repo_id
stringclasses
927 values
file_path
stringlengths
99
214
content
stringlengths
2
4.15M
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0063.json
{ "schema_version": "1.3.1", "id": "GO-2021-0063", "modified": "0001-01-01T00:00:00Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2020-26264", "GHSA-r33q-22hv-j29q" ], "summary": "Nil pointer dereference via malicious RPC message in github.com/ethereum/go-ethereum", "details": "Due to a nil pointer dereference, a maliciously crafted RPC message can cause a panic. If handling RPC messages from untrusted clients, this may be used as a denial of service vector.", "affected": [ { "package": { "name": "github.com/ethereum/go-ethereum", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.9.25" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/ethereum/go-ethereum/les", "symbols": [ "PrivateLightServerAPI.Benchmark", "serverHandler.handleMsg" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/ethereum/go-ethereum/pull/21896" }, { "type": "FIX", "url": "https://github.com/ethereum/go-ethereum/commit/bddd103a9f0af27ef533f04e06ea429cf76b6d46" } ], "credits": [ { "name": "@zsfelfoldi" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0063", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2605.json
{ "schema_version": "1.3.1", "id": "GO-2024-2605", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-27289", "GHSA-m7wr-2xf7-cm9p" ], "summary": "SQL injection in github.com/jackc/pgx/v4", "details": "SQL injection is possible when the database uses the non-default simple protocol, a minus sign directly precedes a numeric placeholder followed by a string placeholder on the same line, and both parameter values are user-controlled.", "affected": [ { "package": { "name": "github.com/jackc/pgx/v4", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "4.18.2" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/jackc/pgx/v4/internal/sanitize", "symbols": [ "Query.Sanitize", "SanitizeSQL" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/jackc/pgx/security/advisories/GHSA-m7wr-2xf7-cm9p" }, { "type": "FIX", "url": "https://github.com/jackc/pgx/commit/f94eb0e2f96782042c96801b5ac448f44f0a81df" } ], "credits": [ { "name": "paul-gerste-sonarsource" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2605", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2760.json
{ "schema_version": "1.3.1", "id": "GO-2024-2760", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2021-36775", "GHSA-28g7-896h-695v" ], "summary": "Rancher's Failure to delete orphaned role bindings does not revoke project level access from group based authentication in github.com/rancher/rancher", "details": "Rancher's Failure to delete orphaned role bindings does not revoke project level access from group based authentication in github.com/rancher/rancher.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/rancher/rancher before v2.4.18, from v2.5.0 before v2.5.12, from v2.6.0 before v2.6.3.", "affected": [ { "package": { "name": "github.com/rancher/rancher", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "2.4.18" }, { "introduced": "2.5.0" }, { "fixed": "2.5.12" }, { "introduced": "2.6.0" }, { "fixed": "2.6.3" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/rancher/rancher/security/advisories/GHSA-28g7-896h-695v" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-36775" }, { "type": "WEB", "url": "https://bugzilla.suse.com/show_bug.cgi?id=1189120" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2760", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2669.json
{ "schema_version": "1.3.1", "id": "GO-2024-2669", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-3299", "GHSA-9jfx-84v9-2rr2" ], "summary": "API token secret ID leak to Sentinel in github.com/hashicorp/nomad", "details": "A vulnerability exists in Nomad where the API caller's ACL token secret ID is exposed to Sentinel policies.", "affected": [ { "package": { "name": "github.com/hashicorp/nomad", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "1.2.11" }, { "fixed": "1.4.11" }, { "introduced": "1.5.0" }, { "fixed": "1.5.7" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "REPORT", "url": "https://github.com/hashicorp/nomad/issues/17907" }, { "type": "WEB", "url": "https://discuss.hashicorp.com/t/hcsec-2023-21-nomad-caller-acl-tokens-secret-id-is-exposed-to-sentinel/56271" } ], "credits": [ { "name": "anonymous4ACL24" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2669", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2594.json
{ "schema_version": "1.3.1", "id": "GO-2024-2594", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-1953", "GHSA-vm9m-57jr-4pxh" ], "summary": "Mattermost fails to limit the number of role names in github.com/mattermost/mattermost-server", "details": "Mattermost fails to limit the number of role names in github.com/mattermost/mattermost-server.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/mattermost/mattermost/server/v8 before v8.1.9.", "affected": [ { "package": { "name": "github.com/mattermost/mattermost-server", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "9.2.0+incompatible" }, { "fixed": "9.2.5+incompatible" }, { "introduced": "9.3.0+incompatible" }, { "fixed": "9.3.1+incompatible" }, { "introduced": "9.4.0+incompatible" }, { "fixed": "9.4.2+incompatible" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/mattermost/mattermost-server/v5", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/mattermost/mattermost-server/v6", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/mattermost/mattermost/server/v8", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "8.1.9" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-vm9m-57jr-4pxh" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-1953" }, { "type": "WEB", "url": "https://mattermost.com/security-updates" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2594", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1515.json
{ "schema_version": "1.3.1", "id": "GO-2023-1515", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2022-43756", "GHSA-8fcj-gf77-47mg" ], "summary": "Denial of service when processing Git credentials in github.com/rancher/wrangler", "details": "A denial of service (DoS) vulnerability exists in the Wrangler Git package. Specially crafted Git credentials can result in a denial of service (DoS) attack on an application that uses Wrangler due to the exhaustion of the available memory and CPU resources.\n\nThis is caused by a lack of input validation of Git credentials before they are used, which may lead to a denial of service in some cases. This issue can be triggered when accessing both private and public Git repositories.\n\nA workaround is to sanitize input passed to the Git package to remove potential unsafe and ambiguous characters. Otherwise, the best course of action is to update to a patched Wrangler version.", "affected": [ { "package": { "name": "github.com/rancher/wrangler", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.7.4-security1" }, { "introduced": "0.8.0" }, { "fixed": "0.8.5-security1" }, { "introduced": "0.8.6" }, { "fixed": "0.8.11" }, { "introduced": "1.0.0" }, { "fixed": "1.0.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/rancher/wrangler/pkg/git", "symbols": [ "Git.Clone", "Git.Ensure", "Git.Head", "Git.LsRemote", "Git.Update", "Git.fetchAndReset", "Git.gitCmd", "Git.reset" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/rancher/wrangler/commit/341018c8fef3e12867c7cb2649bd2cecac75f287" }, { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-8fcj-gf77-47mg" }, { "type": "WEB", "url": "https://github.com/rancher/rancher/security/policy" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-1515", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0100.json
{ "schema_version": "1.3.1", "id": "GO-2021-0100", "modified": "0001-01-01T00:00:00Z", "published": "2021-07-28T18:08:05Z", "aliases": [ "CVE-2021-20291", "GHSA-7qw8-847f-pggm" ], "summary": "Denial of service via deadlock in github.com/containers/storage", "details": "Due to a goroutine deadlock, using github.com/containers/storage/pkg/archive.DecompressStream on a xz archive returns a reader which will hang indefinitely when Close is called. An attacker can use this to cause denial of service if they are able to cause the caller to attempt to decompress an archive they control.", "affected": [ { "package": { "name": "github.com/containers/storage", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.28.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/containers/storage/pkg/archive", "symbols": [ "ApplyLayer", "ApplyUncompressedLayer", "Archiver.CopyFileWithTar", "Archiver.CopyWithTar", "Archiver.TarUntar", "Archiver.UntarPath", "CopyResource", "CopyTo", "DecompressStream", "IsArchivePath", "Untar", "UntarPath", "UntarUncompressed", "cmdStream" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/containers/storage/pull/860" }, { "type": "FIX", "url": "https://github.com/containers/storage/commit/306fcabc964470e4b3b87a43a8f6b7d698209ee1" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1939485" } ], "credits": [ { "name": "Aviv Sasson (Palo Alto Networks)" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0100", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2880.json
{ "schema_version": "1.3.1", "id": "GO-2024-2880", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "GHSA-f7cq-5v43-8pwp" ], "summary": "Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik", "details": "Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik", "affected": [ { "package": { "name": "github.com/traefik/traefik", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/traefik/traefik/v2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "2.11.3" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/traefik/traefik/v3", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "3.0.1" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/traefik/traefik/security/advisories/GHSA-f7cq-5v43-8pwp" }, { "type": "WEB", "url": "https://github.com/advisories/GHSA-5fq7-4mxc-535h" }, { "type": "WEB", "url": "https://github.com/traefik/traefik/releases/tag/v2.11.3" }, { "type": "WEB", "url": "https://github.com/traefik/traefik/releases/tag/v3.0.1" }, { "type": "WEB", "url": "https://www.cve.org/CVERecord?id=CVE-2024-24788" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2880", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2791.json
{ "schema_version": "1.3.1", "id": "GO-2024-2791", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-3154", "GHSA-2cgq-h8xw-2v5j" ], "summary": "CRI-O vulnerable to an arbitrary systemd property injection in github.com/cri-o/cri-o", "details": "CRI-O vulnerable to an arbitrary systemd property injection in github.com/cri-o/cri-o", "affected": [ { "package": { "name": "github.com/cri-o/cri-o", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.27.6" }, { "introduced": "1.28.0" }, { "fixed": "1.28.6" }, { "introduced": "1.29.0" }, { "fixed": "1.29.4" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/cri-o/cri-o/security/advisories/GHSA-2cgq-h8xw-2v5j" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3154" }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2024-3154" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272532" }, { "type": "WEB", "url": "https://github.com/opencontainers/runc/pull/4217" }, { "type": "WEB", "url": "https://github.com/opencontainers/runtime-spec/blob/main/features.md#unsafe-annotations-in-configjson" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2791", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2491.json
{ "schema_version": "1.3.1", "id": "GO-2024-2491", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-21626", "GHSA-xr7r-f8xq-vfvv" ], "summary": "Container breakout through process.cwd trickery and leaked fds in github.com/opencontainers/runc", "details": "Container breakout through process.cwd trickery and leaked fds in github.com/opencontainers/runc", "affected": [ { "package": { "name": "github.com/opencontainers/runc", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "1.0.0-rc93" }, { "fixed": "1.1.12" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/opencontainers/runc/libcontainer/utils", "symbols": [ "CloseExecFrom" ] }, { "path": "github.com/opencontainers/runc/libcontainer/cgroups", "symbols": [ "openFile", "prepareOpenat2" ] }, { "path": "github.com/opencontainers/runc/libcontainer", "symbols": [ "Container.start", "Init", "finalizeNamespace", "linuxSetnsInit.Init", "linuxStandardInit.Init" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/opencontainers/runc/security/advisories/GHSA-xr7r-f8xq-vfvv" }, { "type": "FIX", "url": "https://github.com/opencontainers/runc/commit/02120488a4c0fc487d1ed2867e901eeed7ce8ecf" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/176993/runc-1.1.11-File-Descriptor-Leak-Privilege-Escalation.html" } ], "credits": [ { "name": "Rory McNamara from Snyk" }, { "name": "@lifubang from acmcoder" }, { "name": "Aleksa Sarai from SUSE" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2491", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0241.json
{ "schema_version": "1.3.1", "id": "GO-2021-0241", "modified": "0001-01-01T00:00:00Z", "published": "2022-02-17T17:33:16Z", "aliases": [ "CVE-2021-33197" ], "summary": "Attacker can drop certain headers in net/http/httputil", "details": "ReverseProxy can be made to forward certain hop-by-hop headers, including Connection. If the target of the ReverseProxy is itself a reverse proxy, this lets an attacker drop arbitrary headers, including those set by the ReverseProxy.Director.", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.15.13" }, { "introduced": "1.16.0-0" }, { "fixed": "1.16.5" } ] } ], "ecosystem_specific": { "imports": [ { "path": "net/http/httputil", "symbols": [ "ReverseProxy.ServeHTTP" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/321929" }, { "type": "FIX", "url": "https://go.googlesource.com/go/+/950fa11c4cb01a145bb07eeb167d90a1846061b3" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" }, { "type": "REPORT", "url": "https://go.dev/issue/46313" } ], "credits": [ { "name": "Mattias Grenfeldt (https://grenfeldt.dev)" }, { "name": "Asta Olofsson" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0241", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-2333.json
{ "schema_version": "1.3.1", "id": "GO-2023-2333", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "GHSA-rjjm-x32p-m3f7" ], "summary": "Range checker gadget allows wider inputs than allowed in github.com/consensys/gnark", "details": "Range checker gadget allows wider inputs than allowed in github.com/consensys/gnark", "affected": [ { "package": { "name": "github.com/consensys/gnark", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.9.2-0.20231110170422-f528807119e9" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/consensys/gnark/std/rangecheck", "symbols": [ "commitChecker.commit", "nbPLONKConstraints", "nbR1CSConstraints" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/Consensys/gnark/security/advisories/GHSA-rjjm-x32p-m3f7" }, { "type": "WEB", "url": "https://github.com/Consensys/gnark/issues/897" }, { "type": "FIX", "url": "https://github.com/Consensys/gnark/commit/f528807119e9443df94b8c01fe8ee65abe3c75d8" } ], "credits": [ { "name": "@ultrainstinct30" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-2333", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2511.json
{ "schema_version": "1.3.1", "id": "GO-2024-2511", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-0831", "GHSA-vgh3-mwxq-rcp8" ], "summary": "Hashicorp Vault may expose sensitive log information in github.com/hashicorp/vault", "details": "Hashicorp Vault may expose sensitive log information in github.com/hashicorp/vault", "affected": [ { "package": { "name": "github.com/hashicorp/vault", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "1.15.0" }, { "fixed": "1.15.5" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-vgh3-mwxq-rcp8" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0831" }, { "type": "FIX", "url": "https://github.com/hashicorp/vault/commit/2a72f2a8a5b57de88c22a2a94c4a5f08c6f3770b" }, { "type": "WEB", "url": "https://developer.hashicorp.com/vault/docs/upgrading/upgrade-to-1.15.x#audit-devices-could-log-raw-data-despite-configuration" }, { "type": "WEB", "url": "https://discuss.hashicorp.com/t/hcsec-2024-01-vault-may-expose-sensitive-information-when-configuring-an-audit-log-device/62311" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20240223-0005" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2511", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2593.json
