repo_id
stringclasses
927 values
file_path
stringlengths
99
214
content
stringlengths
2
4.15M
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0224.json
{ "schema_version": "1.3.1", "id": "GO-2021-0224", "modified": "0001-01-01T00:00:00Z", "published": "2022-02-17T17:36:04Z", "aliases": [ "CVE-2020-15586" ], "summary": "Data race and crash in net/http", "details": "HTTP servers where the Handler concurrently reads the request body and writes a response can encounter a data race and crash. The httputil.ReverseProxy Handler is affected.", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.13.13" }, { "introduced": "1.14.0-0" }, { "fixed": "1.14.5" } ] } ], "ecosystem_specific": { "imports": [ { "path": "net/http", "symbols": [ "expectContinueReader.Read" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/242598" }, { "type": "FIX", "url": "https://go.googlesource.com/go/+/fa98f46741f818913a8c11b877520a548715131f" }, { "type": "REPORT", "url": "https://go.dev/issue/34902" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w" } ], "credits": [ { "name": "Mikael Manukyan" }, { "name": "Andrew Kutz" }, { "name": "Dave McClure" }, { "name": "Tim Downey" }, { "name": "Clay Kauzlaric" }, { "name": "Gabe Rosenhouse" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0224", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2529.json
{ "schema_version": "1.3.1", "id": "GO-2024-2529", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "GHSA-pm3m-32r3-7mfh" ], "summary": "Etcd embed auto compaction retention negative value causing a compaction loop or a crash in go.etcd.io/etcd", "details": "Etcd embed auto compaction retention negative value causing a compaction loop or a crash in go.etcd.io/etcd.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: go.etcd.io/etcd/v3 before v3.3.23, from v3.4.0-rc.0 before v3.4.10.", "affected": [ { "package": { "name": "go.etcd.io/etcd", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "go.etcd.io/etcd/v3", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "3.3.23" }, { "introduced": "3.4.0-rc.0" }, { "fixed": "3.4.10" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/etcd-io/etcd/security/advisories/GHSA-pm3m-32r3-7mfh" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2529", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2776.json
{ "schema_version": "1.3.1", "id": "GO-2024-2776", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2021-43350", "GHSA-mg2c-rc36-p594" ], "summary": "Apache Traffic Control Traffic Ops Vulnerable to LDAP Injection in github.com/apache/trafficcontrol", "details": "Apache Traffic Control Traffic Ops Vulnerable to LDAP Injection in github.com/apache/trafficcontrol", "affected": [ { "package": { "name": "github.com/apache/trafficcontrol", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "5.1.0+incompatible" }, { "fixed": "5.1.4+incompatible" }, { "introduced": "6.0.0+incompatible" }, { "fixed": "6.0.1+incompatible" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-mg2c-rc36-p594" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43350" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2021/11/11/3" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2021/11/11/4" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2021/11/17/1" }, { "type": "WEB", "url": "https://trafficcontrol.apache.org/security" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2776", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2675.json
{ "schema_version": "1.3.1", "id": "GO-2024-2675", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-2435", "GHSA-8f25-w7qj-r7hc" ], "summary": "Temporal UI Server cross-site scripting vulnerability in github.com/temporalio/ui-server", "details": "Temporal UI Server cross-site scripting vulnerability in github.com/temporalio/ui-server", "affected": [ { "package": { "name": "github.com/temporalio/ui-server", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/temporalio/ui-server/v2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "2.25.0" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-8f25-w7qj-r7hc" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-2435" }, { "type": "WEB", "url": "https://github.com/temporalio/ui-server/releases/tag/v2.25.0" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2675", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2430.json
{ "schema_version": "1.3.1", "id": "GO-2024-2430", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-46738", "GHSA-qc6v-g3xw-grmx" ], "summary": "Authenticated users can crash the CubeFS servers with maliciously crafted requests in github.com/cubefs/cubefs", "details": "Authenticated users can crash the CubeFS servers with maliciously crafted requests in github.com/cubefs/cubefs.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/cubefs/cubefs before v3.3.1.", "affected": [ { "package": { "name": "github.com/cubefs/cubefs", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "3.3.1" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/cubefs/cubefs/security/advisories/GHSA-qc6v-g3xw-grmx" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-46738" }, { "type": "FIX", "url": "https://github.com/cubefs/cubefs/commit/dd46c24873c8f3df48d0a598b704ef9bd24b1ec1" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2430", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1733.json
{ "schema_version": "1.3.1", "id": "GO-2023-1733", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-26557" ], "summary": "Timing attack from non-constant time scalar arithmetic in github.com/bnb-chain/tss-lib", "details": "Timing attack from non-constant time scalar arithmetic in github.com/bnb-chain/tss-lib.", "affected": [ { "package": { "name": "github.com/bnb-chain/tss-lib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.3.6-0.20230324145555-bb6fb30bd3eb" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/bnb-chain/tss-lib/common" } ] } }, { "package": { "name": "github.com/binance-chain/tss-lib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/binance-chain/tss-lib/common" } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://medium.com/@iofinnet/security-disclosure-for-ecdsa-and-eddsa-threshold-signature-schemes-4e969af7155b" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-1733", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2915.json
{ "schema_version": "1.3.1", "id": "GO-2024-2915", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-22244", "GHSA-5757-v49g-f6r7" ], "summary": "Open Redirect URL in Harbor in github.com/goharbor/harbor", "details": "Open Redirect URL in Harbor in github.com/goharbor/harbor", "affected": [ { "package": { "name": "github.com/goharbor/harbor", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "2.8.5+incompatible" }, { "introduced": "2.9.0+incompatible" }, { "fixed": "2.9.3+incompatible" }, { "introduced": "2.10.0+incompatible" }, { "fixed": "2.10.1+incompatible" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/goharbor/harbor/security/advisories/GHSA-5757-v49g-f6r7" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22244" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2915", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2978.json
{ "schema_version": "1.3.1", "id": "GO-2024-2978", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "GHSA-xr7q-jx4m-x55m" ], "summary": "Private tokens could appear in logs if context containing gRPC metadata is logged in google.golang.org/grpc", "details": "If applications print or log a context containing gRPC metadata, the output will contain all the metadata, which may include private information. This represents a potential PII concern.", "affected": [ { "package": { "name": "google.golang.org/grpc", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "1.64.0" }, { "fixed": "1.64.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "google.golang.org/grpc/metadata", "symbols": [ "MD.String" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/grpc/grpc-go/security/advisories/GHSA-xr7q-jx4m-x55m" }, { "type": "FIX", "url": "https://github.com/grpc/grpc-go/commit/ab292411ddc0f3b7a7786754d1fe05264c3021eb" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2978", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1732.json
{ "schema_version": "1.3.1", "id": "GO-2023-1732", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-26556" ], "summary": "Timing attack from non-constant time scalar multiplication in github.com/bnb-chain/tss-lib", "details": "Timing attack from non-constant time scalar multiplication in github.com/bnb-chain/tss-lib.", "affected": [ { "package": { "name": "github.com/bnb-chain/tss-lib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.3.6-0.20230324145555-bb6fb30bd3eb" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/bnb-chain/tss-lib/common" } ] } }, { "package": { "name": "github.com/binance-chain/tss-lib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/binance-chain/tss-lib/common" } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://medium.com/@iofinnet/security-disclosure-for-ecdsa-and-eddsa-threshold-signature-schemes-4e969af7155b" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-1732", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2777.json
{ "schema_version": "1.3.1", "id": "GO-2024-2777", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2022-3798", "GHSA-mgqh-3qm7-gx82" ], "summary": "IBAX go-ibax vulnerable to SQL injection in github.com/IBAX-io/go-ibax", "details": "IBAX go-ibax vulnerable to SQL injection in github.com/IBAX-io/go-ibax", "affected": [ { "package": { "name": "github.com/IBAX-io/go-ibax", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.4.2" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-mgqh-3qm7-gx82" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3798" }, { "type": "FIX", "url": "https://github.com/IBAX-io/go-ibax/commit/b0183d8e550836dc50282ee74ff421ee41b25a37" }, { "type": "REPORT", "url": "https://github.com/IBAX-io/go-ibax/issues/2060" }, { "type": "WEB", "url": "https://vuldb.com/?id.212634" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2777", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2885.json
{ "schema_version": "1.3.1", "id": "GO-2024-2885", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-35238", "GHSA-8fmj-33gw-g7pw" ], "summary": "Denial of service of Minder Server from maliciously crafted GitHub attestations in github.com/stacklok/minder", "details": "Denial of service of Minder Server from maliciously crafted GitHub attestations in github.com/stacklok/minder", "affected": [ { "package": { "name": "github.com/stacklok/minder", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.0.51" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/stacklok/minder/security/advisories/GHSA-8fmj-33gw-g7pw" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-35238" }, { "type": "FIX", "url": "https://github.com/stacklok/minder/commit/fe321d345b4f738de6a06b13207addc72b59f892" }, { "type": "WEB", "url": "https://github.com/stacklok/minder/blob/daccbc12e364e2d407d56b87a13f7bb24cbdb074/internal/verifier/sigstore/container/container.go#L271-L300" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2885", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-1071.json
{ "schema_version": "1.3.1", "id": "GO-2022-1071", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2022-39272", "GHSA-f4p5-x4vc-mh4v" ], "summary": "Denial of service in flux controllers in github.com/fluxcd modules", "details": "Flux controllers are vulnerable to a denial of service attack.\n\nUsers that have permissions to change Flux's objects, either through a Flux source or directly within a cluster, can provide invalid data to fields .spec.interval or .spec.timeout (and structured variations of these fields), causing the entire object type to stop being processed.\n\nThe issue has two root causes: a) the Kubernetes type metav1.Duration is not fully compatible with the Go type time.Duration as explained in https://github.com/kubernetes/apimachinery/issues/131, and b) a lack of validation within Flux to restrict allowed values.", "affected": [ { "package": { "name": "github.com/fluxcd/helm-controller/api", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.26.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/fluxcd/helm-controller/api/v2beta1" } ] } }, { "package": { "name": "github.com/fluxcd/image-automation-controller/api", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.26.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/fluxcd/image-automation-controller/api/v1beta1" } ] } }, { "package": { "name": "github.com/fluxcd/image-reflector-controller/api", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.22.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/fluxcd/image-reflector-controller/api/v1beta1" } ] } }, { "package": { "name": "github.com/fluxcd/kustomize-controller/api", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.30.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/fluxcd/kustomize-controller/api/v1beta2" } ] } }, { "package": { "name": "github.com/fluxcd/notification-controller/api", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.28.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/fluxcd/notification-controller/api/v1beta1" } ] } }, { "package": { "name": "github.com/fluxcd/source-controller/api", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.30.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/fluxcd/source-controller/api/v1beta2" } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-f4p5-x4vc-mh4v" }, { "type": "FIX", "url": "https://github.com/fluxcd/helm-controller/pull/533" }, { "type": "FIX", "url": "https://github.com/fluxcd/image-automation-controller/pull/439" }, { "type": "FIX", "url": "https://github.com/fluxcd/image-reflector-controller/pull/314" }, { "type": "FIX", "url": "https://github.com/fluxcd/kustomize-controller/pull/731" }, { "type": "FIX", "url": "https://github.com/fluxcd/notification-controller/pull/420" }, { "type": "FIX", "url": "https://github.com/fluxcd/source-controller/pull/903" }, { "type": "WEB", "url": "https://github.com/kubernetes/apimachinery#131" } ], "credits": [ { "name": "Alexander Block (@codablock)" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-1071", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2020-0048.json
{ "schema_version": "1.3.1", "id": "GO-2020-0048", "modified": "0001-01-01T00:00:00Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2020-25614", "GHSA-93m7-c69f-5cfj" ], "summary": "Denial of service in github.com/antchfx/xmlquery", "details": "LoadURL does not check the Content-Type of loaded resources, which can cause a panic due to nil pointer deference if the loaded resource is not XML. If user supplied URLs are loaded, this may be used as a denial of service vector.", "affected": [ { "package": { "name": "github.com/antchfx/xmlquery", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.3.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/antchfx/xmlquery", "symbols": [ "LoadURL" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/antchfx/xmlquery/commit/5648b2f39e8d5d3fc903c45a4f1274829df71821" }, { "type": "WEB", "url": "https://github.com/antchfx/xmlquery/issues/39" } ], "credits": [ { "name": "@dwisiswant0" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2020-0048", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0253.json
{ "schema_version": "1.3.1", "id": "GO-2022-0253", "modified": "0001-01-01T00:00:00Z", "published": "2022-07-15T23:07:48Z", "aliases": [ "CVE-2021-3912", "GHSA-g9wh-3vrx-r7hg" ], "summary": "Resource exhaustion via GZIP bomb in github.com/cloudflare/cfrpki", "details": "The HTTPFetcher.GetXML function reads a response of unlimited size into memory, permitting resource exhaustion.", "affected": [ { "package": { "name": "github.com/cloudflare/cfrpki", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.4.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/cloudflare/cfrpki/sync/lib", "symbols": [ "HTTPFetcher.GetXML" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/cloudflare/cfrpki/commit/648658b1b176a747b52645989cfddc73a81eacad" } ], "credits": [ { "name": "Koen van Hove" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0253", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2566.json
