{"package":"github.com/patrickhener/goshs","ecosystem":"go","latest_version":"v1.1.4","description":"Feature-rich single-binary file server for red teamers and developers.  HTTP/S · WebDAV · SFTP · SMB · NTLM hash capture · DNS/SMTP callbacks ·  TLS · Auth · Share links. A powerful python3 -m http.server replacement.","license":"MIT","license_risk":"permissive","commercial_use_notes":"Permissive: commercial closed-source use OK; preserve the copyright notice.","homepage":"https://pkg.go.dev/github.com/patrickhener/goshs","repository":"https://github.com/patrickhener/goshs","downloads_weekly":615,"health":{"score":40,"risk":"high","breakdown":{"maintenance":20,"popularity":3,"security":0,"maturity":12,"community":5},"deprecated":false,"max_score":100},"vulnerabilities":{"count":10,"critical":5,"high":3,"medium":1,"low":1,"details":[{"vuln_id":"CVE-2026-40188","severity":"high","summary":"goshs is Missing Write Protection for Parametric Data Values","affected_versions":">=1.0.7,<=1.1.4","fixed_version":null,"source":"osv","published_at":"2026-04-10T20:00:28Z","in_kev":false,"epss_prob":0.00029,"epss_percentile":0.08328,"threat_tier":"theoretical"},{"vuln_id":"CVE-2026-40876","severity":"high","summary":"SFTP root escape via prefix-based path validation in goshs","affected_versions":"<=1.1.4|<2.0.0","fixed_version":"2.0.0","source":"osv","published_at":"2026-04-14T22:28:17Z","in_kev":false,"epss_prob":0.00051,"epss_percentile":0.15933,"threat_tier":"theoretical"},{"vuln_id":"CVE-2026-35471","severity":"critical","summary":"goshs: Improper Limitation of a Pathname to a Restricted Directory (Path Traversal)","affected_versions":"<1.1.5-0.20260401172448-237f3af891a9","fixed_version":"1.1.5-0.20260401172448-237f3af891a9","source":"osv","published_at":"2026-04-03T21:58:47Z","in_kev":false,"epss_prob":0.0004,"epss_percentile":0.11918,"threat_tier":"theoretical"},{"vuln_id":"GHSA-7qx6-f23w-3w7f","severity":"low","summary":"Unauthenticated Open Redirect, Arbitrary HTTP Response Header Injection, Missing CSRF, and Invisible-Mode Bypass in goshs `/?redirect` endpoint","affected_versions":"<=1.1.4|<=2.0.0-beta.6","fixed_version":null,"source":"osv","published_at":"2026-04-14T22:53:33Z","in_kev":false,"threat_tier":"unknown"},{"vuln_id":"CVE-2026-40884","severity":"critical","summary":"goshs has an empty-username SFTP password authentication bypass","affected_versions":"<=1.1.4|<2.0.0","fixed_version":"2.0.0","source":"osv","published_at":"2026-04-14T22:28:30Z","in_kev":false,"epss_prob":0.00063,"epss_percentile":0.19378,"threat_tier":"theoretical"},{"vuln_id":"CVE-2026-35392","severity":"critical","summary":"goshs: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in goshs PUT Upload","affected_versions":"<1.1.5-0.20260401172448-237f3af891a9","fixed_version":"1.1.5-0.20260401172448-237f3af891a9","source":"osv","published_at":"2026-04-03T04:07:55Z","in_kev":false,"epss_prob":0.0004,"epss_percentile":0.11918,"threat_tier":"theoretical"},{"vuln_id":"CVE-2026-35393","severity":"critical","summary":"goshs: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in goshs POST multipart upload","affected_versions":"<1.1.5-0.20260401172448-237f3af891a9","fixed_version":"1.1.5-0.20260401172448-237f3af891a9","source":"osv","published_at":"2026-04-03T04:08:20Z","in_kev":false,"epss_prob":0.0004,"epss_percentile":0.11918,"threat_tier":"theoretical"},{"vuln_id":"CVE-2026-34581","severity":"high","summary":"goshs has Auth Bypass via Share Token","affected_versions":">=1.1.0","fixed_version":null,"source":"osv","published_at":"2026-04-01T20:58:48Z","in_kev":false,"epss_prob":0.00031,"epss_percentile":0.0873,"threat_tier":"theoretical"},{"vuln_id":"GHSA-rhf7-wvw3-vjvm","severity":"medium","summary":"goshs has Cross-Origin Arbitrary File Write via Missing CSRF on PUT and Wildcard CORS","affected_versions":"<2.0.2|<=1.1.4","fixed_version":"2.0.2","source":"osv","published_at":"2026-04-23T14:28:14Z","in_kev":false,"threat_tier":"unknown"},{"vuln_id":"CVE-2026-40189","severity":"critical","summary":"goshs has a file-based ACL authorization bypass in goshs state-changing routes","affected_versions":"<=1.1.4","fixed_version":null,"source":"osv","published_at":"2026-04-10T20:00:32Z","in_kev":false,"epss_prob":0.00139,"epss_percentile":0.33475,"threat_tier":"theoretical"}],"actively_exploited_count":0,"likely_exploited_count":0},"versions":{"latest":"v1.1.4","total_count":47,"recent":["v0.0.3","v1.0.9","v0.0.4","v1.0.4","v0.3.1","v0.1.0","v0.1.5","v0.0.2","v1.1.4","v0.1.1","v0.0.8","v0.0.9","v1.0.1","v1.1.0","v1.0.7","v0.0.6","v0.0.7","v0.2.0","v0.4.2","v0.3.2"]},"metadata":{"deprecated":false,"deprecated_message":null,"maintainers_count":11,"first_published":null,"last_published":"2026-03-13T14:11:55Z","dependencies_count":0,"dependencies":[]},"github_stats":null,"bundle":null,"typescript":null,"known_issues":{"bugs_count":0,"bugs_severity":{},"status_breakdown":{},"link":null,"scope":"none"},"historical_compromise":null,"recommendation":{"action":"do_not_use","issues":["3 high severity vulnerabilities","5 critical vulnerabilities"],"use_version":"v1.1.4","version_hint":"Update to >= 2.0.2 to fix known vulnerabilities","summary":"github.com/patrickhener/goshs has critical vulnerabilities — do not use"},"version_scoped":null,"requested_version":null,"_cache":"hit","_response_ms":0,"_powered_by":"depscope.dev — free package intelligence for AI agents","typosquat":{"is_suspected":false},"maintainer_trust":{"available":false},"malicious":{"is_malicious":false},"scorecard":{"available":false},"quality":{"available":false},"version_history_summary":{"total_versions":20,"first_release_age_days":null,"last_release_days_ago":46,"avg_days_between_releases":null,"release_velocity":"active"}}