{ "schema_version": "1.3.1", "id": "GO-2024-2593", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-1888", "GHSA-pfw6-5rx3-xh3c" ], "summary": "Mattermost fails to check the \"invite_guest\" permission in github.com/mattermost/mattermost-server", "details": "Mattermost fails to check the \"invite_guest\" permission in github.com/mattermost/mattermost-server.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/mattermost/mattermost/server/v8 before v8.1.9.", "affected": [ { "package": { "name": "github.com/mattermost/mattermost-server", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "9.2.0+incompatible" }, { "fixed": "9.2.5+incompatible" }, { "introduced": "9.3.0+incompatible" }, { "fixed": "9.3.1+incompatible" }, { "introduced": "9.4.0+incompatible" }, { "fixed": "9.4.2+incompatible" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/mattermost/mattermost-server/v5", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/mattermost/mattermost-server/v6", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/mattermost/mattermost/server/v8", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "8.1.9" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-pfw6-5rx3-xh3c" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-1888" }, { "type": "WEB", "url": "https://mattermost.com/security-updates" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2593", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2536.json
{ "schema_version": "1.3.1", "id": "GO-2024-2536", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-32193", "GHSA-r8f4-hv23-6qp6" ], "summary": "Cross-site scripting in public API in github.com/rancher/norman", "details": "Cross-site scripting in public API in github.com/rancher/norman", "affected": [ { "package": { "name": "github.com/rancher/norman", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.0.0-20240207153100-3bb70b772b52" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/rancher/norman/urlbuilder", "symbols": [ "GetHost", "New", "ParseRequestURL" ] }, { "path": "github.com/rancher/norman/api/writer", "symbols": [ "HTMLResponseWriter.Write" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/rancher/norman/security/advisories/GHSA-r8f4-hv23-6qp6" }, { "type": "FIX", "url": "https://github.com/rancher/norman/commit/3bb70b772b52297feac64f5fdeb1b13c06c37e39" }, { "type": "FIX", "url": "https://github.com/rancher/norman/commit/7b2b467995e6dfab6d4a5dee8dffc15033ae8269" }, { "type": "FIX", "url": "https://github.com/rancher/norman/commit/a6a6cf5696088c32002953d36b75bdcc84f2399e" }, { "type": "FIX", "url": "https://github.com/rancher/norman/commit/bd13c653293b9b5e0b37e8a6ccd1c3277f4623ed" }, { "type": "FIX", "url": "https://github.com/rancher/norman/commit/cb54924f25c7666511a913cd41834299ef22dba4" } ], "credits": [ { "name": "diego95root" }, { "name": "kujalamathias" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2536", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1717.json
{ "schema_version": "1.3.1", "id": "GO-2023-1717", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-29194", "GHSA-735r-hv67-g38f" ], "summary": "Improper handling of keyspaces in vitess.io/vitess", "details": "Users can create a keyspace containing '/'. Future attempts to view keyspaces from some tools (including VTAdmin and \"vtctldclient GetKeyspaces\") receive an error.", "affected": [ { "package": { "name": "vitess.io/vitess", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.16.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "vitess.io/vitess/go/vt/vtorc/inst", "symbols": [ "GetDurabilityPolicy", "ReadKeyspace", "ReadTopologyInstance", "ReadTopologyInstanceBufferable", "SwitchPrimary" ] }, { "path": "vitess.io/vitess/go/vt/topo", "symbols": [ "Server.CreateKeyspace", "Server.CreateShard", "Server.FindAllShardsInKeyspace", "Server.GetKeyspace", "Server.GetKeyspaceDurability", "Server.GetOnlyShard", "Server.GetOrCreateShard", "Server.GetServingShards", "Server.GetShardNames", "Server.InitTablet", "Server.ResolveShardWildcard" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/vitessio/vitess/security/advisories/GHSA-735r-hv67-g38f" }, { "type": "FIX", "url": "https://github.com/vitessio/vitess/commit/adf10196760ad0b3991a7aa7a8580a544e6ddf88" }, { "type": "FIX", "url": "https://github.com/vitessio/vitess/commits/v0.16.1/" } ], "credits": [ { "name": "@AdamKorcz" }, { "name": "@ajm188" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-1717", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0347.json
{ "schema_version": "1.3.1", "id": "GO-2021-0347", "modified": "0001-01-01T00:00:00Z", "published": "2022-05-23T22:15:47Z", "aliases": [ "CVE-2022-24921" ], "summary": "Stack exhaustion when compiling deeply nested expressions in regexp", "details": "On 64-bit platforms, an extremely deeply nested expression can cause regexp.Compile to cause goroutine stack exhaustion, forcing the program to exit. Note this applies to very large expressions, on the order of 2MB.", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.16.15" }, { "introduced": "1.17.0-0" }, { "fixed": "1.17.8" } ] } ], "ecosystem_specific": { "imports": [ { "path": "regexp", "symbols": [ "regexp.Compile" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/384616" }, { "type": "FIX", "url": "https://go.googlesource.com/go/+/452f24ae94f38afa3704d4361d91d51218405c0a" }, { "type": "REPORT", "url": "https://go.dev/issue/51112" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/RP1hfrBYVuk" } ], "credits": [ { "name": "Juho Nurminen" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0347", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2561.json
{ "schema_version": "1.3.1", "id": "GO-2024-2561", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-21498", "GHSA-93x8-66j2-wwr5" ], "summary": "Server-Side Request Forgery in github.com/greenpau/caddy-security", "details": "Server-Side Request Forgery in github.com/greenpau/caddy-security", "affected": [ { "package": { "name": "github.com/greenpau/caddy-security", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-93x8-66j2-wwr5" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21498" }, { "type": "REPORT", "url": "https://github.com/greenpau/caddy-security/issues/269" }, { "type": "WEB", "url": "https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy" }, { "type": "WEB", "url": "https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-6249862" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2561", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2538.json
{ "schema_version": "1.3.1", "id": "GO-2024-2538", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-1329", "GHSA-c866-8gpw-p3mv" ], "summary": "Symlink attack in github.com/hashicorp/nomad", "details": "Symlink attack in github.com/hashicorp/nomad", "affected": [ { "package": { "name": "github.com/hashicorp/nomad", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "1.5.13" }, { "fixed": "1.5.14" }, { "introduced": "1.6.0" }, { "fixed": "1.6.7" }, { "introduced": "1.7.3" }, { "fixed": "1.7.4" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/hashicorp/nomad/helper/escapingfs", "symbols": [ "PathEscapesAllocDir", "pathEscapesBaseViaSymlink" ] }, { "path": "github.com/hashicorp/nomad/client/allocwatcher", "symbols": [ "remotePrevAlloc.Migrate", "remotePrevAlloc.migrateAllocDir", "remotePrevAlloc.streamAllocDir" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-1329" }, { "type": "REPORT", "url": "https://github.com/hashicorp/nomad/issues/19888" }, { "type": "FIX", "url": "https://github.com/hashicorp/nomad/commit/b3209cbc6921e703b0e9984ce70c10b378665834" }, { "type": "FIX", "url": "https://github.com/hashicorp/nomad/commit/d1721c7a6fc1833778086603f818a822a34f445a" }, { "type": "FIX", "url": "https://github.com/hashicorp/nomad/commit/de55da677a21ac7572c0f4a8cd9abd5473c47a70" }, { "type": "WEB", "url": "https://discuss.hashicorp.com/t/hcsec-2024-03-nomad-vulnerable-to-arbitrary-write-through-symlink-attack" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2538", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1839.json
{ "schema_version": "1.3.1", "id": "GO-2023-1839", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-29402" ], "summary": "Code injection via go command with cgo in cmd/go", "details": "The go command may generate unexpected code at build time when using cgo. This may result in unexpected behavior when running a go program which uses cgo.\n\nThis may occur when running an untrusted module which contains directories with newline characters in their names. Modules which are retrieved using the go command, i.e. via \"go get\", are not affected (modules retrieved using GOPATH-mode, i.e. GO111MODULE=off, may be affected).", "affected": [ { "package": { "name": "toolchain", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.19.10" }, { "introduced": "1.20.0-0" }, { "fixed": "1.20.5" } ] } ], "ecosystem_specific": { "imports": [ { "path": "cmd/go" } ] } } ], "references": [ { "type": "REPORT", "url": "https://go.dev/issue/60167" }, { "type": "FIX", "url": "https://go.dev/cl/501226" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/q5135a9d924/m/j0ZoAJOHAwAJ" } ], "credits": [ { "name": "Juho Nurminen of Mattermost" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-1839", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2451.json
{ "schema_version": "1.3.1", "id": "GO-2024-2451", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "summary": "IV collision in github.com/bincyber/go-sqlcrypter", "details": "There is a risk of an IV collision using the awskms or aesgcm provider. NIST SP 800-38D section 8.3 states that it is unsafe to encrypt more than 2^32 plaintexts under the same key when using a random IV. The limit could easily be reached given the use case of database column encryption. Ciphertexts are likely to be persisted and stored together. IV collision could enable an attacker with access to the ciphertexts to decrypt all messages encrypted with the affected key.\n\nThe aesgcm provider cannot be fixed without a breaking change, so users should not encrypt more than 2^32 values with any key. The awskms package can be fixed without a breaking change by switching to a counter-based IV.", "affected": [ { "package": { "name": "github.com/bincyber/go-sqlcrypter", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0.1.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/bincyber/go-sqlcrypter/providers/aesgcm", "symbols": [ "New" ] }, { "path": "github.com/bincyber/go-sqlcrypter/providers/awskms", "symbols": [ "New" ] } ] } } ], "references": [ { "type": "REPORT", "url": "https://github.com/bincyber/go-sqlcrypter/issues/127" }, { "type": "WEB", "url": "https://github.com/bincyber/go-sqlcrypter/pull/128" } ], "credits": [ { "name": "@takeyourhatoff" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2451", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2595.json
{ "schema_version": "1.3.1", "id": "GO-2024-2595", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-23488", "GHSA-xgxj-j98c-59rv" ], "summary": "Mattermost fails to properly restrict the access of files attached to posts in github.com/mattermost/mattermost-server", "details": "Mattermost fails to properly restrict the access of files attached to posts in github.com/mattermost/mattermost-server.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/mattermost/mattermost/server/v8 before v8.1.9.", "affected": [ { "package": { "name": "github.com/mattermost/mattermost-server", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "9.0.0+incompatible" }, { "fixed": "9.4.2+incompatible" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/mattermost/mattermost-server/v5", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/mattermost/mattermost-server/v6", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/mattermost/mattermost/server/v8", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "8.1.9" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-xgxj-j98c-59rv" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23488" }, { "type": "WEB", "url": "https://mattermost.com/security-updates" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2595", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2846.json
{ "schema_version": "1.3.1", "id": "GO-2024-2846", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "GHSA-c9cp-9c75-9v8c" ], "summary": "Containers started with non-empty inheritable Linux process capabilities in github.com/containerd/containerd", "details": "Containers started with non-empty inheritable Linux process capabilities in github.com/containerd/containerd", "affected": [ { "package": { "name": "github.com/containerd/containerd", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.5.11" }, { "introduced": "1.6.0" }, { "fixed": "1.6.2" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/containerd/containerd/oci", "symbols": [ "ApplyOpts", "GenerateSpec", "GenerateSpecWithPlatform", "WithAddedCapabilities", "WithAmbientCapabilities", "WithCapabilities", "WithDroppedCapabilities", "populateDefaultUnixSpec" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/containerd/containerd/security/advisories/GHSA-c9cp-9c75-9v8c" }, { "type": "FIX", "url": "https://github.com/containerd/containerd/commit/e9af808591ee1468f9b0ad6a0d41fdf93ee0c1bc" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2846", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2480.json
{ "schema_version": "1.3.1", "id": "GO-2024-2480", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-23828", "GHSA-qcjq-7f7v-pvc8" ], "summary": "Nginx-UI vulnerable to authenticated RCE through injecting into the application config via CRLF in github.com/0xJacky/Nginx-UI", "details": "Nginx-UI vulnerable to authenticated RCE through injecting into the application config via CRLF in github.com/0xJacky/Nginx-UI.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/0xJacky/Nginx-UI before v2.0.0-beta.12.", "affected": [ { "package": { "name": "github.com/0xJacky/Nginx-UI", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "2.0.0-beta.12" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/0xJacky/nginx-ui/security/advisories/GHSA-qcjq-7f7v-pvc8" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23828" }, { "type": "WEB", "url": "https://github.com/0xJacky/nginx-ui/commit/d70e37c8575e25b3da7203ff06da5e16c77a42d1" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2480", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2661.json
{ "schema_version": "1.3.1", "id": "GO-2024-2661", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2019-19499", "GHSA-4pwp-cx67-5cpx" ], "summary": "Arbitrary file read in github.com/grafana/grafana", "details": "An authenticated attacker that has privileges to modify the data source configurations can read arbitrary files.", "affected": [ { "package": { "name": "github.com/grafana/grafana", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "6.4.4" } ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/grafana/grafana/pull/20192" }, { "type": "WEB", "url": "https://github.com/grafana/grafana/blob/master/CHANGELOG.md#644-2019-11-06" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20200918-0003" }, { "type": "WEB", "url": "https://swarm.ptsecurity.com/grafana-6-4-3-arbitrary-file-read" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2661", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2020-0003.json
{ "schema_version": "1.3.1", "id": "GO-2020-0003", "modified": "0001-01-01T00:00:00Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2020-36568", "GHSA-hggr-p7v6-73p5" ], "summary": "Resource exhaustion in github.com/revel/revel", "details": "An attacker can cause an application that accepts slice parameters (https://revel.github.io/manual/parameters.html#slices) to allocate large amounts of memory and crash through manipulating the request query sent to the application.", "affected": [ { "package": { "name": "github.com/revel/revel", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.0.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/revel/revel" } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/revel/revel/pull/1427" }, { "type": "FIX", "url": "https://github.com/revel/revel/commit/d160ecb72207824005b19778594cbdc272e8a605" }, { "type": "WEB", "url": "https://github.com/revel/revel/issues/1424" } ], "credits": [ { "name": "@SYM01" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2020-0003", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0412.json
