ecosystem
stringclasses
11 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
220
details
stringlengths
34
13.5k
aliases
stringlengths
17
87
modified_date
stringdate
2019-03-26 14:13:00
2022-05-10 08:46:52
published_date
stringdate
2012-06-17 03:41:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
581 values
refs
stringlengths
82
11.6k
introduced
stringclasses
843 values
code_refs
stringlengths
46
940
commits
stringlengths
46
940
Go
GHSA-vpx7-vm66-qx8r
Path Traversal in github.com/unknwon/cae/zip
The ExtractTo function doesn't securely escape file paths in zip archives which include leading or non-leading "..". This allows an attacker to add or replace files system-wide.
{'CVE-2020-7664'}
2022-01-04T19:33:01Z
2021-05-18T20:31:06Z
HIGH
null
{'CWE-22'}
{'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMUNKNWONCAEZIP-570383', 'https://github.com/unknwon/cae/commit/07971c00a1bfd9dc171c3ad0bfab5b67c2287e11', 'https://github.com/unknwon/cae/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7664'}
null
{'https://github.com/unknwon/cae/commit/07971c00a1bfd9dc171c3ad0bfab5b67c2287e11'}
{'https://github.com/unknwon/cae/commit/07971c00a1bfd9dc171c3ad0bfab5b67c2287e11'}
Go
GHSA-hcw3-j74m-qc58
Incorrect Calculation in github.com/open-policy-agent/opa
### Impact Under certain conditions, pretty-printing an AST that contains synthetic nodes could change the logic of some statements by reordering array literals. Example of policies impacted are those that parse and compare web paths, see the example below. **All of these** three conditions have to be met to create a...
{'CVE-2022-23628'}
2022-02-23T22:04:25Z
2022-02-09T22:17:37Z
MODERATE
null
{'CWE-682'}
{'https://github.com/open-policy-agent/opa/commit/bfd984ddf93ef2c4963a08d4fdadae0bcf1a3717', 'https://github.com/open-policy-agent/opa/pull/3851', 'https://github.com/open-policy-agent/opa', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23628', 'https://github.com/open-policy-agent/opa/commit/932e4ffc37a590ace79e9b75ca434...
null
{'https://github.com/open-policy-agent/opa/commit/bfd984ddf93ef2c4963a08d4fdadae0bcf1a3717', 'https://github.com/open-policy-agent/opa/commit/932e4ffc37a590ace79e9b75ca4340288c220239'}
{'https://github.com/open-policy-agent/opa/commit/bfd984ddf93ef2c4963a08d4fdadae0bcf1a3717', 'https://github.com/open-policy-agent/opa/commit/932e4ffc37a590ace79e9b75ca4340288c220239'}
Go
GHSA-58v3-j75h-xr49
Improper Input Validation in libseccomp-golang
libseccomp-golang 0.9.0 and earlier incorrectly generates BPFs that OR multiple arguments rather than ANDing them. A process running under a restrictive seccomp filter that specified multiple syscall arguments could bypass intended access restrictions by specifying a single matching argument.
{'CVE-2017-18367'}
2021-05-17T15:26:35Z
2021-05-18T15:44:30Z
HIGH
null
{'CWE-284'}
{'https://github.com/seccomp/libseccomp-golang/issues/22', 'https://lists.debian.org/debian-lts-announce/2020/08/msg00016.html', 'https://access.redhat.com/errata/RHSA-2019:4087', 'http://www.openwall.com/lists/oss-security/2019/04/25/6', 'https://access.redhat.com/errata/RHSA-2019:4090', 'https://usn.ubuntu.com/4574-1...
null
{'https://github.com/seccomp/libseccomp-golang/commit/06e7a29f36a34b8cf419aeb87b979ee508e58f9e'}
{'https://github.com/seccomp/libseccomp-golang/commit/06e7a29f36a34b8cf419aeb87b979ee508e58f9e'}
Go
GHSA-5r2v-6gm6-vpvh
Insecure Permissions in Gogs
routes/api/v1/api.go in Gogs 0.11.86 lacks permission checks for routes: deploy keys, collaborators, and hooks.
{'CVE-2019-14544'}
2021-05-17T16:36:54Z
2021-05-18T17:33:58Z
CRITICAL
null
{'CWE-200'}
{'https://github.com/gogs/gogs/issues/5764', 'https://github.com/gogs/gogs/commit/c3af3ff1d0484de3bd789ee6c6e47f35d590e945', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14544'}
null
{'https://github.com/gogs/gogs/commit/c3af3ff1d0484de3bd789ee6c6e47f35d590e945'}
{'https://github.com/gogs/gogs/commit/c3af3ff1d0484de3bd789ee6c6e47f35d590e945'}
Go
GO-2021-0061
null
Due to unbounded alias chasing, a maliciously crafted YAML file can cause the system to consume significant system resources. If parsing user input, this may be used as a denial of service vector.
null
2021-04-14T12:00:00Z
2021-04-14T12:00:00Z
null
null
null
{'https://github.com/go-yaml/yaml/commit/bb4e33bf68bf89cad44d386192cbed201f35b241', 'https://github.com/go-yaml/yaml/pull/375'}
null
{'https://github.com/go-yaml/yaml/commit/bb4e33bf68bf89cad44d386192cbed201f35b241'}
{'https://github.com/go-yaml/yaml/commit/bb4e33bf68bf89cad44d386192cbed201f35b241'}
Go
GO-2021-0104
null
Due to improper error handling, DTLS connections were not killed when certificate verification failed, causing users who did not check the connection state to continue to use the connection. This could allow allow an attacker which holds the ICE password, but not a valid certificate, to bypass this restriction.
{'CVE-2021-28681'}
2021-07-28T12:00:00Z
2021-07-28T12:00:00Z
null
null
null
{'https://github.com/advisories/GHSA-74xm-qj29-cq8p', 'https://github.com/pion/webrtc/commit/545613dcdeb5dedb01cce94175f40bcbe045df2e', 'https://github.com/pion/webrtc/pull/1709', 'https://github.com/pion/webrtc/issues/1708'}
null
{'https://github.com/pion/webrtc/commit/545613dcdeb5dedb01cce94175f40bcbe045df2e'}
{'https://github.com/pion/webrtc/commit/545613dcdeb5dedb01cce94175f40bcbe045df2e'}
Go
GHSA-44r7-7p62-q3fr
Insecure generation of random numbers
The miekg Go DNS package before 1.1.25, as used in CoreDNS before 1.6.6 and other products, improperly generates random numbers because math/rand is used. The TXID becomes predictable, leading to response forgeries.
{'CVE-2019-19794'}
2021-05-18T20:42:52Z
2021-05-18T21:09:13Z
MODERATE
null
{'CWE-338', 'CWE-330'}
{'https://github.com/miekg/dns/compare/v1.1.24...v1.1.25', 'https://github.com/miekg/dns/issues/1043', 'https://github.com/miekg/dns/pull/1044', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19794', 'https://github.com/miekg/dns/commit/8ebf2e419df7857ac8919baa05248789a8ffbf33', 'https://github.com/coredns/coredns/issues/3...
null
{'https://github.com/miekg/dns/commit/8ebf2e419df7857ac8919baa05248789a8ffbf33'}
{'https://github.com/miekg/dns/commit/8ebf2e419df7857ac8919baa05248789a8ffbf33'}
Go
GO-2021-0112
null
Due to improper input sanitization when marshalling Go objects into BSON, a maliciously constructed Go structure could allow an attacker to inject additional fields into a MongoDB document. Users are affected if they use this package to handle untrusted user input.
{'CVE-2021-20329'}
2021-07-28T12:00:00Z
2021-07-28T12:00:00Z
null
null
null
{'https://github.com/mongodb/mongo-go-driver/pull/622', 'https://github.com/mongodb/mongo-go-driver/commit/2aca31d5986a9e1c65a92264736de9fdc3b9b4ca', 'https://github.com/advisories/GHSA-f6mq-5m25-4r72', 'https://jira.mongodb.org/browse/GODRIVER-1923'}
null
{'https://github.com/mongodb/mongo-go-driver/commit/2aca31d5986a9e1c65a92264736de9fdc3b9b4ca'}
{'https://github.com/mongodb/mongo-go-driver/commit/2aca31d5986a9e1c65a92264736de9fdc3b9b4ca'}
Go
GO-2021-0057
null
Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.
{'CVE-2020-35381'}
2021-04-14T12:00:00Z
2021-04-14T12:00:00Z
null
null
null
{'https://github.com/buger/jsonparser/issues/219', 'https://github.com/buger/jsonparser/pull/221', 'https://github.com/buger/jsonparser/commit/df3ea76ece10095374fd1c9a22a4fb85a44efc42'}
null
{'https://github.com/buger/jsonparser/commit/df3ea76ece10095374fd1c9a22a4fb85a44efc42'}
{'https://github.com/buger/jsonparser/commit/df3ea76ece10095374fd1c9a22a4fb85a44efc42'}
Go
GHSA-wf43-55jj-vwq8
DNS Rebinding in etcd
DNS rebinding vulnerability found in etcd 3.3.1 and earlier. An attacker can control his DNS records to direct to localhost, and trick the browser into sending requests to localhost (or any other address).
{'CVE-2018-1099'}
2021-05-19T22:09:57Z
2022-02-15T01:57:18Z
MODERATE
null
{'CWE-350', 'CWE-20'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JX7QTIT465BQGRGNCE74RATRQLKT2QE4/', 'https://bugzilla.redhat.com/show_bug.cgi?id=1552717', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1099', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraprojec...
null
{'https://github.com/coreos/etcd/commit/a7e5790c82039945639798ae9a3289fe787f5e56'}
{'https://github.com/coreos/etcd/commit/a7e5790c82039945639798ae9a3289fe787f5e56'}
Go
GHSA-3p3g-vpw6-4w66
Authentication Bypass in hydra
### Impact "When using client authentication method "private_key_jwt" [1], OpenId specification says the following about assertion `jti`:" > A unique identifier for the token, which can be used to prevent reuse of the token. These tokens MUST only be used once, unless conditions for reuse were negotiated between the ...
{'CVE-2020-5300'}
2021-05-24T21:19:26Z
2021-05-27T18:43:22Z
MODERATE
null
{'CWE-294'}
{'https://openid.net/specs/openid-connect-core-1_0.html#ClientAuthentication', 'https://github.com/ory/hydra/releases/tag/v1.4.0', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5300', 'https://github.com/ory/hydra/commit/700d17d3b7d507de1b1d459a7261d6fb2571ebe3', 'https://github.com/ory/hydra/security/advisories/GHSA-3p3g...
null
{'https://github.com/ory/hydra/commit/700d17d3b7d507de1b1d459a7261d6fb2571ebe3'}
{'https://github.com/ory/hydra/commit/700d17d3b7d507de1b1d459a7261d6fb2571ebe3'}
Go
GHSA-c3xm-pvg7-gh7r
mount destinations can be swapped via symlink-exchange to cause mounts outside the rootfs
### Summary runc 1.0.0-rc94 and earlier are vulnerable to a symlink exchange attack whereby an attacker can request a seemingly-innocuous container configuration that actually results in the host filesystem being bind-mounted into the container (allowing for a container escape). CVE-2021-30465 has been assigned for th...
{'CVE-2021-30465'}
2021-05-21T19:34:43Z
2021-05-25T18:44:42Z
HIGH
null
{'CWE-367', 'CWE-22'}
{'https://github.com/opencontainers/runc/security/advisories/GHSA-c3xm-pvg7-gh7r', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4HOARVIT47RULTTFWAU7XBG4WY6TDDHV/', 'https://github.com/opencontainers/runc/commit/0ca91f44f1664da834bc61115a849b56d22f595f', 'https://securi...
null
{'https://github.com/opencontainers/runc/commit/0ca91f44f1664da834bc61115a849b56d22f595f'}
{'https://github.com/opencontainers/runc/commit/0ca91f44f1664da834bc61115a849b56d22f595f'}
Go
GHSA-4c7m-vv47-7c69
Insecure Permissions in Gogs
In Gogs 0.11.91, MakeEmailPrimary in models/user_mail.go lacks a "not the owner of the email" check.
{'CVE-2020-14958'}
2021-05-12T14:55:34Z
2021-05-18T20:33:05Z
MODERATE
null
{'CWE-281'}
{'https://github.com/gogs/gogs/pull/5988', 'https://github.com/gogs/gogs/commit/82ff0c5852f29daa5f95d965fd50665581e7ea3c', 'https://nvd.nist.gov/vuln/detail/CVE-2020-14958'}
null
{'https://github.com/gogs/gogs/commit/82ff0c5852f29daa5f95d965fd50665581e7ea3c'}
{'https://github.com/gogs/gogs/commit/82ff0c5852f29daa5f95d965fd50665581e7ea3c'}
Go
GHSA-gp4j-w3vj-7299
Information Exposure in RunC
RunC allowed additional container processes via 'runc exec' to be ptraced by the pid 1 of the container. This allows the main processes of the container, if running as root, to gain access to file-descriptors of these new processes during the initialization and can lead to container escapes or modification of runC sta...
{'CVE-2016-9962'}
2021-05-20T16:22:33Z
2021-12-20T18:21:43Z
MODERATE
null
{'CWE-200'}
{'http://seclists.org/fulldisclosure/2017/Jan/29', 'http://seclists.org/fulldisclosure/2017/Jan/21', 'https://access.redhat.com/security/vulnerabilities/cve-2016-9962', 'https://security.gentoo.org/glsa/201701-34', 'https://github.com/opencontainers/runc/commit/50a19c6ff828c58e5dab13830bd3dacde268afe5', 'https://lists....
null
{'https://github.com/opencontainers/runc/commit/50a19c6ff828c58e5dab13830bd3dacde268afe5', 'https://github.com/opencontainers/runc/commit/5d93fed3d27f1e2bab58bad13b180a7a81d0b378'}
{'https://github.com/opencontainers/runc/commit/5d93fed3d27f1e2bab58bad13b180a7a81d0b378', 'https://github.com/opencontainers/runc/commit/50a19c6ff828c58e5dab13830bd3dacde268afe5'}
Go
GHSA-v24h-pjjv-mcp6
Denial of service in Tendermint
### Description **Denial of Service 1** Tendermint 0.33.2 and earlier does not limit the number of P2P connection requests. For each p2p connection, Tendermint allocates XXX bytes. Even though this memory is garbage collected once the connection is terminated (due to duplicate IP or reaching a maximum number of inbou...
{'CVE-2020-5303'}
2021-05-24T21:16:50Z
2021-05-27T18:44:09Z
LOW
null
{'CWE-789', 'CWE-787'}
{'https://github.com/tendermint/tendermint/issues/3338', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5303', 'https://github.com/tendermint/tendermint/blob/master/CHANGELOG.md#denial-of-service-1', 'https://github.com/tendermint/tendermint/issues/1696', 'https://hackerone.com/reports/820317', 'https://github.com/tendermi...
null
{'https://github.com/tendermint/tendermint/commit/e2d6859afd7dba4cf97c7f7d412e7d8fc908d1cd'}
{'https://github.com/tendermint/tendermint/commit/e2d6859afd7dba4cf97c7f7d412e7d8fc908d1cd'}
Go
GHSA-qq3j-xp49-j73f
Plugin archive directory traversal in Helm
The Helm core maintainers have identified an information disclosure vulnerability in Helm 3.0.0-3.2.3. ### Impact A traversal attack is possible when installing Helm plugins from a tar archive over HTTP. It is possible for a malicious plugin author to inject a relative path into a plugin archive, and copy a file ou...
{'CVE-2020-4053'}
2021-05-24T20:57:17Z
2021-06-23T18:14:36Z
LOW
null
{'CWE-22'}
{'https://github.com/helm/helm/releases/tag/v3.2.4', 'https://github.com/helm/helm/pull/8317', 'https://nvd.nist.gov/vuln/detail/CVE-2020-4053', 'https://github.com/helm/helm/commit/b6bbe4f08bbb98eadd6c9cd726b08a5c639908b3', 'https://github.com/helm/helm/security/advisories/GHSA-qq3j-xp49-j73f', 'https://github.com/hel...
null
{'https://github.com/helm/helm/commit/b6bbe4f08bbb98eadd6c9cd726b08a5c639908b3', 'https://github.com/helm/helm/commit/0ad800ef43d3b826f31a5ad8dfbb4fe05d143688'}
{'https://github.com/helm/helm/commit/b6bbe4f08bbb98eadd6c9cd726b08a5c639908b3', 'https://github.com/helm/helm/commit/0ad800ef43d3b826f31a5ad8dfbb4fe05d143688'}
Go
GO-2021-0094
null
Protections against directory traversal during archive extraction can be bypassed by chaining multiple symbolic links within the archive. This allows a malicious attacker to cause files to be created outside of the target directory. Additionally if the attacker is able to read extracted files they may create symbolic l...
{'CVE-2020-29529'}
2021-04-14T12:00:00Z
2021-04-14T12:00:00Z
null
null
null
{'https://github.com/hashicorp/go-slug/commit/28cafc59c8da6126a3ae94dfa84181df4073454f', 'https://securitylab.github.com/advisories/GHSL-2020-262-zipslip-go-slug', 'https://github.com/hashicorp/go-slug/pull/12'}
null
{'https://github.com/hashicorp/go-slug/commit/28cafc59c8da6126a3ae94dfa84181df4073454f'}
{'https://github.com/hashicorp/go-slug/commit/28cafc59c8da6126a3ae94dfa84181df4073454f'}
Go
GHSA-3xh2-74w9-5vxm
Integer overflow in github.com/gorilla/websocket
An integer overflow vulnerability exists with the length of websocket frames received via a websocket connection. An attacker would use this flaw to cause a denial of service attack on an HTTP Server allowing websocket connections.
{'CVE-2020-27813'}
2021-05-18T20:56:17Z
2021-05-18T21:08:02Z
HIGH
null
{'CWE-400', 'CWE-190'}
{'https://github.com/gorilla/websocket/pull/537', 'https://github.com/gorilla/websocket/security/advisories/GHSA-jf24-p9p9-4rjh', 'https://github.com/gorilla/websocket/commit/5b740c29263eb386f33f265561c8262522f19d37', 'https://lists.debian.org/debian-lts-announce/2021/01/msg00008.html', 'https://bugzilla.redhat.com/sho...
null
{'https://github.com/gorilla/websocket/commit/5b740c29263eb386f33f265561c8262522f19d37'}
{'https://github.com/gorilla/websocket/commit/5b740c29263eb386f33f265561c8262522f19d37'}
Go
GHSA-gcj7-j438-hjj2
Smokescreen SSRF via deny list bypass
The primary use case for Smokescreen is to prevent server-side request forgery (SSRF) attacks in which external attackers leverage the behavior of applications to connect to or scan internal infrastructure. Smokescreen also offers an option to deny access to additional (e.g., external) URLs by way of a deny list. Ther...
{'CVE-2022-24825'}
2022-04-07T22:10:22Z
2022-04-07T22:10:22Z
MODERATE
null
{'CWE-918'}
{'github.com/stripe/smokescreen', 'https://github.com/stripe/smokescreen/security/advisories/GHSA-gcj7-j438-hjj2', 'https://github.com/stripe/smokescreen/commit/fafb6ae48c6c40aa011d87b61306abc48db8797b', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24825'}
null
{'https://github.com/stripe/smokescreen/commit/fafb6ae48c6c40aa011d87b61306abc48db8797b'}
{'https://github.com/stripe/smokescreen/commit/fafb6ae48c6c40aa011d87b61306abc48db8797b'}
Go
GHSA-7638-r9r3-rmjj
chroot isolation: environment value leakage to intermediate processes
### Impact When running processes using "chroot" isolation, the process being run can examine the environment variables of its immediate parent and grandparent processes (CVE-2021-3602). This isolation type is often used when running `buildah` in unprivileged containers, and it is often used to do so in CI/CD environm...
{'CVE-2021-3602'}
2022-03-18T21:03:34Z
2021-07-19T15:19:09Z
MODERATE
null
{'CWE-200'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=1969264', 'https://ubuntu.com/security/CVE-2021-3602', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3602', 'https://github.com/containers/buildah/security/advisories/GHSA-7638-r9r3-rmjj', 'https://github.com/containers/buildah', 'https://github.com/containers/buildah/commit/a...
null
{'https://github.com/containers/buildah/commit/a468ce0ffd347035d53ee0e26c205ef604097fb0'}
{'https://github.com/containers/buildah/commit/a468ce0ffd347035d53ee0e26c205ef604097fb0'}
Go
GHSA-pmcr-2rhp-36hr
SQL injection in github.com/navidrome/navidrome
model/criteria/criteria.go in Navidrome before 0.47.5 is vulnerable to SQL injection attacks when processing crafted Smart Playlists. An authenticated user could abuse this to extract arbitrary data from the database, including the user table (which contains sensitive information such as the users' encrypted passwords)...
{'CVE-2022-23857'}
2022-01-25T21:03:46Z
2022-01-27T16:23:02Z
MODERATE
null
{'CWE-89'}
{'https://github.com/navidrome/navidrome/commit/9e79b5cbf2a48c1e4344df00fea4ed3844ea965d', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23857', 'https://github.com/navidrome/navidrome/releases/tag/v0.47.5', 'https://github.com/navidrome/navidrome'}
null
{'https://github.com/navidrome/navidrome/commit/9e79b5cbf2a48c1e4344df00fea4ed3844ea965d'}
{'https://github.com/navidrome/navidrome/commit/9e79b5cbf2a48c1e4344df00fea4ed3844ea965d'}
Go
GHSA-8fvr-5rqf-3wwh
Information Exposure in Docker Engine
Docker Engine before 1.6.1 uses weak permissions for (1) /proc/asound, (2) /proc/timer_stats, (3) /proc/latency_stats, and (4) /proc/fs, which allows local users to modify the host, obtain sensitive information, and perform protocol downgrade attacks via a crafted image.
{'CVE-2015-3630'}
2021-05-19T22:47:32Z
2022-02-15T01:57:18Z
HIGH
null
{'CWE-285'}
{'https://groups.google.com/forum/#%21searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ', 'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3630', 'https://lists.opensuse.org/opensuse-updates/2015-05/msg00023.html', 'https://nvd.nist.gov/vuln/detail/CVE-2015-3630', 'https://groups.google.com/foru...
null
{'https://github.com/moby/moby/commit/545b440a80f676a506e5837678dd4c4f65e78660'}
{'https://github.com/moby/moby/commit/545b440a80f676a506e5837678dd4c4f65e78660'}
Go
GHSA-7p8f-8hjm-wm92
Lookup operations do not take into account wildcards in SpiceDB
### Impact Any user making use of a wildcard relationship under the right hand branch of an `exclusion` or within an `intersection` operation will see `Lookup`/`LookupResources` return a resource as "accessible" if it is *not* accessible by virtue of the inclusion of the wildcard in the intersection or the right side o...
{'CVE-2022-21646'}
2022-01-13T15:02:31Z
2022-01-13T15:05:41Z
HIGH
null
{'CWE-155', 'CWE-20'}
{'https://github.com/authzed/spicedb/commit/15bba2e2d2a4bda336a37a7fe8ef8a35028cd970', 'https://github.com/authzed/spicedb/issues/358', 'https://github.com/authzed/spicedb/releases/tag/v1.4.0', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21646', 'https://github.com/authzed/spicedb', 'https://github.com/authzed/spicedb/s...
null
{'https://github.com/authzed/spicedb/commit/15bba2e2d2a4bda336a37a7fe8ef8a35028cd970'}
{'https://github.com/authzed/spicedb/commit/15bba2e2d2a4bda336a37a7fe8ef8a35028cd970'}
Go
GHSA-4hq8-gmxx-h6w9
XML Processing error in github.com/crewjam/saml
### Impact There are three vulnerabilities in the go `encoding/xml` package that can allow an attacker to forge part of a signed XML document. For details on this vulnerability see [xml-roundtrip-validator](https://github.com/mattermost/xml-roundtrip-validator) ### Patches In version 0.4.3, all XML input is validate...
{'CVE-2020-27846'}
2021-05-21T20:54:26Z
2021-06-23T17:29:42Z
HIGH
null
{'CWE-115', 'CWE-287'}
{'https://security.netapp.com/advisory/ntap-20210205-0002/', 'https://github.com/crewjam/saml/security/advisories/GHSA-4hq8-gmxx-h6w9', 'https://nvd.nist.gov/vuln/detail/CVE-2020-27846', 'https://github.com/crewjam/saml/commit/da4f1a0612c0a8dd0452cf8b3c7a6518f6b4d053', 'https://mattermost.com/blog/coordinated-disclosur...
null
{'https://github.com/crewjam/saml/commit/da4f1a0612c0a8dd0452cf8b3c7a6518f6b4d053'}
{'https://github.com/crewjam/saml/commit/da4f1a0612c0a8dd0452cf8b3c7a6518f6b4d053'}
Go
GHSA-742w-89gc-8m9c
containerd v1.2.x can be coerced into leaking credentials during image pull
## Impact If a container image manifest in the OCI Image format or Docker Image V2 Schema 2 format includes a URL for the location of a specific image layer (otherwise known as a “foreign layer”), the default containerd resolver will follow that URL to attempt to download it. In v1.2.x but not 1.3.0 or later, the defa...
{'CVE-2020-15157'}
2022-02-11T23:27:39Z
2022-02-11T23:27:39Z
MODERATE
null
{'CWE-522'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15157', 'https://github.com/containerd/containerd', 'https://github.com/containerd/containerd/commit/1ead8d9deb3b175bf40413b8c47b3d19c2262726', 'https://www.debian.org/security/2021/dsa-4865', 'https://usn.ubuntu.com/4589-1/', 'https://github.com/containerd/containerd/securit...
null
{'https://github.com/containerd/containerd/commit/1ead8d9deb3b175bf40413b8c47b3d19c2262726'}
{'https://github.com/containerd/containerd/commit/1ead8d9deb3b175bf40413b8c47b3d19c2262726'}
Go
GO-2021-0082
null
Thirft Servers preallocate memory for the declared size of messages before checking the actual size of the message. This allows a malicious user to send messages that declare that they are significantly larger than they actually are, allowing them to force the server to allocate significant amounts of memory. This can ...
{'CVE-2019-11939'}
2021-04-14T12:00:00Z
2021-04-14T12:00:00Z
null
null
null
{'https://www.facebook.com/security/advisories/cve-2019-11939', 'https://github.com/facebook/fbthrift/commit/483ed864d69f307e9e3b9dadec048216100c0757'}
null
{'https://github.com/facebook/fbthrift/commit/483ed864d69f307e9e3b9dadec048216100c0757'}
{'https://github.com/facebook/fbthrift/commit/483ed864d69f307e9e3b9dadec048216100c0757'}
Go
GO-2020-0026
null
Due to improper path santization, archives containing relative file paths can cause files to be written (or overwritten) outside of the target directory.
{'CVE-2018-1103'}
2021-04-14T12:00:00Z
2021-04-14T12:00:00Z
null
null
null
{'https://snyk.io/research/zip-slip-vulnerability', 'https://github.com/openshift/source-to-image/commit/f5cbcbc5cc6f8cc2f479a7302443bea407a700cb'}
null
{'https://github.com/openshift/source-to-image/commit/f5cbcbc5cc6f8cc2f479a7302443bea407a700cb'}
{'https://github.com/openshift/source-to-image/commit/f5cbcbc5cc6f8cc2f479a7302443bea407a700cb'}
Go
GHSA-j77r-2fxf-5jrw
Improper path handling in kustomization files allows path traversal
The kustomize-controller enables the use of Kustomize’s functionality when applying Kubernetes declarative state onto a cluster. A malicious user can use built-in features and a specially crafted `kustomization.yaml` to expose sensitive data from the controller’s pod filesystem. In multi-tenancy deployments this can le...
{'CVE-2022-24877'}
2022-05-05T21:49:51Z
2022-05-04T18:04:07Z
CRITICAL
null
{'CWE-22'}
{'https://github.com/fluxcd/pkg/commit/0ec014baf417fd3879d366a45503a548b9267d2a', 'https://github.com/fluxcd/kustomize-controller/commit/f4528fb25d611da94e491346bea056d5c5c3611f', 'https://github.com/fluxcd/flux2/security/advisories/GHSA-j77r-2fxf-5jrw', 'github.com/fluxcd/kustomize-controller'}
null
{'https://github.com/fluxcd/kustomize-controller/commit/f4528fb25d611da94e491346bea056d5c5c3611f', 'https://github.com/fluxcd/pkg/commit/0ec014baf417fd3879d366a45503a548b9267d2a'}
{'https://github.com/fluxcd/kustomize-controller/commit/f4528fb25d611da94e491346bea056d5c5c3611f', 'https://github.com/fluxcd/pkg/commit/0ec014baf417fd3879d366a45503a548b9267d2a'}
Go
GO-2021-0066
null
Attempting to read a malformed .dockercfg may cause secrets to be inappropriately logged.
{'CVE-2020-8564'}
2021-04-14T12:00:00Z
2021-04-14T12:00:00Z
null
null
null
{'https://github.com/kubernetes/kubernetes/commit/11793434dac97a49bfed0150b56ac63e5dc34634', 'https://github.com/kubernetes/kubernetes/issues/95622', 'https://github.com/kubernetes/kubernetes/pull/94712'}
null
{'https://github.com/kubernetes/kubernetes/commit/11793434dac97a49bfed0150b56ac63e5dc34634'}
{'https://github.com/kubernetes/kubernetes/commit/11793434dac97a49bfed0150b56ac63e5dc34634'}
Go
GHSA-crp2-qrr5-8pq7
containerd CRI plugin: Insecure handling of image volumes
### Impact A bug was found in containerd where containers launched through containerd’s CRI implementation with a specially-crafted image configuration could gain access to read-only copies of arbitrary files and directories on the host. This may bypass any policy-based enforcement on container setup (including a Kub...
{'CVE-2022-23648'}
2022-03-29T19:11:08Z
2022-03-02T21:33:17Z
HIGH
null
{'CWE-200'}
{'https://github.com/containerd/containerd/releases/tag/v1.4.13', 'https://github.com/containerd/containerd', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUDQUQBZJGBWJPMRVB6QCCCRF7O3O4PA/', 'https://github.com/containerd/containerd/commit/10f428dac7cec44c864e1b830a462...
null
{'https://github.com/containerd/containerd/commit/10f428dac7cec44c864e1b830a4623af27a9fc70'}
{'https://github.com/containerd/containerd/commit/10f428dac7cec44c864e1b830a4623af27a9fc70'}
Go
GO-2021-0089
null
Parsing malformed JSON which contain opening brackets, but not closing brackes, leads to an infinite loop. If operating on untrusted user input this can be used as a denial of service vector.
{'CVE-2020-10675'}
2021-04-14T12:00:00Z
2021-04-14T12:00:00Z
null
null
null
{'https://github.com/buger/jsonparser/commit/91ac96899e492584984ded0c8f9a08f10b473717', 'https://github.com/buger/jsonparser/issues/188', 'https://github.com/buger/jsonparser/pull/192'}
null
{'https://github.com/buger/jsonparser/commit/91ac96899e492584984ded0c8f9a08f10b473717'}
{'https://github.com/buger/jsonparser/commit/91ac96899e492584984ded0c8f9a08f10b473717'}
Go
GHSA-5qgp-p5jc-w2rm
Arbitrary Code Execution in Docker
Docker before 1.3.2 allows remote attackers to write to arbitrary files and execute arbitrary code via a (1) symlink or (2) hard link attack in an image archive in a (a) pull or (b) load operation.
{'CVE-2014-6407'}
2021-05-20T21:03:55Z
2022-02-15T00:41:12Z
HIGH
null
{'CWE-59'}
{'https://secunia.com/advisories/60241', 'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-6407', 'https://secunia.com/advisories/60171', 'https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00009.html', 'https://docs.docker.com/v1.3/release-notes/', 'https://www.openwall.com/lists/oss-security/20...
null
{'https://github.com/docker/docker/commit/3ac6394b8082d4700483d52fbfe54914be537d9e'}
{'https://github.com/docker/docker/commit/3ac6394b8082d4700483d52fbfe54914be537d9e'}
Go
GHSA-72wf-hwcq-65h9
Cross-Site Request Forgery in Filebrowser
A Cross-Site Request Forgery (CSRF) vulnerability exists in Filebrowser < 2.18.0 that allows attackers to create a backdoor user with admin privilege and get access to the filesystem via a malicious HTML webpage that is sent to the victim.
{'CVE-2021-46398'}
2022-02-11T16:20:19Z
2022-02-05T00:00:31Z
HIGH
null
{'CWE-352'}
{'https://febin0x4e4a.wordpress.com/2022/01/19/critical-csrf-in-filebrowser/', 'https://systemweakness.com/critical-csrf-to-rce-in-filebrowser-865a3c34b8e7', 'https://febin0x4e4a.blogspot.com/2022/01/critical-csrf-in-filebrowser.html', 'https://github.com/filebrowser/filebrowser/', 'http://packetstormsecurity.com/files...
null
{'https://github.com/filebrowser/filebrowser/commit/74b7cd8e81840537a8206317344f118093153e8d'}
{'https://github.com/filebrowser/filebrowser/commit/74b7cd8e81840537a8206317344f118093153e8d'}
Go
GHSA-25xm-hr59-7c27
Release v0.5.8 of github.com/ulikunitz/xz fixes readUvarint denial of service
### Impact The function readUvarint used to read the xz container format may not terminate a loop provide malicous input. ### Patches The problem has been fixed in release v0.5.8. ### Workarounds Limit the size of the compressed file input to a reasonable size for your use case. ### References The standard libra...
{'CVE-2021-29482'}
2021-05-24T17:52:22Z
2021-05-25T18:39:37Z
HIGH
null
{'CWE-835'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29482', 'https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b', 'https://github.com/ulikunitz/xz/security/advisories/GHSA-25xm-hr59-7c27'}
null
{'https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b'}
{'https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b'}
Go
GHSA-25xj-89g5-fm6h
Information Disclosure in HashiCorp Vault
HashiCorp Vault and Vault Enterprise before 1.3.6, and 1.4.2 before 1.4.2, insert Sensitive Information into a Log File.
{'CVE-2020-13223'}
2022-02-24T13:07:50Z
2021-05-18T18:21:09Z
HIGH
null
{'CWE-532', 'CWE-200'}
{'https://www.hashicorp.com/blog/category/vault/', 'https://github.com/hashicorp/vault/commit/e52f34772affb69f3239b2cdf6523cb7cfd67a92', 'https://github.com/hashicorp/vault/commit/87f47c216cf1a28f4054b80cff40de8c9e00e36c', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13223', 'https://github.com/hashicorp/vault', 'https:/...
null
{'https://github.com/hashicorp/vault/commit/87f47c216cf1a28f4054b80cff40de8c9e00e36c', 'https://github.com/hashicorp/vault/commit/e52f34772affb69f3239b2cdf6523cb7cfd67a92'}
{'https://github.com/hashicorp/vault/commit/87f47c216cf1a28f4054b80cff40de8c9e00e36c', 'https://github.com/hashicorp/vault/commit/e52f34772affb69f3239b2cdf6523cb7cfd67a92'}
Go
GHSA-59hh-656j-3p7v
DoS via maliciously crafted p2p message
### Impact A vulnerable node is susceptible to crash when processing a maliciously crafted message from a peer, via the `snap/1` protocol. The crash can be triggered by sending a malicious `snap/1` `GetTrieNodes` package. ### Details On September 21, 2021, geth-team member Gary Rong (@rjl493456442) found a way to c...
{'CVE-2021-41173'}
2021-11-23T19:17:38Z
2021-10-25T19:42:57Z
MODERATE
null
{'CWE-20'}
{'https://github.com/ethereum/go-ethereum', 'https://github.com/ethereum/go-ethereum/pull/23801', 'https://github.com/ethereum/go-ethereum/commit/e40b37718326b8b4873b3b00a0db2e6c6d9ea738', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41173', 'https://github.com/ethereum/go-ethereum/security/advisories/GHSA-59hh-656j-3p7v...
null
{'https://github.com/ethereum/go-ethereum/commit/e40b37718326b8b4873b3b00a0db2e6c6d9ea738'}
{'https://github.com/ethereum/go-ethereum/commit/e40b37718326b8b4873b3b00a0db2e6c6d9ea738'}
Go
GO-2021-0070
null
GetExecUser in the github.com/opencontainers/runc/libcontainer/user package will improperly interpred numeric UIDs as usernames. If the method is used without verify usernames are formatted as expected, it may allow a user to gain unexpected privileges.