{ "schema_version": "1.3.1", "id": "GO-2024-2566", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-24776", "GHSA-r833-w756-h5p2" ], "summary": "Mattermost fails to check the required permissions in github.com/mattermost/mattermost-server", "details": "Mattermost fails to check the required permissions in github.com/mattermost/mattermost-server.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/mattermost/mattermost/server/v8 before v8.1.8.", "affected": [ { "package": { "name": "github.com/mattermost/mattermost-server", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "9.0.0+incompatible" }, { "fixed": "9.3.0+incompatible" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/mattermost/mattermost-server/v5", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/mattermost/mattermost-server/v6", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/mattermost/mattermost/server/v8", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "8.1.8" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-r833-w756-h5p2" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-24776" }, { "type": "WEB", "url": "https://mattermost.com/security-updates" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2566", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1611.json
{ "schema_version": "1.3.1", "id": "GO-2023-1611", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-27475", "GHSA-fx2v-qfhr-4chv" ], "summary": "Path traversal in github.com/gookit/goutil", "details": "fsutil.Unzip is vulnerable to path traversal attacks due to improper validation of paths.", "affected": [ { "package": { "name": "github.com/gookit/goutil", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.6.7" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/gookit/goutil/fsutil", "symbols": [ "Unzip" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/gookit/goutil/security/advisories/GHSA-fx2v-qfhr-4chv" }, { "type": "FIX", "url": "https://github.com/gookit/goutil/commit/d7b94fede71f018f129f7d21feb58c895d28dadc" } ], "credits": [ { "name": "@cokeBeer" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-1611", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2974.json
{ "schema_version": "1.3.1", "id": "GO-2024-2974", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-39696" ], "summary": "Evmos vulnerable to exploit of smart contract account and vesting in github.com/evmos/evmos", "details": "Evmos vulnerable to exploit of smart contract account and vesting in github.com/evmos/evmos.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/evmos/evmos before v19.0.0.", "affected": [ { "package": { "name": "github.com/evmos/evmos", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "19.0.0" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-39696" }, { "type": "FIX", "url": "https://github.com/evmos/evmos/commit/0a620e176617a835ac697eea494afea09185dfaf" }, { "type": "WEB", "url": "https://github.com/evmos/evmos/security/advisories/GHSA-q6hg-6m9x-5g9c" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2974", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-1159.json
{ "schema_version": "1.3.1", "id": "GO-2022-1159", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2022-4123", "GHSA-rprg-4v7q-87v7" ], "summary": "Path traversal in github.com/containers/podman/v4", "details": "The local path and the lowest subdirectory may be disclosed due to incorrect absolute path traversal, resulting in an impact to confidentiality.", "affected": [ { "package": { "name": "github.com/containers/podman/v4", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "4.1.0-rc1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/containers/podman/v4/pkg/bindings/images", "symbols": [ "Build", "nTar" ] } ] } } ], "references": [ { "type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2144989" }, { "type": "WEB", "url": "https://github.com/containers/podman/pull/13531" } ], "credits": [ { "name": "Sage McTaggart" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-1159", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2912.json
{ "schema_version": "1.3.1", "id": "GO-2024-2912", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2021-41092", "GHSA-99pg-grm5-qq3v" ], "summary": "Docker CLI leaks private registry credentials to registry-1.docker.io in github.com/docker/cli", "details": "Docker CLI leaks private registry credentials to registry-1.docker.io in github.com/docker/cli", "affected": [ { "package": { "name": "github.com/docker/cli", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "20.10.9+incompatible" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/docker/cli/cli/command", "symbols": [ "GetDefaultAuthConfig", "RegistryAuthenticationPrivilegedFunc" ] }, { "path": "github.com/docker/cli/cli/command/registry", "symbols": [ "runLogin" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/docker/cli/security/advisories/GHSA-99pg-grm5-qq3v" }, { "type": "FIX", "url": "https://github.com/docker/cli/commit/893e52cf4ba4b048d72e99748e0f86b2767c6c6b" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2912", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2931.json
{ "schema_version": "1.3.1", "id": "GO-2024-2931", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-22650", "GHSA-9ghh-mmcq-8phc" ], "summary": "Rancher does not automatically clean up a user deleted or disabled from the configured Authentication Provider in github.com/rancher/rancher", "details": "Rancher does not automatically clean up a user deleted or disabled from the configured Authentication Provider in github.com/rancher/rancher.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/rancher/rancher from v2.7.0 before v2.7.14, from v2.8.0 before v2.8.5.", "affected": [ { "package": { "name": "github.com/rancher/rancher", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "2.7.0" }, { "fixed": "2.7.14" }, { "introduced": "2.8.0" }, { "fixed": "2.8.5" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/rancher/rancher/security/advisories/GHSA-9ghh-mmcq-8phc" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2931", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0706.json
{ "schema_version": "1.3.1", "id": "GO-2022-0706", "modified": "0001-01-01T00:00:00Z", "published": "2021-05-18T18:34:18Z", "aliases": [ "CVE-2021-22133", "GHSA-qqc5-rgcc-cjqh" ], "summary": "Information disclosure in go.elastic.co/apm", "details": "Sensitive HTTP headers may not be properly sanitized before being sent to the APM server if the program panics.", "affected": [ { "package": { "name": "go.elastic.co/apm", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.11.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "go.elastic.co/apm", "symbols": [ "NewTracer", "NewTracerOptions", "modelWriter.buildModelTransaction" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/elastic/apm-agent-go/pull/888" }, { "type": "FIX", "url": "https://github.com/elastic/apm-agent-go/commit/dd3e8c593580e7b80a98b57e1cc6e017e56747b4" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0706", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1549.json
{ "schema_version": "1.3.1", "id": "GO-2023-1549", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-0229", "GHSA-5465-xc2j-6p84" ], "summary": "Improper input validation in github.com/openshift/apiserver-library-go", "details": "Low-privileged users can set the seccomp profile for pods they control to \"unconfined.\"\n\nBy default, the seccomp profile used in the restricted-v2 Security Context Constraint (SCC) is \"runtime/default,\" allowing users to disable seccomp for pods they can create and modify.", "affected": [ { "package": { "name": "github.com/openshift/apiserver-library-go", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.0.0-20230119093715-30f75d79e424" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/openshift/apiserver-library-go/pkg/securitycontextconstraints/seccomp", "symbols": [ "strategy.ValidateContainer", "strategy.ValidatePod", "strategy.validateProfile" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-5465-xc2j-6p84" }, { "type": "FIX", "url": "https://github.com/openshift/apiserver-library-go/pull/97" }, { "type": "FIX", "url": "https://github.com/openshift/apiserver-library-go/commit/30f75d79e424ca462c6de53ee8b93f91183763e6" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-1549", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0411.json
{ "schema_version": "1.3.1", "id": "GO-2022-0411", "modified": "0001-01-01T00:00:00Z", "published": "2022-07-01T20:08:24Z", "aliases": [ "CVE-2021-4238", "GHSA-3839-6r69-m497", "GHSA-xg2h-wx96-xgxr" ], "summary": "Insufficient randomness in github.com/Masterminds/goutils", "details": "Randomly-generated alphanumeric strings contain significantly less entropy than expected.\n\nThe RandomAlphaNumeric and CryptoRandomAlphaNumeric functions always return strings containing at least one digit from 0 to 9. This significantly reduces the amount of entropy in short strings generated by these functions.", "affected": [ { "package": { "name": "github.com/Masterminds/goutils", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.1.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/Masterminds/goutils", "symbols": [ "CryptoRandomAlphaNumeric", "RandomAlphaNumeric" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/Masterminds/goutils/commit/869801f20f9f1e7ecdbdb6422049d8241270d5e1" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0411", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0574.json
{ "schema_version": "1.3.1", "id": "GO-2022-0574", "modified": "0001-01-01T00:00:00Z", "published": "2022-07-01T00:01:03Z", "aliases": [ "CVE-2022-33082", "GHSA-2m4x-4q9j-w97g" ], "summary": "Denial of service in github.com/open-policy-agent/opa", "details": "An issue in the AST parser of Open Policy Agent makes it possible for attackers to cause a Denial of Service attack from a crafted input.", "affected": [ { "package": { "name": "github.com/open-policy-agent/opa", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.42.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/open-policy-agent/opa/ast", "symbols": [ "Args.Copy", "Args.Vars", "Array.Copy", "Array.Foreach", "Array.Iter", "Array.Until", "ArrayComprehension.Copy", "BeforeAfterVisitor.Walk", "Body.Copy", "Body.Vars", "Call.Copy", "CompileModules", "CompileModulesWithOpt", "Compiler.Compile", "Compiler.GetRulesDynamic", "Compiler.GetRulesDynamicWithOpts", "Compiler.PassesTypeCheck", "ContainsClosures", "ContainsComprehensions", "ContainsRefs", "Copy", "Every.Copy", "Every.KeyValueVars", "Expr.Copy", "Expr.CopyWithoutTerms", "Expr.Vars", "GenericTransformer.Transform", "GenericVisitor.Walk", "Head.Copy", "Head.Vars", "Import.Copy", "IsConstant", "JSON", "JSONWithOpt", "Module.Copy", "Module.UnmarshalJSON", "MustCompileModules", "MustCompileModulesWithOpts", "MustJSON", "MustParseBody", "MustParseBodyWithOpts", "MustParseExpr", "MustParseImports", "MustParseModule", "MustParseModuleWithOpts", "MustParsePackage", "MustParseRef", "MustParseRule", "MustParseStatement", "MustParseStatements", "MustParseTerm", "NewGraph", "ObjectComprehension.Copy", "OutputVarsFromBody", "OutputVarsFromExpr", "Package.Copy", "ParseBody", "ParseBodyWithOpts", "ParseExpr", "ParseImports", "ParseModule", "ParseModuleWithOpts", "ParsePackage", "ParseRef", "ParseRule", "ParseStatement", "ParseStatements", "ParseStatementsWithOpts", "ParseTerm", "Parser.Parse", "Pretty", "QueryContext.Copy", "Ref.ConstantPrefix", "Ref.Copy", "Ref.Dynamic", "Ref.Extend", "Ref.OutputVars", "Rule.Copy", "SetComprehension.Copy", "SomeDecl.Copy", "Term.Copy", "Term.Vars", "Transform", "TransformComprehensions", "TransformRefs", "TransformVars", "TreeNode.DepthFirst", "TypeEnv.Get", "Unify", "ValueMap.Copy", "ValueMap.Equal", "ValueMap.Hash", "ValueMap.Iter", "ValueMap.MarshalJSON", "ValueMap.String", "ValueToInterface", "VarVisitor.Walk", "Walk", "WalkBeforeAndAfter", "WalkBodies", "WalkClosures", "WalkExprs", "WalkNodes", "WalkRefs", "WalkRules", "WalkTerms", "WalkVars", "WalkWiths", "With.Copy", "baseDocEqIndex.AllRules", "baseDocEqIndex.Build", "baseDocEqIndex.Lookup", "bodySafetyTransformer.Visit", "comprehensionIndexNestedCandidateVisitor.Walk", "comprehensionIndexRegressionCheckVisitor.Walk", "metadataParser.Parse", "object.Copy", "object.Diff", "object.Filter", "object.Foreach", "object.Intersect", "object.Iter", "object.Map", "object.Merge", "object.MergeWith", "object.Until", "queryCompiler.Compile", "refChecker.Visit", "refindices.Sorted", "refindices.Update", "rewriteDeclaredVarsInTerm", "rewriteNestedHeadVarLocalTransform.Visit", "ruleArgLocalRewriter.Visit", "ruleWalker.Do", "set.Copy", "set.Diff", "set.Foreach", "set.Intersect", "set.Iter", "set.Map", "set.Reduce", "set.Union", "set.Until", "trieNode.Do", "trieNode.Traverse", "trieTraversalResult.Add", "typeChecker.CheckBody", "typeChecker.CheckTypes" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/open-policy-agent/opa/pull/4701" }, { "type": "FIX", "url": "https://github.com/open-policy-agent/opa/commit/064f6168a8dfebdeb2ea147f7882bb9f5d2b7f67" }, { "type": "WEB", "url": "https://github.com/open-policy-agent/opa/issues/4762" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0574", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2789.json
{ "schema_version": "1.3.1", "id": "GO-2024-2789", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-1139", "GHSA-x5m7-63c6-fx79" ], "summary": "Cluster Monitoring Operator contains a credentials leak in github.com/openshift/cluster-monitoring-operator", "details": "Cluster Monitoring Operator contains a credentials leak in github.com/openshift/cluster-monitoring-operator", "affected": [ { "package": { "name": "github.com/openshift/cluster-monitoring-operator", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-x5m7-63c6-fx79" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-1139" }, { "type": "FIX", "url": "https://github.com/openshift/cluster-monitoring-operator/commit/1cfbe9ffafe1e43f8f87a451b72fddf5d76fa4e3" }, { "type": "FIX", "url": "https://github.com/openshift/cluster-monitoring-operator/pull/1747" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2024:1887" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2024:1891" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2024:2047" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2024:2782" }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2024-1139" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2262158" }, { "type": "WEB", "url": "https://github.com/openshift/cluster-monitoring-operator/blob/d45a3335c2bbada0948adef9fcba55c4e14fa1d7/pkg/manifests/manifests.go#L3135" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2789", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2706.json
{ "schema_version": "1.3.1", "id": "GO-2024-2706", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-29221", "GHSA-w67v-ph4x-f48q" ], "summary": "Mattermost Server Improper Access Control in github.com/mattermost/mattermost-server", "details": "Mattermost Server Improper Access Control in github.com/mattermost/mattermost-server.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/mattermost/mattermost/server/v8 from v8.1.0 before v8.1.11.", "affected": [ { "package": { "name": "github.com/mattermost/mattermost-server", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "9.3.0+incompatible" }, { "fixed": "9.3.3+incompatible" }, { "introduced": "9.4.0+incompatible" }, { "fixed": "9.4.4+incompatible" }, { "introduced": "9.5.0+incompatible" }, { "fixed": "9.5.2+incompatible" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/mattermost/mattermost-server/v5", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/mattermost/mattermost-server/v6", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/mattermost/mattermost/server/v8", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "8.1.0" }, { "fixed": "8.1.11" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-w67v-ph4x-f48q" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-29221" }, { "type": "WEB", "url": "https://github.com/mattermost/mattermost/commit/0dc03fbc6e3c9afb14137e72ab3fa6f5a0125b9c" }, { "type": "WEB", "url": "https://github.com/mattermost/mattermost/commit/5cce9fed7363386afebd81a58fb5fab7d2729c8f" }, { "type": "WEB", "url": "https://github.com/mattermost/mattermost/commit/a5784f34ba6592c6454b8742f24af9d06279e347" }, { "type": "WEB", "url": "https://github.com/mattermost/mattermost/commit/dd3fe2991a70a41790d6bef5d31afc5957525f3c" }, { "type": "WEB", "url": "https://mattermost.com/security-updates" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2706", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2737.json
{ "schema_version": "1.3.1", "id": "GO-2024-2737", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-32473", "GHSA-x84c-p2g9-rqv9" ], "summary": "IPv6 enabled on IPv4-only network interfaces in github.com/docker/docker", "details": "IPv6 enabled on IPv4-only network interfaces in github.com/docker/docker", "affected": [ { "package": { "name": "github.com/docker/docker", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "26.0.0+incompatible" }, { "fixed": "26.0.2+incompatible" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/moby/moby/security/advisories/GHSA-x84c-p2g9-rqv9" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-32473" }, { "type": "WEB", "url": "https://github.com/moby/moby/commit/7cef0d9cd1cf221d8c0b7b7aeda69552649e0642" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2737", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0391.json
