rdiffweb prior to 2.4.8 is vulnerable to a potential Dos attack via an unlimited length "username" field. This can result in excess memory consumption, or memory corruption, leading to a Denial of Service (DoS). This issue is patched in version 2.4.8. There are no known workarounds.
{
"nvd_published_at": "2022-09-26T19:15:00Z",
"severity": "HIGH",
"github_reviewed_at": "2022-09-30T00:51:30Z",
"github_reviewed": true,
"cwe_ids": [
"CWE-130"
]
}