repo_id
stringclasses
927 values
file_path
stringlengths
99
214
content
stringlengths
2
4.15M
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-2328.json
{ "schema_version": "1.3.1", "id": "GO-2023-2328", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-45286", "GHSA-xwh9-gc39-5298" ], "summary": "HTTP request body disclosure in github.com/go-resty/resty/v2", "details": "A race condition in go-resty can result in HTTP request body disclosure across requests.\n\nThis condition can be triggered by calling sync.Pool.Put with the same *bytes.Buffer more than once, when request retries are enabled and a retry occurs. The call to sync.Pool.Get will then return a bytes.Buffer that hasn't had bytes.Buffer.Reset called on it. This dirty buffer will contain the HTTP request body from an unrelated request, and go-resty will append the current HTTP request body to it, sending two bodies in one request.\n\nThe sync.Pool in question is defined at package level scope, so a completely unrelated server could receive the request body.", "affected": [ { "package": { "name": "github.com/go-resty/resty/v2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "2.10.0" }, { "fixed": "2.11.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/go-resty/resty/v2", "symbols": [ "Backoff", "Request.Delete", "Request.Execute", "Request.Get", "Request.Head", "Request.Options", "Request.Patch", "Request.Post", "Request.Put", "Request.Send", "handleRequestBody" ] } ] } } ], "references": [ { "type": "REPORT", "url": "https://github.com/go-resty/resty/issues/743" }, { "type": "REPORT", "url": "https://github.com/go-resty/resty/issues/739" }, { "type": "FIX", "url": "https://github.com/go-resty/resty/pull/745" }, { "type": "FIX", "url": "https://github.com/go-resty/resty/commit/577fed8730d79f583eb48dfc81674164e1fc471e" } ], "credits": [ { "name": "Logan Attwood (@lattwood)" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-2328", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1990.json
{ "schema_version": "1.3.1", "id": "GO-2023-1990", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-29407", "GHSA-j3p8-6mrq-6g7h" ], "summary": "Excessive CPU consumption when decoding 0-height images in golang.org/x/image/tiff", "details": "A maliciously-crafted image can cause excessive CPU consumption in decoding.\n\nA tiled image with a height of 0 and a very large width can cause excessive CPU consumption, despite the image size (width * height) appearing to be zero.", "affected": [ { "package": { "name": "golang.org/x/image", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.10.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "golang.org/x/image/tiff", "symbols": [ "Decode", "DecodeConfig", "newDecoder" ] } ] } } ], "references": [ { "type": "REPORT", "url": "https://go.dev/issue/61581" }, { "type": "FIX", "url": "https://go.dev/cl/514897" } ], "credits": [ { "name": "Philippe Antoine (Catena cyber)" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-1990", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2830.json
{ "schema_version": "1.3.1", "id": "GO-2024-2830", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-34352", "GHSA-f8ch-w75v-c847" ], "summary": "Arbitrary file write in github.com/1Panel-dev/1Panel", "details": "A maliciously crafted packet can write to an arbitrary file.", "affected": [ { "package": { "name": "github.com/1Panel-dev/1Panel", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.10.3-lts" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/1Panel-dev/1Panel/backend/utils/cmd", "symbols": [ "CheckIllegal" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-f8ch-w75v-c847" }, { "type": "FIX", "url": "https://github.com/1Panel-dev/1Panel/commit/e037b69f52799e110af8e98f39a3627ad0285ea6" } ], "credits": [ { "name": "@an5er" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2830", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2447.json
{ "schema_version": "1.3.1", "id": "GO-2024-2447", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "GHSA-hw4x-mcx5-9q36" ], "summary": "Teleport Proxy and Teleport Agents: SSRF to arbitrary hosts is possible from low privileged users in github.com/gravitational/teleport", "details": "Teleport Proxy and Teleport Agents: SSRF to arbitrary hosts is possible from low privileged users in github.com/gravitational/teleport.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/gravitational/teleport before v12.4.31, from v13.0.0 before v13.4.13, from v14.0.0 before v14.2.4.", "affected": [ { "package": { "name": "github.com/gravitational/teleport", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "12.4.31" }, { "introduced": "13.0.0" }, { "fixed": "13.4.13" }, { "introduced": "14.0.0" }, { "fixed": "14.2.4" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/gravitational/teleport/security/advisories/GHSA-hw4x-mcx5-9q36" }, { "type": "FIX", "url": "https://github.com/gravitational/teleport/commit/bb2d67d357e868254a21ed7cb132030d7bf9fcbc" }, { "type": "FIX", "url": "https://github.com/gravitational/teleport/pull/36127" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2447", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2667.json
