rdiffweb prior to 2.4.8 is vulnerable to a potential Dos attack via an unlimited length "username" field. This can result in excess memory consumption, or memory corruption, leading to a Denial of Service (DoS). This issue is patched in version 2.4.8. There are no known workarounds.
{ "nvd_published_at": "2022-09-26T19:15:00Z", "cwe_ids": [ "CWE-130" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2022-09-30T00:51:30Z" }