Click to show internal directories.
Click to hide internal directories.