{ "schema_version": "1.3.1", "id": "GO-2024-2667", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-29893", "GHSA-jhwx-mhww-rgc3" ], "summary": "Out of memory crash from malicious Helm registry in github.com/argoproj/argo-cd/v2", "details": "Out of memory crash from malicious Helm registry in github.com/argoproj/argo-cd/v2", "affected": [ { "package": { "name": "github.com/argoproj/argo-cd/v2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "2.4.0" }, { "fixed": "2.8.14" }, { "introduced": "2.9.0" }, { "fixed": "2.9.10" }, { "introduced": "2.10.0" }, { "fixed": "2.10.5" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-jhwx-mhww-rgc3" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2667", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2951.json
{ "schema_version": "1.3.1", "id": "GO-2024-2951", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "GHSA-hg58-rf2h-6rr7" ], "summary": "Denial of service when syncing with a malicious peer in github.com/cometbft/cometbft", "details": "A malicious peer can cause a syncing node to panic during blocksync. The syncing node may enter into a catastrophic invalid syncing state or get stuck in blocksync mode, never switching to consensus. Nodes that are vulnerable to this state may experience a Denial of Service condition in which syncing will not work as expected when joining a network as a client.", "affected": [ { "package": { "name": "github.com/cometbft/cometbft", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0.37.0" }, { "fixed": "0.37.7" }, { "introduced": "0.38.0" }, { "fixed": "0.38.8" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/cometbft/cometbft/blocksync", "symbols": [ "BlockPool.OnStart", "BlockPool.RedoRequest", "BlockPool.RemovePeerAndRedoAllPeerRequests", "BlockPool.SetPeerRange", "BlockPool.removeTimedoutPeers", "NewBlockPool", "NewReactor", "Reactor.OnStart", "Reactor.Receive", "Reactor.SwitchToBlockSync" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/cometbft/cometbft/security/advisories/GHSA-hg58-rf2h-6rr7" }, { "type": "FIX", "url": "https://github.com/cometbft/cometbft/commit/07866e11139127e415bd0339ac377b6e6a845533" }, { "type": "FIX", "url": "https://github.com/cometbft/cometbft/commit/8ba2e4f52d5e626e019501ba6420cc86d5de7857" } ], "credits": [ { "name": "unknown_feature" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2951", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2464.json
{ "schema_version": "1.3.1", "id": "GO-2024-2464", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-22197", "GHSA-pxmr-q2x3-9x9m" ], "summary": "Remote command execution in github.com/0xJacky/Nginx-UI", "details": "Remote command execution in github.com/0xJacky/Nginx-UI", "affected": [ { "package": { "name": "github.com/0xJacky/Nginx-UI", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.9.10-0.20231219184941-827e76c46e63" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/0xJacky/Nginx-UI/api/system", "symbols": [ "GetSettings", "SaveSettings" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/0xJacky/nginx-ui/commit/827e76c46e63c52114a62a899f61313039c754e3" }, { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-pxmr-q2x3-9x9m" } ], "credits": [ { "name": "@jorgectf" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2464", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2610.json
{ "schema_version": "1.3.1", "id": "GO-2024-2610", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-24785" ], "summary": "Errors returned from JSON marshaling may break template escaping in html/template", "details": "If errors returned from MarshalJSON methods contain user controlled data, they may be used to break the contextual auto-escaping behavior of the html/template package, allowing for subsequent actions to inject unexpected content into templates.", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.21.8" }, { "introduced": "1.22.0-0" }, { "fixed": "1.22.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "html/template", "symbols": [ "Template.Execute", "Template.ExecuteTemplate", "escaper.commit", "jsValEscaper" ] } ] } } ], "references": [ { "type": "REPORT", "url": "https://go.dev/issue/65697" }, { "type": "FIX", "url": "https://go.dev/cl/564196" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/5pwGVUPoMbg" } ], "credits": [ { "name": "RyotaK (https://ryotak.net)" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2610", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1570.json