{ "schema_version": "1.3.1", "id": "GO-2022-0391", "modified": "0001-01-01T00:00:00Z", "published": "2022-07-01T20:10:56Z", "aliases": [ "CVE-2022-2582", "GHSA-6jvc-q2x7-pchv", "GHSA-76wf-9vgp-pj7w" ], "summary": "Exposure of unencrypted plaintext hash in github.com/aws/aws-sdk-go", "details": "The AWS S3 Crypto SDK sends an unencrypted hash of the plaintext alongside the ciphertext as a metadata field. This hash can be used to brute force the plaintext, if the hash is readable to the attacker.\n\nAWS now blocks this metadata field, but older SDK versions still send it.", "affected": [ { "package": { "name": "github.com/aws/aws-sdk-go", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.34.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/aws/aws-sdk-go/service/s3/s3crypto", "symbols": [ "DecryptionClient.GetObject", "DecryptionClient.GetObjectWithContext", "EncryptionClient.PutObject", "EncryptionClient.PutObjectWithContext", "S3LoadStrategy.Load", "S3SaveStrategy.Save", "defaultV2LoadStrategy.Load", "encodeMeta", "kmsKeyHandler.DecryptKey", "kmsKeyHandler.DecryptKeyWithContext", "kmsKeyHandler.GenerateCipherData", "kmsKeyHandler.GenerateCipherDataWithContext" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/aws/aws-sdk-go/commit/35fa6ddf45c061e0f08d3a3b5119f8f4da38f6d1" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0391", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2618.json
{ "schema_version": "1.3.1", "id": "GO-2024-2618", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-28110", "GHSA-5pf6-2qwx-pxm2" ], "summary": "Authentication token leak in github.com/cloudevents/sdk-go/v2", "details": "Using cloudevents.WithRoundTripper to create a cloudevents.Client with an authenticated http.RoundTripper causes the go-sdk to leak credentials to arbitrary endpoints. When the transport is populated with an authenticated transport, http.DefaultClient is modified with the authenticated transport and will start to send Authorization tokens to any endpoint it is used to contact.", "affected": [ { "package": { "name": "github.com/cloudevents/sdk-go/v2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "2.15.2" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/cloudevents/sdk-go/v2/protocol/http", "symbols": [ "New" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/cloudevents/sdk-go/security/advisories/GHSA-5pf6-2qwx-pxm2" }, { "type": "FIX", "url": "https://github.com/cloudevents/sdk-go/commit/de2f28370b0d2a0f64f92c0c6139fa4b8a7c3851" }, { "type": "WEB", "url": "https://github.com/cloudevents/sdk-go/blob/67e389964131d55d65cd14b4eb32d57a47312695/v2/protocol/http/protocol.go#L104-L110" } ], "credits": [ { "name": "mattmoor" }, { "name": "tcnghia" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2618", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0191.json
{ "schema_version": "1.3.1", "id": "GO-2022-0191", "modified": "0001-01-01T00:00:00Z", "published": "2022-07-15T23:03:26Z", "aliases": [ "CVE-2018-16875" ], "summary": "Denial of service in chain verification in crypto/x509", "details": "The crypto/x509 package does not limit the amount of work performed for each chain verification, which might allow attackers to craft pathological inputs leading to a CPU denial of service. Go TLS servers accepting client certificates and TLS clients verifying certificates are affected.", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.10.6" }, { "introduced": "1.11.0-0" }, { "fixed": "1.11.3" } ] } ], "ecosystem_specific": { "imports": [ { "path": "crypto/x509", "symbols": [ "CertPool.findVerifiedParents", "Certificate.buildChains" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/154105" }, { "type": "FIX", "url": "https://go.googlesource.com/go/+/770130659b6fb2acf271476579a3644e093dda7f" }, { "type": "REPORT", "url": "https://go.dev/issue/29233" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/Kw31K8G7Fi0" } ], "credits": [ { "name": "Netflix" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0191", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2671.json
{ "schema_version": "1.3.1", "id": "GO-2024-2671", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-3300", "GHSA-v5fm-hr72-27hx" ], "summary": "CSI plugin names disclosure in github.com/hashicorp/nomad", "details": "A vulnerability was identified in Nomad such that the search HTTP API can reveal names of available CSI plugins to unauthenticated users or users without the plugin:read policy. This vulnerability affects Nomad since 0.11.0 and was fixed in 1.4.11 and 1.5.7.", "affected": [ { "package": { "name": "github.com/hashicorp/nomad", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0.11.0" }, { "fixed": "1.4.11" }, { "introduced": "1.5.0" }, { "fixed": "1.5.7" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/hashicorp/nomad/acl", "symbols": [ "ACL.AllowVariableSearch" ] }, { "path": "github.com/hashicorp/nomad/nomad", "symbols": [ "ACL.GetPolicies", "ACL.GetPolicy", "ACL.GetRoleByID", "ACL.GetRoleByName", "ACL.GetRolesByID", "ACL.GetToken", "ACL.GetTokens", "ACL.ListPolicies", "ACL.ListRoles", "ACL.ListTokens", "Alloc.GetAlloc", "Alloc.GetAllocs", "Alloc.GetServiceRegistrations", "Alloc.List", "CSIPlugin.Get", "CSIPlugin.List", "CSIVolume.Get", "CSIVolume.List", "Deployment.Allocations", "Deployment.GetDeployment", "Deployment.List", "Eval.Allocations", "Eval.Count", "Eval.GetEval", "Eval.List", "Job.Allocations", "Job.Deployments", "Job.Dispatch", "Job.Evaluations", "Job.GetJob", "Job.GetJobVersions", "Job.GetServiceRegistrations", "Job.LatestDeployment", "Job.List", "Job.Plan", "Job.ScaleStatus", "Job.Summary", "Keyring.Get", "Keyring.List", "Namespace.GetNamespace", "Namespace.GetNamespaces", "Namespace.ListNamespaces", "NewServer", "NewWorker", "Node.GetAllocs", "Node.GetClientAllocs", "Node.GetNode", "Node.List", "PeriodicDispatch.SetEnabled", "Scaling.GetPolicy", "Scaling.ListPolicies", "Search.FuzzySearch", "Search.PrefixSearch", "Server.Reload", "Server.RunningChildren", "Server.SetSchedulerWorkerConfig", "ServiceRegistration.GetService", "ServiceRegistration.List", "TestACLServer", "TestServer", "TestServerErr", "Variables.List", "Variables.Read", "Worker.Start", "filteredSearchContexts", "getEnterpriseFuzzyResourceIter", "nomadFSM.Apply", "nomadFSM.Restore", "nomadFSM.RestoreWithFilter", "sufficientSearchPerms" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/hashicorp/nomad/commit/a8789d3872bbf1b1f420f28b0f7ad8532a41d5e3" }, { "type": "WEB", "url": "https://discuss.hashicorp.com/t/hcsec-2023-22-nomad-search-api-leaks-information-about-csi-plugins/56272" } ], "credits": [ { "name": "anonymous4ACL24" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2671", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0212.json
{ "schema_version": "1.3.1", "id": "GO-2022-0212", "modified": "0001-01-01T00:00:00Z", "published": "2022-05-23T22:46:20Z", "aliases": [ "CVE-2019-16276" ], "summary": "Request smuggling due to accepting invalid headers in net/http via net/textproto", "details": "net/http (through net/textproto) used to accept and normalize invalid HTTP/1.1 headers with a space before the colon, in violation of RFC 7230.\n\nIf a Go server is used behind an uncommon reverse proxy that accepts and forwards but doesn't normalize such invalid headers, the reverse proxy and the server can interpret the headers differently. This can lead to filter bypasses or request smuggling, the latter if requests from separate clients are multiplexed onto the same upstream connection by the proxy. Such invalid headers are now rejected by Go servers, and passed without normalization to Go client applications.", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.12.10" }, { "introduced": "1.13.0-0" }, { "fixed": "1.13.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "net/textproto", "symbols": [ "Reader.ReadMimeHeader" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/197503" }, { "type": "FIX", "url": "https://go.googlesource.com/go/+/41b1f88efab9d263408448bf139659119002ea50" }, { "type": "REPORT", "url": "https://go.dev/issue/34540" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/cszieYyuL9Q/m/g4Z7pKaqAgAJ" } ], "credits": [ { "name": "Andrew Stucki (99designs.com)" }, { "name": "Adam Scarr (99designs.com)" }, { "name": "Jan Masarik (masarik.sh)" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0212", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-1213.json
{ "schema_version": "1.3.1", "id": "GO-2022-1213", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2018-25060", "GHSA-hhxg-px5h-jc32" ], "summary": "Insecure generation of cookies in github.com/go-macaron/csrf", "details": "The Options.Secure value is ignored, and cookies created by Generate never have the secure attribute.", "affected": [ { "package": { "name": "github.com/go-macaron/csrf", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.0.0-20180426211050-dadd1711a617" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/go-macaron/csrf", "symbols": [ "Generate" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/go-macaron/csrf/pull/7" }, { "type": "FIX", "url": "https://github.com/go-macaron/csrf/commit/dadd1711a617000b70e5e408a76531b73187031c" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-1213", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2567.json
{ "schema_version": "1.3.1", "id": "GO-2024-2567", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "GHSA-fqpg-rq76-99pq" ], "summary": "Panic in Pipeline when PgConn is busy or closed in github.com/jackc/pgx", "details": "Pipeline can panic when PgConn is busy or closed.", "affected": [ { "package": { "name": "github.com/jackc/pgx/v5", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "5.0.0-alpha.5" }, { "fixed": "5.5.2" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/jackc/pgx/v5/pgconn", "symbols": [ "Pipeline.Sync" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/jackc/pgx/commit/dfd198003a03dbb96e4607b0d3a0bb9a7398ccb7" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2567", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0564.json
{ "schema_version": "1.3.1", "id": "GO-2022-0564", "modified": "0001-01-01T00:00:00Z", "published": "2022-08-15T18:02:15Z", "aliases": [ "CVE-2022-31053", "GHSA-75rw-34q6-72cr" ], "summary": "Signature forgery in github.com/biscuit-auth/biscuit-go", "details": "An attacker can forge Biscuit v1 tokens with any access level.\n\nThere is no known workaround for Biscuit v1. The Biscuit v2 specification avoids this vulnerability.", "affected": [ { "package": { "name": "github.com/biscuit-auth/biscuit-go", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/biscuit-auth/biscuit-go" } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-75rw-34q6-72cr" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0564", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2842.json
{ "schema_version": "1.3.1", "id": "GO-2024-2842", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-3727", "GHSA-6wvf-f2vw-3425" ], "summary": "Unexpected authenticated registry accesses in github.com/containers/image/v5", "details": "An attacker may trigger unexpected authenticated registry accesses on behalf of a victim user, causing resource exhaustion, local path traversal, and other attacks.", "affected": [ { "package": { "name": "github.com/containers/image/v5", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "5.30.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/containers/image/v5/copy", "symbols": [ "Image", "copier.createProgressBar", "imageCopier.copyConfig", "imageCopier.copyLayer" ] }, { "path": "github.com/containers/image/v5/directory", "symbols": [ "dirImageDestination.PutBlobWithOptions", "dirImageDestination.PutManifest", "dirImageDestination.PutSignaturesWithFormat", "dirImageDestination.TryReusingBlobWithOptions", "dirImageSource.GetBlob", "dirImageSource.GetManifest", "dirImageSource.GetSignaturesWithFormat", "dirReference.NewImage" ] }, { "path": "github.com/containers/image/v5/docker", "symbols": [ "GetRepositoryTags", "Image.GetRepositoryTags", "deleteImage", "dockerClient.fetchManifest", "dockerClient.getBlob", "dockerClient.getExtensionsSignatures", "dockerClient.getSigstoreAttachmentManifest", "dockerImageDestination.PutBlobWithOptions", "dockerImageDestination.PutManifest", "dockerImageDestination.PutSignaturesWithFormat", "dockerImageDestination.TryReusingBlobWithOptions", "dockerImageDestination.blobExists", "dockerImageDestination.putSignaturesToLookaside", "dockerImageDestination.putSignaturesToSigstoreAttachments", "dockerImageSource.GetBlob", "dockerImageSource.GetBlobAt", "dockerImageSource.GetManifest", "dockerImageSource.GetSignaturesWithFormat", "dockerImageSource.getSignaturesFromLookaside", "dockerReference.DeleteImage", "dockerReference.NewImage", "dockerReference.NewImageSource", "lookasideStorageURL", "sigstoreAttachmentTag" ] }, { "path": "github.com/containers/image/v5/docker/internal/tarfile", "symbols": [ "Destination.PutBlobWithOptions", "Destination.PutManifest", "Writer.configPath", "Writer.ensureManifestItemLocked", "Writer.ensureSingleLegacyLayerLocked", "Writer.physicalLayerPath", "Writer.writeLegacyMetadataLocked" ] }, { "path": "github.com/containers/image/v5/openshift", "symbols": [ "openshiftImageDestination.PutBlobWithOptions", "openshiftImageDestination.PutManifest", "openshiftImageDestination.TryReusingBlobWithOptions", "openshiftImageSource.GetBlob", "openshiftImageSource.GetManifest", "openshiftImageSource.GetSignaturesWithFormat", "openshiftReference.NewImage" ] }, { "path": "github.com/containers/image/v5/ostree", "symbols": [ "ostreeImageDestination.Commit", "ostreeImageDestination.TryReusingBlobWithOptions", "ostreeImageSource.GetBlob" ] }, { "path": "github.com/containers/image/v5/pkg/blobcache", "symbols": [ "BlobCache.HasBlob", "BlobCache.NewImage", "BlobCache.blobPath", "BlobCache.findBlob", "blobCacheDestination.PutBlobWithOptions", "blobCacheDestination.PutManifest", "blobCacheDestination.TryReusingBlobWithOptions", "blobCacheDestination.saveStream", "blobCacheSource.GetBlob", "blobCacheSource.GetBlobAt", "blobCacheSource.GetManifest", "blobCacheSource.LayerInfosForCopy" ] }, { "path": "github.com/containers/image/v5/storage", "symbols": [ "ResolveReference", "manifestBigDataKey", "signatureBigDataKey", "storageImageDestination.Commit", "storageImageDestination.PutBlobWithOptions", "storageImageDestination.TryReusingBlobWithOptions", "storageImageDestination.tryReusingBlobAsPending", "storageImageSource.GetManifest", "storageImageSource.GetSignaturesWithFormat", "storageImageSource.LayerInfosForCopy", "storageReference.DeleteImage", "storageReference.NewImage", "storageReference.NewImageSource", "storageTransport.GetImage", "storageTransport.GetStoreImage" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-6wvf-f2vw-3425" }, { "type": "FIX", "url": "https://github.com/containers/image/commit/132678b47bae29c710589012668cb85859d88385" }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2024-3727" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2274767" }, { "type": "WEB", "url": "https://github.com/containers/image/releases/tag/v5.30.1" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2842", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0402.json
{ "schema_version": "1.3.1", "id": "GO-2022-0402", "modified": "0001-01-01T00:00:00Z", "published": "2022-07-01T20:10:43Z", "aliases": [ "CVE-2020-26521", "GHSA-h2fg-54x9-5qhq", "GHSA-hmm9-r2m2-qg9w" ], "summary": "Panic in NATS JWT decoding in github.com/nats-io/jwt", "details": "A malicious account can create and sign a User JWT which causes a panic when decoded by the NATS JWT library.", "affected": [ { "package": { "name": "github.com/nats-io/jwt", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.1.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/nats-io/jwt", "symbols": [ "Account.Validate", "AccountClaims.Validate", "Export.Validate", "Exports.Validate", "Import.Validate", "Imports.Validate" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/nats-io/jwt/pull/107" }, { "type": "WEB", "url": "https://advisories.nats.io/CVE/CVE-2020-26521.txt" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0402", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0105.json
