Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-qv32-5wm2-p32h: Command Injection in sequenceserver

Impact

Several HTTP endpoints did not properly sanitize user input and/or query parameters. This could be exploited to inject and run unwanted shell commands

Patches

Fixed in 3.1.2

Workarounds

No known workarounds

ghsa
#git#perl

Command Injection in sequenceserver

Critical severity GitHub Reviewed Published Aug 13, 2024 in wurmlab/sequenceserver • Updated Aug 13, 2024

ghsa: Latest News

GHSA-27wf-5967-98gx: Kubernetes kubelet arbitrary command execution