{ "schema_version": "1.3.1", "id": "GO-2023-1570", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2022-41724" ], "summary": "Panic on large handshake records in crypto/tls", "details": "Large handshake records may cause panics in crypto/tls.\n\nBoth clients and servers may send large TLS handshake records which cause servers and clients, respectively, to panic when attempting to construct responses.\n\nThis affects all TLS 1.3 clients, TLS 1.2 clients which explicitly enable session resumption (by setting Config.ClientSessionCache to a non-nil value), and TLS 1.3 servers which request client certificates (by setting Config.ClientAuth \u003e= RequestClientCert).", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.19.6" }, { "introduced": "1.20.0-0" }, { "fixed": "1.20.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "crypto/tls", "symbols": [ "Conn.Handshake", "Conn.HandshakeContext", "Conn.Read", "Conn.Write", "Conn.clientHandshake", "Conn.handleKeyUpdate", "Conn.handlePostHandshakeMessage", "Conn.handleRenegotiation", "Conn.loadSession", "Conn.readClientHello", "Conn.readHandshake", "Conn.writeRecord", "ConnectionState.ExportKeyingMaterial", "Dial", "DialWithDialer", "Dialer.Dial", "Dialer.DialContext", "certificateMsg.marshal", "certificateMsgTLS13.marshal", "certificateRequestMsg.marshal", "certificateRequestMsgTLS13.marshal", "certificateStatusMsg.marshal", "certificateVerifyMsg.marshal", "cipherSuiteTLS13.expandLabel", "clientHandshakeState.doFullHandshake", "clientHandshakeState.handshake", "clientHandshakeState.readFinished", "clientHandshakeState.readSessionTicket", "clientHandshakeState.sendFinished", "clientHandshakeStateTLS13.handshake", "clientHandshakeStateTLS13.processHelloRetryRequest", "clientHandshakeStateTLS13.readServerCertificate", "clientHandshakeStateTLS13.readServerFinished", "clientHandshakeStateTLS13.readServerParameters", "clientHandshakeStateTLS13.sendClientCertificate", "clientHandshakeStateTLS13.sendClientFinished", "clientHandshakeStateTLS13.sendDummyChangeCipherSpec", "clientHelloMsg.marshal", "clientHelloMsg.marshalWithoutBinders", "clientHelloMsg.updateBinders", "clientKeyExchangeMsg.marshal", "encryptedExtensionsMsg.marshal", "endOfEarlyDataMsg.marshal", "finishedMsg.marshal", "handshakeMessage.marshal", "helloRequestMsg.marshal", "keyUpdateMsg.marshal", "newSessionTicketMsg.marshal", "newSessionTicketMsgTLS13.marshal", "serverHandshakeState.doFullHandshake", "serverHandshakeState.doResumeHandshake", "serverHandshakeState.readFinished", "serverHandshakeState.sendFinished", "serverHandshakeState.sendSessionTicket", "serverHandshakeStateTLS13.checkForResumption", "serverHandshakeStateTLS13.doHelloRetryRequest", "serverHandshakeStateTLS13.readClientCertificate", "serverHandshakeStateTLS13.readClientFinished", "serverHandshakeStateTLS13.sendDummyChangeCipherSpec", "serverHandshakeStateTLS13.sendServerCertificate", "serverHandshakeStateTLS13.sendServerFinished", "serverHandshakeStateTLS13.sendServerParameters", "serverHandshakeStateTLS13.sendSessionTickets", "serverHelloDoneMsg.marshal", "serverHelloMsg.marshal", "serverKeyExchangeMsg.marshal", "sessionState.marshal", "sessionStateTLS13.marshal" ] } ] } } ], "references": [ { "type": "REPORT", "url": "https://go.dev/issue/58001" }, { "type": "FIX", "url": "https://go.dev/cl/468125" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E" } ], "credits": [ { "name": "Marten Seemann" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-1570", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0355.json
{ "schema_version": "1.3.1", "id": "GO-2022-0355", "modified": "0001-01-01T00:00:00Z", "published": "2022-07-27T20:26:59Z", "aliases": [ "CVE-2022-21221", "GHSA-fx95-883v-4q4h" ], "summary": "Path traversal in github.com/valyala/fasthttp", "details": "The fasthttp.FS request handler is vulnerable to directory traversal attacks on Windows systems, and can serve files from outside the provided root directory.\n\nURL path normalization does not handle Windows path separators (backslashes), permitting an attacker to construct requests with relative paths.", "affected": [ { "package": { "name": "github.com/valyala/fasthttp", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.34.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/valyala/fasthttp", "symbols": [ "AppendBrotliBytes", "AppendBrotliBytesLevel", "AppendDeflateBytes", "AppendDeflateBytesLevel", "AppendGunzipBytes", "AppendGzipBytes", "AppendGzipBytesLevel", "AppendHTTPDate", "AppendInflateBytes", "AppendUnbrotliBytes", "Args.WriteTo", "Client.CloseIdleConnections", "Client.Do", "Client.DoDeadline", "Client.DoRedirects", "Client.DoTimeout", "Client.Get", "Client.GetDeadline", "Client.GetTimeout", "Client.Post", "Cookie.AppendBytes", "Cookie.Cookie", "Cookie.Parse", "Cookie.ParseBytes", "Cookie.String", "Cookie.WriteTo", "Dial", "DialDualStack", "DialDualStackTimeout", "DialTimeout", "Do", "DoDeadline", "DoRedirects", "DoTimeout", "FS.NewRequestHandler", "FSHandler", "FileLastModified", "GenerateTestCertificate", "Get", "GetDeadline", "GetTimeout", "HostClient.CloseIdleConnections", "HostClient.Do", "HostClient.DoDeadline", "HostClient.DoRedirects", "HostClient.DoTimeout", "HostClient.Get", "HostClient.GetDeadline", "HostClient.GetTimeout", "HostClient.Post", "LBClient.Do", "LBClient.DoDeadline", "LBClient.DoTimeout", "ListenAndServe", "ListenAndServeTLS", "ListenAndServeTLSEmbed", "ListenAndServeUNIX", "NewStreamReader", "ParseByteRange", "ParseHTTPDate", "ParseIPv4", "PipelineClient.Do", "PipelineClient.DoDeadline", "PipelineClient.DoTimeout", "PipelineClient.PendingRequests", "Post", "Request.Body", "Request.BodyGunzip", "Request.BodyInflate", "Request.BodyUnbrotli", "Request.BodyWriteTo", "Request.ContinueReadBody", "Request.ContinueReadBodyStream", "Request.Host", "Request.MultipartForm", "Request.PostArgs", "Request.Read", "Request.ReadBody", "Request.ReadLimitBody", "Request.SetBodyStreamWriter", "Request.SetHost", "Request.SetHostBytes", "Request.String", "Request.SwapBody", "Request.URI", "Request.Write", "Request.WriteTo", "RequestCtx.FormFile", "RequestCtx.FormValue", "RequestCtx.Host", "RequestCtx.IfModifiedSince", "RequestCtx.MultipartForm", "RequestCtx.Path", "RequestCtx.PostArgs", "RequestCtx.PostBody", "RequestCtx.QueryArgs", "RequestCtx.Redirect", "RequestCtx.RedirectBytes", "RequestCtx.SendFile", "RequestCtx.SendFileBytes", "RequestCtx.SetBodyStreamWriter", "RequestCtx.String", "RequestCtx.URI", "RequestHeader.Add", "RequestHeader.AddBytesK", "RequestHeader.AddBytesKV", "RequestHeader.AddBytesV", "RequestHeader.Read", "RequestHeader.ReadTrailer", "RequestHeader.Set", "RequestHeader.SetByteRange", "RequestHeader.SetBytesK", "RequestHeader.SetBytesKV", "RequestHeader.SetBytesV", "RequestHeader.SetCanonical", "RequestHeader.SetReferer", "RequestHeader.SetRefererBytes", "RequestHeader.Write", "Response.Body", "Response.BodyGunzip", "Response.BodyInflate", "Response.BodyUnbrotli", "Response.BodyWriteTo", "Response.Read", "Response.ReadBody", "Response.ReadLimitBody", "Response.SendFile", "Response.SetBodyStreamWriter", "Response.String", "Response.SwapBody", "Response.Write", "Response.WriteDeflate", "Response.WriteDeflateLevel", "Response.WriteGzip", "Response.WriteGzipLevel", "Response.WriteTo", "ResponseHeader.Add", "ResponseHeader.AddBytesK", "ResponseHeader.AddBytesKV", "ResponseHeader.AddBytesV", "ResponseHeader.AppendBytes", "ResponseHeader.Cookie", "ResponseHeader.DelClientCookie", "ResponseHeader.DelClientCookieBytes", "ResponseHeader.Header", "ResponseHeader.Read", "ResponseHeader.ReadTrailer", "ResponseHeader.Set", "ResponseHeader.SetBytesK", "ResponseHeader.SetBytesKV", "ResponseHeader.SetBytesV", "ResponseHeader.SetCanonical", "ResponseHeader.SetContentRange", "ResponseHeader.SetCookie", "ResponseHeader.SetLastModified", "ResponseHeader.String", "ResponseHeader.Write", "ResponseHeader.WriteTo", "SaveMultipartFile", "Serve", "ServeConn", "ServeFile", "ServeFileBytes", "ServeFileBytesUncompressed", "ServeFileUncompressed", "ServeTLS", "ServeTLSEmbed", "Server.AppendCert", "Server.AppendCertEmbed", "Server.ListenAndServe", "Server.ListenAndServeTLS", "Server.ListenAndServeTLSEmbed", "Server.ListenAndServeUNIX", "Server.Serve", "Server.ServeConn", "Server.ServeTLS", "Server.ServeTLSEmbed", "Server.Shutdown", "TCPDialer.Dial", "TCPDialer.DialDualStack", "TCPDialer.DialDualStackTimeout", "TCPDialer.DialTimeout", "URI.Parse", "URI.Update", "URI.UpdateBytes", "URI.WriteTo", "WriteBrotli", "WriteBrotliLevel", "WriteDeflate", "WriteDeflateLevel", "WriteGunzip", "WriteGzip", "WriteGzipLevel", "WriteInflate", "WriteMultipartForm", "WriteUnbrotli", "bigFileReader.Read", "bigFileReader.WriteTo", "ctxLogger.Printf", "firstByteReader.Read", "flushWriter.Write", "fsFile.NewReader", "fsSmallFileReader.WriteTo", "hijackConn.Close", "hijackConn.Read", "perIPConn.Close", "perIPConnCounter.Unregister", "pipelineConnClient.Do", "pipelineConnClient.DoDeadline", "pipelineConnClient.PendingRequests", "requestStream.Read", "statsWriter.Write", "tcpKeepaliveListener.Accept", "workerPool.Serve" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/valyala/fasthttp/commit/6b5bc7bb304975147b4af68df54ac214ed2554c1" }, { "type": "WEB", "url": "https://github.com/valyala/fasthttp/issues/1226" }, { "type": "WEB", "url": "https://github.com/valyala/fasthttp/releases/tag/v1.34.0" }, { "type": "WEB", "url": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMVALYALAFASTHTTP-2407866" } ], "credits": [ { "name": "egovorukhin" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0355", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2746.json
{ "schema_version": "1.3.1", "id": "GO-2024-2746", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-3177", "GHSA-pxhw-596r-rwq5" ], "summary": "Kubernetes allows bypassing mountable secrets policy imposed by the ServiceAccount admission plugin in k8s.io/kubernetes", "details": "Kubernetes allows bypassing mountable secrets policy imposed by the ServiceAccount admission plugin in k8s.io/kubernetes", "affected": [ { "package": { "name": "k8s.io/kubernetes", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.27.13" }, { "introduced": "1.28.0" }, { "fixed": "1.28.9" }, { "introduced": "1.29.0" }, { "fixed": "1.29.4" } ] } ], "ecosystem_specific": { "imports": [ { "path": "k8s.io/kubernetes/plugin/pkg/admission/serviceaccount", "symbols": [ "Plugin.limitSecretReferences" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-pxhw-596r-rwq5" }, { "type": "FIX", "url": "https://github.com/kubernetes/kubernetes/commit/7c861b1ecad97e1ab9332c970c9294a72065111a" }, { "type": "WEB", "url": "https://github.com/kubernetes/kubernetes/issues/124336" }, { "type": "WEB", "url": "https://groups.google.com/g/kubernetes-security-announce/c/JxjHf7fkVd8/m/oVCzypyOAQAJ" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2746", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0244.json