{ "schema_version": "1.3.1", "id": "GO-2021-0105", "modified": "0001-01-01T00:00:00Z", "published": "2021-07-28T18:08:05Z", "aliases": [ "CVE-2020-26265", "GHSA-xw37-57qp-9mm4" ], "summary": "Consensus flaw in github.com/ethereum/go-ethereum", "details": "Due to an incorrect state calculation, a specific set of transactions could cause a consensus disagreement, causing users of this package to reject a canonical chain.", "affected": [ { "package": { "name": "github.com/ethereum/go-ethereum", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "1.9.4" }, { "fixed": "1.9.20" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/ethereum/go-ethereum/core/state", "symbols": [ "StateDB.AddBalance", "StateDB.CreateAccount", "StateDB.GetOrNewStateObject", "StateDB.SetBalance", "StateDB.SetCode", "StateDB.SetNonce", "StateDB.SetState", "StateDB.SetStorage", "StateDB.SubBalance", "StateDB.createObject" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/ethereum/go-ethereum/pull/21080" }, { "type": "FIX", "url": "https://github.com/ethereum/go-ethereum/commit/87c0ba92136a75db0ab2aba1046d4a9860375d6a" } ], "credits": [ { "name": "John Youngseok Yang (Software Platform Lab)" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0105", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0236.json
{ "schema_version": "1.3.1", "id": "GO-2022-0236", "modified": "0001-01-01T00:00:00Z", "published": "2022-07-15T23:04:18Z", "aliases": [ "CVE-2021-31525", "GHSA-h86h-8ppg-mxmh" ], "summary": "Panic due to large headers in net/http and golang.org/x/net/http/httpguts", "details": "A malicious HTTP server or client can cause the net/http client or server to panic.\n\nReadRequest and ReadResponse can hit an unrecoverable panic when reading a very large header (over 7MB on 64-bit architectures, or over 4MB on 32-bit ones). Transport and Client are vulnerable and the program can be made to crash by a malicious server. Server is not vulnerable by default, but can be if the default max header of 1MB is overridden by setting Server.MaxHeaderBytes to a higher value, in which case the program can be made to crash by a malicious client.\n\nThis also affects golang.org/x/net/http2/h2c and HeaderValuesContainsToken in golang.org/x/net/http/httpguts.", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.15.12" }, { "introduced": "1.16.0-0" }, { "fixed": "1.16.4" } ] } ], "ecosystem_specific": { "imports": [ { "path": "net/http", "symbols": [ "http2clientStream.writeRequest", "http2isConnectionCloseRequest", "isProtocolSwitchHeader", "shouldClose" ] } ] } }, { "package": { "name": "golang.org/x/net", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.0.0-20210428140749-89ef3d95e781" } ] } ], "ecosystem_specific": { "imports": [ { "path": "golang.org/x/net/http/httpguts", "symbols": [ "HeaderValuesContainsToken", "headerValueContainsToken" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/313069" }, { "type": "FIX", "url": "https://go.googlesource.com/net/+/89ef3d95e781148a0951956029c92a211477f7f9" }, { "type": "REPORT", "url": "https://go.dev/issue/45710" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/cu9SP4eSXMc" } ], "credits": [ { "name": "Guido Vranken" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0236", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2907.json
{ "schema_version": "1.3.1", "id": "GO-2024-2907", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-5262", "GHSA-q5mg-pc7r-r8cr" ], "summary": "Files or Directories Accessible to External Parties in ProjectDiscovery in github.com/projectdiscovery/interactsh", "details": "Files or Directories Accessible to External Parties in ProjectDiscovery in github.com/projectdiscovery/interactsh", "affected": [ { "package": { "name": "github.com/projectdiscovery/interactsh", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.2.0" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-q5mg-pc7r-r8cr" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-5262" }, { "type": "FIX", "url": "https://github.com/projectdiscovery/interactsh/commit/6a0cb98b16636a98712729f3d23e34d8bf7260e7" }, { "type": "FIX", "url": "https://github.com/projectdiscovery/interactsh/pull/874" }, { "type": "WEB", "url": "https://zuso.ai/advisory/za-2024-01" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2907", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0945.json
{ "schema_version": "1.3.1", "id": "GO-2022-0945", "modified": "0001-01-01T00:00:00Z", "published": "2022-08-22T17:59:45Z", "aliases": [ "CVE-2016-9122", "GHSA-77gc-fj98-665h" ], "summary": "Signature validation bypass in gopkg.in/square/go-jose.v1", "details": "The go-jose library suffers from multiple signatures exploitation. When validating a signed message, the API did not indicate which signature was valid, which creates the potential for confusion.", "affected": [ { "package": { "name": "gopkg.in/square/go-jose.v1", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.1.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "gopkg.in/square/go-jose.v1", "symbols": [ "JsonWebEncryption.Decrypt", "JsonWebKey.UnmarshalJSON", "JsonWebSignature.Verify", "ecDecrypterSigner.decryptKey", "rawJsonWebKey.ecPublicKey" ] }, { "path": "gopkg.in/square/go-jose.v1/cipher", "symbols": [ "DeriveECDHES", "NewConcatKDF", "cbcAEAD.Open", "cbcAEAD.Seal", "cbcAEAD.computeAuthTag", "padBuffer", "resize" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://www.openwall.com/lists/oss-security/2016/11/03/1" }, { "type": "FIX", "url": "https://github.com/square/go-jose/pull/111" }, { "type": "FIX", "url": "https://github.com/square/go-jose/commit/2c5656adca9909843c4ff50acf1d2cf8f32da7e6" }, { "type": "WEB", "url": "https://github.com/square/go-jose/commit/789a4c4bd4c118f7564954f441b29c153ccd6a96" }, { "type": "WEB", "url": "https://github.com/square/go-jose/commit/c7581939a3656bb65e89d64da0a52364a33d2507" } ], "credits": [ { "name": "Quan Nguyen from Google's Information Security Engineering Team" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0945", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0463.json
{ "schema_version": "1.3.1", "id": "GO-2022-0463", "modified": "0001-01-01T00:00:00Z", "published": "2022-07-01T20:06:59Z", "aliases": [ "CVE-2022-31259", "GHSA-qx32-f6g6-fcfr" ], "summary": "Access control bypass due to broad route matching in github.com/beego/beego and beego/v2", "details": "Routes in the beego HTTP router can match unintended patterns. This overly-broad matching may permit an attacker to bypass access controls.\n\nFor example, the pattern \"/a/b/:name\" can match the URL \"/a.xml/b/\". This may bypass access control applied to the prefix \"/a/\".", "affected": [ { "package": { "name": "github.com/astaxie/beego", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/astaxie/beego", "symbols": [ "App.Run", "ControllerRegister.FindPolicy", "ControllerRegister.FindRouter", "ControllerRegister.ServeHTTP", "FilterRouter.ValidRouter", "InitBeegoBeforeTest", "Run", "RunWithMiddleWares", "TestBeegoInit", "Tree.Match", "adminApp.Run" ] } ] } }, { "package": { "name": "github.com/beego/beego", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.12.9" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/beego/beego", "symbols": [ "App.Run", "ControllerRegister.FindPolicy", "ControllerRegister.FindRouter", "ControllerRegister.ServeHTTP", "FilterRouter.ValidRouter", "InitBeegoBeforeTest", "Run", "RunWithMiddleWares", "TestBeegoInit", "Tree.Match", "Tree.match", "adminApp.Run" ] } ] } }, { "package": { "name": "github.com/beego/beego/v2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "2.0.3" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/beego/beego/v2/server/web", "symbols": [ "AddNamespace", "AddViewPath", "Any", "AutoPrefix", "AutoRouter", "BuildTemplate", "Compare", "CompareNot", "Controller.Abort", "Controller.Bind", "Controller.BindForm", "Controller.BindJSON", "Controller.BindProtobuf", "Controller.BindXML", "Controller.BindYAML", "Controller.CheckXSRFCookie", "Controller.CustomAbort", "Controller.Delete", "Controller.DestroySession", "Controller.Get", "Controller.GetBool", "Controller.GetFile", "Controller.GetFloat", "Controller.GetInt", "Controller.GetInt16", "Controller.GetInt32", "Controller.GetInt64", "Controller.GetInt8", "Controller.GetSecureCookie", "Controller.GetString", "Controller.GetStrings", "Controller.GetUint16", "Controller.GetUint32", "Controller.GetUint64", "Controller.GetUint8", "Controller.Head", "Controller.Input", "Controller.IsAjax", "Controller.JSONResp", "Controller.Options", "Controller.ParseForm", "Controller.Patch", "Controller.Post", "Controller.Put", "Controller.Redirect", "Controller.Render", "Controller.RenderBytes", "Controller.RenderString", "Controller.Resp", "Controller.SaveToFile", "Controller.SaveToFileWithBuffer", "Controller.ServeFormatted", "Controller.ServeJSON", "Controller.ServeJSONP", "Controller.ServeXML", "Controller.ServeYAML", "Controller.SessionRegenerateID", "Controller.SetData", "Controller.SetSecureCookie", "Controller.Trace", "Controller.URLFor", "Controller.XMLResp", "Controller.XSRFFormHTML", "Controller.XSRFToken", "Controller.YamlResp", "ControllerRegister.Add", "ControllerRegister.AddAuto", "ControllerRegister.AddAutoPrefix", "ControllerRegister.AddMethod", "ControllerRegister.AddRouterMethod", "ControllerRegister.Any", "ControllerRegister.CtrlAny", "ControllerRegister.CtrlDelete", "ControllerRegister.CtrlGet", "ControllerRegister.CtrlHead", "ControllerRegister.CtrlOptions", "ControllerRegister.CtrlPatch", "ControllerRegister.CtrlPost", "ControllerRegister.CtrlPut", "ControllerRegister.Delete", "ControllerRegister.FindPolicy", "ControllerRegister.FindRouter", "ControllerRegister.Get", "ControllerRegister.GetContext", "ControllerRegister.Handler", "ControllerRegister.Head", "ControllerRegister.Include", "ControllerRegister.Init", "ControllerRegister.InsertFilter", "ControllerRegister.Options", "ControllerRegister.Patch", "ControllerRegister.Post", "ControllerRegister.Put", "ControllerRegister.ServeHTTP", "ControllerRegister.URLFor", "CtrlAny", "CtrlDelete", "CtrlGet", "CtrlHead", "CtrlOptions", "CtrlPatch", "CtrlPost", "CtrlPut", "Date", "DateFormat", "DateParse", "Delete", "Exception", "ExecuteTemplate", "ExecuteViewPathTemplate", "FileSystem.Open", "FilterRouter.ValidRouter", "FlashData.Error", "FlashData.Notice", "FlashData.Set", "FlashData.Store", "FlashData.Success", "FlashData.Warning", "Get", "GetConfig", "HTML2str", "Handler", "Head", "Htmlquote", "Htmlunquote", "HttpServer.Any", "HttpServer.AutoPrefix", "HttpServer.AutoRouter", "HttpServer.CtrlAny", "HttpServer.CtrlDelete", "HttpServer.CtrlGet", "HttpServer.CtrlHead", "HttpServer.CtrlOptions", "HttpServer.CtrlPatch", "HttpServer.CtrlPost", "HttpServer.CtrlPut", "HttpServer.Delete", "HttpServer.Get", "HttpServer.Handler", "HttpServer.Head", "HttpServer.Include", "HttpServer.InsertFilter", "HttpServer.LogAccess", "HttpServer.Options", "HttpServer.Patch", "HttpServer.Post", "HttpServer.PrintTree", "HttpServer.Put", "HttpServer.RESTRouter", "HttpServer.Router", "HttpServer.RouterWithOpts", "HttpServer.Run", "Include", "InitBeegoBeforeTest", "InsertFilter", "LoadAppConfig", "LogAccess", "MapGet", "Namespace.Any", "Namespace.AutoPrefix", "Namespace.AutoRouter", "Namespace.Cond", "Namespace.CtrlAny", "Namespace.CtrlDelete", "Namespace.CtrlGet", "Namespace.CtrlHead", "Namespace.CtrlOptions", "Namespace.CtrlPatch", "Namespace.CtrlPost", "Namespace.CtrlPut", "Namespace.Delete", "Namespace.Filter", "Namespace.Get", "Namespace.Handler", "Namespace.Head", "Namespace.Include", "Namespace.Namespace", "Namespace.Options", "Namespace.Patch", "Namespace.Post", "Namespace.Put", "Namespace.Router", "NewControllerRegister", "NewControllerRegisterWithCfg", "NewHttpServerWithCfg", "NewHttpSever", "NewNamespace", "NotNil", "Options", "ParseForm", "Patch", "Policy", "Post", "PrintTree", "Put", "RESTRouter", "ReadFromRequest", "RenderForm", "Router", "RouterWithOpts", "Run", "RunWithMiddleWares", "TestBeegoInit", "Tree.AddRouter", "Tree.AddTree", "Tree.Match", "Tree.match", "URLFor", "URLMap.GetMap", "URLMap.GetMapData", "Walk", "adminApp.Run", "adminController.AdminIndex", "adminController.Healthcheck", "adminController.ListConf", "adminController.ProfIndex", "adminController.PrometheusMetrics", "adminController.QpsIndex", "adminController.TaskStatus", "beegoAppConfig.Bool", "beegoAppConfig.DefaultBool", "beegoAppConfig.SaveConfigFile", "beegoAppConfig.Unmarshaler" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/beego/beego/pull/4958" }, { "type": "FIX", "url": "https://github.com/beego/beego/commit/64cf44d725c8cc35d782327d333df9cbeb1bf2dd" }, { "type": "WEB", "url": "https://github.com/beego/beego/issues/4946" }, { "type": "WEB", "url": "https://github.com/beego/beego/pull/4954" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0463", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0643.json
{ "schema_version": "1.3.1", "id": "GO-2022-0643", "modified": "0001-01-01T00:00:00Z", "published": "2022-02-15T01:57:18Z", "aliases": [ "CVE-2017-11480", "GHSA-9q3g-m353-cp4p" ], "summary": "Denial of service in github.com/elastic/beats", "details": "A local attacker can cause a panic if they are able to send arbitrary traffic to a monitored port, due to an out of bounds read.", "affected": [ { "package": { "name": "github.com/elastic/beats", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "6.1.0+incompatible" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/elastic/beats/packetbeat/protos/pgsql", "symbols": [ "pgsqlFieldsParser", "pgsqlPlugin.Parse" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/elastic/beats/pull/5457" }, { "type": "FIX", "url": "https://github.com/elastic/beats/commit/aeca65779d573976981587ca1d1461399e1b59dd" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0643", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0400.json
{ "schema_version": "1.3.1", "id": "GO-2022-0400", "modified": "0001-01-01T00:00:00Z", "published": "2022-07-01T20:10:50Z", "aliases": [ "CVE-2022-2583", "GHSA-4348-x292-h437", "GHSA-h2x7-2ff6-v32p" ], "summary": "Race condition in github.com/ntbosscher/gobase", "details": "A race condition can cause incorrect HTTP request routing.", "affected": [ { "package": { "name": "github.com/ntbosscher/gobase", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.7.2" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/ntbosscher/gobase/auth/httpauth", "symbols": [ "Setup", "middleware" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/ntbosscher/gobase/commit/a8d40bce9c429d324122d18c446924dab809e812" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0400", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2914.json
{ "schema_version": "1.3.1", "id": "GO-2024-2914", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "GHSA-xmmx-7jpf-fx42" ], "related": [ "CVE-2021-41190" ], "summary": "Moby (Docker Engine) is vulnerable to Ambiguous OCI manifest parsing in github.com/docker/docker", "details": "Moby (Docker Engine) is vulnerable to Ambiguous OCI manifest parsing in github.com/docker/docker", "affected": [ { "package": { "name": "github.com/docker/docker", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "20.10.11+incompatible" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/moby/moby", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "20.10.11+incompatible" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/moby/moby/security/advisories/GHSA-xmmx-7jpf-fx42" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2914", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0422.json
{ "schema_version": "1.3.1", "id": "GO-2022-0422", "modified": "0001-01-01T00:00:00Z", "published": "2022-07-01T20:08:04Z", "aliases": [ "CVE-2022-2584", "GHSA-967g-cjx4-h7j6", "GHSA-g3vv-g2j5-45f2" ], "summary": "Panic when decoding invalid blocks in github.com/ipld/go-codec-dagpb", "details": "The dag-pb codec can panic when decoding invalid blocks.", "affected": [ { "package": { "name": "github.com/ipld/go-codec-dagpb", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.3.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/ipld/go-codec-dagpb", "symbols": [ "Decode", "DecodeBytes", "Decoder", "Unmarshal" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/ipld/go-codec-dagpb/commit/a17ace35cc760a2698645c09868f9050fa219f57" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0422", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-1053.json
{ "schema_version": "1.3.1", "id": "GO-2022-1053", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "GHSA-x279-68rr-jp4p" ], "summary": "Incorrect signatures in github.com/supranational/blst", "details": "Potential creation of an invalid signature from correct inputs.\n\nSome inputs to the blst_fp_eucl_inverse function can produce incorrect outputs. This could theoretically permit the creation of an invalid signature from correct inputs.", "affected": [ { "package": { "name": "github.com/supranational/blst", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0.3.0" }, { "fixed": "0.3.3" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/supranational/blst/bindings/go" } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-x279-68rr-jp4p" }, { "type": "FIX", "url": "https://github.com/supranational/blst/commit/dd980e7f81397895705c49fcb4f52e485bb45e21" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-1053", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1841.json
{ "schema_version": "1.3.1", "id": "GO-2023-1841", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-29404" ], "summary": "Improper handling of non-optional LDFLAGS in go command with cgo in cmd/go", "details": "The go command may execute arbitrary code at build time when using cgo. This may occur when running \"go get\" on a malicious module, or when running any other command which builds untrusted code. This is can by triggered by linker flags, specified via a \"#cgo LDFLAGS\" directive.\n\nThe arguments for a number of flags which are non-optional are incorrectly considered optional, allowing disallowed flags to be smuggled through the LDFLAGS sanitization. This affects usage of both the gc and gccgo compilers.", "affected": [ { "package": { "name": "toolchain", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.19.10" }, { "introduced": "1.20.0-0" }, { "fixed": "1.20.5" } ] } ], "ecosystem_specific": { "imports": [ { "path": "cmd/go" } ] } } ], "references": [ { "type": "REPORT", "url": "https://go.dev/issue/60305" }, { "type": "FIX", "url": "https://go.dev/cl/501225" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/q5135a9d924/m/j0ZoAJOHAwAJ" } ], "credits": [ { "name": "Juho Nurminen of Mattermost" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-1841", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2831.json
{ "schema_version": "1.3.1", "id": "GO-2024-2831", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-34360", "GHSA-jcqq-g64v-gcm7" ], "summary": "ATX protocol validation problem in github.com/spacemeshos/go-spacemesh", "details": "Nodes can publish ATXs which reference the incorrect previous ATX of the Smesher that created the ATX. ATXs are expected to form a single chain from the newest to the first ATX ever published by an identity. Allowing Smeshers to reference an earlier (but not the latest) ATX as previous breaks this protocol rule.", "affected": [ { "package": { "name": "github.com/spacemeshos/api/release/go", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.37.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/spacemeshos/api/release/go/spacemesh/v1" } ] } }, { "package": { "name": "github.com/spacemeshos/go-spacemesh", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.5.2-hotfix1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/spacemeshos/go-spacemesh/activation", "symbols": [ "Handler.HandleGossipAtx", "Handler.SyntacticallyValidateDeps", "Handler.processATX", "Handler.storeAtx" ] }, { "path": "github.com/spacemeshos/go-spacemesh/events", "symbols": [ "CloseEventReporter", "EmitAtxPublished", "EmitBeacon", "EmitEligibilities", "EmitInitComplete", "EmitInitFailure", "EmitInitStart", "EmitInvalidPostProof", "EmitOwnMalfeasanceProof", "EmitPoetWaitProof", "EmitPoetWaitRound", "EmitPostComplete", "EmitPostFailure", "EmitPostServiceStarted", "EmitPostServiceStopped", "EmitPostStart", "EmitProposal", "InitializeReporter", "LayerUpdate.Field", "ReportAccountUpdate", "ReportError", "ReportLayerUpdate", "ReportMalfeasance", "ReportNewActivation", "ReportNewTx", "ReportNodeStatusUpdate", "ReportProposal", "ReportResult", "ReportRewardReceived", "ReportTxWithValidity", "SubcribeProposals", "Subscribe", "SubscribeAccount", "SubscribeActivations", "SubscribeErrors", "SubscribeLayers", "SubscribeMalfeasance", "SubscribeMatched", "SubscribeRewards", "SubscribeStatus", "SubscribeToLayers", "SubscribeTxs", "SubscribeUserEvents", "ToMalfeasancePB" ] }, { "path": "github.com/spacemeshos/go-spacemesh/malfeasance", "symbols": [ "Handler.HandleSyncedMalfeasanceProof", "Validate" ] }, { "path": "github.com/spacemeshos/go-spacemesh/malfeasance/wire", "symbols": [ "AtxProof.DecodeScale", "AtxProof.MarshalLogObject", "AtxProofMsg.DecodeScale", "AtxProofMsg.SignedBytes", "BallotProof.DecodeScale", "BallotProof.MarshalLogObject", "BallotProofMsg.DecodeScale", "BallotProofMsg.SignedBytes", "HareMetadata.DecodeScale", "HareMetadata.ToBytes", "HareProof.DecodeScale", "HareProof.MarshalLogObject", "HareProofMsg.DecodeScale", "HareProofMsg.SignedBytes", "InvalidPostIndexProof.DecodeScale", "InvalidPostIndexProof.EncodeScale", "MalfeasanceGossip.DecodeScale", "MalfeasanceGossip.EncodeScale", "MalfeasanceInfo", "MalfeasanceProof.DecodeScale", "MalfeasanceProof.EncodeScale", "MalfeasanceProof.MarshalLogObject", "Proof.DecodeScale", "Proof.EncodeScale" ] }, { "path": "github.com/spacemeshos/go-spacemesh/node", "symbols": [ "App.setupDBs", "App.verifyDB" ] }, { "path": "github.com/spacemeshos/go-spacemesh/sql/atxs", "symbols": [ "Add", "AddGettingNonce", "IterateIDsByEpoch" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/spacemeshos/go-spacemesh/security/advisories/GHSA-jcqq-g64v-gcm7" }, { "type": "FIX", "url": "https://github.com/spacemeshos/api/commit/1d5bd972bbe225d024c3e0ae5214ddb6b481716e" }, { "type": "FIX", "url": "https://github.com/spacemeshos/go-spacemesh/commit/9aff88d54be809ac43d60e8a8b4d65359c356b87" }, { "type": "WEB", "url": "https://spacemesh.io/blog/spacemesh-white-paper-1" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2831", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2870.json
{ "schema_version": "1.3.1", "id": "GO-2024-2870", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-35192", "GHSA-xcq4-m2r3-cmrj" ], "summary": "Credential leakage in github.com/aquasecurity/trivy", "details": "A malicious registry can cause Trivy to leak credentials for legitimate registries such as AWS Elastic Container Registry (ECR), Google Cloud Artifact/Container Registry, or Azure Container Registry (ACR) if the registry is scanned from directly using Trivy. These tokens can then be used to push/pull images from those registries to which the identity/user running Trivy has access. This vulnerability only applies when scanning container images directly from a registry. If you use Docker, containerd or other runtime to pull images locally and scan them with Trivy, you are not affected. To enforce this behavior, you can use the --image-src flag to select which sources you trust.", "affected": [ { "package": { "name": "github.com/aquasecurity/trivy", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.51.2" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/aquasecurity/trivy/pkg/fanal/image/registry/azure" }, { "path": "github.com/aquasecurity/trivy/pkg/fanal/image/registry/ecr", "symbols": [ "ECR.CheckOptions" ] }, { "path": "github.com/aquasecurity/trivy/pkg/fanal/image/registry/google", "symbols": [ "Registry.CheckOptions" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/aquasecurity/trivy/security/advisories/GHSA-xcq4-m2r3-cmrj" }, { "type": "FIX", "url": "https://github.com/aquasecurity/trivy/commit/e7f14f729de259551203f313e57d2d9d3aa2ff87" } ], "credits": [ { "name": "@lyoung-confluent" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2870", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1548.json
{ "schema_version": "1.3.1", "id": "GO-2023-1548", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-25163", "GHSA-mv6w-j4xc-qpfw" ], "summary": "Repository access credential leak in github.com/argoproj/argo-cd/v2", "details": "Argo CD has an output sanitization bug which leaks repository access credentials in error messages.\n\nThese error messages are visible to the user, and they are logged. The error message is visible when a user attempts to create or update an Application via the Argo CD API (and therefor the UI or CLI).\n\nThe user must have \"applications, create\" or \"applications, update\" RBAC access to reach the code which may produce the error. The user is not guaranteed to be able to trigger the error message. They may attempt to spam the API with requests to trigger a rate limit error from the upstream repository.\n\nIf the user has \"repositories, update\" access, they may edit an existing repository to introduce a URL typo or otherwise force an error message.", "affected": [ { "package": { "name": "github.com/argoproj/argo-cd/v2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "2.6.0-rc1" }, { "fixed": "2.6.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/argoproj/argo-cd/v2/util/argo", "symbols": [ "ValidateRepo", "validateRepo" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-mv6w-j4xc-qpfw" }, { "type": "REPORT", "url": "https://github.com/argoproj/argo-cd/issues/12309" }, { "type": "FIX", "url": "https://github.com/argoproj/argo-cd/pull/12320" } ], "credits": [ { "name": "James Callahan" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-1548", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0384.json
{ "schema_version": "1.3.1", "id": "GO-2022-0384", "modified": "0001-01-01T00:00:00Z", "published": "2022-07-15T23:29:45Z", "aliases": [ "CVE-2021-32690", "GHSA-56hp-xqp3-w2jf", "GHSA-7jr6-prv4-5wf5" ], "summary": "Repository credentials passed to alternate domain in helm.sh/helm/v3", "details": "The username and password credentials associated with a Helm repository can be passed to another domain referenced by that Helm repository.\n\nIf the index.yaml for a Helm repository is hosted on one domain and references a chart archive on a different domain, Helm will provide the credentials for the index.yaml's domain when fetching those archives.", "affected": [ { "package": { "name": "helm.sh/helm/v3", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "3.6.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "helm.sh/helm/v3/pkg/downloader", "symbols": [ "ChartDownloader.DownloadTo", "ChartDownloader.ResolveChartVersion", "Manager.Build", "Manager.Update" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-56hp-xqp3-w2jf" }, { "type": "FIX", "url": "https://github.com/helm/helm/commit/61d8e8c4a6f95540c15c6a65f36a6dd0a45e7a2f" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0384", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2020-0035.json
{ "schema_version": "1.3.1", "id": "GO-2020-0035", "modified": "0001-01-01T00:00:00Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2020-36561", "GHSA-f5c5-hmw9-v8hx" ], "summary": "Path traversal in github.com/yi-ge/unzip", "details": "Due to improper path sanitization, archives containing relative file paths can cause files to be written (or overwritten) outside of the target directory.", "affected": [ { "package": { "name": "github.com/yi-ge/unzip", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.0.3-0.20200308084313-2adbaa4891b9" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/yi-ge/unzip", "symbols": [ "Unzip.Extract" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/yi-ge/unzip/pull/1" }, { "type": "FIX", "url": "https://github.com/yi-ge/unzip/commit/2adbaa4891b9690853ef10216189189f5ad7dc73" }, { "type": "WEB", "url": "https://snyk.io/research/zip-slip-vulnerability" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2020-0035", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2836.json
{ "schema_version": "1.3.1", "id": "GO-2024-2836", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-34713", "GHSA-jmqp-37m5-49wh" ], "summary": "sshproxy vulnerable to SSH option injection in github.com/cea-hpc/sshproxy", "details": "sshproxy vulnerable to SSH option injection in github.com/cea-hpc/sshproxy", "affected": [ { "package": { "name": "github.com/cea-hpc/sshproxy", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.6.3" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/cea-hpc/sshproxy/security/advisories/GHSA-jmqp-37m5-49wh" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-34713" }, { "type": "FIX", "url": "https://github.com/cea-hpc/sshproxy/commit/3b8bccc874dc4ca2c80c956cad65722abb46f0b9" }, { "type": "FIX", "url": "https://github.com/cea-hpc/sshproxy/commit/f7eabd05d5f0f951e160293692327cad9a7d9580" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2836", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2571.json
{ "schema_version": "1.3.1", "id": "GO-2024-2571", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "GHSA-2557-x9mg-76w8" ], "summary": "Invalid block proposal in github.com/cosmos/cosmos-sdk", "details": "Invalid block proposal in github.com/cosmos/cosmos-sdk", "affected": [ { "package": { "name": "github.com/cosmos/cosmos-sdk", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.47.9" }, { "introduced": "0.50.0" }, { "fixed": "0.50.4" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/cosmos/cosmos-sdk/baseapp", "symbols": [ "DefaultProposalHandler.PrepareProposalHandler", "NewBaseApp", "NewDefaultProposalHandler" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-2557-x9mg-76w8" }, { "type": "FIX", "url": "https://github.com/cosmos/cosmos-sdk/commit/fe32bcc1d65412c9b5737672956f0638c729ab7d" }, { "type": "WEB", "url": "https://github.com/cosmos/cosmos-sdk/releases/tag/v0.47.9" }, { "type": "WEB", "url": "https://github.com/cosmos/cosmos-sdk/releases/tag/v0.50.4" } ], "credits": [ { "name": "@gitferry, @SebastianElvis, and @vitsalis" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2571", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0952.json
{ "schema_version": "1.3.1", "id": "GO-2022-0952", "modified": "0001-01-01T00:00:00Z", "published": "2022-08-22T18:08:50Z", "aliases": [ "CVE-2022-36009", "GHSA-grvv-h2f9-7v9c" ], "summary": "Incorrect event parsing in github.com/matrix-org/gomatrixserverlib", "details": "Power level parsing does not parse the \"events_default\" key of the m.room.power_levels event, setting the event default power level to zero in all cases. This can cause events to be improperly accepted or rejected in rooms where the event_default power level has been changed.", "affected": [ { "package": { "name": "github.com/matrix-org/gomatrixserverlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.0.0-20220815091947-723fd495dde8" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/matrix-org/gomatrixserverlib", "symbols": [ "Allowed", "Event.PowerLevels", "EventsLoader.LoadAndVerify", "HeaderedReverseTopologicalOrdering", "NewPowerLevelContentFromAuthEvents", "NewPowerLevelContentFromEvent", "RequestBackfill", "ResolveConflicts", "ResolveStateConflicts", "ResolveStateConflictsV2", "RespSendJoin.Check", "RespState.Check", "RespState.Events", "ReverseTopologicalOrdering", "VerifyAuthRulesAtState", "VerifyEventAuthChain" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/matrix-org/gomatrixserverlib/commit/723fd495dde835d078b9f2074b6b62c06dea4575" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0952", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2576.json
{ "schema_version": "1.3.1", "id": "GO-2024-2576", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-1485", "GHSA-84xv-jfrm-h4gm" ], "summary": "registry-support: decompress can delete files outside scope via relative paths in github.com/devfile/registry-support/registry-library", "details": "registry-support: decompress can delete files outside scope via relative paths in github.com/devfile/registry-support/registry-library.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/devfile/registry-support/registry-library before v0.0.0-20240206.", "affected": [ { "package": { "name": "github.com/devfile/registry-support/registry-library", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "0.0.0-20240206" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-84xv-jfrm-h4gm" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-1485" }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2024-1485" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2264106" }, { "type": "WEB", "url": "https://github.com/devfile/registry-support/commit/0e44b9ca6d03fac4fc3f77d37656d56dc5defe0d" }, { "type": "WEB", "url": "https://github.com/devfile/registry-support/pull/197" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2576", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0142.json
{ "schema_version": "1.3.1", "id": "GO-2021-0142", "modified": "0001-01-01T00:00:00Z", "published": "2022-07-01T20:11:09Z", "aliases": [ "CVE-2020-16845", "GHSA-q6gq-997w-f55g" ], "summary": "Unbounded read from invalid inputs in encoding/binary", "details": "ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs.\n\nCertain invalid inputs to ReadUvarint or ReadVarint can cause these functions to read an unlimited number of bytes from the ByteReader parameter before returning an error. This can lead to processing more input than expected when the caller is reading directly from a network and depends on ReadUvarint or ReadVarint only consuming a small, bounded number of bytes, even from invalid inputs.", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.13.15" }, { "introduced": "1.14.0-0" }, { "fixed": "1.14.7" } ] } ], "ecosystem_specific": { "imports": [ { "path": "encoding/binary", "symbols": [ "ReadUvarint", "ReadVarint" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/247120" }, { "type": "FIX", "url": "https://go.googlesource.com/go/+/027d7241ce050d197e7fabea3d541ffbe3487258" }, { "type": "REPORT", "url": "https://go.dev/issue/40618" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo" } ], "credits": [ { "name": "Diederik Loerakker" }, { "name": "Jonny Rhea" }, { "name": "Raúl Kripalani" }, { "name": "Preston Van Loon" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0142", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2822.json
{ "schema_version": "1.3.1", "id": "GO-2024-2822", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-30850", "CVE-2024-33434", "GHSA-p3j6-f45h-hw5f", "GHSA-xfjj-f699-rc79" ], "summary": "Arbitrary code execution in github.com/tiagorlampert/CHAOS", "details": "A remote attacker can execute arbitrary commands via crafted HTTP requests.", "affected": [ { "package": { "name": "github.com/tiagorlampert/CHAOS", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.0.0-20220716132853-b47438d36e3a" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/tiagorlampert/CHAOS/services", "symbols": [ "clientService.BuildClient" ] }, { "path": "github.com/tiagorlampert/CHAOS/delivery/http", "symbols": [ "httpController.generateBinaryPostHandler" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-33434" }, { "type": "FIX", "url": "https://github.com/tiagorlampert/CHAOS/pull/95" }, { "type": "FIX", "url": "https://github.com/tiagorlampert/CHAOS/commit/1b451cf62582295b7225caf5a7b506f0bad56f6b" }, { "type": "FIX", "url": "https://github.com/tiagorlampert/CHAOS/commit/24c9e109b5be34df7b2bce8368eae669c481ed5e" }, { "type": "WEB", "url": "https://gist.github.com/slimwang/d1ec6645ba9012a551ea436679244496" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2822", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2871.json
{ "schema_version": "1.3.1", "id": "GO-2024-2871", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-35194", "GHSA-crgc-2583-rw27" ], "summary": "Stacklok Minder vulnerable to denial of service from maliciously crafted templates in github.com/stacklok/minder", "details": "Stacklok Minder vulnerable to denial of service from maliciously crafted templates in github.com/stacklok/minder", "affected": [ { "package": { "name": "github.com/stacklok/minder", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.0.50" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/stacklok/minder/security/advisories/GHSA-crgc-2583-rw27" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-35194" }, { "type": "FIX", "url": "https://github.com/stacklok/minder/commit/fe321d345b4f738de6a06b13207addc72b59f892" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2871", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-2042.json
{ "schema_version": "1.3.1", "id": "GO-2023-2042", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-39320" ], "summary": "Arbitrary code execution via go.mod toolchain directive in cmd/go", "details": "The go.mod toolchain directive, introduced in Go 1.21, can be leveraged to execute scripts and binaries relative to the root of the module when the \"go\" command was executed within the module. This applies to modules downloaded using the \"go\" command from the module proxy, as well as modules downloaded directly using VCS software.", "affected": [ { "package": { "name": "toolchain", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "1.21.0-0" }, { "fixed": "1.21.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "cmd/go" } ] } } ], "references": [ { "type": "REPORT", "url": "https://go.dev/issue/62198" }, { "type": "FIX", "url": "https://go.dev/cl/526158" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ" } ], "credits": [ { "name": "Juho Nurminen of Mattermost" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-2042", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0493.json
{ "schema_version": "1.3.1", "id": "GO-2022-0493", "modified": "0001-01-01T00:00:00Z", "published": "2022-07-15T23:30:12Z", "aliases": [ "CVE-2022-29526", "GHSA-p782-xgp4-8hr8" ], "summary": "Incorrect privilege reporting in syscall and golang.org/x/sys/unix", "details": "When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.17.10" }, { "introduced": "1.18.0-0" }, { "fixed": "1.18.2" } ] } ], "ecosystem_specific": { "imports": [ { "path": "syscall", "symbols": [ "Faccessat" ] } ] } }, { "package": { "name": "golang.org/x/sys", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.0.0-20220412211240-33da011f77ad" } ] } ], "ecosystem_specific": { "imports": [ { "path": "golang.org/x/sys/unix", "symbols": [ "Faccessat" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/399539" }, { "type": "REPORT", "url": "https://go.dev/issue/52313" }, { "type": "FIX", "url": "https://go.dev/cl/400074" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/Y5qrqw_lWdU" } ], "credits": [ { "name": "Joël Gähwiler (@256dpi)" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0493", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2943.json
{ "schema_version": "1.3.1", "id": "GO-2024-2943", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-38359", "GHSA-9gxx-58q6-42p7" ], "summary": "Lightning Network Daemon (LND)'s onion processing logic leads to a denial of service in github.com/lightningnetwork/lnd", "details": "Lightning Network Daemon (LND)'s onion processing logic leads to a denial of service in github.com/lightningnetwork/lnd", "affected": [ { "package": { "name": "github.com/lightningnetwork/lnd", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.17.0-beta" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/lightningnetwork/lnd/security/advisories/GHSA-9gxx-58q6-42p7" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38359" }, { "type": "WEB", "url": "https://delvingbitcoin.org/t/dos-disclosure-lnd-onion-bomb/979" }, { "type": "WEB", "url": "https://github.com/lightningnetwork/lnd/releases/tag/v0.17.0-beta" }, { "type": "WEB", "url": "https://lightning.network" }, { "type": "WEB", "url": "https://morehouse.github.io/lightning/lnd-onion-bomb" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2943", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2579.json
{ "schema_version": "1.3.1", "id": "GO-2024-2579", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-22393", "GHSA-rmqp-mvv2-54c6" ], "summary": "Apache Answer Unrestricted Upload of File with Dangerous Type vulnerability in github.com/apache/incubator-answer", "details": "Apache Answer Unrestricted Upload of File with Dangerous Type vulnerability in github.com/apache/incubator-answer", "affected": [ { "package": { "name": "github.com/apache/incubator-answer", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.2.5" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-rmqp-mvv2-54c6" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22393" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2024/02/22/1" }, { "type": "WEB", "url": "https://lists.apache.org/thread/f58l6dr4r74hl6o71gn47kmn44vw12cv" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2579", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2825.json
{ "schema_version": "1.3.1", "id": "GO-2024-2825", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-24787" ], "summary": "Arbitrary code execution during build on Darwin in cmd/go", "details": "On Darwin, building a Go module which contains CGO can trigger arbitrary code execution when using the Apple version of ld, due to usage of the -lto_library flag in a \"#cgo LDFLAGS\" directive.", "affected": [ { "package": { "name": "toolchain", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.21.10" }, { "introduced": "1.22.0-0" }, { "fixed": "1.22.3" } ] } ], "ecosystem_specific": { "imports": [ { "path": "cmd/go", "goos": [ "darwin" ] } ] } } ], "references": [ { "type": "REPORT", "url": "https://go.dev/issue/67119" }, { "type": "FIX", "url": "https://go.dev/cl/583815" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/wkkO4P9stm0" } ], "credits": [ { "name": "Juho Forsén (Mattermost)" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2825", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2638.json
{ "schema_version": "1.3.1", "id": "GO-2024-2638", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "GHSA-95rx-m9m5-m94v" ], "summary": "ValidateVoteExtensions function in Cosmos SDK may allow incorrect voting power assumptions in github.com/cosmos/cosmos-sdk", "details": "The default ValidateVoteExtensions helper function infers total voting power based on the injected VoteExtension, which are injected by the proposer.\n\nIf your chain utilizes the ValidateVoteExtensions helper in ProcessProposal, a dishonest proposer can potentially mutate voting power of each validator it includes in the injected VoteExtension, which could have potentially unexpected or negative consequences on modified state. Additional validation on injected VoteExtension data was added to confirm voting power against the state machine.", "affected": [ { "package": { "name": "github.com/cosmos/cosmos-sdk", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0.50.0" }, { "fixed": "0.50.5" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/cosmos/cosmos-sdk/baseapp", "symbols": [ "ValidateVoteExtensions" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/cosmos/cosmos-sdk/security/advisories/GHSA-95rx-m9m5-m94v" }, { "type": "FIX", "url": "https://github.com/cosmos/cosmos-sdk/commit/4467110df40797ebe916c23ebfd45c9ee7583897" }, { "type": "WEB", "url": "https://github.com/cosmos/cosmos-sdk/releases/tag/v0.50.5" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2638", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1923.json
{ "schema_version": "1.3.1", "id": "GO-2023-1923", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2019-14243", "GHSA-85c5-ccm8-vr96" ], "summary": "Panic when handling invalid HAProxy PROXY v2 request in github.com/mastercactapus/proxyprotocol", "details": "Panic when handling invalid HAProxy PROXY v2 request in github.com/mastercactapus/proxyprotocol", "affected": [ { "package": { "name": "github.com/mastercactapus/proxyprotocol", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.0.2" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/mastercactapus/proxyprotocol", "symbols": [ "Conn.LocalAddr", "Conn.ProxyHeader", "Conn.Read", "Conn.RemoteAddr", "Parse", "parseV2" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-85c5-ccm8-vr96" }, { "type": "REPORT", "url": "https://github.com/mastercactapus/proxyprotocol/issues/1" }, { "type": "FIX", "url": "https://github.com/mastercactapus/proxyprotocol/commit/5c4a101121fc3e868026189c7a73f7f19eef90ac" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-1923", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0427.json
{ "schema_version": "1.3.1", "id": "GO-2022-0427", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2022-24863", "CVE-2024-25712", "GHSA-49w7-5r33-jm9m", "GHSA-xg75-q3q5-cqmv" ], "summary": "Unprotected file upload in github.com/swaggo/http-swagger", "details": "The httpSwagger package's HTTP handler provides WebDAV read/write access to an in-memory filesystem. An attacker can exploit this to cause memory exhaustion by uploading many files, XSS attacks by uploading malicious files, or other unexpected behaviors.", "affected": [ { "package": { "name": "github.com/swaggo/http-swagger", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.2.6" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/swaggo/http-swagger" } ] } } ], "references": [ { "type": "WEB", "url": "https://cosmosofcyberspace.github.io/improper_http_method_leads_to_xss/poc.html" }, { "type": "FIX", "url": "https://github.com/swaggo/http-swagger/pull/62" }, { "type": "REPORT", "url": "https://github.com/swaggo/http-swagger/issues/61" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0427", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2979.json
{ "schema_version": "1.3.1", "id": "GO-2024-2979", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-39897", "GHSA-55r9-5mx9-qq7r" ], "summary": "Cache driver GetBlob() allows read access to any blob without access control check in zotregistry.dev/zot", "details": "Cache driver GetBlob() allows read access to any blob without access control check in zotregistry.dev/zot.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: zotregistry.dev/zot before v2.1.0.; zotregistry.io/zot before v2.1.0.", "affected": [ { "package": { "name": "zotregistry.dev/zot", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "2.1.0" } ] } ] } }, { "package": { "name": "zotregistry.io/zot", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "2.1.0" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/project-zot/zot/security/advisories/GHSA-55r9-5mx9-qq7r" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-39897" }, { "type": "WEB", "url": "https://github.com/project-zot/zot/commit/aaee0220e46bdadd12115ac67c19f9d3153eb1df" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2979", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2863.json
{ "schema_version": "1.3.1", "id": "GO-2024-2863", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-35183", "GHSA-8fg7-hp93-qhvr" ], "summary": "wolfictl leaks GitHub tokens to remote non-GitHub git servers in github.com/wolfi-dev/wolfictl", "details": "wolfictl leaks GitHub tokens to remote non-GitHub git servers in github.com/wolfi-dev/wolfictl", "affected": [ { "package": { "name": "github.com/wolfi-dev/wolfictl", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.16.10" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/wolfi-dev/wolfictl/security/advisories/GHSA-8fg7-hp93-qhvr" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-35183" }, { "type": "FIX", "url": "https://github.com/wolfi-dev/wolfictl/commit/0d06e1578300327c212dda26a5ab31d09352b9d0" }, { "type": "FIX", "url": "https://github.com/wolfi-dev/wolfictl/commit/403e93569f46766b4e26e06cf9cd0cae5ee0c2a2" }, { "type": "WEB", "url": "https://github.com/wolfi-dev/wolfictl/blob/488b53823350caa706de3f01ec0eded9350c7da7/pkg/update/update.go#L143" }, { "type": "WEB", "url": "https://github.com/wolfi-dev/wolfictl/blob/4dd6c95abb4bc0f9306350a8601057bd7a92bded/pkg/update/deps/cleanup.go#L49" }, { "type": "WEB", "url": "https://github.com/wolfi-dev/wolfictl/blob/6d99909f7b1aa23f732d84dad054b02a61f530e6/pkg/git/git.go#L22" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2863", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2644.json
{ "schema_version": "1.3.1", "id": "GO-2024-2644", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-51699", "GHSA-wx8q-4gm9-rj2g" ], "summary": "Fluid vulnerable to OS Command Injection for Fluid Users with JuicefsRuntime in github.com/fluid-cloudnative/fluid", "details": "Fluid vulnerable to OS Command Injection for Fluid Users with JuicefsRuntime in github.com/fluid-cloudnative/fluid", "affected": [ { "package": { "name": "github.com/fluid-cloudnative/fluid", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.9.3" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/fluid-cloudnative/fluid/security/advisories/GHSA-wx8q-4gm9-rj2g" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-51699" }, { "type": "FIX", "url": "https://github.com/fluid-cloudnative/fluid/commit/02b7cd8b79a26092df95d625664994bda485c722" }, { "type": "FIX", "url": "https://github.com/fluid-cloudnative/fluid/commit/e0184cff8790ad000c3e8943392c7f544fad7d66" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2644", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0238.json
{ "schema_version": "1.3.1", "id": "GO-2021-0238", "modified": "0001-01-01T00:00:00Z", "published": "2022-02-17T17:33:43Z", "aliases": [ "CVE-2021-33194", "GHSA-83g2-8m93-v3w7" ], "summary": "Infinite loop when parsing inputs in golang.org/x/net/html", "details": "An attacker can craft an input to ParseFragment that causes it to enter an infinite loop and never return.", "affected": [ { "package": { "name": "golang.org/x/net", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.0.0-20210520170846-37e1c6afe023" } ] } ], "ecosystem_specific": { "imports": [ { "path": "golang.org/x/net/html", "symbols": [ "Parse", "ParseFragment", "ParseFragmentWithOptions", "ParseWithOptions", "inHeadIM" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/311090" }, { "type": "FIX", "url": "https://go.googlesource.com/net/+/37e1c6afe02340126705deced573a85ab75209d7" }, { "type": "REPORT", "url": "https://go.dev/issue/46288" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/wPunbCPkWUg" } ], "credits": [ { "name": "OSS-Fuzz (discovery)" }, { "name": "Andrew Thornton (reporter)" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0238", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-2000.json
