Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-7655 | Due to improper sanitization of user input on Windows, the static file handler allows for directory traversal, allowing an attacker to read files outside of the target directory that the server has permission to read. |
Github GHSA |
GHSA-j453-hm5x-c46w | Echo vulnerable to directory traversal |
Wed, 23 Apr 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Go
Published:
Updated: 2025-04-23T15:38:30.467Z
Reserved: 2022-07-29T18:52:35.508Z
Link: CVE-2020-36565
Updated: 2024-08-04T17:30:08.318Z
Status : Modified
Published: 2022-12-07T17:15:09.910
Modified: 2025-04-23T16:15:20.650
Link: CVE-2020-36565
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA