repo_id
stringclasses 927
values | file_path
stringlengths 99
214
| content
stringlengths 2
4.15M
|
|---|---|---|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2932.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2932",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2024-22032",
"GHSA-q6c7-56cq-g2wm"
],
"summary": "Rancher's RKE1 Encryption Config kept in plain-text within cluster AppliedSpec in github.com/rancher/rancher",
"details": "Rancher's RKE1 Encryption Config kept in plain-text within cluster AppliedSpec in github.com/rancher/rancher.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/rancher/rancher from v2.7.0 before v2.7.14, from v2.8.0 before v2.8.5.",
"affected": [
{
"package": {
"name": "github.com/rancher/rancher",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {
"custom_ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "2.7.0"
},
{
"fixed": "2.7.14"
},
{
"introduced": "2.8.0"
},
{
"fixed": "2.8.5"
}
]
}
]
}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/rancher/rancher/security/advisories/GHSA-q6c7-56cq-g2wm"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2932",
"review_status": "UNREVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2765.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2765",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2020-1701",
"GHSA-849r-8wvp-4wwg"
],
"summary": "Permissions bypass in KubeVirt in kubevirt.io/kubevirt",
"details": "Permissions bypass in KubeVirt in kubevirt.io/kubevirt",
"affected": [
{
"package": {
"name": "kubevirt.io/kubevirt",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.26.0"
}
]
}
],
"ecosystem_specific": {}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/advisories/GHSA-849r-8wvp-4wwg"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1701"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1792092"
},
{
"type": "WEB",
"url": "https://github.com/kubevirt/containerized-data-importer/pull/1098"
},
{
"type": "WEB",
"url": "https://github.com/kubevirt/kubevirt/commit/9efa8d7388d4fe1c698c6980aa7122c06bd141be"
},
{
"type": "WEB",
"url": "https://github.com/kubevirt/kubevirt/issues/2967"
},
{
"type": "WEB",
"url": "https://github.com/kubevirt/kubevirt/pull/3001"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2765",
"review_status": "UNREVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-2101.json
|
{
"schema_version": "1.3.1",
"id": "GO-2023-2101",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"GHSA-pffg-92cg-xf5c"
],
"summary": "Incorrect exponentiation results in github.com/consensys/gnark-crypto",
"details": "Incorrect exponentiation results in github.com/consensys/gnark-crypto",
"affected": [
{
"package": {
"name": "github.com/consensys/gnark-crypto",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.12.1"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/consensys/gnark-crypto/ecc/bls12-377",
"symbols": [
"G1Jac.mulWindowed",
"G2Jac.mulWindowed"
]
},
{
"path": "github.com/consensys/gnark-crypto/ecc/bls12-381",
"symbols": [
"G1Jac.mulWindowed",
"G2Jac.mulWindowed"
]
},
{
"path": "github.com/consensys/gnark-crypto/ecc/bls24-315",
"symbols": [
"G1Jac.mulWindowed",
"G2Jac.mulWindowed"
]
},
{
"path": "github.com/consensys/gnark-crypto/ecc/bls24-317",
"symbols": [
"G1Jac.mulWindowed",
"G2Jac.mulWindowed"
]
},
{
"path": "github.com/consensys/gnark-crypto/ecc/bn254",
"symbols": [
"G1Jac.mulWindowed",
"G2Jac.mulWindowed"
]
},
{
"path": "github.com/consensys/gnark-crypto/ecc/bw6-633",
"symbols": [
"G1Jac.mulWindowed",
"G2Jac.mulWindowed"
]
},
{
"path": "github.com/consensys/gnark-crypto/ecc/bw6-756",
"symbols": [
"G1Jac.mulWindowed",
"G2Jac.mulWindowed"
]
},
{
"path": "github.com/consensys/gnark-crypto/ecc/bw6-761",
"symbols": [
"G1Jac.mulWindowed",
"G2Jac.mulWindowed"
]
},
{
"path": "github.com/consensys/gnark-crypto/ecc/secp256k1",
"symbols": [
"G1Jac.mulWindowed"
]
},
{
"path": "github.com/consensys/gnark-crypto/ecc/bls12-377/internal/fptower",
"symbols": [
"E12.ExpGLV"
]
},
{
"path": "github.com/consensys/gnark-crypto/ecc/bls12-381/internal/fptower",
"symbols": [
"E12.ExpGLV"
]
},
{
"path": "github.com/consensys/gnark-crypto/ecc/bls24-315/internal/fptower",
"symbols": [
"E24.ExpGLV"
]
},
{
"path": "github.com/consensys/gnark-crypto/ecc/bls24-317/internal/fptower",
"symbols": [
"E24.ExpGLV"
]
},
{
"path": "github.com/consensys/gnark-crypto/ecc/bn254/internal/fptower",
"symbols": [
"E12.ExpGLV"
]
},
{
"path": "github.com/consensys/gnark-crypto/ecc/bw6-633/internal/fptower",
"symbols": [
"E6.ExpGLV"
]
},
{
"path": "github.com/consensys/gnark-crypto/ecc/bw6-756/internal/fptower",
"symbols": [
"E6.ExpGLV"
]
},
{
"path": "github.com/consensys/gnark-crypto/ecc/bw6-761/internal/fptower",
"symbols": [
"E6.ExpGLV"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://github.com/Consensys/gnark-crypto/pull/213"
},
{
"type": "FIX",
"url": "https://github.com/Consensys/gnark-crypto/pull/451"
},
{
"type": "FIX",
"url": "https://github.com/Consensys/gnark-crypto/commit/ec6be1a037f7c496d595c541a8a8d31c47bcfa3d"
},
{
"type": "WEB",
"url": "https://eprint.iacr.org/2015/565"
},
{
"type": "ADVISORY",
"url": "https://github.com/advisories/GHSA-pffg-92cg-xf5c"
}
],
"credits": [
{
"name": "@asanso"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2023-2101",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2550.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2550",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2020-7924",
"GHSA-6cwm-wm82-hgrw"
],
"summary": "MongoDB Tools Improper Certificate Validation vulnerability in github.com/mongodb/mongo-tools",
"details": "Usage of specific command line parameter in MongoDB Tools which was originally intended to just skip hostname checks, may result in MongoDB skipping all certificate validation. This may result in accepting invalid certificates.\n\nNOTE: this module uses its own versioning scheme that is not fully compatible with standard Go module versioning, so the affected versions in this report may differ from the versions listed in other advisories.\n\nAccording to the advisory, the affected versions are as follows: MongoDB Inc. MongoDB Database Tools 3.6 versions later than 3.6.5; 3.6 versions prior to 3.6.21; 4.0 versions prior to 4.0.21; 4.2 versions prior to 4.2.11; 100 versions prior to 100.2.0. MongoDB Inc. Mongomirror 0 versions later than 0.6.0.",
"affected": [
{
"package": {
"name": "github.com/mongodb/mongo-tools",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.0.0-20200819165540-8c1800b51550"
}
]
}
],
"ecosystem_specific": {
"custom_ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "3.6.5"
},
{
"fixed": "3.6.21"
},
{
"introduced": "4.0.0"
},
{
"fixed": "4.0.21"
},
{
"introduced": "4.2.0"
},
{
"fixed": "4.2.11"
},
{
"introduced": "100.0.0"
},
{
"fixed": "100.2.0"
}
]
}
]
}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/advisories/GHSA-6cwm-wm82-hgrw"
},
{
"type": "FIX",
"url": "https://github.com/mongodb/mongo-tools/commit/8c1800b5155084f954a39a1f2f259efac3bb86de"
},
{
"type": "WEB",
"url": "https://jira.mongodb.org/browse/TOOLS-2587"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2550",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0060.json
|
{
"schema_version": "1.3.1",
"id": "GO-2021-0060",
"modified": "0001-01-01T00:00:00Z",
"published": "2021-04-14T20:04:52Z",
"aliases": [
"CVE-2020-29509",
"GHSA-xhqq-x44f-9fgg"
],
"summary": "Authentication bypass in github.com/russellhaering/gosaml2",
"details": "Due to the behavior of encoding/xml, a crafted XML document may cause XML Digital Signature validation to be entirely bypassed, causing an unsigned document to appear signed.",
"affected": [
{
"package": {
"name": "github.com/russellhaering/gosaml2",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.6.0"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/russellhaering/gosaml2",
"symbols": [
"SAMLServiceProvider.RetrieveAssertionInfo",
"SAMLServiceProvider.ValidateEncodedLogoutRequestPOST",
"SAMLServiceProvider.ValidateEncodedLogoutResponsePOST",
"SAMLServiceProvider.ValidateEncodedResponse",
"parseResponse"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://github.com/russellhaering/gosaml2/commit/42606dafba60c58c458f14f75c4c230459672ab9"
}
],
"credits": [
{
"name": "Juho Nurminen"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2021-0060",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2754.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2754",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2020-8566",
"GHSA-5x96-j797-5qqw"
],
"summary": "Sensitive Information leak via Log File in Kubernetes in k8s.io/kubernetes",
"details": "Sensitive Information leak via Log File in Kubernetes in k8s.io/kubernetes",
"affected": [
{
"package": {
"name": "k8s.io/kubernetes",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.17.13"
},
{
"introduced": "1.18.0"
},
{
"fixed": "1.18.10"
},
{
"introduced": "1.19.0"
},
{
"fixed": "1.19.3"
}
]
}
],
"ecosystem_specific": {}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/advisories/GHSA-5x96-j797-5qqw"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8566"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886640"
},
{
"type": "WEB",
"url": "https://github.com/kubernetes/kubernetes/issues/95624"
},
{
"type": "WEB",
"url": "https://github.com/kubernetes/kubernetes/pull/95245"
},
{
"type": "WEB",
"url": "https://github.com/kubernetes/kubernetes/pull/95245/commits/e91ec4fad3366d2dee020919f7c2a0d7b52fd3ea"
},
{
"type": "WEB",
"url": "https://groups.google.com/g/kubernetes-announce/c/ScdmyORnPDk"
},
{
"type": "WEB",
"url": "https://groups.google.com/g/kubernetes-security-discuss/c/vm-HcrFUOCs/m/36utxAM5CwAJ"
},
{
"type": "WEB",
"url": "https://security.netapp.com/advisory/ntap-20210122-0006"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2754",
"review_status": "UNREVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-1130.json
|
{
"schema_version": "1.3.1",
"id": "GO-2022-1130",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2022-46146",
"GHSA-7rg2-cxvp-9p7p"
],
"summary": "Authentication bypass in github.com/prometheus/exporter-toolkit",
"details": "If an attacker has access to a Prometheus web.yml file and users' bcrypted passwords, it would be possible to bypass security via the built-in authentication cache.",
"affected": [
{
"package": {
"name": "github.com/prometheus/exporter-toolkit",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.7.2"
},
{
"introduced": "0.8.0"
},
{
"fixed": "0.8.2"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/prometheus/exporter-toolkit/web",
"symbols": [
"Listen",
"ListenAndServe",
"Serve",
"ServeMultiple",
"webHandler.ServeHTTP"
]
}
]
}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/prometheus/exporter-toolkit/security/advisories/GHSA-7rg2-cxvp-9p7p"
},
{
"type": "FIX",
"url": "https://github.com/prometheus/exporter-toolkit/commit/5b1eab34484ddd353986bce736cd119d863e4ff5"
}
],
"credits": [
{
"name": "Lei Wan"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2022-1130",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1600.json
|
{
"schema_version": "1.3.1",
"id": "GO-2023-1600",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2023-26047",
"GHSA-p2pf-g8cq-3gq5"
],
"summary": "Arbitrary code execution in github.com/kitabisa/teler-waf",
"details": "Improper handling of payload with special characters, such as CR/LF and horizontal tab, can lead to execution of arbitrary JavaScript code.",
"affected": [
{
"package": {
"name": "github.com/kitabisa/teler-waf",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.2.0"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/kitabisa/teler-waf",
"symbols": [
"Teler.Analyze",
"Teler.HandlerFuncWithNext",
"Teler.checkCommonWebAttack"
]
}
]
}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/advisories/GHSA-p2pf-g8cq-3gq5"
},
{
"type": "FIX",
"url": "https://github.com/kitabisa/teler-waf/commit/6e1b0e19b8adc1bbc3513a986025d4adf88d59f8"
},
{
"type": "WEB",
"url": "https://github.com/kitabisa/teler-waf/releases/tag/v0.2.0"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2023-1600",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2560.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2560",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2024-21497",
"GHSA-8hp3-rmr7-xh88"
],
"summary": "Open Redirect in github.com/greenpau/caddy-security",
"details": "Open Redirect in github.com/greenpau/caddy-security",
"affected": [
{
"package": {
"name": "github.com/greenpau/caddy-security",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/advisories/GHSA-8hp3-rmr7-xh88"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21497"
},
{
"type": "REPORT",
"url": "https://github.com/greenpau/caddy-security/issues/268"
},
{
"type": "WEB",
"url": "https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy"
},
{
"type": "WEB",
"url": "https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-6249861"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2560",
"review_status": "UNREVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2499.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2499",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2024-24747",
"GHSA-xx8w-mq23-29g4"
],
"summary": "Minio unsafe default: Access keys inherit `admin` of root user, allowing privilege escalation in github.com/minio/minio",
"details": "Minio unsafe default: Access keys inherit `admin` of root user, allowing privilege escalation in github.com/minio/minio",
"affected": [
{
"package": {
"name": "github.com/minio/minio",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.0.0-20240131185645-0ae4915a9391"
}
]
}
],
"ecosystem_specific": {}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/minio/minio/security/advisories/GHSA-xx8w-mq23-29g4"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-24747"
},
{
"type": "FIX",
"url": "https://github.com/minio/minio/commit/0ae4915a9391ef4b3ec80f5fcdcf24ee6884e776"
},
{
"type": "WEB",
"url": "https://github.com/minio/minio/releases/tag/RELEASE.2024-01-31T20-20-33Z"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2499",
"review_status": "UNREVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2866.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2866",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2024-5042",
"GHSA-2rhx-qhxp-5jpw"
],
"summary": "Submariner Operator sets unnecessary RBAC permissions in helm charts in github.com/submariner-io/submariner-operator",
"details": "Submariner Operator sets unnecessary RBAC permissions in helm charts in github.com/submariner-io/submariner-operator",
"affected": [
{
"package": {
"name": "github.com/submariner-io/submariner-operator",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.16.4"
},
{
"introduced": "0.17.0"
}
]
}
],
"ecosystem_specific": {}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/advisories/GHSA-2rhx-qhxp-5jpw"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-5042"
},
{
"type": "FIX",
"url": "https://github.com/submariner-io/submariner-operator/commit/b27a04c4270e53cbff6ff8ac6245db10c204bcab"
},
{
"type": "FIX",
"url": "https://github.com/submariner-io/submariner-operator/pull/3040"
},
{
"type": "REPORT",
"url": "https://github.com/submariner-io/submariner-operator/issues/3041"
},
{
"type": "WEB",
"url": "https://access.redhat.com/security/cve/CVE-2024-5042"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280921"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2866",
"review_status": "UNREVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2497.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2497",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2024-23653",
"GHSA-wr6v-9f75-vh2g"
],
"summary": "Privilege escalation in github.com/moby/buildkit",
"details": "BuildKit provides APIs for running interactive containers based on built images. It was possible to use these APIs to ask BuildKit to run a container with elevated privileges. Normally, running such containers is only allowed if special security.insecure entitlement is enabled both by buildkitd configuration and allowed by the user initializing the build request.",
"affected": [
{
"package": {
"name": "github.com/moby/buildkit",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.12.5"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/moby/buildkit/solver/llbsolver",
"symbols": [
"Solver.Solve",
"ValidateEntitlements",
"llbBridge.Exec",
"llbBridge.Run",
"provenanceBridge.Solve"
]
},
{
"path": "github.com/moby/buildkit/frontend/gateway/forwarder",
"symbols": [
"BridgeClient.NewContainer",
"GatewayForwarder.Solve",
"LLBBridgeToGatewayClient"
]
},
{
"path": "github.com/moby/buildkit/cmd/buildkitd",
"symbols": [
"newController"
]
},
{
"path": "github.com/moby/buildkit/frontend/gateway/container",
"symbols": [
"NewContainer"
]
},
{
"path": "github.com/moby/buildkit/frontend/gateway",
"symbols": [
"NewBridgeForwarder",
"gatewayFrontend.Solve",
"llbBridgeForwarder.NewContainer",
"newBridgeForwarder",
"serveLLBBridgeForwarder"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://github.com/moby/buildkit/pull/4602"
},
{
"type": "FIX",
"url": "https://github.com/moby/buildkit/commit/92cc595cfb12891d4b3ae476e067c74250e4b71e"