{'CVE-2016-3697'}
2021-04-14T12:00:00Z
2021-04-14T12:00:00Z
null
null
null
{'http://rhn.redhat.com/errata/RHSA-2016-1034.html', 'https://github.com/docker/docker/issues/21436', 'https://github.com/opencontainers/runc/commit/69af385de62ea68e2e608335cffbb0f4aa3db091', 'https://github.com/opencontainers/runc/pull/708', 'https://security.gentoo.org/glsa/201612-28', 'http://rhn.redhat.com/errata/R...
null
{'https://github.com/opencontainers/runc/commit/69af385de62ea68e2e608335cffbb0f4aa3db091'}
{'https://github.com/opencontainers/runc/commit/69af385de62ea68e2e608335cffbb0f4aa3db091'}
Go
GHSA-m9hp-7r99-94h5
Critical security issues in XML encoding in github.com/dexidp/dex
### Impact The following vulnerabilities have been disclosed, which impact users leveraging the SAML connector: Signature Validation Bypass (CVE-2020-15216): https://github.com/russellhaering/goxmldsig/security/advisories/GHSA-q547-gmf8-8jr7 `encoding/xml` instabilities: - [Element namespace prefix instability (CVE...
{'CVE-2020-26290'}
2021-05-21T20:49:36Z
2021-12-20T17:53:53Z
CRITICAL
null
{'CWE-347'}
{'https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-attributes.md', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26290', 'https://github.com/dexidp/dex/security/advisories/GHSA-m9hp-7r99-94h5', 'https://github.com/russellhaering/goxmldsig/security/advisories/GHSA-q547-gmf8-8jr7', 'http...
null
{'https://github.com/dexidp/dex/commit/324b1c886b407594196113a3dbddebe38eecd4e8'}
{'https://github.com/dexidp/dex/commit/324b1c886b407594196113a3dbddebe38eecd4e8'}
Go
GHSA-mj9r-wwm8-7q52
Open Redirect in github.com/AndrewBurian/powermux
### Impact Attackers may be able to craft phishing links and other open redirects by exploiting the trailing slash redirection feature. This may lead to users being redirected to untrusted sites after following an attacker crafted link. ### Patches The issue is resolved in v1.1.1 ### Workarounds There are no existing...
{'CVE-2021-32721'}
2021-06-30T17:43:53Z
2021-07-01T17:00:32Z
MODERATE
null
{'CWE-601'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32721', 'https://github.com/AndrewBurian/powermux/commit/5e60a8a0372b35a898796c2697c40e8daabed8e9', 'https://github.com/AndrewBurian/powermux/security/advisories/GHSA-mj9r-wwm8-7q52'}
null
{'https://github.com/AndrewBurian/powermux/commit/5e60a8a0372b35a898796c2697c40e8daabed8e9'}
{'https://github.com/AndrewBurian/powermux/commit/5e60a8a0372b35a898796c2697c40e8daabed8e9'}
Go
GHSA-w3jx-wv97-67ph
Cross-site scripting in Dutchcoders transfer.sh
Dutchcoders transfer.sh before 1.2.4 allows XSS via an inline view.
{'CVE-2021-33496'}
2021-05-28T18:03:43Z
2021-06-29T21:25:27Z
MODERATE
null
{'CWE-79'}
{'https://vuln.ryotak.me/advisories/43', 'https://github.com/dutchcoders/transfer.sh/pull/373', 'https://github.com/dutchcoders/transfer.sh/releases/tag/v1.2.4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33496', 'https://github.com/dutchcoders/transfer.sh/commit/9df18fdc69de2e71f30d8c1e6bfab2fda2e52eb4'}
null
{'https://github.com/dutchcoders/transfer.sh/commit/9df18fdc69de2e71f30d8c1e6bfab2fda2e52eb4'}
{'https://github.com/dutchcoders/transfer.sh/commit/9df18fdc69de2e71f30d8c1e6bfab2fda2e52eb4'}
Go
GHSA-jpj5-hg26-6jgc
Cross-site Scripting in Alist
Alist versions 2.0.10 through 2.1.0 were discovered to contain a cross-site scripting (XSS) vulnerability via /i/:data/ipa.plist. This issue was fixed in version 2.1.1.
{'CVE-2022-26533'}
2022-03-23T15:47:27Z
2022-03-13T00:00:54Z
MODERATE
null
{'CWE-79'}
{'https://github.com/Xhofe/alist', 'https://github.com/Xhofe/alist/issues/645', 'https://nvd.nist.gov/vuln/detail/CVE-2022-26533', 'https://github.com/Xhofe/alist/commit/6af17e2509a400979420f613fd7f2f9721fdcd6e'}
null
{'https://github.com/Xhofe/alist/commit/6af17e2509a400979420f613fd7f2f9721fdcd6e'}
{'https://github.com/Xhofe/alist/commit/6af17e2509a400979420f613fd7f2f9721fdcd6e'}
Go
GO-2020-0017
null
If a JWT contains an audience claim with an array of strings, rather than a single string, and `MapClaims.VerifyAudience` is called with `req` set to `false`, then audience verification will be bypassed, allowing an invalid set of audiences to be provided.
{'CVE-2020-26160'}
2021-04-14T12:00:00Z
2021-04-14T12:00:00Z
null
null
null
{'https://github.com/dgrijalva/jwt-go/issues/422', 'https://github.com/dgrijalva/jwt-go/commit/ec0a89a131e3e8567adcb21254a5cd20a70ea4ab'}
null
{'https://github.com/dgrijalva/jwt-go/commit/ec0a89a131e3e8567adcb21254a5cd20a70ea4ab'}
{'https://github.com/dgrijalva/jwt-go/commit/ec0a89a131e3e8567adcb21254a5cd20a70ea4ab'}
Go
GHSA-g5v4-5x39-vwhx
Zip slip directory exploit in github.com/deislabs/oras
### Impact The directory support (#55) allows the downloaded gzipped tarballs to be automatically extracted to the user-specified directory where the tarball can have symbolic links and hard links. A well-crafted tarball or tarballs allow malicious artifact providers linking, writing, or overwriting specific files on ...
{'CVE-2021-21272'}
2022-02-15T00:32:04Z
2022-02-15T00:32:04Z
HIGH
null
{'CWE-29', 'CWE-22'}
{'https://github.com/deislabs/oras/commit/96cd90423303f1bb42bd043cb4c36085e6e91e8e', 'https://pkg.go.dev/github.com/deislabs/oras/pkg/oras', 'https://github.com/deislabs/oras/security/advisories/GHSA-g5v4-5x39-vwhx', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21272', 'https://github.com/deislabs/oras/releases/tag/v0.9....
null
{'https://github.com/deislabs/oras/commit/96cd90423303f1bb42bd043cb4c36085e6e91e8e'}
{'https://github.com/deislabs/oras/commit/96cd90423303f1bb42bd043cb4c36085e6e91e8e'}
Go
GO-2020-0001
null
The default [`Formatter`][LoggerConfig.Formatter] for the [`Logger`][] middleware (included in the [`Default`][] engine) allows attackers to inject arbitrary log entries by manipulating the request path.
null
2021-04-14T12:00:00Z
2021-04-14T12:00:00Z
null
null
null
{'https://github.com/gin-gonic/gin/pull/2237', 'https://github.com/gin-gonic/gin/commit/a71af9c144f9579f6dbe945341c1df37aaf09c0d'}
null
{'https://github.com/gin-gonic/gin/commit/a71af9c144f9579f6dbe945341c1df37aaf09c0d'}
{'https://github.com/gin-gonic/gin/commit/a71af9c144f9579f6dbe945341c1df37aaf09c0d'}
Go
GO-2020-0021
null
Due to improper santization of user input, a number of methods are vulnerable to SQL injection if used with user input that has not been santized by the caller.
{'CVE-2014-8681'}
2021-04-14T12:00:00Z
2021-04-14T12:00:00Z
null
null
null
{'https://seclists.org/fulldisclosure/2014/Nov/31', 'https://github.com/gogs/gogs/commit/83283bca4cb4e0f4ec48a28af680f0d88db3d2c8'}
null
{'https://github.com/gogs/gogs/commit/83283bca4cb4e0f4ec48a28af680f0d88db3d2c8'}
{'https://github.com/gogs/gogs/commit/83283bca4cb4e0f4ec48a28af680f0d88db3d2c8'}
Go
GHSA-c3g4-w6cv-6v7h
Non-empty default inheritable capabilities for linux container in Buildah
A bug was found in Buildah where containers were created with non-empty inheritable Linux process capabilities, creating an atypical Linux environment and enabling programs with inheritable file capabilities to elevate those capabilities to the permitted set during execve(2). This bug did not affect the container secu...
{'CVE-2022-27651'}
2022-04-19T18:02:46Z
2022-04-01T13:56:42Z
MODERATE
null
{'CWE-276'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=2066840', 'https://github.com/containers/buildah/security/advisories/GHSA-c3g4-w6cv-6v7h', 'https://nvd.nist.gov/vuln/detail/CVE-2022-27651', 'https://github.com/containers/buildah', 'https://github.com/containers/buildah/pull/3855', 'https://lists.fedoraproject.org/archive...
null
{'https://github.com/containers/buildah/commit/90b3254c7404039c1c786999ac189654228f6e0e', 'https://github.com/containers/buildah/commit/e7e55c988c05dd74005184ceb64f097a0cfe645b'}
{'https://github.com/containers/buildah/commit/90b3254c7404039c1c786999ac189654228f6e0e', 'https://github.com/containers/buildah/commit/e7e55c988c05dd74005184ceb64f097a0cfe645b'}
Go
GO-2021-0085
null
AppArmor restrictions may be bypassed due to improper validation of mount targets, allowing a malicious image to mount volumes over e.g. /proc.
{'CVE-2019-16884'}
2021-04-14T12:00:00Z
2021-04-14T12:00:00Z
null
null
null
{'https://github.com/opencontainers/runc/issues/2128', 'https://github.com/opencontainers/runc/commit/cad42f6e0932db0ce08c3a3d9e89e6063ec283e4', 'https://github.com/opencontainers/runc/pull/2130'}
null
{'https://github.com/opencontainers/runc/commit/cad42f6e0932db0ce08c3a3d9e89e6063ec283e4'}
{'https://github.com/opencontainers/runc/commit/cad42f6e0932db0ce08c3a3d9e89e6063ec283e4'}
Go
GHSA-9689-rx4v-cqgc
Open Redirect
Pivotal Concourse Release, versions 4.x prior to 4.2.2, login flow allows redirects to untrusted websites. A remote unauthenticated attacker could convince a user to click on a link using the oAuth redirect link with an untrusted website and gain access to that user's access token in Concourse.
{'CVE-2018-15798'}
2021-05-12T18:15:16Z
2022-02-15T01:57:18Z
MODERATE
null
{'CWE-601'}
{'https://github.com/concourse/concourse/blob/release/5.2.x/release-notes/v5.2.8.md', 'https://pivotal.io/security/cve-2018-15798', 'https://nvd.nist.gov/vuln/detail/CVE-2018-15798', 'https://github.com/concourse/concourse/pull/5350/commits/38cb4cc025e5ed28764b4adc363a0bbf41f3c7cb'}
null
{'https://github.com/concourse/concourse/pull/5350/commits/38cb4cc025e5ed28764b4adc363a0bbf41f3c7cb'}
{'https://github.com/concourse/concourse/pull/5350/commits/38cb4cc025e5ed28764b4adc363a0bbf41f3c7cb'}
Go
GHSA-5gjh-5j4f-cpwv
Unrestricted Upload of File with Dangerous Type in Gogs
### Impact The malicious user is able to upload a crafted `config` file into repository's `.git` directory with to gain SSH access to the server. All installations with [repository upload enabled (default)](https://github.com/gogs/gogs/blob/f36eeedbf89328ee70cc3a2e239f6314f9021f58/conf/app.ini#L127-L129) are affected....
{'CVE-2022-0415'}
2022-03-28T16:46:41Z
2022-03-28T16:46:41Z
HIGH
null
{'CWE-434', 'CWE-20'}
{'https://github.com/gogs/gogs/commit/0fef3c9082269e9a4e817274942a5d7c50617284', 'https://huntr.dev/bounties/b4928cfe-4110-462f-a180-6d5673797902', 'https://github.com/gogs/gogs/security/advisories/GHSA-5gjh-5j4f-cpwv', 'https://github.com/gogs/gogs/pull/6838', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0415', 'https:/...
null
{'https://github.com/gogs/gogs/commit/0fef3c9082269e9a4e817274942a5d7c50617284'}
{'https://github.com/gogs/gogs/commit/0fef3c9082269e9a4e817274942a5d7c50617284'}
Go
GHSA-fgv8-vj5c-2ppq
Incorrect Authorization in runc
runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory.
{'CVE-2019-16884'}
2022-02-22T15:38:08Z
2022-02-22T15:38:08Z
HIGH
null
{'CWE-863'}
{'https://access.redhat.com/errata/RHSA-2019:4269', 'http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00073.html', 'http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00009.html', 'https://github.com/opencontainers/runc/pull/2129', 'https://github.com/crosbymichael/runc/commit/78dce1cf1ec36b...
null
{'https://github.com/crosbymichael/runc/commit/78dce1cf1ec36bbe7fe6767bdb81f7cbf6d34d70'}
{'https://github.com/crosbymichael/runc/commit/78dce1cf1ec36bbe7fe6767bdb81f7cbf6d34d70'}
Go
GHSA-qvf8-p83w-v58j
Podman's default inheritable capabilities for linux container not empty
A bug was found in Podman where containers were created with non-empty inheritable Linux process capabilities, creating an atypical Linux environment and enabling programs with inheritable file capabilities to elevate those capabilities to the permitted set during execve(2). This bug did not affect the container secur...
{'CVE-2022-27649'}
2022-04-19T18:03:15Z
2022-04-01T20:52:29Z
HIGH
null
{'CWE-276'}
{'https://github.com/containers/podman/releases/tag/v4.0.3', 'https://bugzilla.redhat.com/show_bug.cgi?id=2066568', 'https://github.com/containers/podman/security/advisories/GHSA-qvf8-p83w-v58j', 'https://github.com/containers/podman/commit/aafa80918a245edcbdaceb1191d749570f1872d0', 'https://github.com/containers/podma...
null
{'https://github.com/containers/podman/commit/aafa80918a245edcbdaceb1191d749570f1872d0'}
{'https://github.com/containers/podman/commit/aafa80918a245edcbdaceb1191d749570f1872d0'}
Go
GO-2020-0037
null
Due to support of Gzip compression in request bodies, as well as a lack of limiting response body sizes, a malicious server can cause a client to consume a significant amount of system resources, which may be used as a denial of service vector.
null
2021-04-14T12:00:00Z
2021-04-14T12:00:00Z
null
null
null
{'https://github.com/tendermint/tendermint/pull/3430', 'https://github.com/tendermint/tendermint/commit/03085c2da23b179c4a51f59a03cb40aa4e85a613'}
null
{'https://github.com/tendermint/tendermint/commit/03085c2da23b179c4a51f59a03cb40aa4e85a613'}
{'https://github.com/tendermint/tendermint/commit/03085c2da23b179c4a51f59a03cb40aa4e85a613'}
Go
GHSA-26cm-qrc6-mfgj
Improper Neutralization of Special Elements used in an LDAP Query in stevenweathers/thunderdome-planning-poker
### Impact LDAP injection vulnerability, only affects instances with LDAP authentication enabled. ### Patches Patch for vulnerability released with v1.16.3. ### Workarounds Disable LDAP feature if in use ### References [OWASP LDAP Injection Prevention Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/LDAP_...
{'CVE-2021-41232'}
2021-11-02T18:40:07Z
2021-11-08T18:16:21Z
HIGH
null
{'CWE-90', 'CWE-74'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-41232', 'https://github.com/StevenWeathers/thunderdome-planning-poker/commit/f1524d01e8a0f2d6c3db5461c742456c692dd8c1', 'https://github.com/github/securitylab/issues/464#issuecomment-957094994', 'https://github.com/StevenWeathers/thunderdome-planning-poker', 'https://github.c...
null
{'https://github.com/StevenWeathers/thunderdome-planning-poker/commit/f1524d01e8a0f2d6c3db5461c742456c692dd8c1'}
{'https://github.com/StevenWeathers/thunderdome-planning-poker/commit/f1524d01e8a0f2d6c3db5461c742456c692dd8c1'}
Go
GHSA-q2qr-3c2p-9235
Denial of Service (DoS) in HashiCorp Consul
HashiCorp Consul and Consul Enterprise could crash when configured with an abnormally-formed service-router entry. Introduced in 1.6.0, fixed in 1.6.6 and 1.7.4.
{'CVE-2020-12758'}
2021-05-13T14:26:25Z
2022-02-15T01:57:18Z
MODERATE
null
{'CWE-400'}
{'https://github.com/hashicorp/consul/blob/v1.7.4/CHANGELOG.md', 'https://github.com/hashicorp/consul/pull/7783', 'https://nvd.nist.gov/vuln/detail/CVE-2020-12758', 'https://github.com/hashicorp/consul/blob/v1.6.6/CHANGELOG.md', 'https://github.com/hashicorp/consul/commit/69b44fb9424cfdc05f1b7243876ab10d236ef1fc'}
null
{'https://github.com/hashicorp/consul/commit/69b44fb9424cfdc05f1b7243876ab10d236ef1fc'}
{'https://github.com/hashicorp/consul/commit/69b44fb9424cfdc05f1b7243876ab10d236ef1fc'}
Go
GHSA-jm5c-rv3w-w83m
Denial of service in geth
### Impact Denial-of-service (crash) during block processing ### Details Affected versions suffer from a vulnerability which can be exploited through the `MULMOD` operation, by specifying a modulo of `0`: `mulmod(a,b,0)`, causing a `panic` in the underlying library. The crash was in the `uint256` library, where a bu...
{'CVE-2020-26242'}
2021-05-21T21:50:44Z
2021-06-29T21:13:20Z
MODERATE
null
{'CWE-125', 'CWE-400', 'CWE-191'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-26242', 'https://github.com/ethereum/go-ethereum/security/advisories/GHSA-jm5c-rv3w-w83m', 'https://blog.ethereum.org/2020/11/12/geth_security_release/', 'https://github.com/ethereum/go-ethereum/commit/7163a6664ee664df81b9028ab3ba13b9d65a7196'}
null
{'https://github.com/ethereum/go-ethereum/commit/7163a6664ee664df81b9028ab3ba13b9d65a7196'}
{'https://github.com/ethereum/go-ethereum/commit/7163a6664ee664df81b9028ab3ba13b9d65a7196'}
Go
GHSA-34jx-wx69-9x8v
Symlink Attack in kubectl cp
The kubectl cp command allows copying files between containers and the user machine. To copy files from a container, Kubernetes creates a tar inside the container, copies it over the network, and kubectl unpacks it on the user’s machine. If the tar binary in the container is malicious, it could run any code and output ...
{'CVE-2019-1002101'}
2021-05-19T21:58:27Z
2022-02-15T01:57:18Z
MODERATE
null
{'CWE-59'}
{'https://access.redhat.com/errata/RHBA-2019:0636', 'http://www.securityfocus.com/bid/107652', 'https://www.twistlock.com/labs-blog/disclosing-directory-traversal-vulnerability-kubernetes-copy-cve-2019-1002101/', 'https://github.com/kubernetes/kubernetes/pull/75037', 'https://access.redhat.com/errata/RHBA-2019:0619', '...
null
{'https://github.com/kubernetes/kubernetes/commit/47063891dd782835170f500a83f37cc98c3c1013'}
{'https://github.com/kubernetes/kubernetes/commit/47063891dd782835170f500a83f37cc98c3c1013'}
Go
GO-2021-0103
null
Due to improper bounds checking, certain mathmatical operations can cause a panic, due to an out of bounds read. If this package is used to process untrusted user inputs, this may be used as a vector for a denial of service attack.
{'CVE-2020-26242'}
2021-07-28T12:00:00Z
2021-07-28T12:00:00Z
null
null
null
{'https://github.com/holiman/uint256/commit/6785da6e3eea403260a5760029e722aa4ff1716d', 'https://github.com/holiman/uint256/pull/80', 'https://github.com/ethereum/go-ethereum/security/advisories/GHSA-jm5c-rv3w-w83m'}
null
{'https://github.com/holiman/uint256/commit/6785da6e3eea403260a5760029e722aa4ff1716d'}
{'https://github.com/holiman/uint256/commit/6785da6e3eea403260a5760029e722aa4ff1716d'}
Go
GHSA-rgjg-66cx-5x9m
Authentication Bypass
Grafana before 4.6.4 and 5.x before 5.2.3 allows authentication bypass because an attacker can generate a valid "remember me" cookie knowing only a username of an LDAP or OAuth user.
{'CVE-2018-15727'}
2021-05-20T21:09:16Z
2022-02-15T01:57:18Z
CRITICAL
null
{'CWE-287'}
{'https://grafana.com/blog/2018/08/29/grafana-5.2.3-and-4.6.4-released-with-important-security-fix/', 'https://access.redhat.com/errata/RHSA-2019:0019', 'https://nvd.nist.gov/vuln/detail/CVE-2018-15727', 'https://www.securityfocus.com/bid/105184', 'https://access.redhat.com/errata/RHSA-2018:3829', 'https://github.com/g...
null
{'https://github.com/grafana/grafana/commit/7baecf0d0deae0d865e45cf03e082bc0db3f28c3', 'https://github.com/grafana/grafana/commit/df83bf10a225811927644bdf6265fa80bdea9137'}
{'https://github.com/grafana/grafana/commit/7baecf0d0deae0d865e45cf03e082bc0db3f28c3', 'https://github.com/grafana/grafana/commit/df83bf10a225811927644bdf6265fa80bdea9137'}
Go
GHSA-j7px-6hwj-hpjg
Open Redirect in OAuth2 Proxy
### Impact As users can provide a redirect address for the proxy to send the authenticated user to at the end of the authentication flow. This is expected to be the original URL that the user was trying to access. This redirect URL is checked within the proxy and validated before redirecting the user to prevent malicio...
{'CVE-2020-11053'}
2021-05-24T21:05:58Z
2021-12-20T17:59:10Z
HIGH
null
{'CWE-601'}
{'https://github.com/oauth2-proxy/oauth2-proxy/commit/0d5fa211df8ef2449347a56b22c779eb8d894c43', 'https://github.com/oauth2-proxy/oauth2-proxy/security/advisories/GHSA-j7px-6hwj-hpjg', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11053'}
null
{'https://github.com/oauth2-proxy/oauth2-proxy/commit/0d5fa211df8ef2449347a56b22c779eb8d894c43'}
{'https://github.com/oauth2-proxy/oauth2-proxy/commit/0d5fa211df8ef2449347a56b22c779eb8d894c43'}
Go
GO-2021-0102
null
Due to improper input validation, a maliciously crafted input can cause a panic, due to incorrect nonce size. If this package is used to decrypt user supplied messages without checking the size of supplied nonces, this may be used as a vector for a denial of service attack.
{'CVE-2019-11289'}
2021-07-28T12:00:00Z
2021-07-28T12:00:00Z
null
null
null
{'https://github.com/advisories/GHSA-5796-p3m6-9qj4', 'https://www.cloudfoundry.org/blog/cve-2019-11289/', 'https://github.com/cloudfoundry/gorouter/commit/b1b5c44e050f73b399b379ca63a42a2c5780a83f'}
null
{'https://github.com/cloudfoundry/gorouter/commit/b1b5c44e050f73b399b379ca63a42a2c5780a83f'}
{'https://github.com/cloudfoundry/gorouter/commit/b1b5c44e050f73b399b379ca63a42a2c5780a83f'}
Go
GHSA-cpgw-2wxr-pww3
Open Redirect
Open redirect vulnerability in Gogs before 0.12 allows remote attackers to redirect users to arbitrary websites and conduct phishing attacks via an initial /\ substring in the user/login redirect_to parameter, related to the function isValidRedirect in routes/user/auth.go.
