[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-CVE-2026-35471":6},{"stargazers_count":4,"fetched_at":5},5,"2026-04-07T09:11:40.124Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":40,"aliases":41,"duplicate_of":9,"upstream":43,"downstream":44,"duplicates":45,"related":46,"reserved_at":9,"published_at":47,"modified_at":47,"state":48,"summary":49,"references_raw":56,"kevs":74,"epss":9,"epss_history":75,"metrics":76,"affected":85},"CVE-2026-35471","goshs is a SimpleHTTPServer written in Go. Prior to 2.0.0-beta.3, tdeleteFile() missing return after path traversal check. This vulnerability is fixed in 2.0.0-beta.3.",null,[11],{"_key":12,"id":12,"name":13,"description":14,"type":15,"status":16,"abstraction":17,"likelihood_of_exploit":18,"capec":19},"CWE-22","Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')","The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.","weakness","Stable","Base","High",[20,24,28,32,36],{"id":21,"name":22,"techniques":23},"CAPEC-126","Path Traversal",[],{"id":25,"name":26,"techniques":27},"CAPEC-64","Using Slashes and URL Encoding Combined to Bypass Validation Logic",[],{"id":29,"name":30,"techniques":31},"CAPEC-76","Manipulating Web Input to File System Calls",[],{"id":33,"name":34,"techniques":35},"CAPEC-78","Using Escaped Slashes in Alternate Encoding",[],{"id":37,"name":38,"techniques":39},"CAPEC-79","Using Slashes in Alternate Encoding",[],[],[42],"GHSA-6qcc-6q27-whp8",[],[],[],[],"2026-04-06T21:38:27.657Z","Received",{"cisa_kev":50,"cisa_ransomware":50,"cisa_vendor":9,"epss_severity":9,"epss_score":9,"severity":51,"severity_score":52,"severity_version":53,"severity_source":54,"severity_vector":55,"severity_status":48},false,"critical",9.8,"v3.0","cve.org","CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",[57,65,69],{"url":58,"sources":59,"tags":62},"https://github.com/patrickhener/goshs/security/advisories/GHSA-6qcc-6q27-whp8",[60,54,61],"osv_go","nvd",[63,64],"WEB","X Refsource CONFIRM",{"url":66,"sources":67,"tags":68},"https://github.com/patrickhener/goshs/commit/237f3af891a90df9b903b85f1cd3438040ca261a",[60],[63],{"url":70,"sources":71,"tags":72},"https://github.com/patrickhener/goshs",[60],[73],"PACKAGE",[],[],[77,80,83],{"source":60,"cvss_v2_0":9,"cvss_v3_0":78,"cvss_v3_1":9,"cvss_v4_0":9},{"baseScore":52,"baseSeverity":9,"vectorString":55,"impactScore":52,"exploitabilityScore":79},10,{"source":54,"cvss_v2_0":9,"cvss_v3_0":81,"cvss_v3_1":9,"cvss_v4_0":9},{"baseScore":52,"baseSeverity":82,"vectorString":55,"impactScore":52,"exploitabilityScore":79},"CRITICAL",{"source":61,"cvss_v2_0":9,"cvss_v3_0":84,"cvss_v3_1":9,"cvss_v4_0":9},{"baseScore":52,"baseSeverity":82,"vectorString":55,"impactScore":52,"exploitabilityScore":79},[86,99],{"ecosystem":87,"name":88,"vendor":89,"product":90,"cpe_part":9,"purl_type":91,"purl_namespace":89,"purl_name":90,"source":9,"versions":92},"Go","github.com/patrickhener/goshs","github.com/patrickhener","goshs","golang",[93],{"version":94,"is_range":95,"range_type":96,"version_start":9,"version_start_type":9,"version_end":97,"version_end_type":98,"fixed_in":9},"lt1_1_5_0_20260401172448_237f3af891a9",true,"semver","1.1.5-0.20260401172448-237f3af891a9","excluding",{"ecosystem":9,"name":90,"vendor":100,"product":90,"cpe_part":101,"purl_type":9,"purl_namespace":9,"purl_name":9,"source":9,"versions":102},"patrickhener","a",[103],{"version":104,"is_range":95,"range_type":54,"version_start":9,"version_start_type":9,"version_end":105,"version_end_type":98,"fixed_in":9},"\u003C 2.0.0-beta.3","2.0.0-beta.3"]