{ "schema_version": "1.3.1", "id": "GO-2023-2000", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-39533", "GHSA-876p-8259-xjgg" ], "summary": "Large RSA keys can cause high resource usage in github.com/libp2p/go-libp2p", "details": "Large RSA keys can lead to resource exhaustion attacks.\n\nWith fix, the size of RSA keys transmitted during handshakes is restricted to \u003c= 8192 bits.", "affected": [ { "package": { "name": "github.com/libp2p/go-libp2p", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.27.8" }, { "introduced": "0.28.0" }, { "fixed": "0.28.2" }, { "introduced": "0.29.0" }, { "fixed": "0.29.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/libp2p/go-libp2p/core/crypto", "symbols": [ "GenerateKeyPair", "GenerateKeyPairWithReader", "GenerateRSAKeyPair", "PublicKeyFromProto", "UnmarshalPrivateKey", "UnmarshalPublicKey", "UnmarshalRsaPrivateKey", "UnmarshalRsaPublicKey" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/libp2p/go-libp2p/security/advisories/GHSA-876p-8259-xjgg" }, { "type": "REPORT", "url": "https://go.dev/issue/61460" }, { "type": "FIX", "url": "https://github.com/libp2p/go-libp2p/commit/0cce607219f3710addc7e18672cffd1f1d912fbb" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-2000", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2917.json
{ "schema_version": "1.3.1", "id": "GO-2024-2917", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "GHSA-7jmw-8259-q9jx" ], "summary": "Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik", "details": "Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik", "affected": [ { "package": { "name": "github.com/traefik/traefik", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/traefik/traefik/v2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "2.11.4" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/traefik/traefik/v3", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "3.0.0-beta3" }, { "fixed": "3.0.2" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/traefik/traefik/security/advisories/GHSA-7jmw-8259-q9jx" }, { "type": "WEB", "url": "https://github.com/traefik/traefik/releases/tag/v2.11.4" }, { "type": "WEB", "url": "https://github.com/traefik/traefik/releases/tag/v3.0.2" }, { "type": "WEB", "url": "https://www.cve.org/CVERecord?id=CVE-2024-24790" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2917", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2728.json
{ "schema_version": "1.3.1", "id": "GO-2024-2728", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-31990", "GHSA-2gvw-w6fj-7m3c" ], "summary": "Argo CD's API server does not enforce project sourceNamespaces in github.com/argoproj/argo-cd", "details": "Argo CD's API server does not enforce project sourceNamespaces in github.com/argoproj/argo-cd", "affected": [ { "package": { "name": "github.com/argoproj/argo-cd", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/argoproj/argo-cd/v2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "2.4.0" }, { "fixed": "2.8.16" }, { "introduced": "2.9.0" }, { "fixed": "2.9.12" }, { "introduced": "2.10.0" }, { "fixed": "2.10.7" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-2gvw-w6fj-7m3c" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31990" }, { "type": "FIX", "url": "https://github.com/argoproj/argo-cd/commit/c514105af739eebedb9dbe89d8a6dd8dfc30bb2c" }, { "type": "FIX", "url": "https://github.com/argoproj/argo-cd/commit/c5a252c4cc260e240e2074794aedb861d07e9ca5" }, { "type": "FIX", "url": "https://github.com/argoproj/argo-cd/commit/e0ff56d89fbd7d066e9c862b30337f6520f13f17" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2728", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0079.json
{ "schema_version": "1.3.1", "id": "GO-2021-0079", "modified": "0001-01-01T00:00:00Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2018-18206", "GHSA-vc3x-gx6c-g99f" ], "summary": "Panic in github.com/bytom/bytom", "details": "A malformed query can cause an out-of-bounds panic due to improper validation of arguments. If processing queries from untrusted parties, this may be used as a vector for denial of service attacks.", "affected": [ { "package": { "name": "github.com/bytom/bytom", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.0.4-0.20180831054840-1ac3c8ac4f2b" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/bytom/bytom/p2p/discover", "symbols": [ "Network.checkTopicRegister" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/Bytom/bytom/pull/1307" }, { "type": "FIX", "url": "https://github.com/Bytom/bytom/commit/1ac3c8ac4f2b1e1df9675228290bda6b9586ba42" } ], "credits": [ { "name": "@yahtoo" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0079", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2721.json
{ "schema_version": "1.3.1", "id": "GO-2024-2721", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-31839", "GHSA-c5rv-hjjc-jv7m" ], "summary": "Cross site scripting in github.com/tiagorlampert/CHAOS", "details": "A malicious actor may be able to extract a JWT token via malicious \"/command\" request. This is a form of cross site scripting (XSS).", "affected": [ { "package": { "name": "github.com/tiagorlampert/CHAOS", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/tiagorlampert/CHAOS/presentation/http", "symbols": [ "NewServer", "httpController.sendCommandHandler" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31839" }, { "type": "WEB", "url": "https://blog.chebuya.com/posts/remote-code-execution-on-chaos-rat-via-spoofed-agents" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2721", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1904.json
{ "schema_version": "1.3.1", "id": "GO-2023-1904", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2022-47931", "GHSA-cvcx-g7wh-x8rf" ], "summary": "Collision of hash values in github.com/bnb-chain/tss-lib", "details": "Collision of hash values in github.com/bnb-chain/tss-lib.", "affected": [ { "package": { "name": "github.com/bnb-chain/tss-lib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.3.6-0.20230324145555-bb6fb30bd3eb" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/bnb-chain/tss-lib/common", "symbols": [ "SHA512_256", "SHA512_256i" ] } ] } }, { "package": { "name": "github.com/binance-chain/tss-lib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/binance-chain/tss-lib/common", "symbols": [ "SHA512_256", "SHA512_256i" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://medium.com/@iofinnet/security-disclosure-for-ecdsa-and-eddsa-threshold-signature-schemes-4e969af7155b" }, { "type": "FIX", "url": "https://github.com/bnb-chain/tss-lib/pull/233" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-1904", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-1002.json
{ "schema_version": "1.3.1", "id": "GO-2022-1002", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2022-39213", "GHSA-xhmf-mmv2-4hhx" ], "summary": "Panic in github.com/pandatix/go-cvss", "details": "ParseVector can panic when provided with invalid input.", "affected": [ { "package": { "name": "github.com/pandatix/go-cvss", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0.2.0" }, { "fixed": "0.4.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/pandatix/go-cvss/20", "symbols": [ "ParseVector" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/pandatix/go-cvss/commit/d9d478ff0c13b8b09ace030db9262f3c2fe031f4" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-1002", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0300.json
{ "schema_version": "1.3.1", "id": "GO-2022-0300", "modified": "0001-01-01T00:00:00Z", "published": "2022-07-15T23:10:20Z", "aliases": [ "CVE-2022-21708", "GHSA-mh3m-8c74-74xh" ], "summary": "Panic via malicious inputs in github.com/graph-gophers/graphql-go", "details": "Malicious inputs can cause a panic.\n\nA maliciously crafted input can cause a stack overflow and panic. Any user with access to the GraphQL can send such a query.\n\nThis issue only occurs when using the graphql.MaxDepth schema option (which is highly recommended in most cases).", "affected": [ { "package": { "name": "github.com/graph-gophers/graphql-go", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.3.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/graph-gophers/graphql-go", "symbols": [ "Schema.Exec", "Schema.Subscribe", "Schema.ToJSON", "Schema.Validate", "Schema.ValidateWithVariables", "Schema.exec", "Schema.subscribe" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/graph-gophers/graphql-go/commit/eae31ca73eb3473c544710955d1dbebc22605bfe" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0300", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0434.json
{ "schema_version": "1.3.1", "id": "GO-2022-0434", "modified": "0001-01-01T00:00:00Z", "published": "2022-05-23T21:59:00Z", "aliases": [ "CVE-2022-27536" ], "summary": "Panic during certificate parsing on Darwin in crypto/x509", "details": "Verifying certificate chains containing certificates which are not compliant with RFC 5280 causes Certificate.Verify to panic on macOS.\n\nThese chains can be delivered through TLS and can cause a crypto/tls or net/http client to crash.", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "1.18.0-0" }, { "fixed": "1.18.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "crypto/x509", "goos": [ "darwin" ], "symbols": [ "Certificate.Verify" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/393655" }, { "type": "FIX", "url": "https://go.googlesource.com/go/+/0fca8a8f25cf4636fd980e72ba0bded4230922de" }, { "type": "REPORT", "url": "https://go.dev/issue/51759" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8" } ], "credits": [ { "name": "Tailscale" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0434", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2747.json
{ "schema_version": "1.3.1", "id": "GO-2024-2747", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-32875", "GHSA-ppf8-hhpp-f5hj" ], "summary": "Hugo Markdown titles are not escaped in internal render hooks in github.com/gohugoio/hugo", "details": "Hugo Markdown titles are not escaped in internal render hooks in github.com/gohugoio/hugo", "affected": [ { "package": { "name": "github.com/gohugoio/hugo", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0.123.0" }, { "fixed": "0.125.3" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/gohugoio/hugo/hugolib" } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/gohugoio/hugo/security/advisories/GHSA-ppf8-hhpp-f5hj" }, { "type": "FIX", "url": "https://github.com/gohugoio/hugo/commit/15a4b9b33715887001f6eff30721d41c0d4cfdd1" }, { "type": "WEB", "url": "https://github.com/gohugoio/hugo/releases/tag/v0.125.3" }, { "type": "WEB", "url": "https://gohugo.io/getting-started/configuration-markup/#renderhooksimageenabledefault" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2747", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2688.json
{ "schema_version": "1.3.1", "id": "GO-2024-2688", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-31420", "GHSA-vjhf-6xfr-5p9g" ], "summary": "KubeVirt NULL pointer dereference flaw in kubevirt.io/kubevirt", "details": "KubeVirt NULL pointer dereference flaw in kubevirt.io/kubevirt", "affected": [ { "package": { "name": "kubevirt.io/kubevirt", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-vjhf-6xfr-5p9g" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31420" }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2024-31420" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272951" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2688", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1826.json
{ "schema_version": "1.3.1", "id": "GO-2023-1826", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-34205", "GHSA-jqvr-j2vg-gjrv" ], "summary": "Signature validation bypass in github.com/moov-io/signedxml", "details": "Signature validation canonicalizes the input XML document before validating the signature. Parsing the uncanonicalized and canonicalized forms can produce different results. An attacker can exploit this variation to bypass signature validation.\n\nUsers of signature validation must only parse the canonicalized form of the validated document. The Validator.Validate function does not return the canonical form, and cannot be used safely. Users should only use the Validator.ValidateReferences function and only parse the canonical form which it returns.\n\nThe Validator.Validate function was removed in github.com/moov-io/signedxml v1.1.0.", "affected": [ { "package": { "name": "github.com/moov-io/signedxml", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.1.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/moov-io/signedxml", "symbols": [ "Validator.Validate" ] } ] } } ], "references": [ { "type": "REPORT", "url": "https://github.com/moov-io/signedxml/issues/23" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-1826", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2588.json
{ "schema_version": "1.3.1", "id": "GO-2024-2588", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-1949", "GHSA-3g35-v53r-gpxc" ], "summary": "Mattermost race condition in github.com/mattermost/mattermost-server", "details": "Mattermost race condition in github.com/mattermost/mattermost-server.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/mattermost/mattermost/server/v8 before v8.1.9.", "affected": [ { "package": { "name": "github.com/mattermost/mattermost-server", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "9.0.0+incompatible" }, { "fixed": "9.4.2+incompatible" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/mattermost/mattermost-server/v5", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/mattermost/mattermost-server/v6", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/mattermost/mattermost/server/v8", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "8.1.9" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-3g35-v53r-gpxc" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-1949" }, { "type": "WEB", "url": "https://mattermost.com/security-updates" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2588", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0433.json
{ "schema_version": "1.3.1", "id": "GO-2022-0433", "modified": "0001-01-01T00:00:00Z", "published": "2022-05-20T21:17:25Z", "aliases": [ "CVE-2022-24675" ], "summary": "Stack overflow from a large amount of PEM data in encoding/pem", "details": "encoding/pem in Go before 1.17.9 and 1.18.x before 1.18.1 has a Decode stack overflow via a large amount of PEM data.", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.17.9" }, { "introduced": "1.18.0-0" }, { "fixed": "1.18.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "encoding/pem", "symbols": [ "Decode" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/399820" }, { "type": "FIX", "url": "https://go.googlesource.com/go/+/45c3387d777caf28f4b992ad9a6216e3085bb8fe" }, { "type": "REPORT", "url": "https://go.dev/issue/51853" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8" } ], "credits": [ { "name": "Juho Nurminen of Mattermost" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0433", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1874.json
{ "schema_version": "1.3.1", "id": "GO-2023-1874", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-40586", "GHSA-c2pj-v37r-2p6h" ], "summary": "Denial of service in github.com/corazawaf/coraza/v2 and v3", "details": "Due to the misuse of log.Fatalf, Coraza may crash after receiving crafted requests from attackers.", "affected": [ { "package": { "name": "github.com/corazawaf/coraza/v2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/corazawaf/coraza/v2/bodyprocessors", "symbols": [ "multipartBodyProcessor.Read" ] } ] } }, { "package": { "name": "github.com/corazawaf/coraza/v3", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "3.0.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/corazawaf/coraza/v3/internal/bodyprocessors", "symbols": [ "multipartBodyProcessor.ProcessRequest" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/corazawaf/coraza/security/advisories/GHSA-c2pj-v37r-2p6h" }, { "type": "FIX", "url": "https://github.com/corazawaf/coraza/commit/a5239ba3ce839e14d9b4f9486e1b4a403dcade8c" }, { "type": "WEB", "url": "https://github.com/corazawaf/coraza/releases/tag/v3.0.1" } ], "credits": [ { "name": "rmb122" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-1874", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2649.json
{ "schema_version": "1.3.1", "id": "GO-2024-2649", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "GHSA-7v38-w32m-wx4m" ], "summary": "Types for Vela Insecure Variable Substitution in github.com/go-vela/types", "details": "Types for Vela Insecure Variable Substitution in github.com/go-vela/types", "affected": [ { "package": { "name": "github.com/go-vela/types", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.23.2" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/go-vela/types/security/advisories/GHSA-7v38-w32m-wx4m" }, { "type": "FIX", "url": "https://github.com/go-vela/types/commit/2e046fceb8fe56fb7170495962f24475cee78d46" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2649", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2450.json