{ "schema_version": "1.3.1", "id": "GO-2022-0244", "modified": "0001-01-01T00:00:00Z", "published": "2022-07-15T23:06:26Z", "aliases": [ "CVE-2021-3538", "GHSA-33m6-q9v5-62r7" ], "summary": "Insufficient randomness in UUIDs in github.com/satori/go.uuid", "details": "Random data used to create UUIDs can contain zeros, resulting in predictable UUIDs and possible collisions.", "affected": [ { "package": { "name": "github.com/satori/go.uuid", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "1.2.1-0.20180103161547-0ef6afb2f6cd" }, { "fixed": "1.2.1-0.20180404165556-75cca531ea76" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/satori/go.uuid", "symbols": [ "NewV1", "NewV2", "NewV4", "rfc4122Generator.NewV1", "rfc4122Generator.NewV2", "rfc4122Generator.NewV4", "rfc4122Generator.getClockSequence", "rfc4122Generator.getHardwareAddr" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/satori/go.uuid/pull/75" }, { "type": "FIX", "url": "https://github.com/satori/go.uuid/commit/75cca531ea763666bc46e531da3b4c3b95f64557" }, { "type": "REPORT", "url": "https://github.com/satori/go.uuid/issues/73" } ], "credits": [ { "name": "@josselin-c" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0244", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0758.json
{ "schema_version": "1.3.1", "id": "GO-2022-0758", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2022-35929", "GHSA-vjxv-45g9-9296" ], "summary": "Improper verification of signature attestations in github.com/sigstore/cosign", "details": "Improper verification of signature attestations in github.com/sigstore/cosign", "affected": [ { "package": { "name": "github.com/sigstore/cosign", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.10.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/sigstore/cosign/cmd/cosign/cli/verify", "symbols": [ "VerifyAttestationCommand.Exec" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/sigstore/cosign/security/advisories/GHSA-vjxv-45g9-9296" }, { "type": "FIX", "url": "https://github.com/sigstore/cosign/commit/c5fda01a8ff33ca981f45a9f13e7fb6bd2080b94" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0758", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1571.json
{ "schema_version": "1.3.1", "id": "GO-2023-1571", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2022-41723", "GHSA-vvpx-j8f3-3w6h" ], "summary": "Denial of service via crafted HTTP/2 stream in net/http and golang.org/x/net", "details": "A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests.", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.19.6" }, { "introduced": "1.20.0-0" }, { "fixed": "1.20.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "net/http", "symbols": [ "Client.Do", "Client.Get", "Client.Head", "Client.Post", "Client.PostForm", "Get", "Head", "ListenAndServe", "ListenAndServeTLS", "Post", "PostForm", "Serve", "ServeTLS", "Server.ListenAndServe", "Server.ListenAndServeTLS", "Server.Serve", "Server.ServeTLS", "Transport.RoundTrip" ] } ] } }, { "package": { "name": "golang.org/x/net", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.7.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "golang.org/x/net/http2", "symbols": [ "ClientConn.Close", "ClientConn.Ping", "ClientConn.RoundTrip", "ClientConn.Shutdown", "ConfigureServer", "ConfigureTransport", "ConfigureTransports", "ConnectionError.Error", "ErrCode.String", "FrameHeader.String", "FrameType.String", "FrameWriteRequest.String", "Framer.ReadFrame", "Framer.WriteContinuation", "Framer.WriteData", "Framer.WriteDataPadded", "Framer.WriteGoAway", "Framer.WriteHeaders", "Framer.WritePing", "Framer.WritePriority", "Framer.WritePushPromise", "Framer.WriteRSTStream", "Framer.WriteRawFrame", "Framer.WriteSettings", "Framer.WriteSettingsAck", "Framer.WriteWindowUpdate", "GoAwayError.Error", "ReadFrameHeader", "Server.ServeConn", "Setting.String", "SettingID.String", "SettingsFrame.ForeachSetting", "StreamError.Error", "Transport.CloseIdleConnections", "Transport.NewClientConn", "Transport.RoundTrip", "Transport.RoundTripOpt", "bufferedWriter.Flush", "bufferedWriter.Write", "chunkWriter.Write", "clientConnPool.GetClientConn", "connError.Error", "dataBuffer.Read", "duplicatePseudoHeaderError.Error", "gzipReader.Close", "gzipReader.Read", "headerFieldNameError.Error", "headerFieldValueError.Error", "noDialClientConnPool.GetClientConn", "noDialH2RoundTripper.RoundTrip", "pipe.Read", "priorityWriteScheduler.CloseStream", "priorityWriteScheduler.OpenStream", "pseudoHeaderError.Error", "requestBody.Close", "requestBody.Read", "responseWriter.Flush", "responseWriter.FlushError", "responseWriter.Push", "responseWriter.SetReadDeadline", "responseWriter.SetWriteDeadline", "responseWriter.Write", "responseWriter.WriteHeader", "responseWriter.WriteString", "serverConn.CloseConn", "serverConn.Flush", "stickyErrWriter.Write", "transportResponseBody.Close", "transportResponseBody.Read", "writeData.String" ] }, { "path": "golang.org/x/net/http2/hpack", "symbols": [ "Decoder.DecodeFull", "Decoder.Write", "Decoder.parseFieldLiteral", "Decoder.readString" ] } ] } } ], "references": [ { "type": "REPORT", "url": "https://go.dev/issue/57855" }, { "type": "FIX", "url": "https://go.dev/cl/468135" }, { "type": "FIX", "url": "https://go.dev/cl/468295" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E" } ], "credits": [ { "name": "Philippe Antoine (Catena cyber)" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-1571", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1621.json
{ "schema_version": "1.3.1", "id": "GO-2023-1621", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-24532" ], "summary": "Incorrect calculation on P256 curves in crypto/internal/nistec", "details": "The ScalarMult and ScalarBaseMult methods of the P256 Curve may return an incorrect result if called with some specific unreduced scalars (a scalar larger than the order of the curve).\n\nThis does not impact usages of crypto/ecdsa or crypto/ecdh.", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.19.7" }, { "introduced": "1.20.0-0" }, { "fixed": "1.20.2" } ] } ], "ecosystem_specific": { "imports": [ { "path": "crypto/internal/nistec", "symbols": [ "P256OrdInverse", "P256Point.ScalarBaseMult", "P256Point.ScalarMult" ] } ] } } ], "references": [ { "type": "REPORT", "url": "https://go.dev/issue/58647" }, { "type": "FIX", "url": "https://go.dev/cl/471255" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/3-TpUx48iQY" } ], "credits": [ { "name": "Guido Vranken, via the Ethereum Foundation bug bounty program" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-1621", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2697.json
{ "schema_version": "1.3.1", "id": "GO-2024-2697", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-1313", "GHSA-67rv-qpw2-6qrr" ], "summary": "Grafana: Users outside an organization can delete a snapshot with its key in github.com/grafana/grafana", "details": "Grafana: Users outside an organization can delete a snapshot with its key in github.com/grafana/grafana.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/grafana/grafana from v9.5.0 before v9.5.18, from v10.0.0 before v10.0.13, from v10.1.0 before v10.1.9, from v10.2.0 before v10.2.6, from v10.3.0 before v10.3.5.", "affected": [ { "package": { "name": "github.com/grafana/grafana", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "9.5.0" }, { "fixed": "9.5.18" }, { "introduced": "10.0.0" }, { "fixed": "10.0.13" }, { "introduced": "10.1.0" }, { "fixed": "10.1.9" }, { "introduced": "10.2.0" }, { "fixed": "10.2.6" }, { "introduced": "10.3.0" }, { "fixed": "10.3.5" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/grafana/bugbounty/security/advisories/GHSA-67rv-qpw2-6qrr" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-1313" }, { "type": "WEB", "url": "https://grafana.com/security/security-advisories/cve-2024-1313" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2697", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2692.json
{ "schema_version": "1.3.1", "id": "GO-2024-2692", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-3250", "GHSA-4685-2x5r-65pj" ], "summary": "Pebble service manager's file pull API allows access by any user in github.com/canonical/pebble", "details": "Pebble service manager's file pull API allows access by any user in github.com/canonical/pebble", "affected": [ { "package": { "name": "github.com/canonical/pebble", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.1.1" }, { "introduced": "1.2.0" }, { "fixed": "1.4.2" }, { "introduced": "1.5.0" }, { "fixed": "1.7.3" }, { "introduced": "1.8.0" }, { "fixed": "1.10.2" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/canonical/pebble/security/advisories/GHSA-4685-2x5r-65pj" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3250" }, { "type": "ADVISORY", "url": "https://www.cve.org/CVERecord?id=CVE-2024-3250" }, { "type": "FIX", "url": "https://github.com/canonical/pebble/commit/4ca343d3889533143477e21c63867f2f3c3b5645" }, { "type": "FIX", "url": "https://github.com/canonical/pebble/commit/a5f6f062a11ea156697b854264385ff7e1985fd8" }, { "type": "FIX", "url": "https://github.com/canonical/pebble/commit/b8abd1ff0090f3e0749e81eb1fc3ea16ba95f514" }, { "type": "FIX", "url": "https://github.com/canonical/pebble/commit/cd326225b9b0be067da7d8858e2c912078cbbbd5" }, { "type": "FIX", "url": "https://github.com/canonical/pebble/pull/406" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2692", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2494.json
{ "schema_version": "1.3.1", "id": "GO-2024-2494", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-23652", "GHSA-4v98-7qmw-rqr8" ], "summary": "Host system modification in github.com/moby/buildkit", "details": "A malicious BuildKit frontend or Dockerfile using RUN --mount could trick the feature that removes empty files created for the mountpoints into removing a file outside the container, from the host system.", "affected": [ { "package": { "name": "github.com/moby/buildkit", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.12.5" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/moby/buildkit/executor", "symbols": [ "MountStubsCleaner" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/moby/buildkit/security/advisories/GHSA-4v98-7qmw-rqr8" }, { "type": "FIX", "url": "https://github.com/moby/buildkit/pull/4603" }, { "type": "WEB", "url": "https://github.com/moby/buildkit/releases/tag/v0.12.5" } ], "credits": [ { "name": "@rmcnamara-snyk" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2494", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2513.json
{ "schema_version": "1.3.1", "id": "GO-2024-2513", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2020-12458", "GHSA-3jq7-8ph8-63xm" ], "summary": "Grafana information disclosure in github.com/grafana/grafana", "details": "Grafana information disclosure in github.com/grafana/grafana.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/grafana/grafana before v7.2.1.", "affected": [ { "package": { "name": "github.com/grafana/grafana", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "7.2.1" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-3jq7-8ph8-63xm" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12458" }, { "type": "FIX", "url": "https://github.com/grafana/grafana/commit/102448040d5132460e3b0013e03ebedec0677e00" }, { "type": "REPORT", "url": "https://github.com/grafana/grafana/issues/8283" }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2020-12458" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1827765" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CTQCKJZZYXMCSHJFZZ3YXEO5NUBANGZS" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEBCIEVSYIDDCA7FTRS2IFUOYLIQU34A" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20200518-0001" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2513", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2583.json
{ "schema_version": "1.3.1", "id": "GO-2024-2583", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "GHSA-x5r5-2qrx-rqj8" ], "summary": "Encryption bypass in github.com/edgelesssys/marblerun", "details": "Encryption bypass in github.com/edgelesssys/marblerun", "affected": [ { "package": { "name": "github.com/edgelesssys/marblerun", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.4.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/edgelesssys/marblerun/marble/premain", "symbols": [ "ActivateRPC", "GramineActivate", "PreMain", "PreMainEgo", "PreMainEx", "PreMainMock" ] }, { "path": "github.com/edgelesssys/marblerun/coordinator/core", "symbols": [ "Core.Activate", "Core.setTTLSConfig" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/edgelesssys/marblerun/security/advisories/GHSA-x5r5-2qrx-rqj8" }, { "type": "FIX", "url": "https://github.com/edgelesssys/marblerun/commit/0330ced092253613a07abe7b330ff6ac6fc6e9c6" }, { "type": "FIX", "url": "https://github.com/edgelesssys/marblerun/commit/e5bcfe32883d22f3d87ffc9400f9fdb5ecbe3200" }, { "type": "WEB", "url": "https://github.com/edgelesssys/marblerun/releases/tag/v1.4.1" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2583", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0322.json
{ "schema_version": "1.3.1", "id": "GO-2022-0322", "modified": "0001-01-01T00:00:00Z", "published": "2022-07-15T23:29:02Z", "aliases": [ "CVE-2022-21698", "GHSA-cg3q-j54f-5p7p" ], "related": [ "CVE-2023-25151", "CVE-2023-45142", "GHSA-5r5m-65gx-7vrh", "GHSA-rcjv-mgp8-qvmr" ], "summary": "Uncontrolled resource consumption in github.com/prometheus/client_golang", "details": "The Prometheus client_golang HTTP server is vulnerable to a denial of service attack when handling requests with non-standard HTTP methods.\n\nIn order to be affected, an instrumented software must use any of the promhttp.InstrumentHandler* middleware except RequestsInFlight; not filter any specific methods (e.g GET) before middleware; pass a metric with a \"method\" label name to a middleware; and not have any firewall/LB/proxy that filters away requests with unknown \"method\".", "affected": [ { "package": { "name": "github.com/prometheus/client_golang", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.11.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/prometheus/client_golang/prometheus/promhttp", "symbols": [ "Handler", "HandlerFor", "InstrumentHandlerCounter", "InstrumentHandlerDuration", "InstrumentHandlerRequestSize", "InstrumentHandlerResponseSize", "InstrumentHandlerTimeToWriteHeader", "InstrumentMetricHandler", "InstrumentRoundTripperCounter", "InstrumentRoundTripperDuration", "flusherDelegator.Flush", "readerFromDelegator.ReadFrom", "responseWriterDelegator.Write", "responseWriterDelegator.WriteHeader", "sanitizeMethod" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/prometheus/client_golang/pull/962" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0322", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-1008.json