{'CVE-2018-15178'}
2021-05-20T20:55:39Z
2021-06-29T18:32:39Z
MODERATE
null
{'CWE-601'}
{'https://github.com/gogs/gogs/pull/5365', 'https://github.com/gogs/gogs/commit/1f247cf8139cb483276cd8dd06385a800ce9d4b2', 'https://github.com/gogs/gogs/issues/5364', 'https://nvd.nist.gov/vuln/detail/CVE-2018-15178'}
null
{'https://github.com/gogs/gogs/commit/1f247cf8139cb483276cd8dd06385a800ce9d4b2'}
{'https://github.com/gogs/gogs/commit/1f247cf8139cb483276cd8dd06385a800ce9d4b2'}
Go
GHSA-p2j5-3f4c-224r
Improper Input Validation in HashiCorp Consul
HashiCorp Consul and Consul Enterprise did not appropriately enforce scope for local tokens issued by a primary data center, where replication to a secondary data center was not enabled. Introduced in 1.4.0, fixed in 1.6.6 and 1.7.4.
{'CVE-2020-13170'}
2021-05-12T22:01:59Z
2021-05-18T18:21:21Z
MODERATE
null
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-13170', 'https://github.com/hashicorp/consul/blob/v1.7.4/CHANGELOG.md', 'https://github.com/hashicorp/consul/pull/8068', 'https://github.com/hashicorp/consul/commit/242994a016a181d6c62a5bb83189716ad13d4216', 'https://github.com/hashicorp/consul/blob/v1.6.6/CHANGELOG.md'}
null
{'https://github.com/hashicorp/consul/commit/242994a016a181d6c62a5bb83189716ad13d4216'}
{'https://github.com/hashicorp/consul/commit/242994a016a181d6c62a5bb83189716ad13d4216'}
Go
GHSA-9r5x-fjv3-q6h4
Incorrect Access Control in github.com/nats-io/jwt and github.com/nats-io/nats-server/v2
NATS Server 2.x before 2.2.0 and JWT library before 2.0.1 have Incorrect Access Control because Import Token bindings are mishandled.
{'CVE-2021-3127'}
2021-05-12T20:34:10Z
2022-02-15T01:57:18Z
HIGH
null
{'CWE-863', 'CWE-284'}
{'https://advisories.nats.io/CVE/CVE-2021-3127.txt', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3127', 'https://github.com/nats-io/jwt/pull/149/commits/a826c77dc9d2671c961b75ceefdb439c41029866', 'https://github.com/nats-io/nats-server/commit/423b79440c80c863de9f4e20548504e6c5d5e403'}
null
{'https://github.com/nats-io/nats-server/commit/423b79440c80c863de9f4e20548504e6c5d5e403', 'https://github.com/nats-io/jwt/pull/149/commits/a826c77dc9d2671c961b75ceefdb439c41029866'}
{'https://github.com/nats-io/nats-server/commit/423b79440c80c863de9f4e20548504e6c5d5e403', 'https://github.com/nats-io/jwt/pull/149/commits/a826c77dc9d2671c961b75ceefdb439c41029866'}
Go
GO-2021-0051
null
Due to improper santization of user input on Windows, the static file handler allows for directory traversal, allowing an attacker to read files outside of the target directory that the server has permission to read.
null
2021-04-14T12:00:00Z
2021-04-14T12:00:00Z
null
null
null
{'https://github.com/labstack/echo/pull/1718', 'https://github.com/labstack/echo/commit/4422e3b66b9fd498ed1ae1d0242d660d0ed3faaa'}
null
{'https://github.com/labstack/echo/commit/4422e3b66b9fd498ed1ae1d0242d660d0ed3faaa'}
{'https://github.com/labstack/echo/commit/4422e3b66b9fd498ed1ae1d0242d660d0ed3faaa'}
Go
GHSA-65f3-3278-7m65
Improper Authorization in Gogs
### Impact Expired PAM accounts and accounts with expired passwords are continued to be seen as valid. Installations use PAM as authentication sources are affected. ### Patches Expired PAM accounts and accounts with expired passwords are no longer being seen as valid. Users should upgrade to 0.12.5 or the latest 0.1...
{'CVE-2022-0871'}
2022-03-14T22:58:34Z
2022-03-12T00:00:34Z
HIGH
null
{'CWE-863', 'CWE-285'}
{'https://huntr.dev/bounties/ea82cfc9-b55c-41fe-ae58-0d0e0bd7ab62', 'https://github.com/gogs/gogs', 'https://github.com/gogs/gogs/commit/64102be2c90e1b47dbdd379873ba76c80d4b0e78', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0871'}
null
{'https://github.com/gogs/gogs/commit/64102be2c90e1b47dbdd379873ba76c80d4b0e78'}
{'https://github.com/gogs/gogs/commit/64102be2c90e1b47dbdd379873ba76c80d4b0e78'}
Go
GHSA-qhm4-jxv7-j9pq
Allocation of Resources Without Limits or Throttling and Uncontrolled Memory Allocation in Kubernetes
The Kubelet component in versions 1.15.0-1.15.9, 1.16.0-1.16.6, and 1.17.0-1.17.2 has been found to be vulnerable to a denial of service attack via the kubelet API, including the unauthenticated HTTP read-only API typically served on port 10255, and the authenticated HTTPS API typically served on port 10250.
{'CVE-2020-8551'}
2021-05-06T21:53:58Z
2022-02-15T01:57:18Z
LOW
null
{'CWE-789'}
{'https://security.netapp.com/advisory/ntap-20200413-0003/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3SOCLOPTSYABTE4CLTSPDIFE6ZZZR4LX/', 'https://github.com/kubernetes/kubernetes/pull/87913', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8551', 'https://github.com/ku...
null
{'https://github.com/kubernetes/kubernetes/commit/9802bfcec0580169cffce2a3d468689a407fa7dc'}
{'https://github.com/kubernetes/kubernetes/commit/9802bfcec0580169cffce2a3d468689a407fa7dc'}
Go
GHSA-82hx-w2r5-c2wq
Allocation of Resources Without Limits or Throttling and Uncontrolled Memory Allocation in Kubernetes
The Kubernetes API server component in versions prior to 1.15.9, 1.16.0-1.16.6, and 1.17.0-1.17.2 has been found to be vulnerable to a denial of service attack via successful API requests.
{'CVE-2020-8552'}
2021-05-06T21:48:16Z
2022-02-15T01:57:18Z
MODERATE
null
{'CWE-789', 'CWE-400'}
{'https://security.netapp.com/advisory/ntap-20200413-0003/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3SOCLOPTSYABTE4CLTSPDIFE6ZZZR4LX/', 'https://github.com/kubernetes/kubernetes/commit/5978856c4c7f10737a11c9540fe60b8475beecbb', 'https://github.com/kubernetes/kube...
null
{'https://github.com/kubernetes/kubernetes/commit/5978856c4c7f10737a11c9540fe60b8475beecbb'}
{'https://github.com/kubernetes/kubernetes/commit/5978856c4c7f10737a11c9540fe60b8475beecbb'}
Go
GHSA-fqh4-rh59-xhvf
Denial of service
The package `github.com/pires/go-proxyproto` before 0.5.0 are vulnerable to Denial of Service (DoS) via the parseVersion1() function. The reader in this package is a default bufio.Reader wrapping a net.Conn. It will read from the connection until it finds a newline. Since no limits are implemented in the code, a delibe...
{'CVE-2021-23351'}
2021-05-18T21:03:39Z
2021-05-18T21:07:43Z
MODERATE
null
{'CWE-400'}
{'https://github.com/pires/go-proxyproto/commit/7f48261db810703d173f27f3309a808cc2b49b8b', 'https://github.com/pires/go-proxyproto/pull/71', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C36IBVOZXRTWM7MGTRUTOM56P5RR74VU/', 'https://lists.fedoraproject.org/archives/list/...
null
{'https://github.com/pires/go-proxyproto/commit/7f48261db810703d173f27f3309a808cc2b49b8b'}
{'https://github.com/pires/go-proxyproto/commit/7f48261db810703d173f27f3309a808cc2b49b8b'}
Go
GO-2021-0092
null
Uniqueness of JWT IDs (jti) are not checked, allowing the JWT to be replayed.
{'CVE-2020-15222'}
2021-04-14T12:00:00Z
2021-04-14T12:00:00Z
null
null
null
{'https://github.com/ory/fosite/commit/0c9e0f6d654913ad57c507dd9a36631e1858a3e9', 'https://github.com/ory/fosite/security/advisories/GHSA-v3q9-2p3m-7g43'}
null
{'https://github.com/ory/fosite/commit/0c9e0f6d654913ad57c507dd9a36631e1858a3e9'}
{'https://github.com/ory/fosite/commit/0c9e0f6d654913ad57c507dd9a36631e1858a3e9'}
Go
GHSA-ccxc-vr6p-4858
Improper Certificate Validation in Cosign
### Impact Cosign can be manipulated to claim that an entry for a signature exists in the Rekor transparency log even if it doesn't. This requires the attacker to have pull and push permissions for the signature in OCI. This can happen with both standard signing with a keypair and "keyless signing" with Fulcio. #### ...
{'CVE-2022-23649'}
2022-03-08T18:26:05Z
2022-02-22T19:34:09Z
LOW
null
{'CWE-295'}
{'https://github.com/sigstore/cosign/security/advisories/GHSA-ccxc-vr6p-4858', 'https://github.com/sigstore/cosign/commit/96d410a6580e4e81d24d112a0855c70ca3fb5b49', 'https://github.com/sigstore/cosign/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23649', 'https://github.com/sigstore/cosign/releases/tag/v1.5.2'}
null
{'https://github.com/sigstore/cosign/commit/96d410a6580e4e81d24d112a0855c70ca3fb5b49'}
{'https://github.com/sigstore/cosign/commit/96d410a6580e4e81d24d112a0855c70ca3fb5b49'}
Go
GO-2020-0036
null
Due to unbounded aliasing, a crafted YAML file can cause consumption of significant system resources. If parsing user supplied input, this may be used as a denial of service vector.
{'CVE-2019-11254'}
2021-04-14T12:00:00Z
2021-04-14T12:00:00Z
null
null
null
{'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18496', 'https://github.com/go-yaml/yaml/commit/53403b58ad1b561927d19068c655246f2db79d48', 'https://github.com/go-yaml/yaml/pull/555'}
null
{'https://github.com/go-yaml/yaml/commit/53403b58ad1b561927d19068c655246f2db79d48'}
{'https://github.com/go-yaml/yaml/commit/53403b58ad1b561927d19068c655246f2db79d48'}
Go
GHSA-jr9c-h74f-2v28
Improper Authorization in Gitea
Gitea 1.16.3 and prior is vulnerable to improper authorization. A patch is available and is anticipated to be part of the 1.16.4 release.
{'CVE-2022-0905'}
2022-03-28T22:24:29Z
2022-03-11T00:02:35Z
MODERATE
null
{'CWE-863', 'CWE-285'}
{'https://github.com/go-gitea/gitea/commit/1314f38b59748397b3429fb9bc9f9d6bac85d2f2', 'https://github.com/go-gitea/gitea', 'https://huntr.dev/bounties/8d221f92-b2b1-4878-bc31-66ff272e5ceb', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0905'}
null
{'https://github.com/go-gitea/gitea/commit/1314f38b59748397b3429fb9bc9f9d6bac85d2f2'}
{'https://github.com/go-gitea/gitea/commit/1314f38b59748397b3429fb9bc9f9d6bac85d2f2'}
Go
GHSA-xcqr-9h24-vrgw
Improper Restriction of Excessive Authentication Attempts in Argo API
As of v1.5.0, the Argo API does not implement anti-automation measures such as rate limiting, account lockouts, or other anti-bruteforce measures. Attackers can submit an unlimited number of authentication attempts without consequence.
{'CVE-2020-8827'}
2021-07-26T21:13:31Z
2021-07-26T21:19:37Z
HIGH
null
{'CWE-307'}
{'https://argoproj.github.io/argo-cd/security_considerations/', 'https://www.soluble.ai/blog/argo-cves-2020', 'https://github.com/argoproj/argo-cd/pull/3369', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8827', 'https://github.com/argoproj/argo-cd/pull/3404', 'https://github.com/argoproj/argo/releases', 'https://github.c...
null
{'https://github.com/argoproj/argo-cd/commit/35a7350b7444bcaf53ee0bb11b9d8e3ae4b717a1'}
{'https://github.com/argoproj/argo-cd/commit/35a7350b7444bcaf53ee0bb11b9d8e3ae4b717a1'}
Go
GHSA-wjm3-fq3r-5x46
Denial of service
GJSON <1.6.5 allows attackers to cause a denial of service (remote) via crafted JSON.
{'CVE-2020-36066'}
2021-05-18T21:00:38Z
2021-05-18T21:07:54Z
MODERATE
null
{'CWE-400'}
{'https://github.com/tidwall/match/commit/c2f534168b739a7ec1821a33839fb2f029f26bbc', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36066', 'https://github.com/tidwall/gjson/issues/195#issuecomment-755303148', 'https://github.com/tidwall/gjson/issues/195'}
null
{'https://github.com/tidwall/match/commit/c2f534168b739a7ec1821a33839fb2f029f26bbc'}
{'https://github.com/tidwall/match/commit/c2f534168b739a7ec1821a33839fb2f029f26bbc'}
Go
GHSA-8v99-48m9-c8pm
Incorrect Authorization in imgcrypt
Imgcrypt implements a function `CheckAuthorization()` that is supposed to check whether a user is authorized to access an encrypted image given the keys that the user has provided on the command line that would enable decryption of the image. The check is to prevent that a user can start a container from an image that ...
{'CVE-2022-24778'}
2022-04-13T03:57:32Z
2022-03-28T19:33:44Z
HIGH
null
{'CWE-863'}
{'https://github.com/containerd/imgcrypt/issues/69', 'https://github.com/containerd/imgcrypt/security/advisories/GHSA-8v99-48m9-c8pm', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TAHAAOOA3KZJC2I5WHCR3XVBJBNWTWUE/', 'https://github.com/containerd/imgcrypt/releases/tag/...
null
{'https://github.com/containerd/imgcrypt/commit/6fdd9818a4d8142107b7ecd767d839c9707700d9'}
{'https://github.com/containerd/imgcrypt/commit/6fdd9818a4d8142107b7ecd767d839c9707700d9'}
Go
GHSA-qqc5-rgcc-cjqh
Information Disclosure in go.elastic.co/apm
The Elastic APM agent for Go versions before 1.11.0 can leak sensitive HTTP header information when logging the details during an application panic. Normally, the APM agent will sanitize sensitive HTTP header details before sending the information to the APM server. During an application panic it is possible the header...
{'CVE-2021-22133'}
2021-05-07T22:01:55Z
2021-05-18T18:34:18Z
LOW
null
{'CWE-532'}
{'https://github.com/elastic/apm-agent-go/commit/c5c7e21aa26a6def7790f74fbceed792ad47ef35', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22133', 'https://github.com/elastic/apm-agent-go/compare/v1.10.0...v1.11.0', 'https://discuss.elastic.co/t/elastic-apm-agent-for-go-1-11-0-security-update/263252'}
null
{'https://github.com/elastic/apm-agent-go/commit/c5c7e21aa26a6def7790f74fbceed792ad47ef35'}
{'https://github.com/elastic/apm-agent-go/commit/c5c7e21aa26a6def7790f74fbceed792ad47ef35'}
Go
GO-2021-0084
null
Session data is stored using permissive permissions, allowing local users with filesystem access to read arbitary data.
{'CVE-2019-16354'}
2021-04-14T12:00:00Z
2021-04-14T12:00:00Z
null
null
null
{'https://github.com/beego/beego/commit/bac2b31afecc65d9a89f9e473b8006c5edc0c8d1', 'https://github.com/beego/beego/issues/3763', 'https://github.com/beego/beego/pull/3975'}
null
{'https://github.com/beego/beego/commit/bac2b31afecc65d9a89f9e473b8006c5edc0c8d1'}
{'https://github.com/beego/beego/commit/bac2b31afecc65d9a89f9e473b8006c5edc0c8d1'}
Go
GHSA-f9fq-vjvh-779p
Improper Input Validation in vault-ssh-helper
HashiCorp vault-ssh-helper up to and including version 0.1.6 incorrectly accepted Vault-issued SSH OTPs for the subnet in which a host's network interface was located, rather than the specific IP address assigned to that interface. Fixed in 0.2.0.
{'CVE-2020-24359'}
2021-05-12T20:21:27Z
2022-02-15T01:57:18Z
HIGH
null
{'CWE-20'}
{'https://github.com/hashicorp/vault-ssh-helper/commit/83effd08cbcbe4b993d776bd9b39465cd9e4603f', 'https://nvd.nist.gov/vuln/detail/CVE-2020-24359', 'https://github.com/hashicorp/vault-ssh-helper/blob/master/CHANGELOG.md#020-august-19-2020', 'https://github.com/hashicorp/vault-ssh-helper/releases'}
null
{'https://github.com/hashicorp/vault-ssh-helper/commit/83effd08cbcbe4b993d776bd9b39465cd9e4603f'}
{'https://github.com/hashicorp/vault-ssh-helper/commit/83effd08cbcbe4b993d776bd9b39465cd9e4603f'}
Go
GHSA-h2fg-54x9-5qhq
Nil dereference in NATS JWT, DoS of nats-server
## Problem Description The NATS account system has an Operator trusted by the servers, which signs Accounts, and each Account can then create and sign Users within their account. The Operator should be able to safely issue Accounts to other entities which it does not fully trust. A malicious Account could create and...
{'CVE-2020-26521'}
2022-02-11T23:43:13Z
2022-02-11T23:43:13Z
LOW
null
{'CWE-476'}
{'https://github.com/nats-io/jwt/security/advisories/GHSA-h2fg-54x9-5qhq', 'http://www.openwall.com/lists/oss-security/2020/11/02/2', 'https://github.com/nats-io/nats-server/commits/master', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26521', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedorapr...
null
{'https://github.com/nats-io/nats-server/commit/9ff8bcde2e46009e98bd9e88f598af355f62c168'}
{'https://github.com/nats-io/nats-server/commit/9ff8bcde2e46009e98bd9e88f598af355f62c168'}
Go
GO-2020-0020
null
Usage of the [`CORS`] handler may apply improper CORS headers, allowing the requester to explicitly control the value of the Access-Control-Allow-Origin header, which bypasses the expected behavior of the Same Origin Policy.
null
2021-04-14T12:00:00Z
2021-04-14T12:00:00Z
null
null
null
{'https://github.com/gorilla/handlers/pull/116', 'https://github.com/gorilla/handlers/commit/90663712d74cb411cbef281bc1e08c19d1a76145'}
null
{'https://github.com/gorilla/handlers/commit/90663712d74cb411cbef281bc1e08c19d1a76145'}
{'https://github.com/gorilla/handlers/commit/90663712d74cb411cbef281bc1e08c19d1a76145'}
Go
GHSA-6jqj-f58p-mrw3
Denial of Service in TenderMint
### Description **Denial of Service** Tendermint 0.33.0 and above allow block proposers to include signatures for the wrong block. This may happen naturally if you start a network, have it run for some time and restart it without changing the chainID. (It is a [misconfiguration](https://docs.tendermint.com/master/ten...
{'CVE-2020-15091'}
2021-05-24T20:49:56Z
2021-12-20T18:17:33Z
MODERATE
null
{'CWE-347'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15091', 'https://github.com/tendermint/tendermint/security/advisories/GHSA-6jqj-f58p-mrw3', 'https://github.com/tendermint/tendermint/commit/480b995a31727593f58b361af979054d17d84340', 'https://github.com/tendermint/tendermint/issues/4926'}
null
{'https://github.com/tendermint/tendermint/commit/480b995a31727593f58b361af979054d17d84340'}
{'https://github.com/tendermint/tendermint/commit/480b995a31727593f58b361af979054d17d84340'}
Go
GO-2020-0016
null
An attacker can construct a series of bytes such that calling [`Reader.Read`] on the bytes could cause an infinite loop. If parsing user supplied input, this may be used as a denial of service vector.
{'CVE-2021-29482'}
2021-04-14T12:00:00Z
2021-04-14T12:00:00Z
null
null
null
{'https://github.com/ulikunitz/xz/security/advisories/GHSA-25xm-hr59-7c27', 'https://github.com/ulikunitz/xz/issues/35', 'https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b'}
null
{'https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b'}
{'https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b'}
Go
GHSA-5m6c-jp6f-2vcv
Open Redirect in OAuth2 Proxy
### Impact As users can provide a redirect address for the proxy to send the authenticated user to at the end of the authentication flow. This is expected to be the original URL that the user was trying to access. This redirect URL is checked within the proxy and validated before redirecting the user to prevent malicio...
{'CVE-2020-4037'}
2021-05-24T20:58:18Z
2021-12-20T17:58:59Z
MODERATE
null
{'CWE-601'}
{'https://github.com/oauth2-proxy/oauth2-proxy/releases/tag/v6.0.0', 'https://nvd.nist.gov/vuln/detail/CVE-2020-4037', 'https://github.com/oauth2-proxy/oauth2-proxy/commit/ee5662e0f5001d76ec76562bb605abbd07c266a2', 'https://github.com/oauth2-proxy/oauth2-proxy/security/advisories/GHSA-5m6c-jp6f-2vcv'}
null
{'https://github.com/oauth2-proxy/oauth2-proxy/commit/ee5662e0f5001d76ec76562bb605abbd07c266a2'}
{'https://github.com/oauth2-proxy/oauth2-proxy/commit/ee5662e0f5001d76ec76562bb605abbd07c266a2'}
Go
GO-2020-0041
null
Due to improper path santization, archives containing relative file paths can cause files to be written (or overwritten) outside of the target directory.
{'CVE-2020-7668'}
2021-04-14T12:00:00Z
2021-04-14T12:00:00Z
null
null
null
{'https://snyk.io/research/zip-slip-vulnerability', 'https://github.com/unknwon/cae/commit/07971c00a1bfd9dc171c3ad0bfab5b67c2287e11'}
null
{'https://github.com/unknwon/cae/commit/07971c00a1bfd9dc171c3ad0bfab5b67c2287e11'}
{'https://github.com/unknwon/cae/commit/07971c00a1bfd9dc171c3ad0bfab5b67c2287e11'}
Go
GHSA-jm34-xm8m-w958
Open Redirect in oauth2_proxy
The Bitly oauth2_proxy in version 2.1 and earlier was affected by an open redirect vulnerability during the start and termination of the 2-legged OAuth flow. This issue was caused by improper input validation and a violation of RFC-6819
{'CVE-2017-1000070'}
2021-05-19T22:31:56Z
2021-12-20T18:04:40Z
MODERATE
null
{'CWE-601'}
{'https://github.com/bitly/oauth2_proxy/pull/359', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000070', 'https://github.com/bitly/oauth2_proxy/issues/228', 'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-1000070', 'https://tools.ietf.org/html/rfc6819#section-5.2.3.5', 'https://github.com/bitly/oauth2_proxy/c...
null
{'https://github.com/bitly/oauth2_proxy/commit/289a6ccf463a425c7606178c510fc5eeb9c8b050'}
{'https://github.com/bitly/oauth2_proxy/commit/289a6ccf463a425c7606178c510fc5eeb9c8b050'}
Go
GO-2021-0071
null
A race between chown and chmod operations during a container filesystem shift may allow a user who can modify the filesystem to chmod an arbitary path of their choice, rather than the expected path.
{'CVE-2015-1340'}
2021-04-14T12:00:00Z
2021-04-14T12:00:00Z
null
null
null
{'https://bugs.launchpad.net/ubuntu/+source/lxd/+bug/1502270', 'https://github.com/lxc/lxd/commit/19c6961cc1012c8a529f20807328a9357f5034f4', 'https://github.com/lxc/lxd/pull/1189'}
null
{'https://github.com/lxc/lxd/commit/19c6961cc1012c8a529f20807328a9357f5034f4'}
{'https://github.com/lxc/lxd/commit/19c6961cc1012c8a529f20807328a9357f5034f4'}
Go
GHSA-4mf2-f3wh-gvf2
Subdomain checking of whitelisted domains could allow unintended redirects in oauth2-proxy
### Impact _What kind of vulnerability is it? Who is impacted?_ For users that use the whitelist domain feature, a domain that ended in a similar way to the intended domain could have been allowed as a redirect. For example, if a whitelist domain was configured for `.example.com`, the intention is that subdomains of `...