},
{
"type": "FIX",
"url": "https://github.com/moby/buildkit/commit/5026d95aa3336e97cfe46e3764f52d08bac7a10e"
},
{
"type": "WEB",
"url": "https://github.com/moby/buildkit/releases/tag/v0.12.5"
}
],
"credits": [
{
"name": "@rmcnamara-snyk"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2497",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0273.json
|
{
"schema_version": "1.3.1",
"id": "GO-2022-0273",
"modified": "0001-01-01T00:00:00Z",
"published": "2022-05-18T18:23:31Z",
"aliases": [
"CVE-2021-39293"
],
"summary": "Panic due to crafted inputs in archive/zip",
"details": "The NewReader and OpenReader functions in archive/zip can cause a panic or an unrecoverable fatal error when reading an archive that claims to contain a large number of files, regardless of its actual size. This is caused by an incomplete fix for CVE-2021-33196.",
"affected": [
{
"package": {
"name": "stdlib",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.16.8"
},
{
"introduced": "1.17.0-0"
},
{
"fixed": "1.17.1"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "archive/zip",
"symbols": [
"NewReader",
"OpenReader"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://go.dev/cl/343434"
},
{
"type": "FIX",
"url": "https://go.googlesource.com/go/+/bacbc33439b124ffd7392c91a5f5d96eca8c0c0b"
},
{
"type": "REPORT",
"url": "https://go.dev/issue/47801"
},
{
"type": "WEB",
"url": "https://groups.google.com/g/golang-announce/c/dx9d7IOseHw"
}
],
"credits": [
{
"name": "OSS-Fuzz Project"
},
{
"name": "Emmanuel Odeke"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2022-0273",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2682.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2682",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2024-22189",
"GHSA-c33x-xqrf-c478"
],
"summary": "Denial of service via connection starvation in github.com/quic-go/quic-go",
"details": "An attacker can cause its peer to run out of memory by sending a large number of NEW_CONNECTION_ID frames that retire old connection IDs. The receiver is supposed to respond to each retirement frame with a RETIRE_CONNECTION_ID frame. The attacker can prevent the receiver from sending out (the vast majority of) these RETIRE_CONNECTION_ID frames by collapsing the peers congestion window (by selectively acknowledging received packets) and by manipulating the peer's RTT estimate.",
"affected": [
{
"package": {
"name": "github.com/quic-go/quic-go",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.42.0"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/quic-go/quic-go",
"symbols": [
"Dial",
"DialAddr",
"DialAddrEarly",
"DialEarly",
"Listen",
"ListenAddr",
"ListenAddrEarly",
"ListenEarly",
"Transport.Dial",
"Transport.DialEarly",
"Transport.Listen",
"Transport.ListenEarly",
"connIDGenerator.Retire",
"connIDGenerator.SetMaxActiveConnIDs",
"connIDManager.Add",
"connIDManager.Get",
"connection.AcceptStream",
"connection.AcceptUniStream",
"connection.OpenStream",
"connection.OpenStreamSync",
"connection.OpenUniStream",
"connection.OpenUniStreamSync",
"connection.run",
"framerI.AppendStreamFrames",
"framerI.QueueControlFrame",
"packetPacker.AppendPacket",
"packetPacker.MaybePackProbePacket",
"packetPacker.PackAckOnlyPacket",
"packetPacker.PackApplicationClose",
"packetPacker.PackCoalescedPacket",
"packetPacker.PackConnectionClose",
"packetPacker.PackMTUProbePacket",
"receiveStream.CancelRead",
"receiveStream.CloseRemote",
"receiveStream.Read",
"sendStream.CancelWrite",
"streamsMap.AcceptStream",
"streamsMap.AcceptUniStream",
"streamsMap.DeleteStream",
"streamsMap.HandleMaxStreamsFrame",
"streamsMap.OpenStream",
"streamsMap.OpenStreamSync",
"streamsMap.OpenUniStream",
"streamsMap.OpenUniStreamSync",
"streamsMap.UpdateLimits",
"windowUpdateQueue.QueueAll"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://github.com/quic-go/quic-go/commit/4a99b816ae3ab03ae5449d15aac45147c85ed47a"
},
{
"type": "WEB",
"url": "https://seemann.io/posts/2024-03-19-exploiting-quics-connection-id-management"
}
],
"credits": [
{
"name": "marten-seemann"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2682",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0998.json
|
{
"schema_version": "1.3.1",
"id": "GO-2022-0998",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2022-36056",
"GHSA-8gw7-4j42-w388"
],
"summary": "Improper blob verification in github.com/sigstore/cosign",
"details": "Improper blob verification in github.com/sigstore/cosign",
"affected": [
{
"package": {
"name": "github.com/sigstore/cosign",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.12.0"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/sigstore/cosign/cmd/cosign/cli/verify",
"symbols": [
"VerifyAttestationCommand.Exec",
"VerifyBlobCmd",
"VerifyCommand.Exec",
"signatures",
"verifyRekorBundle",
"verifyRekorEntry",
"verifySigByUUID"
]
},
{
"path": "github.com/sigstore/cosign/pkg/cosign",
"symbols": [
"TLogUpload",
"TLogUploadInTotoAttestation",
"VerifyBundle",
"VerifyImageAttestations",
"VerifyImageSignature",
"VerifyImageSignatures",
"VerifyLocalImageAttestations",
"VerifyLocalImageSignatures",
"VerifySET",
"VerifyTLogEntry"
]
}
]
}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/sigstore/cosign/security/advisories/GHSA-8gw7-4j42-w388"
},
{
"type": "FIX",
"url": "https://github.com/sigstore/cosign/commit/80b79ed8b4d28ccbce3d279fd273606b5cddcc25"
},
{
"type": "WEB",
"url": "https://github.com/sigstore/cosign/releases/tag/v1.12.0"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2022-0998",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2729.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2729",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2024-31452",
"GHSA-8cph-m685-6v6r"
],
"summary": "OpenFGA Authorization Bypass in github.com/openfga/openfga",
"details": "OpenFGA Authorization Bypass in github.com/openfga/openfga",
"affected": [
{
"package": {
"name": "github.com/openfga/openfga",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "1.5.0"
},
{
"fixed": "1.5.3"
}
]
}
],
"ecosystem_specific": {}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/openfga/openfga/security/advisories/GHSA-8cph-m685-6v6r"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31452"
},
{
"type": "FIX",
"url": "https://github.com/openfga/openfga/commit/b6a6d99b2bdbf8c3781503989576076289f48ed2"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2729",
"review_status": "UNREVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-2382.json
|
{
"schema_version": "1.3.1",
"id": "GO-2023-2382",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2023-39326"
],
"summary": "Denial of service via chunk extensions in net/http",
"details": "A malicious HTTP sender can use chunk extensions to cause a receiver reading from a request or response body to read many more bytes from the network than are in the body.\n\nA malicious HTTP client can further exploit this to cause a server to automatically read a large amount of data (up to about 1GiB) when a handler fails to read the entire body of a request.\n\nChunk extensions are a little-used HTTP feature which permit including additional metadata in a request or response body sent using the chunked encoding. The net/http chunked encoding reader discards this metadata. A sender can exploit this by inserting a large metadata segment with each byte transferred. The chunk reader now produces an error if the ratio of real body to encoded bytes grows too small.",
"affected": [
{
"package": {
"name": "stdlib",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.20.12"
},
{
"introduced": "1.21.0-0"
},
{
"fixed": "1.21.5"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "net/http/internal",
"symbols": [
"chunkedReader.Read",
"chunkedReader.beginChunk",
"readChunkLine"
]
}
]
}
}
],
"references": [
{
"type": "REPORT",
"url": "https://go.dev/issue/64433"
},
{
"type": "FIX",
"url": "https://go.dev/cl/547335"
},
{
"type": "WEB",
"url": "https://groups.google.com/g/golang-dev/c/6ypN5EjibjM/m/KmLVYH_uAgAJ"
}
],
"credits": [
{
"name": "Bartek Nowotarski"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2023-2382",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0064.json
|
{
"schema_version": "1.3.1",
"id": "GO-2021-0064",
"modified": "0001-01-01T00:00:00Z",
"published": "2021-04-14T20:04:52Z",
"aliases": [
"CVE-2020-8565",
"GHSA-8cfg-vx93-jvxw"
],
"summary": "Unauthorized credential disclosure via debug logs in k8s.io/kubernetes and k8s.io/client-go",
"details": "Authorization tokens may be inappropriately logged if the verbosity level is set to a debug level. This is due to an incomplete fix for CVE-2019-11250.",
"affected": [
{
"package": {
"name": "k8s.io/client-go",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.20.0-alpha.2"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "k8s.io/client-go/transport",
"symbols": [
"basicAuthRoundTripper.RoundTrip",
"bearerAuthRoundTripper.RoundTrip",
"debuggingRoundTripper.RoundTrip",
"impersonatingRoundTripper.RoundTrip",
"requestInfo.toCurl",
"userAgentRoundTripper.RoundTrip"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://github.com/kubernetes/kubernetes/pull/95316"
},
{
"type": "FIX",
"url": "https://github.com/kubernetes/kubernetes/commit/e99df0e5a75eb6e86123b56d53e9b7ca0fd00419"
},
{
"type": "WEB",
"url": "https://github.com/kubernetes/kubernetes/issues/95623"
}
],
"credits": [
{
"name": "@sfowl"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2021-0064",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2959.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2959",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2024-38513",
"GHSA-98j2-3j3p-fw2v"
],
"summary": "Session Middleware Token Injection Vulnerability in github.com/gofiber/fiber",
"details": "Session Middleware Token Injection Vulnerability in github.com/gofiber/fiber",
"affected": [
{
"package": {
"name": "github.com/gofiber/fiber",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/gofiber/fiber/v2",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "2.52.5"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/gofiber/fiber/v2/middleware/session",
"symbols": [
"Store.Get",
"Store.responseCookies"
]
}
]
}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/gofiber/fiber/security/advisories/GHSA-98j2-3j3p-fw2v"
},
{
"type": "FIX",
"url": "https://github.com/gofiber/fiber/commit/7926e5bf4da03e54f62d27d53229d35b264cba8e"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2959",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-2098.json
|
{
"schema_version": "1.3.1",
"id": "GO-2023-2098",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2023-44378",
"GHSA-498w-5j49-vqjg"
],
"summary": "Unsoundness in variable comparison / non-unique binary decomposition in github.com/consensys/gnark",
"details": "Unsoundness in variable comparison / non-unique binary decomposition in github.com/consensys/gnark",
"affected": [
{
"package": {
"name": "github.com/consensys/gnark",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.9.0"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/consensys/gnark/frontend/cs/r1cs",
"symbols": [
"builder.AssertIsLessOrEqual",
"builder.Cmp",
"builder.ToBinary",
"builder.mustBeLessOrEqCst",
"builder.mustBeLessOrEqVar"
]
},
{
"path": "github.com/consensys/gnark/frontend/cs/scs",
"symbols": [
"builder.AssertIsLessOrEqual",
"builder.Cmp",
"builder.ToBinary",
"builder.mustBeLessOrEqCst",
"builder.mustBeLessOrEqVar"
]
},
{
"path": "github.com/consensys/gnark/internal/backend/circuits",
"symbols": [
"recursiveHint.Define"
]
},
{
"path": "github.com/consensys/gnark/std/math/bits",
"symbols": [
"WithNbDigits"
]
}
]
}
}
],
"references": [
{
"type": "REPORT",
"url": "https://github.com/zkopru-network/zkopru/issues/116"
},
{
"type": "FIX",
"url": "https://github.com/Consensys/gnark/pull/835"
},
{
"type": "FIX",
"url": "https://github.com/Consensys/gnark/commit/59a4087261a6c73f13e80d695c17b398c3d0934f"
},
{
"type": "ADVISORY",
"url": "https://github.com/advisories/GHSA-498w-5j49-vqjg"
}
],
"credits": [
{
"name": "@kustosz"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2023-2098",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2794.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2794",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2024-4198",
"GHSA-5qx9-9ffj-5r8f"
],
"summary": "Mattermost fails to fully validate role changes in github.com/mattermost/mattermost-server",
"details": "Mattermost fails to fully validate role changes in github.com/mattermost/mattermost-server",
"affected": [
{
"package": {
"name": "github.com/mattermost/mattermost-server",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "8.1.0+incompatible"
},
{
"fixed": "8.1.12+incompatible"
},
{
"introduced": "9.5.0+incompatible"
},
{
"fixed": "9.5.3+incompatible"
},
{
"introduced": "9.6.0-rc1+incompatible"
},
{
"fixed": "9.6.1+incompatible"
}
]
}
],
"ecosystem_specific": {}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/advisories/GHSA-5qx9-9ffj-5r8f"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4198"
},
{
"type": "WEB",
"url": "https://github.com/mattermost/mattermost/commit/3d6d8a7c1f7105558fe266a1b379859a4dba4e9b"
},
{
"type": "WEB",
"url": "https://github.com/mattermost/mattermost/commit/408ce4a82bb55ce27801f7044d9b3b49e82c47ed"
},
{
"type": "WEB",
"url": "https://github.com/mattermost/mattermost/commit/fba5b8e348feada9b21290369c3598ccd5c04424"
},
{
"type": "WEB",
"url": "https://mattermost.com/security-updates"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2794",
"review_status": "UNREVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0240.json
|
{
"schema_version": "1.3.1",
"id": "GO-2021-0240",
"modified": "0001-01-01T00:00:00Z",
"published": "2022-02-17T17:33:25Z",
"aliases": [
"CVE-2021-33196"
],
"summary": "Panic when reading certain archives in archive/zip",
"details": "NewReader and OpenReader can cause a panic or an unrecoverable fatal error when reading an archive that claims to contain a large number of files, regardless of its actual size.",
"affected": [
{
"package": {
"name": "stdlib",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.15.13"
},
{
"introduced": "1.16.0-0"
},
{
"fixed": "1.16.5"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "archive/zip",
"symbols": [
"Reader.init"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://go.dev/cl/318909"
},
{
"type": "FIX",
"url": "https://go.googlesource.com/go/+/74242baa4136c7a9132a8ccd9881354442788c8c"
},
{
"type": "WEB",
"url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI"
},
{
"type": "REPORT",
"url": "https://go.dev/issue/46242"
}
],
"credits": [
{
"name": "OSS-Fuzz (discovery)"
},
{
"name": "Emmanuel Odeke (reporter)"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2021-0240",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2490.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2490",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2024-24579",
"GHSA-hpxr-w9w7-g4gv"
],
"summary": "Path traversal in github.com/anchore/stereoscope",
"details": "It is possible to craft an OCI tar archive that, when stereoscope attempts to unarchive the contents, will result in writing to paths outside of the unarchive temporary directory.",
"affected": [
{
"package": {
"name": "github.com/anchore/stereoscope",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.0.1"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/anchore/stereoscope/pkg/file",
"symbols": [
"UntarToDirectory"
]
}
]
}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/anchore/stereoscope/security/advisories/GHSA-hpxr-w9w7-g4gv"
},
{
"type": "FIX",
"url": "https://github.com/anchore/stereoscope/commit/09dacab4d9ee65ee8bc7af8ebf4aa7b5aaa36204"
}
],
"credits": [
{
"name": "@wagoodman"
},
{
"name": "@joshbressers"
},
{
"name": "@nurmi"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2490",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0370.json
|
{
"schema_version": "1.3.1",
"id": "GO-2022-0370",
"modified": "0001-01-01T00:00:00Z",
"published": "2022-07-29T20:00:14Z",
"aliases": [
"CVE-2022-24968",
"GHSA-h289-x5wc-xcv8",
"GHSA-m658-p24x-p74r"
],
"summary": "Man-in-the-middle attack due to improper validation of certificate in mellium.im/xmpp",
"details": "Websocket client connections are vulnerable to man-in-the-middle attacks via DNS spoofing.\n\nWhen looking up a WSS endpoint using a DNS TXT record, the server TLS certificate is incorrectly validated using the name of the server returned by the TXT record request, not the name of the the server being connected to. This permits any attacker that can spoof a DNS record to redirect the user to a server of their choosing.\n\nProviding a *tls.Config with a ServerName field set to the correct destination hostname will avoid this issue.",
"affected": [
{
"package": {
"name": "mellium.im/xmpp",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0.18.0"
},
{
"fixed": "0.21.1"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "mellium.im/xmpp/websocket",
"symbols": [
"Dial",
"DialDirect",
"DialSession",
"Dialer.Dial",
"Dialer.DialDirect",
"Dialer.config",
"NewClient"
]
}
]
}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://mellium.im/cve/cve-2022-24968/"
},
{
"type": "FIX",
"url": "https://github.com/mellium/xmpp/pull/260"
},
{
"type": "FIX",
"url": "https://github.com/mellium/xmpp/commit/0d92aa486da69b71f2f4a30e62aa722c711b98ac"
},
{
"type": "REPORT",
"url": "https://mellium.im/issue/259"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2022-0370",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2617.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2617",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2024-2048",
"GHSA-r3w7-mfpm-c2vw"
],
"summary": "Authentication bypass in github.com/hashicorp/vault",
"details": "The TLS certificate authentication method incorrectly validates client certificates when configured with a non-CA certificate as a trusted certificate. When configured this way, attackers may be able to craft a certificate that can be used to bypass authentication.",
"affected": [
{
"package": {
"name": "github.com/hashicorp/vault",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.14.10"
},
{
"introduced": "1.15.0"
},
{
"fixed": "1.15.5"
}
]
}
],
"ecosystem_specific": {}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-2048"
},
{
"type": "WEB",
"url": "https://discuss.hashicorp.com/t/hcsec-2024-05-vault-cert-auth-method-did-not-correctly-validate-non-ca-certificates/63382"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2617",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2653.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2653",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2024-28248",
"GHSA-68mj-9pjq-mc85"
],
"summary": "HTTP policy bypass in github.com/cilium/cilium",
"details": "Cilium's HTTP policies are not consistently applied to all traffic in the scope of the policies, leading to HTTP traffic being incorrectly and intermittently forwarded when it should be dropped.",
"affected": [
{
"package": {
"name": "github.com/cilium/cilium",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "1.13.9"
},
{
"fixed": "1.13.13"
},
{
"introduced": "1.14.0"
},
{
"fixed": "1.14.8"
},
{
"introduced": "1.15.0"
},
{
"fixed": "1.15.2"
}
]
}
],
"ecosystem_specific": {}
}
],
"references": [
{
"type": "WEB",
"url": "https://docs.cilium.io/en/stable/security/policy/language/#http"
}
],
"credits": [
{
"name": "@romikps"
},
{
"name": "@sayboras"
},
{
"name": "@jrajahalme"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2653",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2554.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2554",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2024-25620",
"GHSA-v53g-5gjp-272r"
],
"summary": "Path traversal in helm.sh/helm/v3",
"details": "Path traversal in helm.sh/helm/v3",
"affected": [
{
"package": {
"name": "helm.sh/helm/v3",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "3.14.1"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "helm.sh/helm/v3/pkg/chart",
"symbols": [
"Chart.Validate",
"Metadata.Validate"
]
},
{
"path": "helm.sh/helm/v3/pkg/chartutil",
"symbols": [
"CreateFrom",
"Save",
"SaveDir",
"writeTarContents"
]
},
{
"path": "helm.sh/helm/v3/pkg/lint/rules",
"symbols": [
"Chartfile",
"Dependencies",
"Templates",
"TemplatesWithKubeVersion",
"validateChartName"
]
}
]
}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/helm/helm/security/advisories/GHSA-v53g-5gjp-272r"
},
{
"type": "FIX",
"url": "https://github.com/helm/helm/commit/0d0f91d1ce277b2c8766cdc4c7aa04dbafbf2503"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2554",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0239.json
|
{
"schema_version": "1.3.1",
"id": "GO-2021-0239",
"modified": "0001-01-01T00:00:00Z",
"published": "2022-02-17T17:33:35Z",
"aliases": [
"CVE-2021-33195"
],
"summary": "Improper sanitization when resolving values from DNS in net",
"details": "The LookupCNAME, LookupSRV, LookupMX, LookupNS, and LookupAddr functions and their respective methods on the Resolver type may return arbitrary values retrieved from DNS which do not follow the established RFC 1035 rules for domain names. If these names are used without further sanitization, for instance unsafely included in HTML, they may allow for injection of unexpected content. Note that LookupTXT may still return arbitrary values that could require sanitization before further use.",
"affected": [
{
"package": {
"name": "stdlib",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.15.13"
},
{
"introduced": "1.16.0-0"
},
{
"fixed": "1.16.5"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "net",
"symbols": [
"Resolver.LookupAddr",
"Resolver.LookupCNAME",
"Resolver.LookupMX",
"Resolver.LookupNS",
"Resolver.LookupSRV"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://go.dev/cl/320949"
},
{
"type": "FIX",
"url": "https://go.googlesource.com/go/+/c89f1224a544cde464fcb86e78ebb0cc97eedba2"
},
{
"type": "WEB",
"url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI"
},
{
"type": "REPORT",
"url": "https://go.dev/issue/46241"
}
],
"credits": [
{
"name": "Philipp Jeitner"
},
{
"name": "Haya Shulman from Fraunhofer SIT"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2021-0239",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1840.json
|
{
"schema_version": "1.3.1",
"id": "GO-2023-1840",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2023-29403"
],
"summary": "Unsafe behavior in setuid/setgid binaries in runtime",
"details": "On Unix platforms, the Go runtime does not behave differently when a binary is run with the setuid/setgid bits. This can be dangerous in certain cases, such as when dumping memory state, or assuming the status of standard i/o file descriptors.\n\nIf a setuid/setgid binary is executed with standard I/O file descriptors closed, opening any files can result in unexpected content being read or written with elevated privileges. Similarly, if a setuid/setgid program is terminated, either via panic or signal, it may leak the contents of its registers.",
"affected": [
{
"package": {
"name": "stdlib",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.19.10"
},
{
"introduced": "1.20.0-0"
},
{
"fixed": "1.20.5"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "runtime"
}
]
}
}
],
"references": [
{
"type": "REPORT",
"url": "https://go.dev/issue/60272"
},
{
"type": "FIX",
"url": "https://go.dev/cl/501223"
},
{
"type": "WEB",
"url": "https://groups.google.com/g/golang-announce/c/q5135a9d924/m/j0ZoAJOHAwAJ"
}
],
"credits": [
{
"name": "Vincent Dehors from Synacktiv"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2023-1840",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2656.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2656",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2024-28249",
"GHSA-j89h-qrvr-xc36"
],
"summary": "Unencrypted traffic between nodes with IPsec in github.com/cilium/cilium",
"details": "In Cilium clusters with IPsec enabled and traffic matching Layer 7 policies, traffic that should be IPsec-encrypted between a node's Envoy proxy and pods on other nodes is sent unencrypted, and traffic that should be IPsec-encrypted between a node's DNS proxy and pods on other nodes is sent unencrypted.",
"affected": [
{
"package": {
"name": "github.com/cilium/cilium",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.13.13"
},
{
"introduced": "1.14.0"
},
{
"fixed": "1.14.8"
},
{
"introduced": "1.15.0"
},
{
"fixed": "1.15.2"
}
]
}
],
"ecosystem_specific": {}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cilium/cilium/security/advisories/GHSA-j89h-qrvr-xc36"
}
],
"credits": [
{
"name": "@jschwinger233"
},
{
"name": "@julianwiedmann"
},
{
"name": "@giorio94"
},
{
"name": "@jrajahalme"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2656",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1602.json
|
{
"schema_version": "1.3.1",
"id": "GO-2023-1602",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2023-26483",
"GHSA-6gc3-crp7-25w5"
],
"summary": "Denial of service via deflate decompression bomb in github.com/russellhaering/gosaml2",
"details": "A bug in SAML authentication library can result in Denial of Service attacks.\n\nAttackers can craft a \"deflate\"-compressed request which will consume significantly more memory during processing than the size of the original request. This may eventually lead to memory exhaustion and the process being killed.",
"affected": [
{
"package": {
"name": "github.com/russellhaering/gosaml2",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.9.0"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/russellhaering/gosaml2",
"symbols": [
"DecodeUnverifiedBaseResponse",
"DecodeUnverifiedLogoutResponse",
"SAMLServiceProvider.RetrieveAssertionInfo",
"SAMLServiceProvider.ValidateEncodedLogoutRequestPOST",
"SAMLServiceProvider.ValidateEncodedLogoutResponsePOST",
"SAMLServiceProvider.ValidateEncodedResponse",
"SAMLServiceProvider.validationContext",
"maybeDeflate",
"parseResponse"
]
}
]
}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/advisories/GHSA-6gc3-crp7-25w5"
},
{
"type": "FIX",
"url": "https://github.com/russellhaering/gosaml2/commit/f9d66040241093e8702649baff50cc70d2c683c0"
},
{
"type": "WEB",
"url": "https://github.com/russellhaering/gosaml2/releases/tag/v0.9.0"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2023-1602",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2020-0028.json
|
{
"schema_version": "1.3.1",
"id": "GO-2020-0028",
"modified": "0001-01-01T00:00:00Z",
"published": "2021-04-14T20:04:52Z",
"aliases": [
"CVE-2018-17419",
"GHSA-9jcx-pr2f-qvq5"
],
"summary": "Denial of service via malformed zone file in github.com/miekg/dns",
"details": "Due to a nil pointer dereference, parsing a malformed zone file containing TA records may cause a panic. If parsing user supplied input, this may be used as a denial of service vector.",
"affected": [
{
"package": {
"name": "github.com/miekg/dns",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.0.10"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/miekg/dns",
"symbols": [
"NewRR",
"ParseZone",
"ReadRR",
"setTA"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://github.com/miekg/dns/commit/501e858f679edecd4a38a86317ce50271014a80d"
},
{
"type": "REPORT",
"url": "https://github.com/miekg/dns/issues/742"
}
],
"credits": [
{
"name": "@tr3ee"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2020-0028",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0761.json
|
{
"schema_version": "1.3.1",
"id": "GO-2022-0761",
"modified": "0001-01-01T00:00:00Z",
"published": "2022-08-09T17:05:15Z",
"aliases": [
"CVE-2016-5386"
],
"summary": "Improper input validation in net/http and net/http/cgi",
"details": "An input validation flaw in the CGI components allows the HTTP_PROXY environment variable to be set by the incoming Proxy header, which changes where Go by default proxies all outbound HTTP requests.\n\nThis environment variable is also used to set the outgoing proxy, enabling an attacker to insert a proxy into outgoing requests of a CGI program.\n\nRead more about \"httpoxy\" here: https://httpoxy.org.",
"affected": [
{
"package": {
"name": "stdlib",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.6.3"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "net/http",
"symbols": [
"Handler.ServeHTTP"
]
},
{
"path": "net/http/cgi",
"symbols": [
"ProxyFromEnvironment"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://go.dev/cl/25010"
},
{
"type": "FIX",
"url": "https://go.googlesource.com/go/+/b97df54c31d6c4cc2a28a3c83725366d52329223"
},
{
"type": "REPORT",
"url": "https://go.dev/issue/16405"
},
{
"type": "WEB",
"url": "https://groups.google.com/g/golang-announce/c/7jZDOQ8f8tM/m/eWRWHnc8CgAJ"
}
],
"credits": [
{
"name": "Dominic Scheirlinck"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2022-0761",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2556.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2556",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2024-23448",
"GHSA-8r33-q5j5-rh7g"
],
"summary": "APM Server vulnerable to Insertion of Sensitive Information into Log File in github.com/elastic/apm-server",
"details": "APM Server vulnerable to Insertion of Sensitive Information into Log File in github.com/elastic/apm-server.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/elastic/apm-server before v8.12.1.",
"affected": [
{
"package": {
"name": "github.com/elastic/apm-server",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {
"custom_ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0"
},
{
"fixed": "8.12.1"
}
]
}
]
}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/advisories/GHSA-8r33-q5j5-rh7g"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23448"
},
{
"type": "WEB",
"url": "https://discuss.elastic.co/t/apm-server-8-12-1-security-update-esa-2024-03/352688"
},
{
"type": "WEB",
"url": "https://www.elastic.co/community/security"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2556",
"review_status": "UNREVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-2074.json
|
{
"schema_version": "1.3.1",
"id": "GO-2023-2074",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2023-42821",
"GHSA-m9xq-6h2j-65r2"
],
"summary": "Parser out-of-bounds read caused by a malformed markdown input in github.com/gomarkdown/markdown",
"details": "Parser out-of-bounds read caused by a malformed markdown input in github.com/gomarkdown/markdown",
"affected": [
{
"package": {
"name": "github.com/gomarkdown/markdown",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.0.0-20230922105210-14b16010c2ee"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/gomarkdown/markdown/parser",
"symbols": [
"Parser.Block",
"Parser.Inline",
"Parser.Parse",
"Parser.isPrefixHeading",
"citation"
]
}
]
}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/gomarkdown/markdown/security/advisories/GHSA-m9xq-6h2j-65r2"
},
{
"type": "FIX",
"url": "https://github.com/gomarkdown/markdown/commit/14b16010c2ee7ff33a940a541d993bd043a88940"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2023-2074",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-2181.json
|
{
"schema_version": "1.3.1",
"id": "GO-2023-2181",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2023-46737",
"GHSA-vfp6-jrw2-99g9"
],
"summary": "Denial of service attack from remote registry in github.com/sigstore/cosign",
"details": "An attacker who controls a remote registry can return a high number of attestations and/or signatures to cosign. This can cause cosign to enter a long loop resulting in a denial of service, i.e., endless data attack.",
"affected": [
{
"package": {
"name": "github.com/sigstore/cosign",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/sigstore/cosign/pkg/cosign",
"symbols": [
"FetchSignaturesForReference"
]
}
]
}
},
{
"package": {
"name": "github.com/sigstore/cosign/v2",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "2.2.1"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/sigstore/cosign/v2/pkg/cosign",
"symbols": [
"FetchSignaturesForReference"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://github.com/sigstore/cosign/commit/8ac891ff0e29ddc67965423bee8f826219c6eb0f"
},
{
"type": "WEB",
"url": "https://github.com/sigstore/cosign/releases/tag/v2.2.1"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2023-2181",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0536.json
|
{
"schema_version": "1.3.1",
"id": "GO-2022-0536",
"modified": "0001-01-01T00:00:00Z",
"published": "2022-08-01T22:20:53Z",
"aliases": [
"CVE-2019-9512",
"CVE-2019-9514",
"GHSA-39qc-96h7-956f",
"GHSA-hgr8-6h9x-f7q9"
],
"summary": "Reset flood in net/http and golang.org/x/net/http",
"details": "Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service.\n\nServers that accept direct connections from untrusted clients could be remotely made to allocate an unlimited amount of memory, until the program crashes. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.",
"affected": [
{
"package": {
"name": "stdlib",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.11.13"
},
{
"introduced": "1.12.0-0"
},
{
"fixed": "1.12.8"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "net/http",
"symbols": [
"http2serverConn.scheduleFrameWrite",
"http2serverConn.serve",
"http2serverConn.writeFrame"
]
}
]
}
},
{
"package": {
"name": "golang.org/x/net",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.0.0-20190813141303-74dc4d7220e7"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "golang.org/x/net/http2",
"symbols": [
"Server.ServeConn",
"serverConn.scheduleFrameWrite",
"serverConn.serve",
"serverConn.writeFrame"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://go.dev/cl/190137"
},
{
"type": "FIX",
"url": "https://go.googlesource.com/go/+/145e193131eb486077b66009beb051aba07c52a5"
},
{
"type": "REPORT",
"url": "https://go.dev/issue/33606"
},
{
"type": "WEB",
"url": "https://groups.google.com/g/golang-announce/c/65QixT3tcmg/m/DrFiG6vvCwAJ"
}
],
"credits": [
{
"name": "Jonathan Looney of Netflix"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2022-0536",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0104.json
|
{
"schema_version": "1.3.1",
"id": "GO-2021-0104",
"modified": "0001-01-01T00:00:00Z",
"published": "2021-07-28T18:08:05Z",
"aliases": [
"CVE-2021-28681",
"GHSA-74xm-qj29-cq8p"
],
"summary": "Authorization bypass in github.com/pion/webrtc/v3",