{ "schema_version": "1.3.1", "id": "GO-2021-0412", "modified": "0001-01-01T00:00:00Z", "published": "2022-04-28T23:35:11Z", "aliases": [ "CVE-2022-24778", "GHSA-8v99-48m9-c8pm" ], "summary": "Incorrect authorization in github.com/containerd/imgcrypt", "details": "The imgcrypt library provides API extensions for containerd to support encrypted container images and implements the ctd-decoder command line tool for use by containerd to decrypt encrypted container images. The imgcrypt function CheckAuthorization is supposed to check whether the current used is authorized to access an encrypted image and prevent the user from running an image that another user previously decrypted on the same system. In versions prior to 1.1.4, a failure occurs when an image with a ManifestList is used and the architecture of the local host is not the first one in the ManifestList. Only the first architecture in the list was tested, which may not have its layers available locally since it could not be run on the host architecture. Therefore, the verdict on unavailable layers was that the image could be run anticipating that image run failure would occur later due to the layers not being available. However, this verdict to allow the image to run enabled other architectures in the ManifestList to run an image without providing keys if that image had previously been decrypted. A patch has been applied to imgcrypt 1.1.4. Workarounds may include usage of different namespaces for each remote user.", "affected": [ { "package": { "name": "github.com/containerd/imgcrypt", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.1.4" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/containerd/imgcrypt/images/encryption", "symbols": [ "CheckAuthorization", "DecryptImage", "EncryptImage", "cryptManifestList" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/containerd/imgcrypt/commit/6fdd9818a4d8142107b7ecd767d839c9707700d9" }, { "type": "WEB", "url": "https://github.com/containerd/imgcrypt/issues/69" }, { "type": "WEB", "url": "https://github.com/containerd/imgcrypt/releases/tag/v1.1.4" } ], "credits": [ { "name": "@dimitar-dimitrow" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0412", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2590.json
{ "schema_version": "1.3.1", "id": "GO-2024-2590", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-23493", "GHSA-7v3v-984v-h74r" ], "summary": "Mattermost leaks details of AD/LDAP groups of a teams in github.com/mattermost/mattermost-server", "details": "Mattermost leaks details of AD/LDAP groups of a teams in github.com/mattermost/mattermost-server.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/mattermost/mattermost/server/v8 before v8.1.9.", "affected": [ { "package": { "name": "github.com/mattermost/mattermost-server", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "9.2.0+incompatible" }, { "fixed": "9.2.5+incompatible" }, { "introduced": "9.3.0+incompatible" }, { "fixed": "9.3.1+incompatible" }, { "introduced": "9.4.0+incompatible" }, { "fixed": "9.4.2+incompatible" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/mattermost/mattermost-server/v5", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/mattermost/mattermost-server/v6", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/mattermost/mattermost/server/v8", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "8.1.9" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-7v3v-984v-h74r" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23493" }, { "type": "WEB", "url": "https://mattermost.com/security-updates" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2590", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2867.json
{ "schema_version": "1.3.1", "id": "GO-2024-2867", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2022-39324", "GHSA-4724-7jwc-3fpw" ], "summary": "Grafana Spoofing originalUrl of snapshots in github.com/grafana/grafana", "details": "Grafana Spoofing originalUrl of snapshots in github.com/grafana/grafana.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/grafana/grafana before v8.5.16, from v9.0.0 before v9.2.8.", "affected": [ { "package": { "name": "github.com/grafana/grafana", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "8.5.16" }, { "introduced": "9.0.0" }, { "fixed": "9.2.8" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/grafana/grafana/security/advisories/GHSA-4724-7jwc-3fpw" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-39324" }, { "type": "FIX", "url": "https://github.com/grafana/grafana/commit/239888f22983010576bb3a9135a7294e88c0c74a" }, { "type": "FIX", "url": "https://github.com/grafana/grafana/commit/d7dcea71ea763780dc286792a0afd560bff2985c" }, { "type": "FIX", "url": "https://github.com/grafana/grafana/pull/60232" }, { "type": "FIX", "url": "https://github.com/grafana/grafana/pull/60256" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2867", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2020-0026.json
{ "schema_version": "1.3.1", "id": "GO-2020-0026", "modified": "0001-01-01T00:00:00Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2018-1103", "GHSA-w55j-f7vx-6q37" ], "summary": "Arbitrary file write via archive extraction in github.com/openshift/source-to-image", "details": "Due to improper path sanitization, archives containing relative file paths can cause files to be written (or overwritten) outside of the target directory.", "affected": [ { "package": { "name": "github.com/openshift/source-to-image", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.1.10-0.20180427153919-f5cbcbc5cc6f" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/openshift/source-to-image/pkg/tar", "symbols": [ "New", "stiTar.ExtractTarStream", "stiTar.ExtractTarStreamFromTarReader", "stiTar.ExtractTarStreamWithLogging", "stiTar.extractLink" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/openshift/source-to-image/commit/f5cbcbc5cc6f8cc2f479a7302443bea407a700cb" }, { "type": "WEB", "url": "https://snyk.io/research/zip-slip-vulnerability" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2020-0026", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1558.json
{ "schema_version": "1.3.1", "id": "GO-2023-1558", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-23626", "GHSA-2h6c-j3gf-xp9r" ], "summary": "Denial of service via malformed size parameters in github.com/ipfs/go-bitfield", "details": "When feeding untrusted user input into the size parameter of NewBitfield and FromBytes functions, an attacker can trigger panics.\n\nThis happens when the size is a not a multiple of 8 or is negative.\n\nA workaround is to ensure size%8 == 0 \u0026\u0026 size \u003e= 0 yourself before calling NewBitfield or FromBytes.", "affected": [ { "package": { "name": "github.com/ipfs/go-bitfield", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.1.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/ipfs/go-bitfield", "symbols": [ "FromBytes", "NewBitfield" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/ipfs/go-bitfield/security/advisories/GHSA-2h6c-j3gf-xp9r" }, { "type": "FIX", "url": "https://github.com/ipfs/go-bitfield/commit/5e1d256fe043fc4163343ccca83862c69c52e579" } ], "credits": [ { "name": "Jorropo" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-1558", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2920.json
{ "schema_version": "1.3.1", "id": "GO-2024-2920", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-49559", "GHSA-2hmf-46v7-v6fx" ], "summary": "Denial of service vulnerability via the parseDirectives function in github.com/vektah/gqlparser", "details": "An issue in vektah gqlparser open-source-library allows a remote attacker to cause a denial of service via a crafted script to the parseDirectives function.", "affected": [ { "package": { "name": "github.com/vektah/gqlparser", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/vektah/gqlparser/parser", "symbols": [ "ParseQuery", "ParseSchema", "ParseSchemas", "parser.parseDirectives" ] } ] } }, { "package": { "name": "github.com/vektah/gqlparser/v2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "2.5.14" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/vektah/gqlparser/v2/parser", "symbols": [ "ParseQuery", "ParseSchema", "ParseSchemas", "parser.parseDirectives" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-2hmf-46v7-v6fx" }, { "type": "FIX", "url": "https://github.com/vektah/gqlparser/commit/36a3658873bf5a107f42488dfc392949cdd02977" }, { "type": "WEB", "url": "https://gist.github.com/uvzz/d3ed9d4532be16ec1040a2cf3dfec8d1" }, { "type": "WEB", "url": "https://github.com/99designs/gqlgen/issues/3118" }, { "type": "WEB", "url": "https://github.com/vektah/gqlparser/blob/master/parser/query.go#L316" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2920", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0425.json
{ "schema_version": "1.3.1", "id": "GO-2022-0425", "modified": "0001-01-01T00:00:00Z", "published": "2022-02-15T01:57:18Z", "aliases": [ "CVE-2021-4239", "GHSA-6cr6-fmvc-vw2p", "GHSA-g9mp-8g3h-3c5c" ], "summary": "Weak encryption and denial of service in github.com/flynn/noise", "details": "The Noise protocol implementation suffers from weakened cryptographic security after encrypting 2^64 messages, and a potential denial of service attack.\n\nAfter 2^64 (~18.4 quintillion) messages are encrypted with the Encrypt function, the nonce counter will wrap around, causing multiple messages to be encrypted with the same key and nonce.\n\nIn a separate issue, the Decrypt function increments the nonce state even when it fails to decrypt a message. If an attacker can provide an invalid input to the Decrypt function, this will cause the nonce state to desynchronize between the peers, resulting in a failure to encrypt all subsequent messages.", "affected": [ { "package": { "name": "github.com/flynn/noise", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.0.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/flynn/noise", "symbols": [ "CipherState.Decrypt", "CipherState.Encrypt", "HandshakeState.ReadMessage", "HandshakeState.WriteMessage", "symmetricState.DecryptAndHash", "symmetricState.EncryptAndHash" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/flynn/noise/pull/44" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0425", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-1052.json
{ "schema_version": "1.3.1", "id": "GO-2022-1052", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2021-21271", "GHSA-p658-8693-mhvg" ], "summary": "Uncontrolled resource consumption during consensus in github.com/tendermint/tendermint", "details": "Mishandling of timestamps during consensus process can cause a denial of service.\n\nWhile reaching consensus, different tendermint nodes can observe a different timestamp for a consensus evidence. This mismatch can cause the evidence to be invalid, upon which the node producing the evidence will be asked to generate a new evidence. This new evidence will be the same, which means it will again be rejected by other nodes involved in the consensus. This loop will continue until the peer nodes decide to disconnect from the node producing the evidence.", "affected": [ { "package": { "name": "github.com/tendermint/tendermint", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0.34.0" }, { "fixed": "0.34.3" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/tendermint/tendermint/evidence", "symbols": [ "Pool.CheckEvidence", "Pool.Update" ] }, { "path": "github.com/tendermint/tendermint/consensus", "symbols": [ "BaseWAL.OnStart", "Handshaker.Handshake", "Handshaker.ReplayBlocks", "Reactor.OnStart", "Reactor.SwitchToConsensus", "RunReplayFile", "State.OnStart", "State.OpenWAL", "State.ReplayFile", "State.tryAddVote", "WALGenerateNBlocks", "WALWithNBlocks" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/tendermint/tendermint/security/advisories/GHSA-p658-8693-mhvg" }, { "type": "ARTICLE", "url": "https://github.com/tendermint/tendermint/blob/v0.34.3/CHANGELOG.md#v0.34.3" }, { "type": "FIX", "url": "https://github.com/tendermint/tendermint/commit/a2a6852ab99e4a0f9e79f0ea8c1726e262e25c76" } ], "credits": [ { "name": "cmwaters (Github)" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-1052", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2901.json
{ "schema_version": "1.3.1", "id": "GO-2024-2901", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-37032", "GHSA-8hqg-whrw-pv92" ], "summary": "Ollama does not validate the format of the digest (sha256 with 64 hex digits) in github.com/ollama/ollama", "details": "Ollama does not validate the format of the digest (sha256 with 64 hex digits) in github.com/ollama/ollama", "affected": [ { "package": { "name": "github.com/ollama/ollama", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.1.34" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-8hqg-whrw-pv92" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-37032" }, { "type": "FIX", "url": "https://github.com/ollama/ollama/commit/2a21363bb756a7341d3d577f098583865bd7603f" }, { "type": "FIX", "url": "https://github.com/ollama/ollama/pull/4175" }, { "type": "WEB", "url": "https://github.com/ollama/ollama/blob/adeb40eaf29039b8964425f69a9315f9f1694ba8/server/modelpath_test.go#L41-L58" }, { "type": "WEB", "url": "https://github.com/ollama/ollama/compare/v0.1.33...v0.1.34" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2901", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0254.json
{ "schema_version": "1.3.1", "id": "GO-2022-0254", "modified": "0001-01-01T00:00:00Z", "published": "2022-07-15T23:07:56Z", "aliases": [ "CVE-2021-39137", "GHSA-9856-9gg9-qcmq" ], "summary": "Consensus flaw during block processing in github.com/ethereum/go-ethereum", "details": "A vulnerability in the Geth EVM can cause a node to reject the canonical chain.\n\nA memory-corruption bug within the EVM can cause a consensus error, where vulnerable nodes obtain a different stateRoot when processing a maliciously crafted transaction. This, in turn, would lead to the chain being split in two forks.", "affected": [ { "package": { "name": "github.com/ethereum/go-ethereum", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.10.8" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/ethereum/go-ethereum/core/vm", "symbols": [ "EVM.Call", "EVM.CallCode", "EVM.Create", "EVM.Create2", "EVM.DelegateCall", "EVM.StaticCall", "EVMInterpreter.Run", "opCall", "opCallCode", "opDelegateCall", "opStaticCall" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/ethereum/go-ethereum/pull/23381/commits/4d4879cafd1b3c906fc184a8c4a357137465128f" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0254", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2652.json
{ "schema_version": "1.3.1", "id": "GO-2024-2652", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-21662", "CVE-2024-21652", "GHSA-2vgg-9h6w-m454", "GHSA-x32m-mvfj-52xv" ], "summary": "Brute force protection bypass in github.com/argoproj/argo-cd/v2", "details": "An attacker can effectively bypass the rate limit and brute force protections in Argo CD by exploiting the application's weak cache-based mechanism. The application's brute force protection relies on a cache mechanism that tracks login attempts for each user. An attacker can overflow this cache by bombarding it with login attempts for different users, thereby pushing out the admin account's failed attempts and effectively resetting the rate limit for that account.", "affected": [ { "package": { "name": "github.com/argoproj/argo-cd/v2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "2.8.13" }, { "introduced": "2.9.0" }, { "fixed": "2.9.9" }, { "introduced": "2.10.0" }, { "fixed": "2.10.4" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/argoproj/argo-cd/v2/util/session", "symbols": [ "SessionManager.VerifyUsernamePassword", "SessionManager.updateFailureCount", "getMaximumCacheSize" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/argoproj/argo-cd/commit/17b0df1168a4c535f6f37e95f25ed7cd81e1fa4d" }, { "type": "FIX", "url": "https://github.com/argoproj/argo-cd/commit/6e181d72b31522f886a2afa029d5b26d7912ec7b" }, { "type": "FIX", "url": "https://github.com/argoproj/argo-cd/commit/cebb6538f7944c87ca2fecb5d17f8baacc431456" }, { "type": "WEB", "url": "https://argo-cd.readthedocs.io/en/stable/security_considerations/#cve-2020-8827-insufficient-anti-automationanti-brute-force" } ], "credits": [ { "name": "@nadava669" }, { "name": "@pasha-codefresh" }, { "name": "@crenshaw-dev" }, { "name": "@todaywasawesome" }, { "name": "@jannfis" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2652", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2763.json
{ "schema_version": "1.3.1", "id": "GO-2024-2763", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2017-15103", "GHSA-6g56-v9qg-jp92" ], "summary": "Heketi Arbitrary Code Execution in github.com/heketi/heketi", "details": "Heketi Arbitrary Code Execution in github.com/heketi/heketi", "affected": [ { "package": { "name": "github.com/heketi/heketi", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "5.0.1+incompatible" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-6g56-v9qg-jp92" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15103" }, { "type": "FIX", "url": "https://github.com/heketi/heketi/commit/787bae461b23003a4daa4d1d639016a754cf6b00" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2017:3481" }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2017-15103" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1510147" }, { "type": "WEB", "url": "https://github.com/heketi/heketi/releases/tag/v5.0.1" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2763", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2020-0050.json
{ "schema_version": "1.3.1", "id": "GO-2020-0050", "modified": "0001-01-01T00:00:00Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2020-15216", "GHSA-q547-gmf8-8jr7" ], "related": [ "CVE-2020-26290", "CVE-2020-27847", "GHSA-2x32-jm95-2cpx", "GHSA-m9hp-7r99-94h5" ], "summary": "XML digital signature validation bypass in github.com/russellhaering/goxmldsig", "details": "Due to the behavior of encoding/xml, a crafted XML document may cause XML Digital Signature validation to be entirely bypassed, causing an unsigned document to appear signed.", "affected": [ { "package": { "name": "github.com/russellhaering/goxmldsig", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.1.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/russellhaering/goxmldsig", "symbols": [ "ValidationContext.Validate", "ValidationContext.findSignature" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/russellhaering/goxmldsig/commit/f6188febf0c29d7ffe26a0436212b19cb9615e64" } ], "credits": [ { "name": "@jupenur" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2020-0050", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2565.json
{ "schema_version": "1.3.1", "id": "GO-2024-2565", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-21495", "GHSA-c7vf-m394-m4x4" ], "summary": "Use of Insufficiently Random Values in github.com/greenpau/caddy-security", "details": "Use of Insufficiently Random Values in github.com/greenpau/caddy-security", "affected": [ { "package": { "name": "github.com/greenpau/caddy-security", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-c7vf-m394-m4x4" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21495" }, { "type": "REPORT", "url": "https://github.com/greenpau/caddy-security/issues/265" }, { "type": "WEB", "url": "https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy" }, { "type": "WEB", "url": "https://github.com/greenpau/go-authcrunch/commit/ecd3725baf2683eb1519bb3c81ae41085fbf7dc2" }, { "type": "WEB", "url": "https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-6248275" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2565", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-1165.json
{ "schema_version": "1.3.1", "id": "GO-2022-1165", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2022-23525", "GHSA-53c4-hhmh-vw5q" ], "summary": "Denial of service via repository index file in helm.sh/helm/v3", "details": "Applications that use the repo package in the Helm SDK to parse an index file can suffer a Denial of Service when that input causes a panic that cannot be recovered from.\n\nThe repo package contains a handler that processes the index file of a repository. For example, the Helm client adds references to chart repositories where charts are managed. The repo package parses the index file of the repository and loads it into memory. Some index files can cause array data structures to be created causing a memory violation.\n\nThe Helm Client will panic with an index file that causes a memory violation panic. Helm is not a long running service so the panic will not affect future uses of the Helm client.", "affected": [ { "package": { "name": "helm.sh/helm/v3", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "3.10.3" } ] } ], "ecosystem_specific": { "imports": [ { "path": "helm.sh/helm/v3/pkg/repo", "symbols": [ "ChartRepository.DownloadIndexFile", "ChartRepository.Index", "ChartRepository.Load", "File.Remove", "FindChartInAuthAndTLSAndPassRepoURL", "FindChartInAuthAndTLSRepoURL", "FindChartInAuthRepoURL", "FindChartInRepoURL", "IndexDirectory", "IndexFile.Add", "IndexFile.MustAdd", "LoadIndexFile", "loadIndex" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/helm/helm/security/advisories/GHSA-53c4-hhmh-vw5q" }, { "type": "FIX", "url": "https://github.com/helm/helm/commit/638ebffbc2e445156f3978f02fd83d9af1e56f5b" } ], "credits": [ { "name": "Ada Logics, in a fuzzing audit sponsored by CNCF" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-1165", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2534.json
{ "schema_version": "1.3.1", "id": "GO-2024-2534", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-32192", "GHSA-833m-37f7-jq55" ], "summary": "Unauthenticated cross-site scripting in github.com/rancher/apiserver", "details": "Unauthenticated cross-site scripting in github.com/rancher/apiserver", "affected": [ { "package": { "name": "github.com/rancher/apiserver", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.0.0-20240207153957-4fd7d821d952" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/rancher/apiserver/pkg/writer", "symbols": [ "HTMLResponseWriter.Write", "HTMLResponseWriter.WriteList", "HTMLResponseWriter.write" ] }, { "path": "github.com/rancher/apiserver/pkg/urlbuilder", "symbols": [ "New", "NewPrefixed", "ParseRequestURL" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/rancher/apiserver/security/advisories/GHSA-833m-37f7-jq55" }, { "type": "FIX", "url": "https://github.com/rancher/apiserver/commit/4df268e250f625fa323349062636496e0aeff4e4" }, { "type": "FIX", "url": "https://github.com/rancher/apiserver/commit/4e102cf0d07b1af3d10d82c3e5a751a869b8a6c7" }, { "type": "FIX", "url": "https://github.com/rancher/apiserver/commit/4fd7d821d952510bfe38c9d4a3e2a65157f50525" }, { "type": "FIX", "url": "https://github.com/rancher/apiserver/commit/69b3c2b56f3fa5a421889c533dada8cd08783cda" }, { "type": "FIX", "url": "https://github.com/rancher/apiserver/commit/97a10a30200cb851afd8ee85ee6b2295c4b6e5ee" }, { "type": "FIX", "url": "https://github.com/rancher/apiserver/commit/a3b9e3721c1b558ee63aec9594e37c223a5c8437" } ], "credits": [ { "name": "diego95root" }, { "name": "kujalamathias" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2534", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-1167.json
{ "schema_version": "1.3.1", "id": "GO-2022-1167", "modified": "0001-01-01T00:00:00Z", "published": "2022-12-14T18:06:02Z", "aliases": [ "CVE-2022-23524", "GHSA-6rx9-889q-vv2r" ], "summary": "Denial of service in string value parsing in helm.sh/helm/v3", "details": "Applications that use the strvals package in the Helm SDK to parse user supplied input can suffer a Denial of Service when that input causes an error that cannot be recovered from.\n\nThe strvals package contains a parser that turns strings into Go structures. For example, the Helm client has command line flags like --set, --set-string, and others that enable the user to pass in strings that are merged into the values. The strvals package converts these strings into structures Go can work with. Some string inputs can cause can cause a stack overflow to be created causing a stack overflow error. Stack overflow errors cannot be recovered from.\n\nThe Helm Client will panic with input to --set, --set-string, and other value setting flags that causes a stack overflow. Helm is not a long running service so the error will not affect future uses of the Helm client.", "affected": [ { "package": { "name": "helm.sh/helm/v3", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "3.10.3" } ] } ], "ecosystem_specific": { "imports": [ { "path": "helm.sh/helm/v3/pkg/strvals", "symbols": [ "Parse", "ParseFile", "ParseInto", "ParseIntoFile", "ParseIntoString", "ParseJSON", "ParseString", "ToYAML", "parser.key" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/helm/helm/security/advisories/GHSA-6rx9-889q-vv2r" }, { "type": "FIX", "url": "https://github.com/helm/helm/commit/3636f6824757ff734cb265b8770efe48c1fb3737" } ], "credits": [ { "name": "Ada Logics in a fuzzing audit sponsored by CNCF" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-1167", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0190.json
{ "schema_version": "1.3.1", "id": "GO-2022-0190", "modified": "0001-01-01T00:00:00Z", "published": "2022-08-02T15:44:23Z", "aliases": [ "CVE-2018-16874" ], "summary": "Directory traversal via \"go get\" command in cmd/go", "details": "The \"go get\" command is vulnerable to directory traversal when executed with the import path of a malicious Go package which contains curly brace (both '{' and '}' characters).\n\nSpecifically, it is only vulnerable in GOPATH mode, but not in module mode (the distinction is documented at https://golang.org/cmd/go/#hdr-Module_aware_go_get). The attacker can cause an arbitrary filesystem write, which can lead to code execution.", "affected": [ { "package": { "name": "toolchain", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.10.6" }, { "introduced": "1.11.0-0" }, { "fixed": "1.11.3" } ] } ], "ecosystem_specific": { "imports": [ { "path": "cmd/go/internal/get", "symbols": [ "downloadPackage" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/154101" }, { "type": "FIX", "url": "https://go.googlesource.com/go/+/bc82d7c7db83487e05d7a88e06549d4ae2a688c3" }, { "type": "REPORT", "url": "https://go.dev/issue/29230" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/Kw31K8G7Fi0" } ], "credits": [ { "name": "ztz of Tencent Security Platform" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0190", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-2185.json
{ "schema_version": "1.3.1", "id": "GO-2023-2185", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-45283" ], "summary": "Insecure parsing of Windows paths with a \\??\\ prefix in path/filepath", "details": "The filepath package does not recognize paths with a \\??\\ prefix as special.\n\nOn Windows, a path beginning with \\??\\ is a Root Local Device path equivalent to a path beginning with \\\\?\\. Paths with a \\??\\ prefix may be used to access arbitrary locations on the system. For example, the path \\??\\c:\\x is equivalent to the more common path c:\\x.\n\nBefore fix, Clean could convert a rooted path such as \\a\\..\\??\\b into the root local device path \\??\\b. Clean will now convert this to .\\??\\b.\n\nSimilarly, Join(\\, ??, b) could convert a seemingly innocent sequence of path elements into the root local device path \\??\\b. Join will now convert this to \\.\\??\\b.\n\nIn addition, with fix, IsAbs now correctly reports paths beginning with \\??\\ as absolute, and VolumeName correctly reports the \\??\\ prefix as a volume name.\n\nUPDATE: Go 1.20.11 and Go 1.21.4 inadvertently changed the definition of the volume name in Windows paths starting with \\?, resulting in filepath.Clean(\\?\\c:) returning \\?\\c: rather than \\?\\c:\\ (among other effects). The previous behavior has been restored.", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.20.11" }, { "introduced": "1.21.0-0" }, { "fixed": "1.21.4" } ] } ], "ecosystem_specific": { "imports": [ { "path": "path/filepath", "goos": [ "windows" ], "symbols": [ "Abs", "Base", "Clean", "Dir", "EvalSymlinks", "Glob", "IsLocal", "Join", "Rel", "Split", "VolumeName", "Walk", "WalkDir", "join", "volumeNameLen" ] }, { "path": "internal/safefilepath", "goos": [ "windows" ], "symbols": [ "FromFS", "fromFS" ] } ] } }, { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "1.20.11" }, { "fixed": "1.20.12" }, { "introduced": "1.21.4" }, { "fixed": "1.21.5" } ] } ], "ecosystem_specific": { "imports": [ { "path": "path/filepath", "goos": [ "windows" ], "symbols": [ "Abs", "Base", "Clean", "Dir", "EvalSymlinks", "Glob", "IsLocal", "Join", "Rel", "Split", "VolumeName", "Walk", "WalkDir", "volumeNameLen" ] } ] } } ], "references": [ { "type": "REPORT", "url": "https://go.dev/issue/63713" }, { "type": "FIX", "url": "https://go.dev/cl/540277" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/4tU8LZfBFkY" }, { "type": "REPORT", "url": "https://go.dev/issue/64028" }, { "type": "FIX", "url": "https://go.dev/cl/541175" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-dev/c/6ypN5EjibjM/m/KmLVYH_uAgAJ" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-2185", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0414.json
{ "schema_version": "1.3.1", "id": "GO-2022-0414", "modified": "0001-01-01T00:00:00Z", "published": "2022-07-01T20:08:17Z", "aliases": [ "CVE-2022-21235", "GHSA-6635-c626-vj4r" ], "summary": "Command injection in github.com/Masterminds/vcs", "details": "Passing untrusted inputs to VCS functions can permit an attacker to execute arbitrary commands.\n\nThe vcs package executes version control commands with user-provided arguments. These arguments can be interpreted as command-line flags, which can be used to perform command injection.", "affected": [ { "package": { "name": "github.com/Masterminds/vcs", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.13.3" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/Masterminds/vcs", "symbols": [ "BzrRepo.ExportDir", "BzrRepo.Get", "BzrRepo.Init", "BzrRepo.Ping", "GitRepo.Get", "GitRepo.Init", "GitRepo.Update", "HgRepo.ExportDir", "HgRepo.Get", "HgRepo.Init", "HgRepo.Ping", "NewRepo", "NewSvnRepo", "SvnRepo.ExportDir", "SvnRepo.Get", "SvnRepo.Ping" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/Masterminds/vcs/pull/105" } ], "credits": [ { "name": "Alessio Della Libera of Snyk Research Team" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0414", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2973.json
{ "schema_version": "1.3.1", "id": "GO-2024-2973", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-39321", "GHSA-gxrv-wf35-62w9" ], "summary": "Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik", "details": "Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik", "affected": [ { "package": { "name": "github.com/traefik/traefik", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/traefik/traefik/v2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "2.11.6" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/traefik/traefik/v3", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "3.0.0-beta3" }, { "fixed": "3.0.4" }, { "introduced": "3.1.0-rc1" }, { "fixed": "3.1.0-rc3" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/traefik/traefik/security/advisories/GHSA-gxrv-wf35-62w9" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-39321" }, { "type": "WEB", "url": "https://github.com/traefik/traefik/releases/tag/v2.11.6" }, { "type": "WEB", "url": "https://github.com/traefik/traefik/releases/tag/v3.0.4" }, { "type": "WEB", "url": "https://github.com/traefik/traefik/releases/tag/v3.1.0-rc3" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2973", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2923.json
{ "schema_version": "1.3.1", "id": "GO-2024-2923", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "GHSA-85rg-8m6h-825p" ], "summary": "Vulnerabilities with the k8sGPT in github.com/k8sgpt-ai/k8sgpt", "details": "Vulnerabilities with the k8sGPT in github.com/k8sgpt-ai/k8sgpt", "affected": [ { "package": { "name": "github.com/k8sgpt-ai/k8sgpt", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.3.33" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/k8sgpt-ai/k8sgpt/security/advisories/GHSA-85rg-8m6h-825p" }, { "type": "WEB", "url": "https://github.com/k8sgpt-ai/k8sgpt/releases/tag/v0.3.33" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2923", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2495.json
{ "schema_version": "1.3.1", "id": "GO-2024-2495", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-44313", "GHSA-9xc9-xq7w-vpcr" ], "summary": "Apache ServiceComb Service-Center Server-Side Request Forgery vulnerability in github.com/apache/servicecomb-service-center", "details": "Apache ServiceComb Service-Center Server-Side Request Forgery vulnerability in github.com/apache/servicecomb-service-center.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/apache/servicecomb-service-center before v2.2.0.", "affected": [ { "package": { "name": "github.com/apache/servicecomb-service-center", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "2.2.0" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-9xc9-xq7w-vpcr" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-44313" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2024/01/31/4" }, { "type": "WEB", "url": "https://lists.apache.org/thread/kxovd455o9h4f2v811hcov2qknbwld5r" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2495", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2020-0020.json
{ "schema_version": "1.3.1", "id": "GO-2020-0020", "modified": "0001-01-01T00:00:00Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2017-20146", "GHSA-jcr6-mmjj-pchw" ], "summary": "Improper access control in github.com/gorilla/handlers", "details": "Usage of the CORS handler may apply improper CORS headers, allowing the requester to explicitly control the value of the Access-Control-Allow-Origin header, which bypasses the expected behavior of the Same Origin Policy.", "affected": [ { "package": { "name": "github.com/gorilla/handlers", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.3.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/gorilla/handlers", "symbols": [ "cors.ServeHTTP" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/gorilla/handlers/pull/116" }, { "type": "FIX", "url": "https://github.com/gorilla/handlers/commit/90663712d74cb411cbef281bc1e08c19d1a76145" } ], "credits": [ { "name": "Evan J Johnson" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2020-0020", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0061.json
{ "schema_version": "1.3.1", "id": "GO-2021-0061", "modified": "0001-01-01T00:00:00Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2021-4235", "GHSA-r88r-gmrh-7j83" ], "summary": "Denial of service in gopkg.in/yaml.v2", "details": "Due to unbounded alias chasing, a maliciously crafted YAML file can cause the system to consume significant system resources. If parsing user input, this may be used as a denial of service vector.", "affected": [ { "package": { "name": "gopkg.in/yaml.v2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "2.2.3" } ] } ], "ecosystem_specific": { "imports": [ { "path": "gopkg.in/yaml.v2", "symbols": [ "Decoder.Decode", "Unmarshal", "UnmarshalStrict", "decoder.unmarshal" ] } ] } }, { "package": { "name": "github.com/go-yaml/yaml", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/go-yaml/yaml", "symbols": [ "Decoder.Decode", "Unmarshal", "UnmarshalStrict", "decoder.unmarshal" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/go-yaml/yaml/pull/375" }, { "type": "FIX", "url": "https://github.com/go-yaml/yaml/commit/bb4e33bf68bf89cad44d386192cbed201f35b241" } ], "credits": [ { "name": "@simonferquel" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0061", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0558.json
{ "schema_version": "1.3.1", "id": "GO-2022-0558", "modified": "0001-01-01T00:00:00Z", "published": "2022-08-22T18:07:59Z", "aliases": [ "CVE-2022-1227", "GHSA-66vw-v2x9-hw75" ], "summary": "Privilege escalation in github.com/containers/psgo", "details": "The psgo package executes the 'nsenter' binary, potentially allowing privilege escalation when used in environments where nsenter is provided by an untrusted source.", "affected": [ { "package": { "name": "github.com/containers/psgo", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.7.2" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/containers/psgo", "symbols": [ "JoinNamespaceAndProcessInfo", "JoinNamespaceAndProcessInfoByPids", "JoinNamespaceAndProcessInfoByPidsWithOptions", "JoinNamespaceAndProcessInfoWithOptions", "ProcessInfo", "ProcessInfoByPids", "contextFromOptions" ] }, { "path": "github.com/containers/psgo/internal/proc", "symbols": [ "ParseStatus", "readStatusUserNS" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/containers/psgo/pull/92" }, { "type": "WEB", "url": "https://github.com/containers/podman/issues/10941" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0558", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2449.json
{ "schema_version": "1.3.1", "id": "GO-2024-2449", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "GHSA-vfxf-76hv-v4w4" ], "summary": "User-provided environment values allow execution on macOS agents in github.com/gravitational/teleport", "details": "User-provided environment values allow execution on macOS agents in github.com/gravitational/teleport.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/gravitational/teleport before v12.4.31, from v13.0.0 before v13.4.13, from v14.0.0 before v14.2.4.", "affected": [ { "package": { "name": "github.com/gravitational/teleport", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "12.4.31" }, { "introduced": "13.0.0" }, { "fixed": "13.4.13" }, { "introduced": "14.0.0" }, { "fixed": "14.2.4" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/gravitational/teleport/security/advisories/GHSA-vfxf-76hv-v4w4" }, { "type": "FIX", "url": "https://github.com/gravitational/teleport/commit/fcc97de9f99dfec8696ecfd620672a26f29cf9ac" }, { "type": "FIX", "url": "https://github.com/gravitational/teleport/pull/36132" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2449", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2643.json
{ "schema_version": "1.3.1", "id": "GO-2024-2643", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-50726", "GHSA-g623-jcgg-mhmm" ], "summary": "Bypass manifest during application creation in github.com/argoproj/argo-cd/v2", "details": "An improper validation bug allows users who have create privileges to sync a local manifest during application creation. This allows for bypassing the restriction that the manifests come from some approved git/Helm/OCI source.", "affected": [ { "package": { "name": "github.com/argoproj/argo-cd", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "1.2.0-rc1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/argoproj/argo-cd/server/application", "symbols": [ "Server.Create" ] } ] } }, { "package": { "name": "github.com/argoproj/argo-cd/v2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "2.0.0" }, { "fixed": "2.8.12" }, { "introduced": "2.9.0" }, { "fixed": "2.9.8" }, { "introduced": "2.10.0" }, { "fixed": "2.10.3" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/argoproj/argo-cd/v2/server/application", "symbols": [ "Server.Create" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/argoproj/argo-cd/commit/3b8f673f06c2d228e01cbc830e5cb57cef008978" }, { "type": "WEB", "url": "https://argo-cd.readthedocs.io/en/latest/operator-manual/rbac" } ], "credits": [ { "name": "@crenshaw-dev" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2643", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2578.json
{ "schema_version": "1.3.1", "id": "GO-2024-2578", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-23349", "GHSA-8pf2-qj4v-fj64" ], "summary": "Apache Answer Cross-site Scripting vulnerability in github.com/apache/incubator-answer", "details": "Apache Answer Cross-site Scripting vulnerability in github.com/apache/incubator-answer", "affected": [ { "package": { "name": "github.com/apache/incubator-answer", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.2.5" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-8pf2-qj4v-fj64" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23349" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2024/02/22/2" }, { "type": "WEB", "url": "https://lists.apache.org/thread/y5902t09vfgy7892z3vzr1zq900sgyqg" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2578", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-1188.json
{ "schema_version": "1.3.1", "id": "GO-2022-1188", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2022-4741", "GHSA-qvx2-59g8-8hph" ], "summary": "Uncontrolled memory allocation in code.sajari.com/docconv", "details": "An attacker can remotely supply a specially crafted input that causes uncontrolled memory allocation.", "affected": [ { "package": { "name": "code.sajari.com/docconv", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.2.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "code.sajari.com/docconv/docd", "symbols": [ "main", "serve" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/sajari/docconv/commit/42bcff666855ab978e67a9041d0cdea552f20301" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-1188", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0619.json
{ "schema_version": "1.3.1", "id": "GO-2022-0619", "modified": "0001-01-01T00:00:00Z", "published": "2022-08-15T18:05:29Z", "aliases": [ "CVE-2022-1996", "GHSA-r48q-9g5r-8q2h" ], "summary": "Authorization bypass in github.com/emicklei/go-restful, go-restful/v2 and go-restful/v3", "details": "CORS filters that use an AllowedDomains configuration parameter can match domains outside the specified set, permitting an attacker to avoid the CORS policy.\n\nThe AllowedDomains configuration parameter is documented as a list of allowed origin domains, but values in this list are applied as regular expression matches. For example, an allowed domain of \"example.com\" will match the Origin header \"example.com.malicious.domain\".", "affected": [ { "package": { "name": "github.com/emicklei/go-restful", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "2.16.0+incompatible" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/emicklei/go-restful", "symbols": [ "CrossOriginResourceSharing.Filter", "CrossOriginResourceSharing.isOriginAllowed" ] } ] } }, { "package": { "name": "github.com/emicklei/go-restful/v2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "2.7.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/emicklei/go-restful/v2", "symbols": [ "CrossOriginResourceSharing.Filter", "CrossOriginResourceSharing.isOriginAllowed" ] } ] } }, { "package": { "name": "github.com/emicklei/go-restful/v3", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "3.0.0" }, { "fixed": "3.8.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/emicklei/go-restful/v3", "symbols": [ "CrossOriginResourceSharing.Filter", "CrossOriginResourceSharing.isOriginAllowed" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/emicklei/go-restful/commit/f292efff46ae17e9d104f865a60a39a2ae9402f1" }, { "type": "WEB", "url": "https://github.com/emicklei/go-restful/issues/489" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0619", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2428.json
{ "schema_version": "1.3.1", "id": "GO-2024-2428", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-5044", "GHSA-fp9f-44c2-cw27" ], "summary": "Ingress-nginx code injection via nginx.ingress.kubernetes.io/permanent-redirect annotation in k8s.io/ingress-nginx", "details": "Ingress-nginx code injection via nginx.ingress.kubernetes.io/permanent-redirect annotation in k8s.io/ingress-nginx.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: k8s.io/ingress-nginx before v1.9.0.", "affected": [ { "package": { "name": "k8s.io/ingress-nginx", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "1.9.0" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-fp9f-44c2-cw27" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5044" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2023/10/25/3" }, { "type": "WEB", "url": "https://github.com/kubernetes/ingress-nginx/issues/10572" }, { "type": "WEB", "url": "https://groups.google.com/g/kubernetes-security-announce/c/ukuYYvRNel0" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20240307-0012" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2428", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2614.json
{ "schema_version": "1.3.1", "id": "GO-2024-2614", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-24767", "GHSA-c69x-5xmw-v44x" ], "summary": "Password brute force attack in github.com/IceWhaleTech/CasaOS-UserService", "details": "The CasaOS web application does not have protection against password brute force attacks. An attacker can use a password brute force attack to find and gain full access to the server. This vulnerability allows attackers to get super user-level access over the server.", "affected": [ { "package": { "name": "github.com/IceWhaleTech/CasaOS-UserService", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0.4.4-3-alpha1" }, { "fixed": "0.4.7" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/IceWhaleTech/CasaOS-UserService/route/v1", "symbols": [ "PostUserLogin" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/IceWhaleTech/CasaOS-UserService/security/advisories/GHSA-c69x-5xmw-v44x" }, { "type": "FIX", "url": "https://github.com/IceWhaleTech/CasaOS-UserService/commit/62006f61b55951048dbace4ebd9e483274838699" }, { "type": "WEB", "url": "https://github.com/IceWhaleTech/CasaOS-UserService/releases/tag/v0.4.7" } ], "credits": [ { "name": "DrDark1999" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2614", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-2385.json
{ "schema_version": "1.3.1", "id": "GO-2023-2385", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-26154", "GHSA-5844-q3fc-56rh" ], "summary": "Insufficient entropy in AES-256-CBC in github.com/pubnub/go", "details": "There is insufficient entropy in the implementation of the AES-256-CBC cryptographic algorithm. The provided encrypt functions are less secure when hex encoding and trimming are applied, leaving half of the bits in the key always the same for every encoded message or file.\n\nUsers are encouraged to migrate to the new crypto package introduced in v7.2.0.", "affected": [ { "package": { "name": "github.com/pubnub/go", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/pubnub/go/utils", "symbols": [ "DecryptFile", "DecryptString", "EncryptCipherKey", "EncryptFile", "EncryptString", "SerializeAndEncrypt", "SerializeEncryptAndSerialize", "aesCipher", "generateIV", "padWithPKCS7", "unpadPKCS7" ] } ] } }, { "package": { "name": "github.com/pubnub/go/v5", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/pubnub/go/v5/utils", "symbols": [ "DecryptFile", "DecryptString", "EncryptCipherKey", "EncryptFile", "EncryptString", "SerializeAndEncrypt", "SerializeEncryptAndSerialize", "aesCipher", "generateIV", "padWithPKCS7", "unpadPKCS7" ] } ] } }, { "package": { "name": "github.com/pubnub/go/v6", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/pubnub/go/v6/utils", "symbols": [ "DecryptFile", "DecryptString", "EncryptCipherKey", "EncryptFile", "EncryptString", "SerializeAndEncrypt", "SerializeEncryptAndSerialize", "aesCipher", "generateIV", "padWithPKCS7", "unpadPKCS7" ] } ] } }, { "package": { "name": "github.com/pubnub/go/v7", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/pubnub/go/v7/utils", "symbols": [ "DecryptFile", "DecryptString", "EncryptCipherKey", "EncryptFile", "EncryptString", "SerializeAndEncrypt", "SerializeEncryptAndSerialize", "aesCipher", "generateIV", "padWithPKCS7", "unpadPKCS7" ] } ] } }, { "package": { "name": "github.com/pubnub/go/v7", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "7.2.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/pubnub/go/v7/crypto", "symbols": [ "EncryptCipherKey", "NewAesCbcCryptoModule", "NewLegacyCryptoModule", "NewLegacyCryptor", "defaultExtendedCryptor.DecryptStream", "defaultExtendedCryptor.EncryptStream", "legacyAesCipher", "legacyCryptor.Decrypt", "legacyCryptor.DecryptStream", "legacyCryptor.Encrypt", "legacyCryptor.EncryptStream", "module.Decrypt", "module.DecryptStream", "module.Encrypt", "module.EncryptStream" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-5844-q3fc-56rh" }, { "type": "FIX", "url": "https://github.com/pubnub/go/commit/428517fef5b901db7275d9f5a75eda89a4c28e08" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-2385", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2741.json
{ "schema_version": "1.3.1", "id": "GO-2024-2741", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-31450" ], "summary": "Owncast vulnerable to arbitrary file deletion in emoji.go (GHSL-2023-277) in github.com/owncast/owncast", "details": "Owncast vulnerable to arbitrary file deletion in emoji.go (GHSL-2023-277) in github.com/owncast/owncast", "affected": [ { "package": { "name": "github.com/owncast/owncast", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.1.3" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31450" }, { "type": "FIX", "url": "https://github.com/owncast/owncast/commit/1b14800c7d7f54be14ed4d130bfe7f480645076e" }, { "type": "WEB", "url": "https://github.com/owncast/owncast/blob/v0.1.2/controllers/admin/emoji.go#L63" }, { "type": "WEB", "url": "https://github.com/owncast/owncast/releases/tag/v0.1.3" }, { "type": "WEB", "url": "https://securitylab.github.com/advisories/GHSL-2023-277_Owncast/" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2741", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0075.json
{ "schema_version": "1.3.1", "id": "GO-2021-0075", "modified": "0001-01-01T00:00:00Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2018-12018", "GHSA-p5gc-957x-gfw9" ], "summary": "Panic due to improper validation of RPC messages in github.com/ethereum/go-ethereum", "details": "Due to improper argument validation in RPC messages, a maliciously crafted message can cause a panic, leading to denial of service.", "affected": [ { "package": { "name": "github.com/ethereum/go-ethereum", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.8.11" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/ethereum/go-ethereum/les", "symbols": [ "ProtocolManager.handleMsg" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/ethereum/go-ethereum/pull/16891" }, { "type": "FIX", "url": "https://github.com/ethereum/go-ethereum/commit/a5237a27eaf81946a3edb4fafe13ed6359d119e4" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0075", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1640.json
{ "schema_version": "1.3.1", "id": "GO-2023-1640", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-28105", "GHSA-5g39-ppwg-6xx8" ], "summary": "Path traversal when unzipping files in github.com/dablelv/go-huge-util", "details": "Path traversal when unzipping files in github.com/dablelv/go-huge-util", "affected": [ { "package": { "name": "github.com/dablelv/go-huge-util", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.0.34" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/dablelv/go-huge-util/zip", "symbols": [ "Unzip", "unzipFile" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/dablelv/go-huge-util/security/advisories/GHSA-5g39-ppwg-6xx8" }, { "type": "FIX", "url": "https://github.com/dablelv/go-huge-util/commit/0e308b0fac8973e6fa251b0ab095cdc5c1c0956b" } ], "credits": [ { "name": "@cokeBeer" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-1640", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1821.json
{ "schema_version": "1.3.1", "id": "GO-2023-1821", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "GHSA-qfc5-6r3j-jj22" ], "summary": "The x/crisis package does not cause chain halt in github.com/cosmos/cosmos-sdk", "details": "If an invariant check fails on a Cosmos SDK network, and a transaction is sent to the x/crisis package to halt the chain, the chain does not halt as originally intended.\n\nNo patch will be released, as the package is planned to be deprecated and replaced.", "affected": [ { "package": { "name": "github.com/cosmos/cosmos-sdk", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/cosmos/cosmos-sdk/x/crisis" } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/cosmos/cosmos-sdk/security/advisories/GHSA-qfc5-6r3j-jj22" }, { "type": "REPORT", "url": "https://github.com/cosmos/cosmos-sdk/issues/15325" }, { "type": "REPORT", "url": "https://github.com/cosmos/cosmos-sdk/issues/15706" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-1821", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0054.json
{ "schema_version": "1.3.1", "id": "GO-2021-0054", "modified": "0001-01-01T00:00:00Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2020-36067", "GHSA-p64j-r5f4-pwwx" ], "summary": "Panic due to improper input validation in ForEach in github.com/tidwall/gjson", "details": "Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.", "affected": [ { "package": { "name": "github.com/tidwall/gjson", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.6.6" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/tidwall/gjson", "symbols": [ "Get", "GetBytes", "GetMany", "GetManyBytes", "Result.ForEach", "Result.Get", "unwrap" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b" }, { "type": "WEB", "url": "https://github.com/tidwall/gjson/issues/196" } ], "credits": [ { "name": "@toptotu" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0054", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2448.json
{ "schema_version": "1.3.1", "id": "GO-2024-2448", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-48732", "GHSA-q7rx-w656-fwmv" ], "summary": "Mattermost notified all users in the channel when using WebSockets to respond individually in github.com/mattermost/mattermost-server", "details": "Mattermost notified all users in the channel when using WebSockets to respond individually in github.com/mattermost/mattermost-server.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/mattermost/mattermost/server/v8 before v8.1.7.", "affected": [ { "package": { "name": "github.com/mattermost/mattermost-server", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "8.1.7+incompatible" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/mattermost/mattermost-server/v5", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/mattermost/mattermost-server/v6", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/mattermost/mattermost/server/v8", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "8.1.7" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-q7rx-w656-fwmv" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-48732" }, { "type": "WEB", "url": "https://github.com/mattermost/mattermost/commit/851515be222160bee0a495c0d411056b19ed4111" }, { "type": "WEB", "url": "https://mattermost.com/security-updates" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2448", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2707.json
{ "schema_version": "1.3.1", "id": "GO-2024-2707", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-21848", "GHSA-xp9j-8p68-9q93" ], "summary": "Mattermost Server Improper Access Control in github.com/mattermost/mattermost-server", "details": "Mattermost Server Improper Access Control in github.com/mattermost/mattermost-server.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/mattermost/mattermost/server/v8 before v8.1.11.", "affected": [ { "package": { "name": "github.com/mattermost/mattermost-server", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/mattermost/mattermost-server/v5", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/mattermost/mattermost-server/v6", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/mattermost/mattermost/server/v8", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "8.1.11" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-xp9j-8p68-9q93" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21848" }, { "type": "WEB", "url": "https://mattermost.com/security-updates" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2707", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0243.json
{ "schema_version": "1.3.1", "id": "GO-2021-0243", "modified": "0001-01-01T00:00:00Z", "published": "2022-02-17T17:32:57Z", "aliases": [ "CVE-2021-34558" ], "summary": "Panic on certain certificates in crypto/tls", "details": "crypto/tls clients can panic when provided a certificate of the wrong type for the negotiated parameters. net/http clients performing HTTPS requests are also affected.", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.15.14" }, { "introduced": "1.16.0-0" }, { "fixed": "1.16.6" } ] } ], "ecosystem_specific": { "imports": [ { "path": "crypto/tls", "symbols": [ "rsaKeyAgreement.generateClientKeyExchange" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/334031" }, { "type": "FIX", "url": "https://go.googlesource.com/go/+/a98589711da5e9d935e8d690cfca92892e86d557" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/n9FxMelZGAQ" }, { "type": "REPORT", "url": "https://go.dev/issue/47143" } ], "credits": [ { "name": "Imre Rad" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0243", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2020-0019.json
{ "schema_version": "1.3.1", "id": "GO-2020-0019", "modified": "0001-01-01T00:00:00Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2020-27813", "GHSA-3xh2-74w9-5vxm", "GHSA-jf24-p9p9-4rjh" ], "summary": "Integer overflow in github.com/gorilla/websocket", "details": "An attacker can craft malicious WebSocket frames that cause an integer overflow in a variable which tracks the number of bytes remaining. This may cause the server or client to get stuck attempting to read frames in a loop, which can be used as a denial of service vector.", "affected": [ { "package": { "name": "github.com/gorilla/websocket", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.4.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/gorilla/websocket", "symbols": [ "Conn.Close", "Conn.NextReader", "Conn.NextWriter", "Conn.ReadJSON", "Conn.ReadMessage", "Conn.WriteControl", "Conn.WriteJSON", "Conn.WriteMessage", "Conn.WritePreparedMessage", "Conn.advanceFrame", "Dialer.Dial", "Dialer.DialContext", "NewClient", "NewPreparedMessage", "ReadJSON", "Subprotocols", "Upgrade", "Upgrader.Upgrade", "WriteJSON", "flateReadWrapper.Read", "flateWriteWrapper.Close", "flateWriteWrapper.Write", "httpProxyDialer.Dial", "messageReader.Read", "messageWriter.Close", "messageWriter.ReadFrom", "messageWriter.Write", "messageWriter.WriteString", "netDialerFunc.Dial", "proxy_direct.Dial", "proxy_envOnce.Get", "proxy_socks5.Dial", "truncWriter.Write" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/gorilla/websocket/pull/537" }, { "type": "FIX", "url": "https://github.com/gorilla/websocket/commit/5b740c29263eb386f33f265561c8262522f19d37" } ], "credits": [ { "name": "Max Justicz" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2020-0019", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0052.json
{ "schema_version": "1.3.1", "id": "GO-2021-0052", "modified": "0001-01-01T00:00:00Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2020-28483", "GHSA-h395-qcrw-5vmq" ], "summary": "Inconsistent interpretation of HTTP Requests in github.com/gin-gonic/gin", "details": "Due to improper HTTP header sanitization, a malicious user can spoof their source IP address by setting the X-Forwarded-For header. This may allow a user to bypass IP based restrictions, or obfuscate their true source.", "affected": [ { "package": { "name": "github.com/gin-gonic/gin", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.7.7" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/gin-gonic/gin", "symbols": [ "Context.ClientIP", "Context.Next", "Context.RemoteIP", "Engine.HandleContext", "Engine.Run", "Engine.RunFd", "Engine.RunListener", "Engine.RunTLS", "Engine.RunUnix", "Engine.ServeHTTP" ] } ] } } ], "references": [ { "type": "REPORT", "url": "https://github.com/gin-gonic/gin/issues/2862" }, { "type": "REPORT", "url": "https://github.com/gin-gonic/gin/issues/2473" }, { "type": "REPORT", "url": "https://github.com/gin-gonic/gin/issues/2232" }, { "type": "FIX", "url": "https://github.com/gin-gonic/gin/pull/2844" }, { "type": "FIX", "url": "https://github.com/gin-gonic/gin/commit/5929d521715610c9dd14898ebbe1d188d5de8937" }, { "type": "FIX", "url": "https://github.com/gin-gonic/gin/pull/2632" }, { "type": "FIX", "url": "https://github.com/gin-gonic/gin/commit/bfc8ca285eb46dad60e037d57c545cd260636711" }, { "type": "FIX", "url": "https://github.com/gin-gonic/gin/pull/2675" }, { "type": "FIX", "url": "https://github.com/gin-gonic/gin/commit/03e5e05ae089bc989f1ca41841f05504d29e3fd9" }, { "type": "WEB", "url": "https://github.com/gin-gonic/gin/pull/2474" } ], "credits": [ { "name": "@sorenisanerd" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0052", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-2379.json
{ "schema_version": "1.3.1", "id": "GO-2023-2379", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-49290", "GHSA-7f9x-gw85-8grf" ], "summary": "Denial of service due to malicious parameters in github.com/lestrrat-go/jwx", "details": "The JWE key management algorithms based on PBKDF2 require a JOSE Header Parameter called p2c (PBES2 Count). This parameter dictates the number of PBKDF2 iterations needed to derive a CEK wrapping key. Its purpose is to intentionally slow down the key derivation function, making password brute-force and dictionary attacks more resource-intensive. However, if an attacker sets the p2c parameter in JWE to a very large number, it can cause excessive computational consumption.", "affected": [ { "package": { "name": "github.com/lestrrat-go/jwx", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.2.27" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/lestrrat-go/jwx/jwe", "symbols": [ "Decrypt" ] } ] } }, { "package": { "name": "github.com/lestrrat-go/jwx/v2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "2.0.18" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/lestrrat-go/jwx/v2/jwe", "symbols": [ "Decrypt", "decryptCtx.decryptContent" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/lestrrat-go/jwx/security/advisories/GHSA-7f9x-gw85-8grf" }, { "type": "FIX", "url": "https://github.com/lestrrat-go/jwx/commit/64f2a229b8e18605f47361d292b526bdc4aee01c" } ], "credits": [ { "name": "@P3ngu1nW" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-2379", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1631.json
{ "schema_version": "1.3.1", "id": "GO-2023-1631", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-24535", "GHSA-hw7c-3rfg-p46j" ], "summary": "Panic when parsing invalid messages in google.golang.org/protobuf", "details": "Parsing invalid messages can panic.\n\nParsing a text-format message which contains a potential number consisting of a minus sign, one or more characters of whitespace, and no further input will cause a panic.", "affected": [ { "package": { "name": "google.golang.org/protobuf", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "1.29.0" }, { "fixed": "1.29.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "google.golang.org/protobuf/encoding/prototext", "symbols": [ "Unmarshal", "UnmarshalOptions.Unmarshal", "UnmarshalOptions.unmarshal" ] }, { "path": "google.golang.org/protobuf/internal/encoding/text", "symbols": [ "Decoder.Peek", "Decoder.Read", "parseNumber" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/475995" }, { "type": "REPORT", "url": "https://github.com/golang/protobuf/issues/1530" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-1631", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1772.json
{ "schema_version": "1.3.1", "id": "GO-2023-1772", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-2253", "GHSA-hqxw-f8mx-cpmw" ], "summary": "Memory exhaustion in github.com/distribution/distribution", "details": "Systems that run distribution built after a specific commit running on memory-restricted environments can suffer from denial of service by a crafted malicious /v2/_catalog API endpoint request.", "affected": [ { "package": { "name": "github.com/distribution/distribution", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "2.8.2-beta.1+incompatible" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/distribution/distribution/registry/handlers", "symbols": [ "catalogHandler.GetCatalog" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/distribution/distribution/commit/f55a6552b006a381d9167e328808565dd2bf77dc" }, { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-hqxw-f8mx-cpmw" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-1772", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-2158.json
{ "schema_version": "1.3.1", "id": "GO-2023-2158", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-4457", "GHSA-37x5-qpm8-53rq" ], "summary": "Google Sheet API key disclosure in github.com/grafana/google-sheets-datasource", "details": "Error messages for the Google Sheets data source plugin were improperly sanitized. The Google Sheet API-key could potentially be exposed.", "affected": [ { "package": { "name": "github.com/grafana/google-sheets-datasource", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0.9.0" }, { "fixed": "1.2.2" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/grafana/google-sheets-datasource/pkg/googlesheets", "symbols": [ "GoogleSheets.Query", "GoogleSheets.getSheetData", "googleSheetsDatasource.QueryData" ] } ] } } ], "references": [ { "type": "WEB", "url": "https://grafana.com/security/security-advisories/cve-2023-4457/" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-2158", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2569.json
{ "schema_version": "1.3.1", "id": "GO-2024-2569", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-25631", "GHSA-x989-52fc-4vr4" ], "summary": "Unencrypted traffic between pods when using Wireguard and an external kvstore in github.com/cilium/cilium", "details": "Unencrypted traffic between pods when using Wireguard and an external kvstore in github.com/cilium/cilium", "affected": [ { "package": { "name": "github.com/cilium/cilium", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.14.7" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/cilium/cilium/security/advisories/GHSA-x989-52fc-4vr4" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-25631" }, { "type": "WEB", "url": "https://docs.cilium.io/en/stable/installation/k8s-install-external-etcd/#when-do-i-need-to-use-a-kvstore" }, { "type": "WEB", "url": "https://docs.cilium.io/en/stable/security/network/encryption-wireguard/#encryption-wg" }, { "type": "WEB", "url": "https://github.com/cilium/cilium/releases/tag/v1.14.7" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2569", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0073.json
{ "schema_version": "1.3.1", "id": "GO-2021-0073", "modified": "0001-01-01T00:00:00Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2017-17831", "GHSA-w4xh-w33p-4v29" ], "summary": "Arbitrary command execution in github.com/git-lfs/git-lfs", "details": "Arbitrary command execution can be triggered by improperly sanitized SSH URLs in LFS configuration files. This can be triggered by cloning a malicious repository.", "affected": [ { "package": { "name": "github.com/git-lfs/git-lfs", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "2.1.1-0.20170519163204-f913f5f9c7c6+incompatible" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/git-lfs/git-lfs/lfsapi", "symbols": [ "Client.NewRequest", "sshAuthClient.Resolve", "sshCache.Resolve", "sshGetLFSExeAndArgs" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/git-lfs/git-lfs/pull/2241" }, { "type": "FIX", "url": "https://github.com/git-lfs/git-lfs/commit/f913f5f9c7c6d1301785fdf9884a2942d59cdf19" }, { "type": "WEB", "url": "http://blog.recurity-labs.com/2017-08-10/scm-vulns" }, { "type": "WEB", "url": "https://confluence.atlassian.com/sourcetreekb/sourcetree-security-advisory-2018-01-24-942834324.html" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0073", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2477.json
{ "schema_version": "1.3.1", "id": "GO-2024-2477", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-23820", "GHSA-rxpw-85vw-fx87" ], "summary": "OpenFGA denial of service in github.com/openfga/openfga", "details": "OpenFGA denial of service in github.com/openfga/openfga", "affected": [ { "package": { "name": "github.com/openfga/openfga", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.4.3" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/openfga/openfga/security/advisories/GHSA-rxpw-85vw-fx87" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23820" }, { "type": "FIX", "url": "https://github.com/openfga/openfga/commit/908ac85c8b7769c8042cca31886df8db01976c39" }, { "type": "WEB", "url": "https://github.com/openfga/openfga/releases/tag/v1.4.3" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2477", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1941.json
{ "schema_version": "1.3.1", "id": "GO-2023-1941", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-37788", "GHSA-4r8x-2p26-976p" ], "summary": "Panic when handling invalid request in MITM mode in github.com/elazarl/goproxy", "details": "An invalid request can cause a panic when running in MITM mode.", "affected": [ { "package": { "name": "github.com/elazarl/goproxy", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.0.0-20230731152917-f99041a5c027" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/elazarl/goproxy", "symbols": [ "ProxyHttpServer.ServeHTTP", "ProxyHttpServer.handleHttps" ] } ] } } ], "references": [ { "type": "REPORT", "url": "https://github.com/elazarl/goproxy/issues/502" }, { "type": "FIX", "url": "https://github.com/elazarl/goproxy/pull/507" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-1941", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2488.json
{ "schema_version": "1.3.1", "id": "GO-2024-2488", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2020-16251", "GHSA-4mp7-2m29-gqxf" ], "summary": "HashiCorp Vault Authentication bypass in github.com/hashicorp/vault", "details": "HashiCorp Vault Authentication bypass in github.com/hashicorp/vault", "affected": [ { "package": { "name": "github.com/hashicorp/vault", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0.8.3" }, { "fixed": "1.2.5" }, { "introduced": "1.3.0" }, { "fixed": "1.3.8" }, { "introduced": "1.4.0" }, { "fixed": "1.4.4" }, { "introduced": "1.5.0" }, { "fixed": "1.5.1" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-4mp7-2m29-gqxf" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16251" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/159479/Hashicorp-Vault-GCP-IAM-Integration-Authentication-Bypass.html" }, { "type": "WEB", "url": "https://github.com/hashicorp/vault/blob/master/CHANGELOG.md#151" }, { "type": "WEB", "url": "https://www.hashicorp.com/blog/category/vault" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2488", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1998.json
{ "schema_version": "1.3.1", "id": "GO-2023-1998", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-37896", "GHSA-2xx4-jj5v-6mff" ], "summary": "Improper path sanitization in sandbox mode in github.com/projectdiscovery/nuclei/v2", "details": "Improper path sanitization in sandbox mode in github.com/projectdiscovery/nuclei/v2", "affected": [ { "package": { "name": "github.com/projectdiscovery/nuclei/v2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "2.9.9" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/projectdiscovery/nuclei/v2/cmd/nuclei", "symbols": [ "init#1", "main", "readConfig" ] }, { "path": "github.com/projectdiscovery/nuclei/v2/pkg/protocols/common/generators", "symbols": [ "New", "PayloadGenerator.loadPayloads" ] }, { "path": "github.com/projectdiscovery/nuclei/v2/pkg/protocols/common/protocolstate", "symbols": [ "Init" ] }, { "path": "github.com/projectdiscovery/nuclei/v2/pkg/protocols/dns", "symbols": [ "Request.Compile" ] }, { "path": "github.com/projectdiscovery/nuclei/v2/pkg/protocols/http", "symbols": [ "Request.Compile" ] }, { "path": "github.com/projectdiscovery/nuclei/v2/pkg/protocols/headless", "symbols": [ "Request.Compile" ] }, { "path": "github.com/projectdiscovery/nuclei/v2/pkg/protocols/network", "symbols": [ "Request.Compile" ] }, { "path": "github.com/projectdiscovery/nuclei/v2/pkg/protocols/websocket", "symbols": [ "Request.Compile" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/projectdiscovery/nuclei/security/advisories/GHSA-2xx4-jj5v-6mff" }, { "type": "FIX", "url": "https://github.com/projectdiscovery/nuclei/pull/3927" }, { "type": "WEB", "url": "https://github.com/projectdiscovery/nuclei/releases/tag/v2.9.9" } ], "credits": [ { "name": "keomutchoiboi" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-1998", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2962.json
{ "schema_version": "1.3.1", "id": "GO-2024-2962", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-24531" ], "summary": "Output of \"go env\" does not sanitize values in cmd/go", "details": "Command go env is documented as outputting a shell script containing the Go environment. However, go env doesn't sanitize values, so executing its output as a shell script can cause various bad bahaviors, including executing arbitrary commands or inserting new environment variables.\n\nThis issue is relatively minor because, in general, if an attacker can set arbitrary environment variables on a system, they have better attack vectors than making \"go env\" print them out.", "affected": [ { "package": { "name": "toolchain", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.21.0-0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "cmd/go" } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/488375" }, { "type": "FIX", "url": "https://go.dev/cl/493535" }, { "type": "REPORT", "url": "https://go.dev/issue/58508" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-dev/c/ixHOFpSbajE/m/8EjlbKVWAwAJ" } ], "credits": [ { "name": "Hunter Wittenborn (https://hunterwittenborn.com/)" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2962", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2631.json
{ "schema_version": "1.3.1", "id": "GO-2024-2631", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-28180", "GHSA-c5q2-7r4c-mv6g" ], "summary": "Decompression bomb vulnerability in github.com/go-jose/go-jose", "details": "An attacker could send a JWE containing compressed data that used large amounts of memory and CPU when decompressed by Decrypt or DecryptMulti.", "affected": [ { "package": { "name": "github.com/go-jose/go-jose/v4", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "4.0.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/go-jose/go-jose/v4", "symbols": [ "JSONWebEncryption.Decrypt", "JSONWebEncryption.DecryptMulti", "inflate" ] } ] } }, { "package": { "name": "github.com/go-jose/go-jose/v3", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "3.0.3" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/go-jose/go-jose/v3", "symbols": [ "JSONWebEncryption.Decrypt", "JSONWebEncryption.DecryptMulti", "inflate" ] } ] } }, { "package": { "name": "gopkg.in/go-jose/go-jose.v2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "2.6.3" } ] } ], "ecosystem_specific": { "imports": [ { "path": "gopkg.in/go-jose/go-jose.v2", "symbols": [ "JSONWebEncryption.Decrypt", "JSONWebEncryption.DecryptMulti", "inflate" ] } ] } }, { "package": { "name": "gopkg.in/square/go-jose.v2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "gopkg.in/square/go-jose.v2", "symbols": [ "JSONWebEncryption.Decrypt", "JSONWebEncryption.DecryptMulti", "inflate" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/go-jose/go-jose/security/advisories/GHSA-c5q2-7r4c-mv6g" }, { "type": "FIX", "url": "https://github.com/go-jose/go-jose/commit/0dd4dd541c665fb292d664f77604ba694726f298" }, { "type": "FIX", "url": "https://github.com/go-jose/go-jose/commit/add6a284ea0f844fd6628cba637be5451fe4b28a" }, { "type": "FIX", "url": "https://github.com/go-jose/go-jose/commit/f4c051a0653d78199a053892f7619ebf96339502" } ], "credits": [ { "name": "zer0yu" }, { "name": "chenjj" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2631", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2955.json
{ "schema_version": "1.3.1", "id": "GO-2024-2955", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2019-25211", "GHSA-869c-j7wc-8jqv" ], "summary": "Gin mishandles a wildcard in the origin string in github.com/gin-contrib/cors", "details": "Gin-Gonic CORS middleware mishandles a wildcard at the end of an origin string. Examples: https://example.community/* is accepted by the origin string https://example.com/* and http://localhost.example.com/* is accepted by the origin string http://localhost/* .", "affected": [ { "package": { "name": "github.com/gin-contrib/cors", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.6.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/gin-contrib/cors", "symbols": [ "Config.parseWildcardRules", "Default", "New" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-869c-j7wc-8jqv" }, { "type": "FIX", "url": "https://github.com/gin-contrib/cors/commit/27b723a473efd80d5a498fa9f5933c80204c850d" }, { "type": "FIX", "url": "https://github.com/gin-contrib/cors/pull/106" }, { "type": "FIX", "url": "https://github.com/gin-contrib/cors/pull/57" }, { "type": "WEB", "url": "https://github.com/gin-contrib/cors/compare/v1.5.0...v1.6.0" }, { "type": "WEB", "url": "https://github.com/gin-contrib/cors/releases/tag/v1.6.0" } ], "credits": [ { "name": "@maxshine" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2955", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0417.json
{ "schema_version": "1.3.1", "id": "GO-2022-0417", "modified": "0001-01-01T00:00:00Z", "published": "2022-07-01T20:08:10Z", "aliases": [ "CVE-2022-27651", "GHSA-c3g4-w6cv-6v7h" ], "summary": "Incorrect default permissions in github.com/containers/buildah", "details": "Containers are created with non-empty inheritable Linux process capabilities, permitting programs with inheritable file capabilities to elevate those capabilities to the permitted set during execve(2).\n\nThis bug does not affect the container security sandbox, as the inheritable set never contains more capabilities than are included in the container's bounding set.", "affected": [ { "package": { "name": "github.com/containers/buildah", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.25.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/containers/buildah", "symbols": [ "Builder.Run", "setupCapAdd", "setupCapDrop" ] }, { "path": "github.com/containers/buildah/chroot", "symbols": [ "setCapabilities" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/containers/buildah/commit/e7e55c988c05dd74005184ceb64f097a0cfe645b" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2066840" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0417", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2762.json
{ "schema_version": "1.3.1", "id": "GO-2024-2762", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2019-12303", "GHSA-53pj-67m4-9w98" ], "summary": "Rancher code injection via fluentd config commands in github.com/rancher/rancher", "details": "Rancher code injection via fluentd config commands in github.com/rancher/rancher", "affected": [ { "package": { "name": "github.com/rancher/rancher", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "2.0.0+incompatible" }, { "fixed": "2.2.4+incompatible" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-53pj-67m4-9w98" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12303" }, { "type": "WEB", "url": "https://forums.rancher.com/t/rancher-release-v2-2-4-addresses-rancher-cve-2019-12274-and-cve-2019-12303/14466" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2762", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2446.json
{ "schema_version": "1.3.1", "id": "GO-2024-2446", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-7113", "GHSA-h3gq-j7p9-x3p4" ], "summary": "Mattermost Cross-site Scripting vulnerability in github.com/mattermost/mattermost-server", "details": "Mattermost Cross-site Scripting vulnerability in github.com/mattermost/mattermost-server.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/mattermost/mattermost/server/v8 before v8.1.7.", "affected": [ { "package": { "name": "github.com/mattermost/mattermost-server", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/mattermost/mattermost-server/v5", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/mattermost/mattermost-server/v6", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/mattermost/mattermost/server/v8", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "8.1.7" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-h3gq-j7p9-x3p4" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-7113" }, { "type": "WEB", "url": "https://mattermost.com/security-updates" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2446", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-2402.json
{ "schema_version": "1.3.1", "id": "GO-2023-2402", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-48795", "GHSA-45x7-px36-x8w8" ], "summary": "Man-in-the-middle attacker can compromise integrity of secure channel in golang.org/x/crypto", "details": "A protocol weakness allows a MITM attacker to compromise the integrity of the secure channel before it is established, allowing the attacker to prevent transmission of a number of messages immediately after the secure channel is established without either side being aware.\n\nThe impact of this attack is relatively limited, as it does not compromise confidentiality of the channel. Notably this attack would allow an attacker to prevent the transmission of the SSH2_MSG_EXT_INFO message, disabling a handful of newer security features.\n\nThis protocol weakness was also fixed in OpenSSH 9.6.", "affected": [ { "package": { "name": "golang.org/x/crypto", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.17.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "golang.org/x/crypto/ssh", "symbols": [ "Client.Dial", "Client.DialContext", "Client.DialTCP", "Client.Listen", "Client.ListenTCP", "Client.ListenUnix", "Client.NewSession", "Dial", "DiscardRequests", "NewClient", "NewClientConn", "NewServerConn", "Request.Reply", "Session.Close", "Session.CombinedOutput", "Session.Output", "Session.RequestPty", "Session.RequestSubsystem", "Session.Run", "Session.SendRequest", "Session.Setenv", "Session.Shell", "Session.Signal", "Session.Start", "Session.WindowChange", "channel.Accept", "channel.Close", "channel.CloseWrite", "channel.Read", "channel.ReadExtended", "channel.Reject", "channel.SendRequest", "channel.Write", "channel.WriteExtended", "connectionState.readPacket", "connectionState.writePacket", "curve25519sha256.Client", "curve25519sha256.Server", "dhGEXSHA.Client", "dhGEXSHA.Server", "dhGroup.Client", "dhGroup.Server", "ecdh.Client", "ecdh.Server", "extChannel.Read", "extChannel.Write", "handshakeTransport.enterKeyExchange", "handshakeTransport.readLoop", "handshakeTransport.sendKexInit", "mux.OpenChannel", "mux.SendRequest", "sessionStdin.Close", "sshClientKeyboardInteractive.Challenge", "tcpListener.Accept", "tcpListener.Close", "transport.readPacket", "transport.writePacket", "unixListener.Accept", "unixListener.Close" ] } ] } } ], "references": [ { "type": "REPORT", "url": "https://go.dev/issue/64784" }, { "type": "FIX", "url": "https://go.dev/cl/550715" }, { "type": "FIX", "url": "https://github.com/golang/crypto/commit/9d2ee975ef9fe627bf0a6f01c1f69e8ef1d4f05d" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/qA3XtxvMUyg" }, { "type": "WEB", "url": "https://www.openssh.com/txt/release-9.6" } ], "credits": [ { "name": "Fabian Bäumer (Ruhr University Bochum)" }, { "name": "Marcus Brinkmann (Ruhr University Bochum)" }, { "name": "Jörg Schwenk (Ruhr University Bochum)" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-2402", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2764.json
{ "schema_version": "1.3.1", "id": "GO-2024-2764", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2019-6287", "GHSA-6r7x-4q7g-h83j" ], "summary": "Rancher Project Members Have Continued Access to Namespaces After Being Removed From Them in github.com/rancher/rancher", "details": "Rancher Project Members Have Continued Access to Namespaces After Being Removed From Them in github.com/rancher/rancher", "affected": [ { "package": { "name": "github.com/rancher/rancher", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "2.0.0+incompatible" }, { "fixed": "2.1.6+incompatible" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-6r7x-4q7g-h83j" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-6287" }, { "type": "REPORT", "url": "https://github.com/rancher/rancher/issues/17244" }, { "type": "REPORT", "url": "https://github.com/rancher/rancher/issues/17724" }, { "type": "WEB", "url": "https://forums.rancher.com/t/rancher-release-v2-1-6/13148" }, { "type": "WEB", "url": "https://forums.rancher.com/t/rancher-security-announcement-cve-2018-20321-and-cve-2019-6287/13149" }, { "type": "WEB", "url": "https://rancher.com/blog/2019/2019-01-29-explaining-security-vulnerabilities-addressed-in-rancher-v2-1-6-and-v2-0-11" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2764", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2528.json
{ "schema_version": "1.3.1", "id": "GO-2024-2528", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "GHSA-j86v-2vjr-fg8f" ], "summary": "Etcd Gateway TLS endpoint validation only confirms TCP reachability in go.etcd.io/etcd", "details": "Etcd Gateway TLS endpoint validation only confirms TCP reachability in go.etcd.io/etcd.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: go.etcd.io/etcd/v3 before v3.3.23, from v3.4.0-rc.0 before v3.4.10.", "affected": [ { "package": { "name": "go.etcd.io/etcd", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "go.etcd.io/etcd/v3", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "3.3.23" }, { "introduced": "3.4.0-rc.0" }, { "fixed": "3.4.10" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/etcd-io/etcd/security/advisories/GHSA-j86v-2vjr-fg8f" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2528", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2591.json
{ "schema_version": "1.3.1", "id": "GO-2024-2591", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-1887", "GHSA-fx48-xv6q-6gp3" ], "summary": "Mattermost post fetching without auditing in compliance export in github.com/mattermost/mattermost-server", "details": "Mattermost post fetching without auditing in compliance export in github.com/mattermost/mattermost-server.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/mattermost/mattermost/server/v8 before v8.1.9.", "affected": [ { "package": { "name": "github.com/mattermost/mattermost-server", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "9.2.0+incompatible" }, { "fixed": "9.2.5+incompatible" }, { "introduced": "9.3.0+incompatible" }, { "fixed": "9.3.1+incompatible" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/mattermost/mattermost-server/v5", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/mattermost/mattermost-server/v6", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/mattermost/mattermost/server/v8", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "8.1.9" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-fx48-xv6q-6gp3" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-1887" }, { "type": "WEB", "url": "https://mattermost.com/security-updates" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2591", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2858.json
{ "schema_version": "1.3.1", "id": "GO-2024-2858", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2022-39201", "GHSA-x744-mm8v-vpgr" ], "summary": "Grafana Data source and plugin proxy endpoints could leak the authentication cookie to some destination plugins in github.com/grafana/grafana", "details": "Grafana Data source and plugin proxy endpoints could leak the authentication cookie to some destination plugins in github.com/grafana/grafana.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/grafana/grafana before v8.5.14, from v9.0.0 before v9.1.8.", "affected": [ { "package": { "name": "github.com/grafana/grafana", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "5.0.0-beta1+incompatible" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "8.5.14" }, { "introduced": "9.0.0" }, { "fixed": "9.1.8" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/grafana/grafana/security/advisories/GHSA-x744-mm8v-vpgr" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-39201" }, { "type": "FIX", "url": "https://github.com/grafana/grafana/commit/b571acc1dc130a33f24742c1f93b93216da6cf57" }, { "type": "FIX", "url": "https://github.com/grafana/grafana/commit/c658816f5229d17f877579250c07799d3bbaebc9" }, { "type": "WEB", "url": "https://github.com/grafana/grafana/releases/tag/v9.1.8" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2858", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1535.json
{ "schema_version": "1.3.1", "id": "GO-2023-1535", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "GHSA-hxp2-xqf3-v83h" ], "summary": "Panic during unmarshal of Server Hello in github.com/pion/dtls/v2", "details": "Unmarshalling a Server Hello can panic, which could allow a denial of service.", "affected": [ { "package": { "name": "github.com/pion/dtls/v2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "2.2.4" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/pion/dtls/v2/pkg/protocol/handshake", "symbols": [ "Handshake.Unmarshal", "MessageServerHello.Unmarshal" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/pion/dtls/commit/7a14903448b70069fd9e02adf210ca23083c56d2" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-1535", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0070.json
{ "schema_version": "1.3.1", "id": "GO-2021-0070", "modified": "0001-01-01T00:00:00Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2016-3697", "GHSA-q3j5-32m5-58c2" ], "summary": "Privilege escalation in github.com/opencontainers/runc", "details": "GetExecUser in the github.com/opencontainers/runc/libcontainer/user package will improperly interpret numeric UIDs as usernames. If the method is used without verifying that usernames are formatted as expected, it may allow a user to gain unexpected privileges.", "affected": [ { "package": { "name": "github.com/opencontainers/runc", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.1.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/opencontainers/runc/libcontainer/user", "symbols": [ "GetExecUser", "GetExecUserPath" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/opencontainers/runc/pull/708" }, { "type": "FIX", "url": "https://github.com/opencontainers/runc/commit/69af385de62ea68e2e608335cffbb0f4aa3db091" }, { "type": "WEB", "url": "https://github.com/docker/docker/issues/21436" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2016-1034.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2016-2634.html" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/201612-28" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0070", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2020-0037.json
{ "schema_version": "1.3.1", "id": "GO-2020-0037", "modified": "0001-01-01T00:00:00Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2019-25072", "GHSA-3fm3-m23v-5r46" ], "summary": "Uncontrolled resource consumption in github.com/tendermint/tendermint", "details": "Due to support of Gzip compression in request bodies, as well as a lack of limiting response body sizes, a malicious server can cause a client to consume a significant amount of system resources, which may be used as a denial of service vector.", "affected": [ { "package": { "name": "github.com/tendermint/tendermint", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.31.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/tendermint/tendermint/rpc/lib/client", "symbols": [ "NewJSONRPCClient", "NewURIClient", "makeHTTPClient" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/tendermint/tendermint/pull/3430" }, { "type": "FIX", "url": "https://github.com/tendermint/tendermint/commit/03085c2da23b179c4a51f59a03cb40aa4e85a613" } ], "credits": [ { "name": "@guagualvcha" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2020-0037", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0528.json
{ "schema_version": "1.3.1", "id": "GO-2022-0528", "modified": "0001-01-01T00:00:00Z", "published": "2022-07-30T03:51:17Z", "aliases": [ "CVE-2022-25891", "GHSA-477v-w82m-634j" ], "summary": "Panic on crafted messages in github.com/containrrr/shoutrrr", "details": "Sending a message exactly 2000, 4000, or 6000 characters in length to Discord causes a panic.", "affected": [ { "package": { "name": "github.com/containrrr/shoutrrr", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.6.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/containrrr/shoutrrr/pkg/util", "symbols": [ "PartitionMessage" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/containrrr/shoutrrr/pull/242" }, { "type": "FIX", "url": "https://github.com/containrrr/shoutrrr/commit/6a27056f9d7522a8b493216195cb7634bf4b5c42" }, { "type": "WEB", "url": "https://github.com/containrrr/shoutrrr/issues/240" } ], "credits": [ { "name": "justinsteven" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0528", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2572.json
{ "schema_version": "1.3.1", "id": "GO-2024-2572", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "GHSA-4j93-fm92-rp4m" ], "summary": "Missing BlockedAddressed Validation in Vesting Module in github.com/cosmos/cosmos-sdk", "details": "Missing BlockedAddressed Validation in Vesting Module in github.com/cosmos/cosmos-sdk", "affected": [ { "package": { "name": "github.com/cosmos/cosmos-sdk", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.47.9" }, { "introduced": "0.50.0" }, { "fixed": "0.50.4" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/cosmos/cosmos-sdk/x/auth/vesting", "symbols": [ "msgServer.CreatePeriodicVestingAccount" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/cosmos/cosmos-sdk/security/advisories/GHSA-4j93-fm92-rp4m" }, { "type": "FIX", "url": "https://github.com/cosmos/cosmos-sdk/commit/c05850241e2d615721e3492d15fee4e1deec082b" }, { "type": "WEB", "url": "https://github.com/cosmos/cosmos-sdk/releases/tag/v0.47.9" }, { "type": "WEB", "url": "https://github.com/cosmos/cosmos-sdk/releases/tag/v0.50.4" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2572", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2650.json
{ "schema_version": "1.3.1", "id": "GO-2024-2650", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "GHSA-v8mx-hp2q-gw85" ], "summary": "Golang SDK for Vela Insecure Variable Substitution in github.com/go-vela/sdk-go", "details": "Golang SDK for Vela Insecure Variable Substitution in github.com/go-vela/sdk-go", "affected": [ { "package": { "name": "github.com/go-vela/sdk-go", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.23.2" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/go-vela/sdk-go/security/advisories/GHSA-v8mx-hp2q-gw85" }, { "type": "FIX", "url": "https://github.com/go-vela/sdk-go/commit/e3a34719badf37928e60f4402abe51f8b50055e1" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2650", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2020-0005.json
{ "schema_version": "1.3.1", "id": "GO-2020-0005", "modified": "0001-01-01T00:00:00Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2020-15106", "CVE-2020-15112", "GHSA-m332-53r6-2w93", "GHSA-p4g4-wgrh-qrg2" ], "summary": "Panic due to malformed WALs in go.etcd.io/etcd", "details": "Malformed WALs can be constructed such that WAL.ReadAll can cause attempted out of bounds reads, or creation of arbitrarily sized slices, which may be used as a DoS vector.", "affected": [ { "package": { "name": "go.etcd.io/etcd", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.5.0-alpha.5.0.20200423152442-f4b650b51dc4" } ] } ], "ecosystem_specific": { "imports": [ { "path": "go.etcd.io/etcd/wal", "symbols": [ "Create", "Repair", "Verify", "WAL.ReadAll", "decoder.decodeRecord" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/etcd-io/etcd/pull/11793" }, { "type": "FIX", "url": "https://github.com/etcd-io/etcd/commit/f4b650b51dc4a53a8700700dc12e1242ac56ba07" }, { "type": "WEB", "url": "https://github.com/etcd-io/etcd/blob/master/security/SECURITY_AUDIT.pdf" } ], "credits": [ { "name": "Trail of Bits" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2020-0005", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0531.json
{ "schema_version": "1.3.1", "id": "GO-2022-0531", "modified": "0001-01-01T00:00:00Z", "published": "2022-07-28T17:24:57Z", "aliases": [ "CVE-2022-30629" ], "summary": "Session tickets lack random ticket_age_add in crypto/tls", "details": "An attacker can correlate a resumed TLS session with a previous connection.\n\nSession tickets generated by crypto/tls do not contain a randomly generated ticket_age_add, which allows an attacker that can observe TLS handshakes to correlate successive connections by comparing ticket ages during session resumption.", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.17.11" }, { "introduced": "1.18.0-0" }, { "fixed": "1.18.3" } ] } ], "ecosystem_specific": { "imports": [ { "path": "crypto/tls", "symbols": [ "serverHandshakeStateTLS13.sendSessionTickets" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/405994" }, { "type": "FIX", "url": "https://go.googlesource.com/go/+/fe4de36198794c447fbd9d7cc2d7199a506c76a5" }, { "type": "REPORT", "url": "https://go.dev/issue/52814" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg/m/IWz5T6x7AAAJ" } ], "credits": [ { "name": "Github user @nervuri" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0531", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2462.json
{ "schema_version": "1.3.1", "id": "GO-2024-2462", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-22198", "GHSA-8r25-68wm-jw35" ], "summary": "Arbitrary command execution in github.com/0xJacky/Nginx-UI", "details": "Arbitrary command execution in github.com/0xJacky/Nginx-UI", "affected": [ { "package": { "name": "github.com/0xJacky/Nginx-UI", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.9.10-0.20231219184941-827e76c46e63" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/0xJacky/Nginx-UI/api/system", "symbols": [ "GetSettings", "SaveSettings" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/0xJacky/nginx-ui/commit/827e76c46e63c52114a62a899f61313039c754e3" }, { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-8r25-68wm-jw35" } ], "credits": [ { "name": "@jorgectf" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2462", "review_status": "REVIEWED" } }