{'CVE-2021-21291'}
2021-05-21T21:37:23Z
2021-05-25T18:42:20Z
LOW
null
{'CWE-601'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-21291', 'https://github.com/oauth2-proxy/oauth2-proxy/commit/780ae4f3c99b579cb2ea9845121caebb6192f725', 'https://github.com/oauth2-proxy/oauth2-proxy/releases/tag/v7.0.0', 'https://pkg.go.dev/github.com/oauth2-proxy/oauth2-proxy/v7', 'https://github.com/oauth2-proxy/oauth2-pr...
null
{'https://github.com/oauth2-proxy/oauth2-proxy/commit/780ae4f3c99b579cb2ea9845121caebb6192f725'}
{'https://github.com/oauth2-proxy/oauth2-proxy/commit/780ae4f3c99b579cb2ea9845121caebb6192f725'}
Go
GHSA-fx5p-f64h-93xc
Opened exploitable ports in default docker-compose.yaml in go-ipfs
### Impact Allows admin API access to the IPFS node. ### Who ? This affects people running the [docker-compose.yaml](https://github.com/ipfs/go-ipfs/blob/master/docker-compose.yaml) service in an environment where the docker host is directly attached to a public or untrusted IP. In the vulnerable version, the priv...
null
2022-04-04T21:23:55Z
2022-04-04T21:23:55Z
MODERATE
null
null
{'https://github.com/ipfs/go-ipfs/commit/816a128aaf963d72c4930852ce32b9a4e31924a1', 'https://github.com/ipfs/go-ipfs/releases/tag/v0.12.1', 'https://github.com/ipfs/go-ipfs/pull/8773', 'https://github.com/ipfs/go-ipfs/security/advisories/GHSA-fx5p-f64h-93xc', 'https://github.com/ipfs/go-ipfs'}
null
{'https://github.com/ipfs/go-ipfs/commit/816a128aaf963d72c4930852ce32b9a4e31924a1'}
{'https://github.com/ipfs/go-ipfs/commit/816a128aaf963d72c4930852ce32b9a4e31924a1'}
Go
GHSA-xcf7-q56x-78gh
Connection descriptor exhaustion in proxyproto
The package `github.com/pires/go-proxyproto` before 0.6.0 are vulnerable to Denial of Service (DoS) via creating connections without the proxy protocol header.
{'CVE-2021-23409'}
2021-07-26T17:31:53Z
2021-07-26T21:23:49Z
HIGH
null
{'CWE-400'}
{'https://github.com/pires/go-proxyproto/issues/65', 'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMPIRESGOPROXYPROTO-1316439', 'https://github.com/pires/go-proxyproto/pull/74/commits/cdc63867da24fc609b727231f682670d0d1cd346', 'https://github.com/pires/go-proxyproto/releases/tag/v0.6.0', 'https://nvd.nist.gov/vuln/detail/C...
null
{'https://github.com/pires/go-proxyproto/pull/74/commits/cdc63867da24fc609b727231f682670d0d1cd346'}
{'https://github.com/pires/go-proxyproto/pull/74/commits/cdc63867da24fc609b727231f682670d0d1cd346'}
Go
GHSA-x5m6-jh4r-34mv
Arbitrary File Overwrite in hub
The am function in lib/hub/commands.rb in hub before 1.12.1 allows local users to overwrite arbitrary files via a symlink attack on a temporary patch file.
{'CVE-2014-0177'}
2021-05-20T20:32:04Z
2022-02-15T01:07:53Z
MODERATE
null
{'CWE-377'}
{'https://github.com/github/hub/commit/016ec99d25b1cb83cb4367e541177aa431beb600', 'https://nvd.nist.gov/vuln/detail/CVE-2014-0177', 'https://secunia.com/advisories/58273'}
null
{'https://github.com/github/hub/commit/016ec99d25b1cb83cb4367e541177aa431beb600'}
{'https://github.com/github/hub/commit/016ec99d25b1cb83cb4367e541177aa431beb600'}
Go
GHSA-7gfg-6934-mqq2
Improper Authenication in Pion DTLS
handleIncomingPacket in conn.go in Pion DTLS before 1.5.2 lacks a check for application data with epoch 0, which allows remote attackers to inject arbitrary unencrypted data after handshake completion.
{'CVE-2019-20786'}
2021-05-25T19:54:18Z
2021-06-29T21:34:57Z
CRITICAL
null
{'CWE-287'}
{'https://www.usenix.org/system/files/sec20fall_fiterau-brostean_prepub.pdf', 'https://nvd.nist.gov/vuln/detail/CVE-2019-20786', 'https://github.com/pion/dtls/compare/v1.5.1...v1.5.2', 'https://github.com/pion/dtls/commit/fd73a5df2ff0e1fb6ae6a51e2777d7a16cc4f4e0', 'https://www.usenix.org/conference/usenixsecurity20/pre...
null
{'https://github.com/pion/dtls/commit/fd73a5df2ff0e1fb6ae6a51e2777d7a16cc4f4e0'}
{'https://github.com/pion/dtls/commit/fd73a5df2ff0e1fb6ae6a51e2777d7a16cc4f4e0'}
Go
GHSA-rrm8-32g4-w8m3
Cross-site Request Forgery (CSRF)
CSRF in Bitly oauth2_proxy 2.1 during authentication flow
{'CVE-2017-1000069'}
2021-05-12T18:30:22Z
2021-12-20T18:04:46Z
HIGH
null
{'CWE-352'}
{'https://github.com/bitly/oauth2_proxy/commit/55085d9697962668fd4e43e8e4644144fe83cd93', 'https://github.com/bitly/oauth2_proxy/pull/360', 'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-1000069', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000069'}
null
{'https://github.com/bitly/oauth2_proxy/commit/55085d9697962668fd4e43e8e4644144fe83cd93'}
{'https://github.com/bitly/oauth2_proxy/commit/55085d9697962668fd4e43e8e4644144fe83cd93'}
Go
GHSA-wmwp-pggc-h4mj
Cross-site Scripting in Documize
domain/section/markdown/markdown.go in Documize before 3.5.1 mishandles untrusted Markdown content. This was addressed by adding the bluemonday HTML sanitizer to defend against XSS.
{'CVE-2019-19619'}
2021-05-17T21:29:00Z
2021-05-18T15:30:30Z
MODERATE
null
{'CWE-79'}
{'https://github.com/documize/community/compare/v3.5.0...v3.5.1', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19619', 'https://github.com/documize/community/releases/tag/v3.5.1', 'https://github.com/documize/community/commit/a4384210d4d0d6b18e6fdb7e155de96d4a1cf9f3'}
null
{'https://github.com/documize/community/commit/a4384210d4d0d6b18e6fdb7e155de96d4a1cf9f3'}
{'https://github.com/documize/community/commit/a4384210d4d0d6b18e6fdb7e155de96d4a1cf9f3'}
Go
GO-2021-0067
null
Using Reader.Open on an archive containing a file with a path prefixed by "../" will cause a panic due to a stack overflow. If parsing user supplied archives, this may be used as a denial of service vector.
{'CVE-2021-27919'}
2021-04-14T12:00:00Z
2021-04-14T12:00:00Z
null
null
null
{'https://github.com/golang/go/issues/44916', 'https://go-review.googlesource.com/c/go/+/300489', 'https://github.com/golang/go/commit/cd3b4ca9f20fd14187ed4cdfdee1a02ea87e5cd8'}
null
{'https://github.com/golang/go/commit/cd3b4ca9f20fd14187ed4cdfdee1a02ea87e5cd8'}
{'https://github.com/golang/go/commit/cd3b4ca9f20fd14187ed4cdfdee1a02ea87e5cd8'}
Go
GHSA-3fx4-7f69-5mmg
Integer Overflow in go-jose
go-jose before 1.0.5 suffers from a CBC-HMAC integer overflow on 32-bit architectures. An integer overflow could lead to authentication bypass for CBC-HMAC encrypted ciphertexts on 32-bit architectures.
{'CVE-2016-9123'}
2021-05-20T16:26:07Z
2021-06-23T17:14:12Z
HIGH
null
{'CWE-190'}
{'https://github.com/square/go-jose/commit/789a4c4bd4c118f7564954f441b29c153ccd6a96', 'https://nvd.nist.gov/vuln/detail/CVE-2016-9123', 'https://www.openwall.com/lists/oss-security/2016/11/03/1', 'https://hackerone.com/reports/165170'}
null
{'https://github.com/square/go-jose/commit/789a4c4bd4c118f7564954f441b29c153ccd6a96'}
{'https://github.com/square/go-jose/commit/789a4c4bd4c118f7564954f441b29c153ccd6a96'}
Go
GO-2021-0088
null
Skip ignores unknown fields, rather than failing. A malicious user can craft small messages with unknown fields which can take significant resources to parse. If a server accepts messages from an untrusted user, it may be used as a denial of service vector.
{'CVE-2019-3564'}
2021-04-14T12:00:00Z
2021-04-14T12:00:00Z
null
null
null
{'https://www.facebook.com/security/advisories/cve-2019-3564', 'https://github.com/facebook/fbthrift/commit/c461c1bd1a3e130b181aa9c854da3030cd4b5156'}
null
{'https://github.com/facebook/fbthrift/commit/c461c1bd1a3e130b181aa9c854da3030cd4b5156'}
{'https://github.com/facebook/fbthrift/commit/c461c1bd1a3e130b181aa9c854da3030cd4b5156'}
Go
GHSA-gv2h-gf8m-r68j
Exposure of server configuration in github.com/go-vela/server
### Impact _What kind of vulnerability is it? Who is impacted?_ * The ability to expose configuration set in the [Vela server](https://github.com/go-vela/server) via [pipeline template functionality](https://go-vela.github.io/docs/templates/overview/). * It impacts all users of Vela. Sample of template exposing serv...
{'CVE-2020-26294'}
2022-02-15T00:19:57Z
2022-02-15T00:19:57Z
HIGH
null
{'CWE-200', 'CWE-78'}
{'https://pkg.go.dev/github.com/go-vela/compiler/compiler', 'https://github.com/go-vela/compiler/commit/f1ace5f8a05c95c4d02264556e38a959ee2d9bda', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26294', 'https://github.com/go-vela/compiler/security/advisories/GHSA-gv2h-gf8m-r68j', 'https://github.com/helm/helm/blob/6297c021...
null
{'https://github.com/go-vela/compiler/commit/f1ace5f8a05c95c4d02264556e38a959ee2d9bda'}
{'https://github.com/go-vela/compiler/commit/f1ace5f8a05c95c4d02264556e38a959ee2d9bda'}
Go
GHSA-q6gq-997w-f55g
Infinite loop in xz
Go before 1.13.15 and 14.x before 1.14.7 can have an infinite read loop in ReadUvarint and ReadVarint in encoding/binary via invalid inputs.
{'CVE-2020-16845'}
2021-06-18T22:05:40Z
2021-12-16T19:16:40Z
HIGH
null
{'CWE-835'}
{'http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/', 'http://lists.opensuse.org/open...
null
{'https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b'}
{'https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b'}
Go
GHSA-gmq2-39ff-f5qg
A failed upgrade may lead to hung goroutines
### Impact Processes using tableflip may encounter hung goroutines in the parent process, after a failed upgrade. The Go runtime has annoying behaviour around setting and clearing O_NONBLOCK: exec.Cmd.Start() ends up calling os.File.Fd() for any file in exec.Cmd.ExtraFiles. os.File.Fd() disables both the use of the ru...
null
2021-05-21T14:40:36Z
2021-05-21T16:25:48Z
LOW
null
null
{'https://github.com/cloudflare/tableflip/security/advisories/GHSA-gmq2-39ff-f5qg', 'https://github.com/cloudflare/tableflip/commit/cae714b289e199db5da5f08af861ea65be6232c0'}
null
{'https://github.com/cloudflare/tableflip/commit/cae714b289e199db5da5f08af861ea65be6232c0'}
{'https://github.com/cloudflare/tableflip/commit/cae714b289e199db5da5f08af861ea65be6232c0'}
Go
GO-2020-0003
null
If the application accepts [slice parameters](https://revel.github.io/manual/parameters.html#slices), an attacker can cause the application to allocate large amounts of memory and crash by manipulating the request query.
null
2021-04-14T12:00:00Z
2021-04-14T12:00:00Z
null
null
null
{'https://github.com/revel/revel/commit/d160ecb72207824005b19778594cbdc272e8a605', 'https://github.com/revel/revel/pull/1427', 'https://github.com/revel/revel/issues/1424'}
null
{'https://github.com/revel/revel/commit/d160ecb72207824005b19778594cbdc272e8a605'}
{'https://github.com/revel/revel/commit/d160ecb72207824005b19778594cbdc272e8a605'}