"details": "Due to improper error handling, DTLS connections were not killed when certificate verification failed, causing users who did not check the connection state to continue to use the connection. This could allow allow an attacker which holds the ICE password, but not a valid certificate, to bypass this restriction.",
"affected": [
{
"package": {
"name": "github.com/pion/webrtc/v3",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "3.0.15"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/pion/webrtc/v3",
"symbols": [
"DTLSTransport.Start",
"PeerConnection.AddTrack",
"PeerConnection.AddTransceiverFromKind",
"PeerConnection.AddTransceiverFromTrack",
"PeerConnection.CreateDataChannel",
"PeerConnection.RemoveTrack",
"PeerConnection.SetLocalDescription",
"PeerConnection.SetRemoteDescription",
"operations.Done",
"operations.Enqueue"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://github.com/pion/webrtc/pull/1709"
},
{
"type": "FIX",
"url": "https://github.com/pion/webrtc/commit/545613dcdeb5dedb01cce94175f40bcbe045df2e"
},
{
"type": "WEB",
"url": "https://github.com/pion/webrtc/issues/1708"
}
],
"credits": [
{
"name": "Gaukas Wang (@Gaukas)"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2021-0104",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2654.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2654",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2024-21661",
"GHSA-6v85-wr92-q4p7"
],
"summary": "Denial of service in github.com/argoproj/argo-cd/v2",
"details": "Application may crash due to concurrent writes, leading to a denial of service. An attacker can crash the application continuously, making it impossible for legitimate users to access the service. Authentication is not required in the attack.",
"affected": [
{
"package": {
"name": "github.com/argoproj/argo-cd/v2",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "2.8.13"
},
{
"introduced": "2.9.0"
},
{
"fixed": "2.9.9"
},
{
"introduced": "2.10.0"
},
{
"fixed": "2.10.4"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/argoproj/argo-cd/v2/server/application",
"symbols": [
"NewHandler",
"newTerminalSession"
]
},
{
"path": "github.com/argoproj/argo-cd/v2/util/session",
"symbols": [
"SessionManager.VerifyUsernamePassword",
"SessionManager.getFailureCount",
"SessionManager.updateFailureCount",
"expireOldFailedAttempts"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://github.com/argoproj/argo-cd/commit/2a22e19e06aaf6a1e734443043310a66c234e345"
},
{
"type": "FIX",
"url": "https://github.com/argoproj/argo-cd/commit/5bbb51ab423f273dda74ab956469843d2db2e208"
},
{
"type": "FIX",
"url": "https://github.com/argoproj/argo-cd/commit/ce04dc5c6f6e92033221ec6d96b74403b065ca8b"
},
{
"type": "WEB",
"url": "https://github.com/argoproj/argo-cd/blob/54601c8fd30b86a4c4b7eb449956264372c8bde0/util/session/sessionmanager.go#L302-L311"
}
],
"credits": [
{
"name": "@nadava669"
},
{
"name": "@todaywasawesome"
},
{
"name": "@crenshaw-dev"
},
{
"name": "@jannfis"
},
{
"name": "@pasha-codefresh"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2654",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0965.json
|
{
"schema_version": "1.3.1",
"id": "GO-2022-0965",
"modified": "0001-01-01T00:00:00Z",
"published": "2022-09-02T21:12:51Z",
"aliases": [
"GHSA-74fp-r6jw-h4mp"
],
"summary": "Unbounded recursion in JSON parsing in k8s.io/apimachinery",
"details": "Unbounded recursion in JSON parsing allows malicious JSON input to cause excessive memory consumption or panics.",
"affected": [
{
"package": {
"name": "k8s.io/apimachinery",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.0.0-20190927203648-9ce6eca90e73"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "k8s.io/apimachinery/pkg/runtime/serializer/json",
"symbols": [
"Serializer.Decode",
"Serializer.Encode",
"customNumberDecoder.Decode"
]
},
{
"path": "k8s.io/apimachinery/pkg/util/json",
"symbols": [
"Unmarshal"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://github.com/kubernetes/kubernetes/pull/83261"
},
{
"type": "WEB",
"url": "https://github.com/advisories/GHSA-pmqp-h87c-mr78"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11253"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2022-0965",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2875.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2875",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2024-34710"
],
"summary": "Wiki.js Stored XSS through Client Side Template Injection in github.com/requarks/wiki",
"details": "Wiki.js Stored XSS through Client Side Template Injection in github.com/requarks/wiki",
"affected": [
{
"package": {
"name": "github.com/requarks/wiki",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-34710"
},
{
"type": "FIX",
"url": "https://github.com/requarks/wiki/commit/1238d614e1599fefadd4614ee4b5797a087f50ac"
},
{
"type": "WEB",
"url": "https://github.com/requarks/wiki/security/advisories/GHSA-xjcj-p2qv-q3rf"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2875",
"review_status": "UNREVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2886.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2886",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2024-36107",
"GHSA-95fr-cm4m-q5p9"
],
"summary": "MinIO information disclosure vulnerability in github.com/minio/minio",
"details": "MinIO information disclosure vulnerability in github.com/minio/minio",
"affected": [
{
"package": {
"name": "github.com/minio/minio",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.0.0-20240527191746-e0fe7cc39172"
}
]
}
],
"ecosystem_specific": {}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/minio/minio/security/advisories/GHSA-95fr-cm4m-q5p9"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-36107"
},
{
"type": "FIX",
"url": "https://github.com/minio/minio/commit/e0fe7cc391724fc5baa85b45508f425020fe4272"
},
{
"type": "FIX",
"url": "https://github.com/minio/minio/pull/19810"
},
{
"type": "WEB",
"url": "https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/If-Modified-Since"
},
{
"type": "WEB",
"url": "https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/If-Unmodified-Since"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2886",
"review_status": "UNREVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2716.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2716",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2024-32001",
"GHSA-j85q-46hg-36p2"
],
"summary": "SpiceDB: LookupSubjects may return partial results if a specific kind of relation is used in github.com/authzed/spicedb",
"details": "SpiceDB: LookupSubjects may return partial results if a specific kind of relation is used in github.com/authzed/spicedb",
"affected": [
{
"package": {
"name": "github.com/authzed/spicedb",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.30.1"
}
]
}
],
"ecosystem_specific": {}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/authzed/spicedb/security/advisories/GHSA-j85q-46hg-36p2"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-32001"
},
{
"type": "FIX",
"url": "https://github.com/authzed/spicedb/commit/a244ed1edfaf2382711dccdb699971ec97190c7b"
},
{
"type": "WEB",
"url": "https://github.com/authzed/spicedb/releases/tag/v1.30.1"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2716",
"review_status": "UNREVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0523.json
|
{
"schema_version": "1.3.1",
"id": "GO-2022-0523",
"modified": "0001-01-01T00:00:00Z",
"published": "2022-07-20T20:52:06Z",
"aliases": [
"CVE-2022-30633"
],
"summary": "Stack exhaustion when unmarshaling certain documents in encoding/xml",
"details": "Unmarshaling an XML document into a Go struct which has a nested field that uses the 'any' field tag can panic due to stack exhaustion.",
"affected": [
{
"package": {
"name": "stdlib",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.17.12"
},
{
"introduced": "1.18.0-0"
},
{
"fixed": "1.18.4"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "encoding/xml",
"symbols": [
"Decoder.DecodeElement",
"Decoder.unmarshal",
"Decoder.unmarshalPath"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://go.dev/cl/417061"
},
{
"type": "FIX",
"url": "https://go.googlesource.com/go/+/c4c1993fd2a5b26fe45c09592af6d3388a3b2e08"
},
{
"type": "REPORT",
"url": "https://go.dev/issue/53611"
},
{
"type": "WEB",
"url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2022-0523",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-2116.json
|
{
"schema_version": "1.3.1",
"id": "GO-2023-2116",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2023-45141",
"GHSA-mv73-f69x-444p"
],
"summary": "CSRF token validation vulnerability in github.com/gofiber/fiber/v2",
"details": "A cross-site request forgery vulnerability can allow an attacker to obtain tokens and forge malicious requests on behalf of a user. This can lead to unauthorized actions being taken on the user's behalf, potentially compromising the security and integrity of the application.\n\nThe vulnerability is caused by improper validation and enforcement of CSRF tokens within the application. The CSRF token is validated against tokens in storage but was is not tied to the original requestor that generated it, allowing for token reuse.",
"affected": [
{
"package": {
"name": "github.com/gofiber/fiber/v2",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "2.50.0"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/gofiber/fiber/v2/middleware/csrf",
"symbols": [
"CsrfFromCookie",
"CsrfFromForm",
"CsrfFromHeader",
"CsrfFromParam",
"CsrfFromQuery",
"New",
"configDefault",
"manager.getRaw",
"manager.setRaw",
"newManager"
]
}
]
}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/gofiber/fiber/security/advisories/GHSA-mv73-f69x-444p"
},
{
"type": "FIX",
"url": "https://github.com/gofiber/fiber/commit/8c3916dbf4ad2ed427d02c6eb63ae8b2fa8f019a"
},
{
"type": "FIX",
"url": "https://github.com/gofiber/fiber/commit/b50d91d58ecdff2a330bf07950244b6c4caf65b1"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2023-2116",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2913.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2913",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2021-41089",
"GHSA-v994-f8vw-g7j4"
],
"summary": "Unexpected chmod of host files via 'docker cp' in Moby Docker Engine in github.com/docker/docker",
"details": "Unexpected chmod of host files via 'docker cp' in Moby Docker Engine in github.com/docker/docker",
"affected": [
{
"package": {
"name": "github.com/docker/docker",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "20.10.9+incompatible"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/docker/docker/pkg/chrootarchive",
"symbols": [
"untarHandler"
]
}
]
}
},
{
"package": {
"name": "github.com/moby/moby",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "20.10.9+incompatible"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/moby/moby/pkg/chrootarchive",
"symbols": [
"untarHandler"
]
}
]
}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/moby/moby/security/advisories/GHSA-v994-f8vw-g7j4"
},
{
"type": "FIX",
"url": "https://github.com/moby/moby/commit/bce32e5c93be4caf1a592582155b9cb837fc129a"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2913",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2903.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2903",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2024-37153",
"GHSA-xgr7-jgq3-mhmc"
],
"summary": "Contract balance not updating correctly after interchain transaction in github.com/evmos/evmos",
"details": "Contract balance not updating correctly after interchain transaction in github.com/evmos/evmos",
"affected": [
{
"package": {
"name": "github.com/evmos/evmos",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/evmos/evmos/v2",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/evmos/evmos/v3",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/evmos/evmos/v4",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/evmos/evmos/v5",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/evmos/evmos/v6",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/evmos/evmos/v7",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/evmos/evmos/v8",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/evmos/evmos/v9",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/evmos/evmos/v10",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/evmos/evmos/v11",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/evmos/evmos/v12",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/evmos/evmos/v13",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/evmos/evmos/v14",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/evmos/evmos/v15",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/evmos/evmos/v16",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/evmos/evmos/v17",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/evmos/evmos/v18",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "18.1.0"
}
]
}
],
"ecosystem_specific": {}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/evmos/evmos/security/advisories/GHSA-xgr7-jgq3-mhmc"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-37153"
},
{
"type": "FIX",
"url": "https://github.com/evmos/evmos/commit/478b7a62e7af57a70cf3a01126c7f5a89bee69d7"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2903",
"review_status": "UNREVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0380.json
|
{
"schema_version": "1.3.1",
"id": "GO-2022-0380",
"modified": "0001-01-01T00:00:00Z",
"published": "2022-07-15T23:29:36Z",
"aliases": [
"CVE-2020-26892",
"GHSA-2c64-vj8g-vwrq",
"GHSA-4w5x-x539-ppf5"
],
"summary": "Incorrect handling of credential expiry in github.com/nats-io/jwt",
"details": "The AccountClaims.IsRevoked and Export.IsRevoked functions improperly validate expired credentials using the current system time rather than the issue time of the JWT to be tested.\n\nThese functions cannot be used properly. Newer versions of the jwt package provide an IsClaimRevoked method which performs correct validation. In these versions, the IsRevoked method always return true.",
"affected": [
{
"package": {
"name": "github.com/nats-io/jwt",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.1.0"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/nats-io/jwt",
"symbols": [
"AccountClaims.IsRevoked",
"Export.IsRevoked"
]
}
]
}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://advisories.nats.io/CVE/CVE-2020-26892.txt"
},
{
"type": "FIX",
"url": "https://github.com/nats-io/jwt/commit/e11ce317263cef69619fc1ca743b195d02aa1d8a"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2022-0380",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-2162.json
|
{
"schema_version": "1.3.1",
"id": "GO-2023-2162",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2023-41891",
"GHSA-r847-6w6h-r8g4"
],
"summary": "SQL Injection in List Endpoints in github.com/flyteorg/flyteadmin",
"details": "A malicious user can send a REST request to a List endpoint with filters that contain custom SQL statements. This can result in SQL injection.",
"affected": [
{
"package": {
"name": "github.com/flyteorg/flyteadmin",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.1.124"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/flyteorg/flyteadmin/pkg/common",
"symbols": [
"NewSortParameter"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://github.com/flyteorg/flyteadmin/commit/b3177ef70f068e908140b8a4a9913dfa74f289fd"
}
],
"credits": [
{
"name": "@Sanjana-Sarda"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2023-2162",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0535.json
|
{
"schema_version": "1.3.1",
"id": "GO-2022-0535",
"modified": "0001-01-01T00:00:00Z",
"published": "2022-08-01T22:21:17Z",
"aliases": [
"CVE-2020-0601"
],
"summary": "Certificate validation bypass on Windows in crypto/x509",
"details": "A Windows vulnerability allows attackers to spoof valid certificate chains when the system root store is in use.\n\nA workaround is present in Go 1.12.6+ and Go 1.13.7+, but affected users should additionally install the Windows security update to protect their system.\n\nSee https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-0601 for details on the Windows vulnerability.",
"affected": [
{
"package": {
"name": "stdlib",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.12.16"
},
{
"introduced": "1.13.0-0"
},
{
"fixed": "1.13.7"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "crypto/x509",
"goos": [
"windows"
],
"symbols": [
"Certificate.systemVerify"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://go.dev/cl/215905"
},
{
"type": "FIX",
"url": "https://go.googlesource.com/go/+/953bc8f391a63adf00bac2515dba62abe8a1e2c2"
},
{
"type": "REPORT",
"url": "https://go.dev/issue/36834"
},
{
"type": "WEB",
"url": "https://groups.google.com/g/golang-announce/c/Hsw4mHYc470/m/WJeW5wguEgAJ"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2022-0535",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0193.json
|
{
"schema_version": "1.3.1",
"id": "GO-2022-0193",
"modified": "0001-01-01T00:00:00Z",
"published": "2022-07-06T18:14:54Z",
"aliases": [
"CVE-2018-17143",
"GHSA-fcf9-6fv2-fc5v"
],
"summary": "Panic on unconsidered isindex and template combination in golang.org/x/net/html",
"details": "The Parse function can panic on some invalid inputs.\n\nFor example, the Parse function panics on the input \"\u003ctemplate\u003e\u003ctBody\u003e\u003cisindex/action=0\u003e\".",
"affected": [
{
"package": {
"name": "golang.org/x/net",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.0.0-20180921000356-2f5d2388922f"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "golang.org/x/net/html",
"symbols": [
"Parse",
"ParseFragment",
"inBodyIM"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://go-review.googlesource.com/c/net/+/136575"
},
{
"type": "FIX",
"url": "https://go.googlesource.com/net/+/2f5d2388922f370f4355f327fcf4cfe9f5583908"
},
{
"type": "REPORT",
"url": "https://go.dev/issue/27704"
}
],
"credits": [
{
"name": "@tr3ee"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2022-0193",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1987.json
|
{
"schema_version": "1.3.1",
"id": "GO-2023-1987",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2023-29409"
],
"summary": "Large RSA keys can cause high CPU usage in crypto/tls",
"details": "Extremely large RSA keys in certificate chains can cause a client/server to expend significant CPU time verifying signatures.\n\nWith fix, the size of RSA keys transmitted during handshakes is restricted to \u003c= 8192 bits.\n\nBased on a survey of publicly trusted RSA keys, there are currently only three certificates in circulation with keys larger than this, and all three appear to be test certificates that are not actively deployed. It is possible there are larger keys in use in private PKIs, but we target the web PKI, so causing breakage here in the interests of increasing the default safety of users of crypto/tls seems reasonable.",
"affected": [
{
"package": {
"name": "stdlib",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.19.12"
},
{
"introduced": "1.20.0-0"
},
{
"fixed": "1.20.7"
},
{
"introduced": "1.21.0-0"
},
{
"fixed": "1.21.0-rc.4"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "crypto/tls",
"symbols": [
"Conn.Handshake",
"Conn.HandshakeContext",
"Conn.Read",
"Conn.Write",
"Conn.processCertsFromClient",
"Conn.verifyServerCertificate",
"Dial",
"DialWithDialer",
"Dialer.Dial",
"Dialer.DialContext"
]
}
]
}
}
],
"references": [
{
"type": "REPORT",
"url": "https://go.dev/issue/61460"
},
{
"type": "FIX",
"url": "https://go.dev/cl/515257"
},
{
"type": "WEB",
"url": "https://groups.google.com/g/golang-announce/c/X0b6CsSAaYI/m/Efv5DbZ9AwAJ"
}
],
"credits": [
{
"name": "Mateusz Poliwczak"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2023-1987",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2703.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2703",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"GHSA-j5vm-7qcc-2wwg"
],
"summary": "Kopia: Storage connection credentials written to console on \"repository status\" CLI command with JSON output in github.com/kopia/kopia",
"details": "Kopia: Storage connection credentials written to console on \"repository status\" CLI command with JSON output in github.com/kopia/kopia",
"affected": [
{
"package": {
"name": "github.com/kopia/kopia",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.16.0"
}
]
}
],
"ecosystem_specific": {}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/kopia/kopia/security/advisories/GHSA-j5vm-7qcc-2wwg"
},
{
"type": "FIX",
"url": "https://github.com/kopia/kopia/commit/1d6f852cd6534f4bea978cbdc85c583803d79f77"
},
{
"type": "FIX",
"url": "https://github.com/kopia/kopia/pull/3589"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2703",
"review_status": "UNREVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2730.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2730",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"withdrawn": "2024-04-17T18:06:23Z",
"related": [
"CVE-2024-3400"
],
"summary": "WITHDRAWN: Directory traversal in FilesystemStore in github.com/gorilla/sessions",
"details": "(This report has been withdrawn on the grounds that it generates too many false positives. Session IDs are documented as not being suitable to hold user-provided data.)\n\nFilesystemStore does not sanitize the Session.ID value, making it vulnerable to directory traversal attacks. If an attacker has control over the contents of the session ID, this can be exploited to write to arbitrary files in the filesystem.\n\nPrograms which do not set session IDs explicitly, or which only set session IDs that will not be interpreted by the filesystem, are not vulnerable.",
"affected": [
{
"package": {
"name": "github.com/gorilla/sessions",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/gorilla/sessions",
"symbols": [
"CookieStore.Get",
"FilesystemStore.Get",
"FilesystemStore.New",
"FilesystemStore.Save",
"FilesystemStore.erase",
"FilesystemStore.load",
"FilesystemStore.save",
"Registry.Get",
"Registry.Save",
"Save",
"Session.Save"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://github.com/gorilla/sessions/pull/274"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2730",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0477.json
|
{
"schema_version": "1.3.1",
"id": "GO-2022-0477",
"modified": "0001-01-01T00:00:00Z",
"published": "2022-06-09T01:43:37Z",
"aliases": [
"CVE-2022-30634"
],
"summary": "Indefinite hang with large buffers on Windows in crypto/rand",
"details": "On Windows, rand.Read will hang indefinitely if passed a buffer larger than 1 \u003c\u003c 32 - 1 bytes.",
"affected": [
{
"package": {
"name": "stdlib",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.17.11"
},
{
"introduced": "1.18.0-0"
},
{
"fixed": "1.18.3"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "crypto/rand",
"goos": [
"windows"
],
"symbols": [
"Read"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://go.dev/cl/402257"
},
{
"type": "FIX",
"url": "https://go.googlesource.com/go/+/bb1f4416180511231de6d17a1f2f55c82aafc863"
},
{
"type": "REPORT",
"url": "https://go.dev/issue/52561"
},
{
"type": "WEB",
"url": "https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg/m/IWz5T6x7AAAJ"
}
],
"credits": [
{
"name": "Davis Goodin"
},
{
"name": "Quim Muntal of Microsoft"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2022-0477",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2611.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2611",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2024-24786",
"GHSA-8r3f-844c-mc37"
],
"summary": "Infinite loop in JSON unmarshaling in google.golang.org/protobuf",
"details": "The protojson.Unmarshal function can enter an infinite loop when unmarshaling certain forms of invalid JSON. This condition can occur when unmarshaling into a message which contains a google.protobuf.Any value, or when the UnmarshalOptions.DiscardUnknown option is set.",
"affected": [
{
"package": {
"name": "google.golang.org/protobuf",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.33.0"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "google.golang.org/protobuf/encoding/protojson",
"symbols": [
"Unmarshal",
"UnmarshalOptions.Unmarshal",
"UnmarshalOptions.unmarshal"
]
},
{
"path": "google.golang.org/protobuf/internal/encoding/json",
"symbols": [
"Decoder.Peek",
"Decoder.Read"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://go.dev/cl/569356"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2611",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2637.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2637",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2024-28197",
"GHSA-mq4x-r2w3-j7mr"
],
"summary": "Account Takeover via Session Fixation in Zitadel [Bypassing MFA] in github.com/zitadel/zitadel",
"details": "Account Takeover via Session Fixation in Zitadel [Bypassing MFA] in github.com/zitadel/zitadel.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/zitadel/zitadel before v2.44.3, from v2.45.0 before v2.45.1.",
"affected": [
{
"package": {
"name": "github.com/zitadel/zitadel",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {
"custom_ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0"
},
{
"fixed": "2.44.3"
},
{
"introduced": "2.45.0"
},
{
"fixed": "2.45.1"
}
]
}
]
}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/zitadel/zitadel/security/advisories/GHSA-mq4x-r2w3-j7mr"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-28197"
},
{
"type": "FIX",
"url": "https://github.com/zitadel/zitadel/commit/d4c553b75a214e41299af010ef4b26174a0f802c"
},
{
"type": "FIX",
"url": "https://github.com/zitadel/zitadel/commit/e82cb51eb819c6cdba8123c9c34c5739b46b29eb"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2637",
"review_status": "UNREVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0084.json
|
{
"schema_version": "1.3.1",
"id": "GO-2021-0084",
"modified": "0001-01-01T00:00:00Z",
"published": "2021-04-14T20:04:52Z",
"aliases": [
"CVE-2019-16354",
"CVE-2019-16355",
"GHSA-f6px-w8rh-7r89",
"GHSA-hf4p-4j9r-3cvx"
],
"summary": "Incorrect permissions for critical resource in github.com/astaxie/beego",
"details": "Session data is stored using permissive permissions, allowing local users with filesystem access to read arbitrary data.",
"affected": [
{
"package": {
"name": "github.com/astaxie/beego",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.12.2"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/astaxie/beego/session",
"symbols": [
"FileProvider.SessionRead",
"FileProvider.SessionRegenerate",
"Manager.GetSessionStore",
"Manager.SessionRegenerateID",
"Manager.SessionStart"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://github.com/beego/beego/pull/3975"
},
{
"type": "FIX",
"url": "https://github.com/beego/beego/commit/bac2b31afecc65d9a89f9e473b8006c5edc0c8d1"
},
{
"type": "WEB",
"url": "https://github.com/beego/beego/issues/3763"
}
],
"credits": [
{
"name": "@nicowaisman"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2021-0084",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0603.json
|
{
"schema_version": "1.3.1",
"id": "GO-2022-0603",
"modified": "0001-01-01T00:00:00Z",
"published": "2022-08-22T18:00:47Z",
"aliases": [
"CVE-2022-28948",
"GHSA-hp87-p4gw-j4gq"
],
"summary": "Panic in gopkg.in/yaml.v3",
"details": "An issue in the Unmarshal function can cause a program to panic when attempting to deserialize invalid input.",
"affected": [
{
"package": {
"name": "gopkg.in/yaml.v3",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "3.0.0-20220521103104-8f96da9f5d5e"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "gopkg.in/yaml.v3",
"symbols": [
"Unmarshal"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://github.com/go-yaml/yaml/commit/8f96da9f5d5eff988554c1aae1784627c4bf6754"
},
{
"type": "WEB",
"url": "https://github.com/go-yaml/yaml/issues/666"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2022-0603",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2723.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2723",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2024-31391",
"GHSA-g9qx-25vj-rf53"
],
"summary": "Apache Solr Operator liveness and readiness probes may leak basic auth credentials in github.com/apache/solr-operator",
"details": "Apache Solr Operator liveness and readiness probes may leak basic auth credentials in github.com/apache/solr-operator",
"affected": [
{
"package": {
"name": "github.com/apache/solr-operator",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0.3.0"
},
{
"fixed": "0.8.1"
}
]
}
],
"ecosystem_specific": {}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/advisories/GHSA-g9qx-25vj-rf53"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31391"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2024/04/12/7"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread/w7011s78lzywzwyszvy4d8zm99ybt8c7"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2723",
"review_status": "UNREVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2020-0021.json
|
{
"schema_version": "1.3.1",
"id": "GO-2020-0021",
"modified": "0001-01-01T00:00:00Z",
"published": "2021-04-14T20:04:52Z",
"aliases": [
"CVE-2014-8681",
"GHSA-mr6h-chqp-p9g2"
],
"summary": "SQL Injection in github.com/gogits/gogs",
"details": "Due to improper sanitization of user input, a number of methods are vulnerable to SQL injection if used with user input that has not been sanitized by the caller.",
"affected": [
{
"package": {
"name": "github.com/gogits/gogs",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.5.8"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/gogits/gogs",
"symbols": [
"GetIssues",
"SearchRepositoryByName",
"SearchUserByName"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://github.com/gogs/gogs/commit/83283bca4cb4e0f4ec48a28af680f0d88db3d2c8"
},
{
"type": "WEB",
"url": "https://seclists.org/fulldisclosure/2014/Nov/31"
}
],
"credits": [
{
"name": "Pascal Turbing"
},
{
"name": "Jiahua (Joe) Chen"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2020-0021",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0227.json
|
{
"schema_version": "1.3.1",
"id": "GO-2021-0227",
"modified": "0001-01-01T00:00:00Z",
"published": "2022-02-17T17:35:32Z",
"aliases": [
"CVE-2020-29652",
"GHSA-3vm4-22fp-5rfm"
],
"summary": "Panic on crafted authentication request message in golang.org/x/crypto/ssh",
"details": "Clients can cause a panic in SSH servers. An attacker can craft an authentication request message for the “gssapi-with-mic” method which will cause NewServerConn to panic via a nil pointer dereference if ServerConfig.GSSAPIWithMICConfig is nil.",
"affected": [
{
"package": {
"name": "golang.org/x/crypto",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.0.0-20201216223049-8b5274cf687f"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "golang.org/x/crypto/ssh",
"symbols": [
"NewServerConn",
"connection.serverAuthenticate"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://go.dev/cl/278852"
},
{
"type": "FIX",
"url": "https://go.googlesource.com/crypto/+/8b5274cf687fd9316b4108863654cc57385531e8"
},
{
"type": "WEB",
"url": "https://groups.google.com/g/golang-announce/c/ouZIlBimOsE?pli=1"
}
],
"credits": [
{
"name": "Joern Schneewesiz (GitLab Security Research Team)"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2021-0227",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0755.json
|
{
"schema_version": "1.3.1",
"id": "GO-2022-0755",
"modified": "0001-01-01T00:00:00Z",
"published": "2021-05-18T15:42:40Z",
"aliases": [
"CVE-2019-13209",
"GHSA-xhg2-rvm8-w2jh"
],
"summary": "Cross-site request forgery in github.com/rancher/rancher",
"details": "Rancher 2 is vulnerable to a Cross-Site Websocket Hijacking attack that allows an exploiter to gain access to clusters managed by Rancher.",
"affected": [
{
"package": {
"name": "github.com/rancher/rancher",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "2.2.5-rc6.0.20190621200032-0ddffe484adc+incompatible"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/rancher/rancher/server",
"symbols": [
"Start"
]
},
{
"path": "github.com/rancher/rancher/pkg/clusterrouter",
"symbols": [
"Router.ServeHTTP"
]
}
]
}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/advisories/GHSA-xhg2-rvm8-w2jh"
},
{
"type": "FIX",
"url": "https://github.com/rancher/rancher/commit/0ddffe484adccb9e37d9432e8e625d8ebbfb0088"
},
{
"type": "WEB",
"url": "https://forums.rancher.com/t/rancher-release-v2-2-5-addresses-rancher-cve-2019-13209/14801"
}
],
"credits": [
{
"name": "Matt Belisle"
},
{
"name": "Alex Stevenson at Workiva"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2022-0755",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0264.json
|
{
"schema_version": "1.3.1",
"id": "GO-2021-0264",
"modified": "0001-01-01T00:00:00Z",
"published": "2022-01-13T20:54:43Z",
"aliases": [
"CVE-2021-41772"
],
"summary": "Panic when opening certain archives in archive/zip",
"details": "Previously, opening a zip with (*Reader).Open could result in a panic if the zip contained a file whose name was exclusively made up of slash characters or \"..\" path elements.\n\nOpen could also panic if passed the empty string directly as an argument.\n\nNow, any files in the zip whose name could not be made valid for fs.FS.Open will be skipped, and no longer added to the fs.FS file list, although they are still accessible through (*Reader).File.\n\nNote that it was already the case that a file could be accessible from (*Reader).Open with a name different from the one in (*Reader).File, as the former is the cleaned name, while the latter is the original one.\n\nFinally, the actual panic site was made robust as a defense-in-depth measure.",
"affected": [
{
"package": {
"name": "stdlib",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.16.10"
},
{
"introduced": "1.17.0-0"
},
{
"fixed": "1.17.3"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "archive/zip",
"symbols": [
"Reader.Open",
"split"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://go.dev/cl/349770"
},
{
"type": "FIX",
"url": "https://go.googlesource.com/go/+/b24687394b55a93449e2be4e6892ead58ea9a10f"
},
{
"type": "WEB",
"url": "https://groups.google.com/g/golang-announce/c/0fM21h43arc"
},
{
"type": "REPORT",
"url": "https://go.dev/issue/48085"
}
],
"credits": [