{ "schema_version": "1.3.1", "id": "GO-2024-2450", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-47858", "GHSA-w88v-pjr8-cmv2" ], "summary": "Mattermost viewing archived public channels permissions vulnerability in github.com/mattermost/mattermost-server", "details": "Mattermost viewing archived public channels permissions vulnerability in github.com/mattermost/mattermost-server.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/mattermost/mattermost-server before v7.8.10.; github.com/mattermost/mattermost/server/v8 before v8.1.1.", "affected": [ { "package": { "name": "github.com/mattermost/mattermost-server", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "7.8.10" } ] } ] } }, { "package": { "name": "github.com/mattermost/mattermost-server/v5", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/mattermost/mattermost-server/v6", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/mattermost/mattermost/server/v8", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "8.1.1" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-w88v-pjr8-cmv2" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-47858" }, { "type": "WEB", "url": "https://mattermost.com/security-updates" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2450", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1526.json
{ "schema_version": "1.3.1", "id": "GO-2023-1526", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-24623", "GHSA-v9mp-j8g7-2q6m" ], "summary": "Server-side request forgery in github.com/hakobe/paranoidhttp", "details": "Paranoidhttp before is vulnerable to SSRF because [::] is equivalent to the 127.0.0.1 address, but does not match the filter for private addresses.", "affected": [ { "package": { "name": "github.com/hakobe/paranoidhttp", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.3.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/hakobe/paranoidhttp", "symbols": [ "safeAddr" ] } ] } } ], "references": [ { "type": "WEB", "url": "https://github.com/hakobe/paranoidhttp/blob/master/CHANGELOG.md#v030-2023-01-19" }, { "type": "FIX", "url": "https://github.com/hakobe/paranoidhttp/commit/07f671da14ce63a80f4e52432b32e8d178d75fd3" }, { "type": "WEB", "url": "https://github.com/hakobe/paranoidhttp/compare/v0.2.0...v0.3.0" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-1526", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2564.json
{ "schema_version": "1.3.1", "id": "GO-2024-2564", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-21493", "GHSA-8h95-jcp5-pjpr" ], "summary": "Improper Validation of Array Index in github.com/greenpau/caddy-security", "details": "Improper Validation of Array Index in github.com/greenpau/caddy-security", "affected": [ { "package": { "name": "github.com/greenpau/caddy-security", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-8h95-jcp5-pjpr" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21493" }, { "type": "REPORT", "url": "https://github.com/greenpau/caddy-security/issues/263" }, { "type": "WEB", "url": "https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy" }, { "type": "WEB", "url": "https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-5961078" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2564", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2471.json
{ "schema_version": "1.3.1", "id": "GO-2024-2471", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "GHSA-qr8r-m495-7hc4" ], "summary": "Chain halt panic in github.com/cometbft/cometbft", "details": "A vulnerability in CometBFT’s validation logic for VoteExtensionsEnableHeight can result in a chain halt when triggered through a governance parameter change proposal on an ABCI2 Application Chain. If a parameter change proposal including a VoteExtensionsEnableHeight modification is passed, nodes running the affected versions may panic, halting the network.", "affected": [ { "package": { "name": "github.com/cometbft/cometbft", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0.38.0" }, { "fixed": "0.38.3" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/cometbft/cometbft/types", "symbols": [ "ConsensusParams.ValidateUpdate" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/cometbft/cometbft/security/advisories/GHSA-qr8r-m495-7hc4" }, { "type": "FIX", "url": "https://github.com/cometbft/cometbft/commit/5fbc97378b94b0945febe9549399e7c9c5df13ed" } ], "credits": [ { "name": "@dongsam" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2471", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2792.json
{ "schema_version": "1.3.1", "id": "GO-2024-2792", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-32476", "GHSA-9m6p-x4h2-6frq" ], "summary": "Argo CD vulnerable to a Denial of Service via malicious jqPathExpressions in ignoreDifferences in github.com/argoproj/argo-cd", "details": "Argo CD vulnerable to a Denial of Service via malicious jqPathExpressions in ignoreDifferences in github.com/argoproj/argo-cd", "affected": [ { "package": { "name": "github.com/argoproj/argo-cd", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/argoproj/argo-cd/v2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "2.8.17" }, { "introduced": "2.9.0" }, { "fixed": "2.9.13" }, { "introduced": "2.10.0" }, { "fixed": "2.10.8" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-9m6p-x4h2-6frq" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-32476" }, { "type": "FIX", "url": "https://github.com/argoproj/argo-cd/commit/7893979a1e78d59cedd0ba790ded24e30bb40657" }, { "type": "FIX", "url": "https://github.com/argoproj/argo-cd/commit/9e5cc5a26ff0920a01816231d59fdb5eae032b5a" }, { "type": "FIX", "url": "https://github.com/argoproj/argo-cd/commit/e2df7315fb7d96652186bf7435773a27be330cac" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2792", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0112.json
{ "schema_version": "1.3.1", "id": "GO-2021-0112", "modified": "0001-01-01T00:00:00Z", "published": "2021-07-28T18:08:05Z", "aliases": [ "CVE-2021-20329", "GHSA-f6mq-5m25-4r72" ], "summary": "Improper input validation in go.mongodb.org/mongo-driver", "details": "Due to improper input sanitization when marshalling Go objects into BSON, a maliciously constructed Go structure could allow an attacker to inject additional fields into a MongoDB document. Users are affected if they use this package to handle untrusted user input.", "affected": [ { "package": { "name": "go.mongodb.org/mongo-driver", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.5.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "go.mongodb.org/mongo-driver/x/bsonx/bsoncore", "symbols": [ "AppendArrayElement", "AppendArrayElementStart", "AppendBinaryElement", "AppendBooleanElement", "AppendCodeWithScopeElement", "AppendDBPointerElement", "AppendDateTimeElement", "AppendDecimal128Element", "AppendDocumentElement", "AppendDocumentElementStart", "AppendDoubleElement", "AppendHeader", "AppendInt32Element", "AppendInt64Element", "AppendJavaScriptElement", "AppendMaxKeyElement", "AppendMinKeyElement", "AppendNullElement", "AppendObjectIDElement", "AppendRegex", "AppendRegexElement", "AppendStringElement", "AppendSymbolElement", "AppendTimeElement", "AppendTimestampElement", "AppendUndefinedElement", "AppendValueElement", "ArrayBuilder.AppendArray", "ArrayBuilder.AppendBinary", "ArrayBuilder.AppendBoolean", "ArrayBuilder.AppendCodeWithScope", "ArrayBuilder.AppendDBPointer", "ArrayBuilder.AppendDateTime", "ArrayBuilder.AppendDecimal128", "ArrayBuilder.AppendDocument", "ArrayBuilder.AppendDouble", "ArrayBuilder.AppendInt32", "ArrayBuilder.AppendInt64", "ArrayBuilder.AppendJavaScript", "ArrayBuilder.AppendMaxKey", "ArrayBuilder.AppendMinKey", "ArrayBuilder.AppendNull", "ArrayBuilder.AppendObjectID", "ArrayBuilder.AppendRegex", "ArrayBuilder.AppendString", "ArrayBuilder.AppendSymbol", "ArrayBuilder.AppendTimestamp", "ArrayBuilder.AppendUndefined", "ArrayBuilder.AppendValue", "ArrayBuilder.StartArray", "BuildArray", "BuildArrayElement", "BuildDocumentElement", "DocumentBuilder.AppendArray", "DocumentBuilder.AppendBinary", "DocumentBuilder.AppendBoolean", "DocumentBuilder.AppendCodeWithScope", "DocumentBuilder.AppendDBPointer", "DocumentBuilder.AppendDateTime", "DocumentBuilder.AppendDecimal128", "DocumentBuilder.AppendDocument", "DocumentBuilder.AppendDouble", "DocumentBuilder.AppendInt32", "DocumentBuilder.AppendInt64", "DocumentBuilder.AppendJavaScript", "DocumentBuilder.AppendMaxKey", "DocumentBuilder.AppendMinKey", "DocumentBuilder.AppendNull", "DocumentBuilder.AppendObjectID", "DocumentBuilder.AppendRegex", "DocumentBuilder.AppendString", "DocumentBuilder.AppendSymbol", "DocumentBuilder.AppendTimestamp", "DocumentBuilder.AppendUndefined", "DocumentBuilder.AppendValue", "DocumentBuilder.StartDocument" ] }, { "path": "go.mongodb.org/mongo-driver/bson/bsonrw", "symbols": [ "Copier.AppendArrayBytes", "Copier.AppendDocumentBytes", "Copier.AppendValueBytes", "Copier.CopyArrayFromBytes", "Copier.CopyBytesToArrayWriter", "Copier.CopyBytesToDocumentWriter", "Copier.CopyDocument", "Copier.CopyDocumentFromBytes", "Copier.CopyDocumentToBytes", "Copier.CopyValue", "Copier.CopyValueFromBytes", "Copier.CopyValueToBytes", "CopyDocument", "valueWriter.WriteArray", "valueWriter.WriteBinary", "valueWriter.WriteBinaryWithSubtype", "valueWriter.WriteBoolean", "valueWriter.WriteCodeWithScope", "valueWriter.WriteDBPointer", "valueWriter.WriteDateTime", "valueWriter.WriteDecimal128", "valueWriter.WriteDocument", "valueWriter.WriteDouble", "valueWriter.WriteInt32", "valueWriter.WriteInt64", "valueWriter.WriteJavascript", "valueWriter.WriteMaxKey", "valueWriter.WriteMinKey", "valueWriter.WriteNull", "valueWriter.WriteObjectID", "valueWriter.WriteRegex", "valueWriter.WriteString", "valueWriter.WriteSymbol", "valueWriter.WriteTimestamp", "valueWriter.WriteUndefined", "valueWriter.WriteValueBytes", "valueWriter.writeElementHeader" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/mongodb/mongo-go-driver/pull/622" }, { "type": "FIX", "url": "https://github.com/mongodb/mongo-go-driver/commit/2aca31d5986a9e1c65a92264736de9fdc3b9b4ca" }, { "type": "WEB", "url": "https://jira.mongodb.org/browse/GODRIVER-1923" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0112", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-2052.json
{ "schema_version": "1.3.1", "id": "GO-2023-2052", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-41338", "GHSA-3q5p-3558-364f" ], "summary": "IsFromLocal local address check can be circumvented in github.com/gofiber/fiber/v2", "details": "The Ctx.IsFromLocal function can incorrectly report a request as being sent from localhost when the request contains an X-Forwarded-For header containing a localhost IP address.", "affected": [ { "package": { "name": "github.com/gofiber/fiber/v2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "2.49.2-0.20230906112033-b8c9ede6efa2" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/gofiber/fiber/v2", "symbols": [ "Ctx.IsFromLocal", "Ctx.isLocalHost" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/gofiber/fiber/security/advisories/GHSA-3q5p-3558-364f" }, { "type": "FIX", "url": "https://github.com/gofiber/fiber/commit/b8c9ede6efa231116c4bd8bb9d5e03eac1cb76dc" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-2052", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0096.json
{ "schema_version": "1.3.1", "id": "GO-2021-0096", "modified": "0001-01-01T00:00:00Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2020-8945", "GHSA-m6wg-2mwg-4rfq" ], "summary": "Memory corruption or code execution in github.com/proglottis/gpgme", "details": "Due to improper setting of finalizers, memory passed to C may be freed before it is used, leading to crashes due to memory corruption or possible code execution.", "affected": [ { "package": { "name": "github.com/proglottis/gpgme", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.1.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/proglottis/gpgme" } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/proglottis/gpgme/pull/23" }, { "type": "FIX", "url": "https://github.com/proglottis/gpgme/commit/92153bcb59bd2f511e502262c46c7bd660e21733" } ], "credits": [ { "name": "Ulrich Obergfell" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0096", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0629.json
{ "schema_version": "1.3.1", "id": "GO-2022-0629", "modified": "0001-01-01T00:00:00Z", "published": "2022-02-15T01:57:18Z", "aliases": [ "CVE-2020-8568", "GHSA-5cgx-vhfp-6cf9" ], "summary": "Directory traversal in sigs.k8s.io/secrets-store-csi-driver", "details": "Modifying pod status allows host directory traversal.\n\nKubernetes Secrets Store CSI Driver allows an attacker who can modify a SecretProviderClassPodStatus/Status resource the ability to write content to the host filesystem and sync file contents to Kubernetes Secrets. This includes paths under var/lib/kubelet/pods that contain other Kubernetes Secrets.", "affected": [ { "package": { "name": "sigs.k8s.io/secrets-store-csi-driver", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0.0.15" }, { "fixed": "0.0.17" } ] } ], "ecosystem_specific": { "imports": [ { "path": "sigs.k8s.io/secrets-store-csi-driver/controllers", "symbols": [ "SecretProviderClassPodStatusReconciler.Reconcile" ] }, { "path": "sigs.k8s.io/secrets-store-csi-driver/pkg/rotation", "symbols": [ "Reconciler.Run", "Reconciler.reconcile" ] }, { "path": "sigs.k8s.io/secrets-store-csi-driver/pkg/secrets-store", "symbols": [ "SecretsStore.Run", "nodeServer.NodeUnpublishVolume" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/kubernetes-sigs/secrets-store-csi-driver/pull/371" }, { "type": "FIX", "url": "https://github.com/kubernetes-sigs/secrets-store-csi-driver/commit/c2cbb19e2eef16638fa0523383788a4bc22231fd" } ], "credits": [ { "name": "tam7t (Tommy Murphy)" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0629", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1914.json
{ "schema_version": "1.3.1", "id": "GO-2023-1914", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "GHSA-f28g-86hc-823q" ], "summary": "Brute-force of token secrets in github.com/superfly/tokenizer", "details": "Brute-force of token secrets in github.com/superfly/tokenizer", "affected": [ { "package": { "name": "github.com/superfly/tokenizer", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.0.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/superfly/tokenizer" } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-f28g-86hc-823q" }, { "type": "FIX", "url": "https://github.com/superfly/tokenizer/pull/8" }, { "type": "FIX", "url": "https://github.com/superfly/tokenizer/pull/9" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-1914", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2778.json
{ "schema_version": "1.3.1", "id": "GO-2024-2778", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2021-31999", "GHSA-pvxj-25m6-7vqr" ], "summary": "Rancher Privilege escalation vulnerability via malicious \"Connection\" header in github.com/rancher/rancher", "details": "Rancher Privilege escalation vulnerability via malicious \"Connection\" header in github.com/rancher/rancher.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/rancher/rancher before v2.4.16, from v2.5.0 before v2.5.9.", "affected": [ { "package": { "name": "github.com/rancher/rancher", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "2.0.0+incompatible" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "2.4.16" }, { "introduced": "2.5.0" }, { "fixed": "2.5.9" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-pvxj-25m6-7vqr" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31999" }, { "type": "WEB", "url": "https://bugzilla.suse.com/show_bug.cgi?id=1187084" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2778", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2734.json
{ "schema_version": "1.3.1", "id": "GO-2024-2734", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-30257", "GHSA-6m9h-2pr2-9j8f" ], "summary": "1Panel's password verification is suspected to have a timing attack vulnerability in github.com/1Panel-dev/1Panel", "details": "1Panel's password verification is suspected to have a timing attack vulnerability in github.com/1Panel-dev/1Panel.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/1Panel-dev/1Panel before v1.10.3.", "affected": [ { "package": { "name": "github.com/1Panel-dev/1Panel", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "1.10.3" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-6m9h-2pr2-9j8f" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-30257" }, { "type": "WEB", "url": "https://github.com/1Panel-dev/1Panel/blob/dev/backend/app/service/auth.go#L81C5-L81C26" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2734", "review_status": "UNREVIEWED" } }