Safety vulnerability ID: 54481
The information on this page was manually curated by our Cybersecurity Intelligence Team.
rdiffweb prior to 2.4.8 is vulnerable to a potential Dos attack via an unlimited length "username" field. This can result in excess memory consumption, or memory corruption, leading to a Denial of Service (DoS). This issue is patched in version 2.4.8. There are no known workarounds.
Latest version: 2.9.5
A web interface to rdiff-backup repositories.
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application