{
"name": "Colin Arnott (SiteHost)"
},
{
"name": "Noah Santschi-Cooney (Sourcegraph Code Intelligence Team)"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2021-0264",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2463.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2463",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2024-22196",
"GHSA-h374-mm57-879c"
],
"summary": "SQL injection in github.com/0xJacky/Nginx-UI",
"details": "SQL injection in github.com/0xJacky/Nginx-UI",
"affected": [
{
"package": {
"name": "github.com/0xJacky/Nginx-UI",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.9.10-0.20231219195202-ec93ab05a3ec"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/0xJacky/Nginx-UI/api/cosy",
"symbols": [
"Ctx.SortOrder"
]
},
{
"path": "github.com/0xJacky/Nginx-UI/model",
"symbols": [
"OrderAndPaginate"
]
}
]
}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/advisories/GHSA-h374-mm57-879c"
},
{
"type": "FIX",
"url": "https://github.com/0xJacky/nginx-ui/commit/ec93ab05a3ecbb6bcf464d9dca48d74452df8a5b"
}
],
"credits": [
{
"name": "@jorgectf"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2463",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0217.json
|
{
"schema_version": "1.3.1",
"id": "GO-2022-0217",
"modified": "0001-01-01T00:00:00Z",
"published": "2022-05-24T15:21:01Z",
"aliases": [
"CVE-2019-6486"
],
"summary": "Denial of service affecting P-521 and P-384 curves in crypto/elliptic",
"details": "A DoS vulnerability in the crypto/elliptic implementations of the P-521 and P-384 elliptic curves may let an attacker craft inputs that consume excessive amounts of CPU.\n\nThese inputs might be delivered via TLS handshakes, X.509 certificates, JWT tokens, ECDH shares or ECDSA signatures. In some cases, if an ECDH private key is reused more than once, the attack can also lead to key recovery.",
"affected": [
{
"package": {
"name": "stdlib",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.10.8"
},
{
"introduced": "1.11.0-0"
},
{
"fixed": "1.11.5"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "crypto/elliptic",
"symbols": [
"curve.doubleJacobian"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://go.dev/cl/159218"
},
{
"type": "FIX",
"url": "https://go.googlesource.com/go/+/193c16a3648b8670a762e925b6ac6e074f468a20"
},
{
"type": "REPORT",
"url": "https://go.dev/issue/29903"
},
{
"type": "WEB",
"url": "https://groups.google.com/g/golang-announce/c/mVeX35iXuSw"
}
],
"credits": [
{
"name": "Wycheproof Project"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2022-0217",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2519.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2519",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2020-12459",
"GHSA-m25m-5778-fm22"
],
"summary": "Grafana world readable configuration files in github.com/grafana/grafana",
"details": "Grafana world readable configuration files in github.com/grafana/grafana.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/grafana/grafana from v6.0.0 before v7.2.1.",
"affected": [
{
"package": {
"name": "github.com/grafana/grafana",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {
"custom_ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "6.0.0"
},
{
"fixed": "7.2.1"
}
]
}
]
}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/advisories/GHSA-m25m-5778-fm22"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12459"
},
{
"type": "FIX",
"url": "https://github.com/grafana/grafana/commit/102448040d5132460e3b0013e03ebedec0677e00"
},
{
"type": "REPORT",
"url": "https://github.com/grafana/grafana/issues/8283"
},
{
"type": "WEB",
"url": "https://access.redhat.com/security/cve/CVE-2020-12459"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1827765"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1829724"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CTQCKJZZYXMCSHJFZZ3YXEO5NUBANGZS"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEBCIEVSYIDDCA7FTRS2IFUOYLIQU34A"
},
{
"type": "WEB",
"url": "https://security.netapp.com/advisory/ntap-20200518-0004"
},
{
"type": "WEB",
"url": "https://src.fedoraproject.org/rpms/grafana/c/fab93d67363eb0a9678d9faf160cc88237f26277"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2519",
"review_status": "UNREVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0094.json
|
{
"schema_version": "1.3.1",
"id": "GO-2021-0094",
"modified": "0001-01-01T00:00:00Z",
"published": "2021-04-14T20:04:52Z",
"aliases": [
"CVE-2020-29529",
"GHSA-2g5j-5x95-r6hr"
],
"summary": "Directory traversal in github.com/hashicorp/go-slug",
"details": "Protections against directory traversal during archive extraction can be bypassed by chaining multiple symbolic links within the archive. This allows a malicious attacker to cause files to be created outside of the target directory. Additionally if the attacker is able to read extracted files they may create symbolic links to arbitrary files on the system which the unpacker has permissions to read.",
"affected": [
{
"package": {
"name": "github.com/hashicorp/go-slug",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.5.0"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/hashicorp/go-slug",
"symbols": [
"Unpack"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://github.com/hashicorp/go-slug/pull/12"
},
{
"type": "FIX",
"url": "https://github.com/hashicorp/go-slug/commit/28cafc59c8da6126a3ae94dfa84181df4073454f"
},
{
"type": "WEB",
"url": "https://securitylab.github.com/advisories/GHSL-2020-262-zipslip-go-slug"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2021-0094",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0088.json
|
{
"schema_version": "1.3.1",
"id": "GO-2021-0088",
"modified": "0001-01-01T00:00:00Z",
"published": "2021-04-14T20:04:52Z",
"aliases": [
"CVE-2019-3564",
"GHSA-x4rg-4545-4w7w"
],
"summary": "Denial of service via ignored unknown fields in github.com/facebook/fbthrift",
"details": "Skip ignores unknown fields, rather than failing. A malicious user can craft small messages with unknown fields which can take significant resources to parse. If a server accepts messages from an untrusted user, it may be used as a denial of service vector.",
"affected": [
{
"package": {
"name": "github.com/facebook/fbthrift",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.31.1-0.20190225164308-c461c1bd1a3e"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/facebook/fbthrift/thrift/lib/go/thrift",
"symbols": [
"BinaryProtocol.Skip",
"CompactProtocol.Skip",
"HeaderProtocol.Skip",
"JSONProtocol.Skip",
"Process",
"ProcessContext",
"SimpleJSONProtocol.Skip",
"SimpleServer.AcceptLoop",
"SimpleServer.AcceptLoopContext",
"SimpleServer.Serve",
"SimpleServer.ServeContext",
"Skip",
"SkipDefaultDepth",
"applicationException.Read"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://github.com/facebook/fbthrift/commit/c461c1bd1a3e130b181aa9c854da3030cd4b5156"
},
{
"type": "WEB",
"url": "https://www.facebook.com/security/advisories/cve-2019-3564"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2021-0088",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2466.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2466",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2023-49568",
"GHSA-mw99-9chc-xw7r"
],
"summary": "Denial of service in github.com/go-git/go-git/v5 and gopkg.in/src-d/go-git.v4",
"details": "Denial of service in github.com/go-git/go-git/v5 and gopkg.in/src-d/go-git.v4",
"affected": [
{
"package": {
"name": "gopkg.in/src-d/go-git.v4",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "4.7.1"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/go-git/go-git/v5",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "5.0.0"
},
{
"fixed": "5.11.0"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/go-git/go-git/v5",
"symbols": [
"AddOptions.Validate",
"Blame",
"BlameResult.String",
"Clone",
"CloneContext",
"CommitOptions.Validate",
"CreateTagOptions.Validate",
"GrepOptions.Validate",
"GrepResult.String",
"Init",
"InitWithOptions",
"NoMatchingRefSpecError.Error",
"Open",
"PlainClone",
"PlainCloneContext",
"PlainInit",
"PlainInitWithOptions",
"PlainOpen",
"PlainOpenWithOptions",
"Remote.Fetch",
"Remote.FetchContext",
"Remote.List",
"Remote.ListContext",
"Remote.Push",
"Remote.PushContext",
"Remote.String",
"Repository.BlobObject",
"Repository.BlobObjects",
"Repository.Branch",
"Repository.Branches",
"Repository.CommitObject",
"Repository.CommitObjects",
"Repository.Config",
"Repository.ConfigScoped",
"Repository.CreateBranch",
"Repository.CreateRemote",
"Repository.CreateRemoteAnonymous",
"Repository.CreateTag",
"Repository.DeleteBranch",
"Repository.DeleteObject",
"Repository.DeleteRemote",
"Repository.DeleteTag",
"Repository.Fetch",
"Repository.FetchContext",
"Repository.Grep",
"Repository.Head",
"Repository.Log",
"Repository.Notes",
"Repository.Object",
"Repository.Objects",
"Repository.Prune",
"Repository.Push",
"Repository.PushContext",
"Repository.Reference",
"Repository.References",
"Repository.Remote",
"Repository.Remotes",
"Repository.RepackObjects",
"Repository.ResolveRevision",
"Repository.SetConfig",
"Repository.Tag",
"Repository.TagObject",
"Repository.TagObjects",
"Repository.Tags",
"Repository.TreeObject",
"Repository.TreeObjects",
"ResetOptions.Validate",
"Status.String",
"Submodule.Init",
"Submodule.Repository",
"Submodule.Status",
"Submodule.Update",
"Submodule.UpdateContext",
"SubmoduleStatus.String",
"Submodules.Init",
"Submodules.Status",
"Submodules.Update",
"Submodules.UpdateContext",
"SubmodulesStatus.String",
"Worktree.Add",
"Worktree.AddGlob",
"Worktree.AddWithOptions",
"Worktree.Checkout",
"Worktree.Clean",
"Worktree.Commit",
"Worktree.Grep",
"Worktree.Move",
"Worktree.Pull",
"Worktree.PullContext",
"Worktree.Remove",
"Worktree.RemoveGlob",
"Worktree.Reset",
"Worktree.ResetSparsely",
"Worktree.Status",
"Worktree.Submodule",
"Worktree.Submodules",
"Worktree.checkoutFileSymlink",
"Worktree.createBranch",
"buildTreeHelper.BuildTree",
"checkFastForwardUpdate",
"isFastForward"
]
},
{
"path": "github.com/go-git/go-git/v5/config",
"symbols": [
"Branch.Validate",
"Config.Unmarshal",
"Config.Validate",
"LoadConfig",
"ReadConfig",
"RemoteConfig.Validate"
]
},
{
"path": "github.com/go-git/go-git/v5/plumbing/object",
"symbols": [
"Commit.Stats",
"Commit.StatsContext",
"Patch.Stats",
"getFileStatsFromFilePatches"
]
},
{
"path": "github.com/go-git/go-git/v5/storage/filesystem",
"symbols": [
"ConfigStorage.Config",
"ConfigStorage.SetConfig",
"ModuleStorage.Module",
"NewStorage",
"NewStorageWithOptions",
"ObjectStorage.EncodedObject"
]
},
{
"path": "github.com/go-git/go-git/v5/storage/filesystem/dotgit",
"symbols": [
"DotGit.Alternates"
]
}
]
}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-49568"
}
],
"credits": [
{
"name": "Ionut Lalu"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2466",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2665.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2665",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2024-29891",
"GHSA-hr5w-cwwq-2v4m"
],
"summary": "ZITADEL's Improper Content-Type Validation Leads to Account Takeover via Stored XSS + CSP Bypass in github.com/zitadel/zitadel",
"details": "ZITADEL's Improper Content-Type Validation Leads to Account Takeover via Stored XSS + CSP Bypass in github.com/zitadel/zitadel.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/zitadel/zitadel before v2.42.17, from v2.43.0 before v2.43.11, from v2.44.0 before v2.44.7, from v2.45.0 before v2.45.5, from v2.46.0 before v2.46.5, from v2.47.0 before v2.47.8, from v2.48.0 before v2.48.3.",
"affected": [
{
"package": {
"name": "github.com/zitadel/zitadel",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {
"custom_ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0"
},
{
"fixed": "2.42.17"
},
{
"introduced": "2.43.0"
},
{
"fixed": "2.43.11"
},
{
"introduced": "2.44.0"
},
{
"fixed": "2.44.7"
},
{
"introduced": "2.45.0"
},
{
"fixed": "2.45.5"
},
{
"introduced": "2.46.0"
},
{
"fixed": "2.46.5"
},
{
"introduced": "2.47.0"
},
{
"fixed": "2.47.8"
},
{
"introduced": "2.48.0"
},
{
"fixed": "2.48.3"
}
]
}
]
}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/zitadel/zitadel/security/advisories/GHSA-hr5w-cwwq-2v4m"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-29891"
},
{
"type": "WEB",
"url": "https://github.com/zitadel/zitadel/releases/tag/v2.42.17"
},
{
"type": "WEB",
"url": "https://github.com/zitadel/zitadel/releases/tag/v2.43.11"
},
{
"type": "WEB",
"url": "https://github.com/zitadel/zitadel/releases/tag/v2.44.7"
},
{
"type": "WEB",
"url": "https://github.com/zitadel/zitadel/releases/tag/v2.45.5"
},
{
"type": "WEB",
"url": "https://github.com/zitadel/zitadel/releases/tag/v2.46.5"
},
{
"type": "WEB",
"url": "https://github.com/zitadel/zitadel/releases/tag/v2.47.8"
},
{
"type": "WEB",
"url": "https://github.com/zitadel/zitadel/releases/tag/v2.48.3"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2665",
"review_status": "UNREVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2629.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2629",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2024-1442",
"GHSA-5mxf-42f5-j782"
],
"summary": "Grafana's users with permissions to create a data source can CRUD all data sources in github.com/grafana/grafana",
"details": "Grafana's users with permissions to create a data source can CRUD all data sources in github.com/grafana/grafana.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/grafana/grafana from v8.5.0 before v9.5.7, from v10.0.0 before v10.0.12, from v10.1.0 before v10.1.8, from v10.2.0 before v10.2.5, from v10.3.0 before v10.3.4.",
"affected": [
{
"package": {
"name": "github.com/grafana/grafana",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {
"custom_ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "8.5.0"
},
{
"fixed": "9.5.7"
},
{
"introduced": "10.0.0"
},
{
"fixed": "10.0.12"
},
{
"introduced": "10.1.0"
},
{
"fixed": "10.1.8"
},
{
"introduced": "10.2.0"
},
{
"fixed": "10.2.5"
},
{
"introduced": "10.3.0"
},
{
"fixed": "10.3.4"
}
]
}
]
}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/advisories/GHSA-5mxf-42f5-j782"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-1442"
},
{
"type": "WEB",
"url": "https://grafana.com/security/security-advisories/cve-2024-1442"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2629",
"review_status": "UNREVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2865.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2865",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2023-40297",
"GHSA-x8xm-wrjq-5g54"
],
"summary": "Stakater Forecastle has a directory traversal vulnerability in github.com/stakater/Forecastle",
"details": "Stakater Forecastle has a directory traversal vulnerability in github.com/stakater/Forecastle",
"affected": [
{
"package": {
"name": "github.com/stakater/Forecastle",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/advisories/GHSA-x8xm-wrjq-5g54"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40297"
},
{
"type": "WEB",
"url": "https://github.com/sahar042/CVE-2023-40297"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2865",
"review_status": "UNREVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0051.json
|
{
"schema_version": "1.3.1",
"id": "GO-2021-0051",
"modified": "0001-01-01T00:00:00Z",
"published": "2021-04-14T20:04:52Z",
"aliases": [
"CVE-2020-36565",
"GHSA-j453-hm5x-c46w"
],
"summary": "Directory traversal on Windows in github.com/labstack/echo/v4",
"details": "Due to improper sanitization of user input on Windows, the static file handler allows for directory traversal, allowing an attacker to read files outside of the target directory that the server has permission to read.",
"affected": [
{
"package": {
"name": "github.com/labstack/echo/v4",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "4.1.18-0.20201215153152-4422e3b66b9f"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/labstack/echo/v4",
"goos": [
"windows"
],
"symbols": [
"Echo.Static",
"Group.Static",
"common.static"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://github.com/labstack/echo/pull/1718"
},
{
"type": "FIX",
"url": "https://github.com/labstack/echo/commit/4422e3b66b9fd498ed1ae1d0242d660d0ed3faaa"
}
],
"credits": [
{
"name": "@little-cui (Apache ServiceComb)"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2021-0051",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-2048.json
|
{
"schema_version": "1.3.1",
"id": "GO-2023-2048",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"GHSA-6xv5-86q9-7xr8"
],
"summary": "Paths outside of the rootfs could be produced on Windows in github.com/cyphar/filepath-securejoin",
"details": "Certain rootfs and path combinations result in generated paths that are outside of the provided rootfs on Windows.",
"affected": [
{
"package": {
"name": "github.com/cyphar/filepath-securejoin",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.2.4"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/cyphar/filepath-securejoin",
"goos": [
"windows"
],
"symbols": [
"SecureJoin",
"SecureJoinVFS"
]
}
]
}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cyphar/filepath-securejoin/security/advisories/GHSA-6xv5-86q9-7xr8"
},
{
"type": "FIX",
"url": "https://github.com/cyphar/filepath-securejoin/commit/c121231e1276e11049547bee5ce68d5a2cfe2d9b"
}
],
"credits": [
{
"name": "@pjbgf"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2023-2048",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1574.json
|
{
"schema_version": "1.3.1",
"id": "GO-2023-1574",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2023-25173",
"GHSA-hmfx-3pcx-653p"
],
"related": [
"GHSA-4wjj-jwc9-2x96",
"GHSA-fjm8-m7m6-2fjp",
"GHSA-phjr-8j92-w5v7",
"GHSA-rc4r-wh2q-q6c4",
"CVE-2022-2989",
"CVE-2022-2990",
"CVE-2022-2995",
"CVE-2022-36109"
],
"summary": "Privilege escalation via supplementary groups in github.com/containerd/containerd",
"details": "Supplementary groups are not set up properly inside a container. If an attacker has direct access to a container and manipulates their supplementary group access, they may be able to use supplementary group access to bypass primary group restrictions in some cases and potentially escalate privileges in the container. Uses of the containerd client library may also have improperly setup supplementary groups.",
"affected": [
{
"package": {
"name": "github.com/containerd/containerd",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "1.6.0"
},
{
"fixed": "1.6.18"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/containerd/containerd/oci",
"symbols": [
"WithAdditionalGIDs",
"WithUIDGID",
"WithUser",
"WithUserID",
"WithUsername"
]
},
{
"path": "github.com/containerd/containerd/pkg/cri/server",
"symbols": [
"criService.CreateContainer",
"criService.containerSpecOpts",
"instrumentedAlphaService.CreateContainer",
"instrumentedService.CreateContainer"
]
}
]
}
},
{
"package": {
"name": "github.com/containerd/containerd",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.5.18"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/containerd/containerd/oci",
"symbols": [
"WithAdditionalGIDs",
"WithUIDGID",
"WithUser",
"WithUserID",
"WithUsername"
]
},
{
"path": "github.com/containerd/containerd/pkg/cri/server",
"symbols": [
"criService.CreateContainer",
"criService.containerSpecOpts",
"instrumentedService.CreateContainer"
]
}
]
}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/containerd/containerd/security/advisories/GHSA-hmfx-3pcx-653p"
},
{
"type": "WEB",
"url": "https://github.com/moby/moby/security/advisories/GHSA-rc4r-wh2q-q6c4"
},
{
"type": "FIX",
"url": "https://github.com/containerd/containerd/commit/133f6bb6cd827ce35a5fb279c1ead12b9d21460a"
},
{
"type": "WEB",
"url": "https://github.com/advisories/GHSA-4wjj-jwc9-2x96"
},
{
"type": "WEB",
"url": "https://github.com/advisories/GHSA-fjm8-m7m6-2fjp"
},
{
"type": "WEB",
"url": "https://github.com/advisories/GHSA-phjr-8j92-w5v7"
},
{
"type": "ARTICLE",
"url": "https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2023-1574",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2020-0034.json
|
{
"schema_version": "1.3.1",
"id": "GO-2020-0034",
"modified": "0001-01-01T00:00:00Z",
"published": "2021-04-14T20:04:52Z",
"aliases": [
"CVE-2020-36560",
"GHSA-rmj9-q58g-9qgg"
],
"summary": "Path traversal in github.com/artdarek/go-unzip",
"details": "Due to improper path sanitization, archives containing relative file paths can cause files to be written (or overwritten) outside of the target directory.",
"affected": [
{
"package": {
"name": "github.com/artdarek/go-unzip",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.0.0"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/artdarek/go-unzip",
"symbols": [
"Unzip.Extract"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://github.com/artdarek/go-unzip/pull/2"
},
{
"type": "FIX",
"url": "https://github.com/artdarek/go-unzip/commit/4975cbe0a719dc50b12da8585f1f207c82f7dfe0"
},
{
"type": "WEB",
"url": "https://snyk.io/research/zip-slip-vulnerability"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2020-0034",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0172.json
|
{
"schema_version": "1.3.1",
"id": "GO-2021-0172",
"modified": "0001-01-01T00:00:00Z",
"published": "2022-02-15T23:56:14Z",
"aliases": [
"CVE-2017-1000098"
],
"summary": "Denial of service when parsing large forms in mime/multipart",
"details": "When parsing large multipart/form-data, an attacker can cause a HTTP server to open a large number of file descriptors. This may be used as a denial-of-service vector.",
"affected": [
{
"package": {
"name": "stdlib",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.6.4"
},
{
"introduced": "1.7.0-0"
},
{
"fixed": "1.7.4"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "mime/multipart",
"symbols": [
"Reader.readForm"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://go.dev/cl/30410"
},
{
"type": "FIX",
"url": "https://go.googlesource.com/go/+/7478ea5dba7ed02ddffd91c1d17ec8141f7cf184"
},
{
"type": "REPORT",
"url": "https://go.dev/issue/16296"
},
{
"type": "WEB",
"url": "https://groups.google.com/g/golang-dev/c/4NdLzS8sls8/m/uIz8QlnIBQAJ"
}
],
"credits": [
{
"name": "Simon Rawet"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2021-0172",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0098.json
|
{
"schema_version": "1.3.1",
"id": "GO-2021-0098",
"modified": "0001-01-01T00:00:00Z",
"published": "2021-04-14T20:04:52Z",
"aliases": [
"CVE-2021-21237",
"GHSA-cx3w-xqmc-84g5"
],
"summary": "Arbitrary code execution on Windows in github.com/git-lfs/git-lfs",
"details": "Due to the standard library behavior of exec.LookPath on Windows a number of methods may result in arbitrary code execution when cloning or operating on untrusted Git repositories.",
"affected": [
{
"package": {
"name": "github.com/git-lfs/git-lfs",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.5.1-0.20210113180018-fc664697ed2c"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/git-lfs/git-lfs/commands",
"goos": [
"windows"
],
"symbols": [
"PipeCommand",
"PipeMediaCommand",
"Run",
"lockVerifier.Verify",
"singleCheckout.Run",
"singleCheckout.RunToPath",
"uploadContext.NewQueue",
"uploadContext.UploadPointers"
]
},
{
"path": "github.com/git-lfs/git-lfs/creds",
"goos": [
"windows"
],
"symbols": [
"AskPassCredentialHelper.Fill",
"AskPassCredentialHelper.getFromProgram",
"CredentialHelperWrapper.FillCreds",
"CredentialHelpers.Approve",
"CredentialHelpers.Fill",
"commandCredentialHelper.Approve"
]
},
{
"path": "github.com/git-lfs/git-lfs/lfs",
"goos": [
"windows"
],
"symbols": [
"GitFilter.Clean",
"GitFilter.Smudge",
"GitFilter.SmudgeToFile",
"pipeExtensions"
]
},
{
"path": "github.com/git-lfs/git-lfs/lfshttp",
"goos": [
"windows"
],
"symbols": [
"Client.Do",
"Client.DoWithAccess",
"Client.HttpClient",
"Client.NewRequest",
"Client.Transport",
"sshAuthClient.Resolve",
"sshCache.Resolve"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://github.com/git-lfs/git-lfs/commit/fc664697ed2c2081ee9633010de0a7f9debea72a"
}
],
"credits": [
{
"name": "@Ry0taK"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2021-0098",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2969.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2969",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2024-39930"
],
"summary": "CVE-2024-39930 in github.com/gogs/gogs",
"details": "CVE-2024-39930 in github.com/gogs/gogs",
"affected": [
{
"package": {
"name": "github.com/gogs/gogs",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-39930"
},
{
"type": "WEB",
"url": "https://github.com/gogs/gogs/releases"
},
{
"type": "WEB",
"url": "https://www.sonarsource.com/blog/securing-developer-tools-unpatched-code-vulnerabilities-in-gogs-1/"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2969",
"review_status": "UNREVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0095.json
|
{
"schema_version": "1.3.1",
"id": "GO-2021-0095",
"modified": "0001-01-01T00:00:00Z",
"published": "2021-04-14T20:04:52Z",
"aliases": [
"CVE-2020-8918",
"GHSA-5x29-3hr9-6wpw"
],
"summary": "Sensitive information exposure in github.com/google/go-tpm",
"details": "Due to repeated usage of a XOR key an attacker that can eavesdrop on the TPM 1.2 transport is able to calculate usageAuth for keys created using CreateWrapKey, despite it being encrypted, allowing them to use the created key.",
"affected": [
{
"package": {
"name": "github.com/google/go-tpm",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.3.0"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/google/go-tpm/tpm",
"symbols": [
"CreateWrapKey"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://github.com/google/go-tpm/pull/195"
},
{
"type": "FIX",
"url": "https://github.com/google/go-tpm/commit/d7806cce857a1a020190c03348e5361725d8f141"
}
],
"credits": [
{
"name": "Chris Fenner"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2021-0095",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0317.json
|
{
"schema_version": "1.3.1",
"id": "GO-2021-0317",
"modified": "0001-01-01T00:00:00Z",
"published": "2022-05-23T22:15:42Z",
"aliases": [
"CVE-2022-23772"
],
"summary": "Uncontrolled memory consumption in math/big",
"details": "Rat.SetString had an overflow issue that can lead to uncontrolled memory consumption.",
"affected": [
{
"package": {
"name": "stdlib",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.16.14"
},
{
"introduced": "1.17.0-0"
},
{
"fixed": "1.17.7"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "math/big",
"symbols": [
"Rat.SetString"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://go.dev/cl/379537"
},
{
"type": "FIX",
"url": "https://go.googlesource.com/go/+/ad345c265916bbf6c646865e4642eafce6d39e78"
},
{
"type": "WEB",
"url": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ"
},
{
"type": "REPORT",
"url": "https://go.dev/issue/50699"
}
],
"credits": [
{
"name": "Emmanuel Odeke"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2021-0317",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1597.json
|
{
"schema_version": "1.3.1",
"id": "GO-2023-1597",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2023-26046",
"GHSA-9f95-hhg4-pg4f"
],
"summary": "Cross site scripting in github.com/kitabisa/teler-waf",
"details": "Improper sanitization and filtering of HTML entities in user input can lead to cross-site scripting (XSS) attacks where arbitrary JavaScript code is executed in the browser.",
"affected": [
{
"package": {
"name": "github.com/kitabisa/teler-waf",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.1.1"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/kitabisa/teler-waf",
"symbols": [
"Teler.Analyze",
"Teler.HandlerFuncWithNext",
"Teler.checkCustomRules"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://github.com/kitabisa/teler-waf/commit/d1d49cfddfa3ec2adad962870f14b85cd1aaf739"
},
{
"type": "WEB",
"url": "https://github.com/kitabisa/teler-waf/releases/tag/v0.1.1"
},
{
"type": "ADVISORY",
"url": "https://github.com/advisories/GHSA-9f95-hhg4-pg4f"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2023-1597",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0109.json
|
{
"schema_version": "1.3.1",
"id": "GO-2021-0109",
"modified": "0001-01-01T00:00:00Z",
"published": "2021-07-28T18:08:05Z",
"aliases": [
"CVE-2020-15223",
"GHSA-7mqr-2v3q-v2wm"
],
"summary": "Improper handling of token revocation in github.com/ory/fosite",
"details": "Due to improper error handling, an error with the underlying token storage may cause a user to believe a token has been successfully revoked when it is in fact still valid. An attackers ability to exploit this relies on an ability to trigger errors in the underlying storage.",
"affected": [
{
"package": {
"name": "github.com/ory/fosite",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.34.0"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/ory/fosite/handler/oauth2",
"symbols": [
"TokenRevocationHandler.RevokeToken"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://github.com/ory/fosite/commit/03dd55813f5521985f7dd64277b7ba0cf1441319"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2021-0109",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2505.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2505",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2020-28053",
"GHSA-6m72-467w-94rh"
],
"summary": "Privilege Escalation in HashiCorp Consul in github.com/hashicorp/consul",
"details": "Privilege Escalation in HashiCorp Consul in github.com/hashicorp/consul",
"affected": [
{
"package": {
"name": "github.com/hashicorp/consul",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "1.2.0"
},
{
"fixed": "1.6.10"
},
{
"introduced": "1.7.0"
},
{
"fixed": "1.7.10"
},
{
"introduced": "1.8.0"
},
{
"fixed": "1.8.6"
}
]
}
],
"ecosystem_specific": {}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/advisories/GHSA-6m72-467w-94rh"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28053"
},
{
"type": "FIX",
"url": "https://github.com/hashicorp/consul/commit/ff5215d882ac51b49c2647aac46b42aa9c890ce3"
},
{
"type": "FIX",
"url": "https://github.com/hashicorp/consul/pull/9240"
},
{
"type": "WEB",
"url": "https://github.com/hashicorp/consul/blob/master/CHANGELOG.md#186-november-19-2020"
},
{
"type": "WEB",
"url": "https://security.gentoo.org/glsa/202208-09"
},
{
"type": "WEB",
"url": "https://www.hashicorp.com/blog/category/consul"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2505",
"review_status": "UNREVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0289.json
|
{
"schema_version": "1.3.1",
"id": "GO-2022-0289",
"modified": "0001-01-01T00:00:00Z",
"published": "2022-05-18T18:23:23Z",
"aliases": [
"CVE-2021-44717"
],
"summary": "Misdirected I/O in syscall",
"details": "When a Go program running on a Unix system is out of file descriptors and calls syscall.ForkExec (including indirectly by using the os/exec package), syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or can be provoked) repeatedly, it can result in misdirected I/O such as writing network traffic intended for one connection to a different connection, or content intended for one file to a different one.\n\nFor users who cannot immediately update to the new release, the bug can be mitigated by raising the per-process file descriptor limit.",
"affected": [
{
"package": {
"name": "stdlib",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.16.12"
},
{
"introduced": "1.17.0-0"
},
{
"fixed": "1.17.5"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "syscall",
"symbols": [
"ForkExec"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://go.dev/cl/370576"
},
{
"type": "FIX",
"url": "https://go.googlesource.com/go/+/a76511f3a40ea69ee4f5cd86e735e1c8a84f0aa2"
},
{
"type": "REPORT",
"url": "https://go.dev/issue/50057"
},
{
"type": "WEB",
"url": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k"
},
{
"type": "FIX",
"url": "https://go.dev/cl/370577"
},
{
"type": "FIX",
"url": "https://go.dev/cl/370795"
}
],
"credits": [
{
"name": "Tomasz Maczukin"
},
{
"name": "Kamil Trzciński of GitLab"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2022-0289",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2718.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2718",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2024-29902",
"GHSA-88jx-383q-w4qc"
],
"summary": "Cosign malicious attachments can cause system-wide denial of service in github.com/sigstore/cosign",
"details": "Cosign malicious attachments can cause system-wide denial of service in github.com/sigstore/cosign",
"affected": [
{
"package": {
"name": "github.com/sigstore/cosign",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/sigstore/cosign/v2",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "2.2.4"
}
]
}
],
"ecosystem_specific": {}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/sigstore/cosign/security/advisories/GHSA-88jx-383q-w4qc"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-29902"
},
{
"type": "FIX",
"url": "https://github.com/sigstore/cosign/commit/629f5f8fa672973503edde75f84dcd984637629e"
},
{
"type": "WEB",
"url": "https://github.com/google/go-containerregistry/blob/a0658aa1d0cc7a7f1bcc4a3af9155335b6943f40/pkg/v1/remote/layer.go#L36-L40"
},
{
"type": "WEB",
"url": "https://github.com/sigstore/cosign/blob/9bc3ee309bf35d2f6e17f5d23f231a3d8bf580bc/pkg/oci/remote/remote.go#L228-L239"
},
{
"type": "WEB",
"url": "https://github.com/sigstore/cosign/releases/tag/v2.2.4"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2718",
"review_status": "UNREVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2817.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2817",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2024-33396",
"GHSA-wccg-v638-j9q2"
],
"summary": "karmada vulnerable to arbitrary code execution via a crafted command in github.com/karmada-io/karmada",
"details": "karmada vulnerable to arbitrary code execution via a crafted command in github.com/karmada-io/karmada",
"affected": [
{
"package": {
"name": "github.com/karmada-io/karmada",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/advisories/GHSA-wccg-v638-j9q2"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-33396"
},
{
"type": "WEB",
"url": "https://gist.github.com/HouqiyuA/2b56a893c06553013982836abb77ba50"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2817",
"review_status": "UNREVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2615.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2615",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2024-24766",
"GHSA-c967-2652-gfjm"
],
"summary": "Username enumeration in github.com/IceWhaleTech/CasaOS-UserService",
"details": "CasaOS-UserService is vulnerable to a username enumeration issue, when an attacker can enumerate the CasaOS username using the application response. If the username is incorrect, the application gives the error 'User does not exist'. If the password is incorrect, the application gives the error 'Invalid password'.",
"affected": [
{
"package": {
"name": "github.com/IceWhaleTech/CasaOS-UserService",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0.4.4-3-alpha1"
},
{
"fixed": "0.4.7"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/IceWhaleTech/CasaOS-UserService/route/v1",
"symbols": [
"PostUserLogin",
"PutUserInfo"
]
}
]
}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/IceWhaleTech/CasaOS-UserService/security/advisories/GHSA-c967-2652-gfjm"
},
{
"type": "FIX",
"url": "https://github.com/IceWhaleTech/CasaOS-UserService/commit/c75063d7ca5800948e9c09c0a6efe9809b5d39f7"
},
{
"type": "WEB",
"url": "https://github.com/IceWhaleTech/CasaOS-UserService/releases/tag/v0.4.7"
}
],
"credits": [
{
"name": "DrDark1999"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2615",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2981.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2981",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2024-39909",
"GHSA-5248-h45p-9pgw"
],
"summary": "SQL Injection in the KubeClarity REST API in github.com/openclarity/kubeclarity/backend",
"details": "SQL Injection in the KubeClarity REST API in github.com/openclarity/kubeclarity/backend",
"affected": [
{
"package": {
"name": "github.com/openclarity/kubeclarity/backend",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.0.0-20240711173334-1d1178840703"
}
]
}
],
"ecosystem_specific": {}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/openclarity/kubeclarity/security/advisories/GHSA-5248-h45p-9pgw"
},
{
"type": "WEB",
"url": "https://github.com/openclarity/kubeclarity/blob/main/backend/pkg/database/id_view.go#L79"
},
{
"type": "WEB",
"url": "https://github.com/openclarity/kubeclarity/commit/1d1178840703a72d9082b7fc4aea0a3326c5d294"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2981",
"review_status": "UNREVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2752.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2752",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2022-1058",
"GHSA-4rqq-rxvc-v2rc"
],
"summary": "Gitea Open Redirect in code.gitea.io/gitea",
"details": "Gitea Open Redirect in code.gitea.io/gitea",
"affected": [
{
"package": {
"name": "code.gitea.io/gitea",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.16.5"
}
]
}
],
"ecosystem_specific": {}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/advisories/GHSA-4rqq-rxvc-v2rc"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1058"
},
{
"type": "WEB",
"url": "https://github.com/go-gitea/gitea/commit/e3d8e92bdc67562783de9a76b5b7842b68daeb48"
},
{
"type": "WEB",
"url": "https://github.com/go-gitea/gitea/pull/19175"
},
{
"type": "WEB",
"url": "https://github.com/go-gitea/gitea/pull/19186"
},
{
"type": "WEB",
"url": "https://huntr.dev/bounties/4fb42144-ac70-4f76-a5e1-ef6b5e55dc0d"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2752",
"review_status": "UNREVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1765.json
|
{
"schema_version": "1.3.1",
"id": "GO-2023-1765",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2023-1732",
"GHSA-2q89-485c-9j2x"
],
"summary": "Leaked shared secret and weak blinding in github.com/cloudflare/circl",
"details": "When sampling randomness for a shared secret, the implementation of Kyber and FrodoKEM, did not check whether crypto/rand.Read() returns an error. In rare deployment cases (error thrown by the Read() function), this could lead to a predictable shared secret.\n\nThe tkn20 and blindrsa components did not check whether enough randomness was returned from the user provided randomness source. Typically the user provides crypto/rand.Reader, which in the vast majority of cases will always return the right number random bytes. In the cases where it does not, or the user provides a source that does not, the blinding for blindrsa is weak and integrity of the plaintext is not ensured in tkn20.",
"affected": [
{
"package": {
"name": "github.com/cloudflare/circl",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.3.3"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/cloudflare/circl/abe/cpabe/tkn20/internal/tkn",
"symbols": [
"EncryptCCA"
]
},
{
"path": "github.com/cloudflare/circl/blindsign/blindrsa",
"symbols": [
"RSAVerifier.Blind"
]
},
{
"path": "github.com/cloudflare/circl/kem/frodo/frodo640shake",
"symbols": [
"PublicKey.EncapsulateTo",
"scheme.Encapsulate",
"scheme.EncapsulateDeterministically"
]
},
{
"path": "github.com/cloudflare/circl/kem/kyber/kyber1024",
"symbols": [
"PublicKey.EncapsulateTo",
"scheme.Encapsulate",
"scheme.EncapsulateDeterministically"
]
},
{
"path": "github.com/cloudflare/circl/kem/kyber/kyber512",
"symbols": [
"PublicKey.EncapsulateTo",
"scheme.Encapsulate",
"scheme.EncapsulateDeterministically"
]
},
{
"path": "github.com/cloudflare/circl/kem/kyber/kyber768",
"symbols": [
"PublicKey.EncapsulateTo",
"scheme.Encapsulate",
"scheme.EncapsulateDeterministically"
]
},
{
"path": "github.com/cloudflare/circl/kem/sike/sikep434",
"symbols": [
"scheme.Encapsulate"
]
},
{
"path": "github.com/cloudflare/circl/kem/sike/sikep503",
"symbols": [
"scheme.Encapsulate"
]
},
{
"path": "github.com/cloudflare/circl/kem/sike/sikep751",
"symbols": [
"scheme.Encapsulate"
]
}
]
}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cloudflare/circl/security/advisories/GHSA-2q89-485c-9j2x"
},
{
"type": "FIX",
"url": "https://github.com/cloudflare/circl/commit/ff8d91225f8954b4970b6d6382d2e4c78f4a4cf8"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2023-1765",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-2003.json
|
{
"schema_version": "1.3.1",
"id": "GO-2023-2003",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"GHSA-8c37-7qx3-4c4p"
],
"summary": "Group signature validation bypass in github.com/supranational/blst",
"details": "When complemented with a check for infinity, blst skips performing a signature group-check. Formally speaking, infinity is the identity element of the elliptic curve group and as such it is a member of the group, so the group-check should be performed. The fix performs the check even in the presence of infinity.",
"affected": [
{
"package": {
"name": "github.com/supranational/blst",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0.3.0"
},
{
"fixed": "0.3.11"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/supranational/blst/bindings/go"
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://github.com/supranational/blst/commit/fb91221c91c82f65bfc7f243256308977a06d48b"
},
{
"type": "WEB",
"url": "https://github.com/supranational/blst/releases/tag/v0.3.11"
}
],
"credits": [
{
"name": "Yunjong Jeong (@blukat29)"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2023-2003",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2926.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2926",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2024-37158"
],
"summary": "Evmos is missing precompile checks in github.com/evmos/evmos",
"details": "Evmos is missing precompile checks in github.com/evmos/evmos",
"affected": [
{
"package": {
"name": "github.com/evmos/evmos",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/evmos/evmos/v2",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/evmos/evmos/v3",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/evmos/evmos/v4",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/evmos/evmos/v5",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/evmos/evmos/v6",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/evmos/evmos/v7",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/evmos/evmos/v8",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/evmos/evmos/v9",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/evmos/evmos/v10",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/evmos/evmos/v11",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/evmos/evmos/v12",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/evmos/evmos/v13",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/evmos/evmos/v14",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/evmos/evmos/v15",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/evmos/evmos/v16",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/evmos/evmos/v17",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/evmos/evmos/v18",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "18.0.0"
}
]
}
],
"ecosystem_specific": {}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-37158"
},
{
"type": "FIX",
"url": "https://github.com/evmos/evmos/commit/b2a09ca66613d8b04decd3f2dcba8e1e77709dcb"
},
{
"type": "WEB",
"url": "https://github.com/evmos/evmos/security/advisories/GHSA-pxv8-qhrh-jc7v"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2926",
"review_status": "UNREVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0476.json
|
{
"schema_version": "1.3.1",
"id": "GO-2022-0476",
"modified": "0001-01-01T00:00:00Z",
"published": "2022-07-28T17:24:43Z",
"aliases": [
"CVE-2020-28367"
],
"summary": "Arbitrary code execution via the go command with cgo in cmd/go",
"details": "The go command may execute arbitrary code at build time when cgo is in use. This may occur when running go get on a malicious package, or any other command that builds untrusted code.\n\nThis can be caused by malicious gcc flags specified via a cgo directive.",
"affected": [
{
"package": {
"name": "toolchain",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.14.12"
},
{
"introduced": "1.15.0-0"
},
{
"fixed": "1.15.5"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "cmd/go",
"symbols": [
"validCompilerFlags"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://go.dev/cl/267277"
},
{
"type": "FIX",
"url": "https://go.googlesource.com/go/+/da7aa86917811a571e6634b45a457f918b8e6561"
},
{
"type": "REPORT",
"url": "https://go.dev/issue/42556"
},
{
"type": "WEB",
"url": "https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM"
}
],
"credits": [
{
"name": "Imre Rad"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2022-0476",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2562.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2562",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2024-21499",
"GHSA-r969-783f-6jqr"
],
"summary": "Improper Neutralization of HTTP Headers in github.com/greenpau/caddy-security",
"details": "Improper Neutralization of HTTP Headers in github.com/greenpau/caddy-security",
"affected": [
{
"package": {
"name": "github.com/greenpau/caddy-security",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/advisories/GHSA-r969-783f-6jqr"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21499"
},
{
"type": "REPORT",
"url": "https://github.com/greenpau/caddy-security/issues/270"
},
{
"type": "WEB",
"url": "https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy"
},
{
"type": "WEB",
"url": "https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-6249863"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2562",
"review_status": "UNREVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2020-0041.json
|
{
"schema_version": "1.3.1",
"id": "GO-2020-0041",
"modified": "0001-01-01T00:00:00Z",
"published": "2021-04-14T20:04:52Z",
"aliases": [
"CVE-2020-7668",
"GHSA-88jf-7rch-32qc"
],
"summary": "Path Traversal in github.com/unknwon/cae",
"details": "Due to improper path sanitization, archives containing relative file paths can cause files to be written (or overwritten) outside of the target directory.",
"affected": [
{
"package": {
"name": "github.com/unknwon/cae",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.0.1"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/unknwon/cae/tz",
"symbols": [
"Create",
"ExtractTo",
"Open",
"OpenFile",
"TzArchive.Close",
"TzArchive.ExtractTo",
"TzArchive.ExtractToFunc",
"TzArchive.Flush",
"TzArchive.Open",
"TzArchive.syncFiles"
]
},
{
"path": "github.com/unknwon/cae/zip",
"symbols": [
"Create",
"ExtractTo",
"ExtractToFunc",
"Open",
"OpenFile",
"ZipArchive.Close",
"ZipArchive.ExtractTo",
"ZipArchive.ExtractToFunc",
"ZipArchive.Flush",
"ZipArchive.Open"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://github.com/unknwon/cae/commit/07971c00a1bfd9dc171c3ad0bfab5b67c2287e11"
},
{
"type": "WEB",
"url": "https://snyk.io/research/zip-slip-vulnerability"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2020-0041",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0177.json
|
{
"schema_version": "1.3.1",
"id": "GO-2022-0177",
"modified": "0001-01-01T00:00:00Z",
"published": "2022-08-09T17:31:35Z",
"aliases": [
"CVE-2017-15041"
],
"summary": "Remote command execution via \"go get\" in cmd/go",
"details": "The \"go get\" command allows remote command execution.\n\nUsing custom domains, it is possible to arrange things so that example.com/pkg1 points to a Subversion repository but example.com/pkg1/pkg2 points to a Git repository. If the Subversion repository includes a Git checkout in its pkg2 directory and some other work is done to ensure the proper ordering of operations, \"go get\" can be tricked into reusing this Git checkout for the fetch of code from pkg2. If the Subversion repository's Git checkout has malicious commands in .git/hooks/, they will execute on the system running \"go get\".",
"affected": [
{
"package": {
"name": "toolchain",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.8.4"
},
{
"introduced": "1.9.0-0"
},
{
"fixed": "1.9.1"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "cmd/go"
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://go.dev/cl/68110"
},
{
"type": "FIX",
"url": "https://go.googlesource.com/go/+/ec71ee078fd3243b78c0d404c8634bd97e38d7eb"
},
{
"type": "REPORT",
"url": "https://go.dev/issue/22125"
},
{
"type": "WEB",
"url": "https://groups.google.com/g/golang-dev/c/RinSE3EiJBI/m/kYL7zb07AgAJ"
}
],
"credits": [
{
"name": "Simon Rawet"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2022-0177",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2434.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2434",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2023-46742",
"GHSA-vwch-g97w-hfg2"
],
"summary": "CubeFS leaks users key in logs in github.com/cubefs/cubefs",
"details": "CubeFS leaks users key in logs in github.com/cubefs/cubefs.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/cubefs/cubefs before v3.3.1.",
"affected": [
{
"package": {
"name": "github.com/cubefs/cubefs",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {
"custom_ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0"
},
{
"fixed": "3.3.1"
}
]
}
]
}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cubefs/cubefs/security/advisories/GHSA-vwch-g97w-hfg2"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-46742"
},
{
"type": "FIX",
"url": "https://github.com/cubefs/cubefs/commit/8dccce6ac8dff3db44d7e9074094c7303a5ff5dd"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2434",
"review_status": "UNREVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2020-0009.json
|
{
"schema_version": "1.3.1",
"id": "GO-2020-0009",
"modified": "0001-01-01T00:00:00Z",
"published": "2021-04-14T20:04:52Z",
"aliases": [
"CVE-2016-9123",
"GHSA-3fx4-7f69-5mmg"
],
"summary": "Integer overflow in github.com/square/go-jose",
"details": "On 32-bit platforms an attacker can manipulate a ciphertext encrypted with AES-CBC with HMAC such that they can control how large the input buffer is when computing the HMAC authentication tag. This can can allow a manipulated ciphertext to be verified as authentic, opening the door for padding oracle attacks.",
"affected": [
{
"package": {
"name": "github.com/square/go-jose",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.0.0-20160903044734-789a4c4bd4c1"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/square/go-jose/cipher",
"goarch": [
"386",
"arm",
"armbe",
"amd64p32",
"mips",
"mipsle",
"mips64p32",
"mips64p32le",
"ppc",
"riscv",
"s390",
"sparc"
],
"symbols": [
"cbcAEAD.Open",
"cbcAEAD.Seal",
"cbcAEAD.computeAuthTag"
]
},
{
"path": "github.com/square/go-jose",
"goarch": [
"386",
"arm",
"armbe",
"amd64p32",
"mips",
"mipsle",
"mips64p32",
"mips64p32le",
"ppc",
"riscv",
"s390",
"sparc"
],
"symbols": [
"JsonWebEncryption.Decrypt",
"genericEncrypter.Encrypt",
"genericEncrypter.EncryptWithAuthData"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://github.com/square/go-jose/commit/789a4c4bd4c118f7564954f441b29c153ccd6a96"
},
{
"type": "WEB",
"url": "https://www.openwall.com/lists/oss-security/2016/11/03/1"
}
],
"credits": [
{
"name": "Quan Nguyen from Google's Information Security Engineering Team"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2020-0009",
"review_status": "REVIEWED"
}
}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.