{ "schema_version": "1.3.1", "id": "GO-2022-1008", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2022-2990", "GHSA-fjm8-m7m6-2fjp" ], "related": [ "CVE-2022-2989", "CVE-2022-2995", "CVE-2022-36109", "CVE-2023-25173", "GHSA-4wjj-jwc9-2x96", "GHSA-hmfx-3pcx-653p", "GHSA-phjr-8j92-w5v7", "GHSA-rc4r-wh2q-q6c4" ], "summary": "Unauthorized file access in github.com/containers/buildah", "details": "SGID programs executed in a container can access files that have negative group permissions for the user's primary group.\n\nConsider a file which is owned by user u1 and group g1, permits user and other read access, and does NOT permit group read access. This file is readable by u1 and all other users except for ones in group g1.\n\nA program with the set-group-ID (SGID) bit set assumes the primary group of the program's group when it executes.\n\nA user with the primary group g1 who executes an SGID program owned by group g2 should not be able to access the file described above. While the program executes with the primary group g2, the group g1 should remain in its supplementary groups, blocking access to the file.\n\nBuildah does not correctly add g1 to the supplementary groups in this scenario, permitting unauthorized access.", "affected": [ { "package": { "name": "github.com/containers/buildah", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.27.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/containers/buildah", "symbols": [ "Builder.Run", "Builder.configureUIDGID" ] } ] } } ], "references": [ { "type": "ARTICLE", "url": "https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/" }, { "type": "FIX", "url": "https://github.com/containers/buildah/commit/4a8bf740e862f2438279c6feee2ea59ddf0cda0b" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-1008", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1752.json
{ "schema_version": "1.3.1", "id": "GO-2023-1752", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-24540" ], "summary": "Improper handling of JavaScript whitespace in html/template", "details": "Not all valid JavaScript whitespace characters are considered to be whitespace. Templates containing whitespace characters outside of the character set \"\\t\\n\\f\\r\\u0020\\u2028\\u2029\" in JavaScript contexts that also contain actions may not be properly sanitized during execution.", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.19.9" }, { "introduced": "1.20.0-0" }, { "fixed": "1.20.4" } ] } ], "ecosystem_specific": { "imports": [ { "path": "html/template", "symbols": [ "Template.Execute", "Template.ExecuteTemplate", "nextJSCtx" ] } ] } } ], "references": [ { "type": "REPORT", "url": "https://go.dev/issue/59721" }, { "type": "FIX", "url": "https://go.dev/cl/491616" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU" } ], "credits": [ { "name": "Juho Nurminen of Mattermost" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-1752", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2961.json
{ "schema_version": "1.3.1", "id": "GO-2024-2961", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2022-30636" ], "summary": "Limited directory traversal vulnerability on Windows in golang.org/x/crypto", "details": "httpTokenCacheKey uses path.Base to extract the expected HTTP-01 token value to lookup in the DirCache implementation. On Windows, path.Base acts differently to filepath.Base, since Windows uses a different path separator (\\ vs. /), allowing a user to provide a relative path, i.e. .well-known/acme-challenge/..\\..\\asd becomes ..\\..\\asd. The extracted path is then suffixed with +http-01, joined with the cache directory, and opened.\n\nSince the controlled path is suffixed with +http-01 before opening, the impact of this is significantly limited, since it only allows reading arbitrary files on the system if and only if they have this suffix.", "affected": [ { "package": { "name": "golang.org/x/crypto", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.0.0-20220525230936-793ad666bf5e" } ] } ], "ecosystem_specific": { "imports": [ { "path": "golang.org/x/crypto/acme/autocert", "goos": [ "windows" ], "symbols": [ "DirCache.Delete", "DirCache.Get", "DirCache.Put", "HostWhitelist", "Manager.GetCertificate", "Manager.Listener", "NewListener", "listener.Accept", "listener.Close" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/408694" }, { "type": "REPORT", "url": "https://go.dev/issue/53082" } ], "credits": [ { "name": "Juho Nurminen of Mattermost" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2961", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0972.json
{ "schema_version": "1.3.1", "id": "GO-2022-0972", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2022-41719", "GHSA-jr77-8gx4-h5qh" ], "summary": "Panic in github.com/shamaton/msgpack/v2", "details": "Unmarshal can panic on some inputs, possibly allowing for denial of service attacks.", "affected": [ { "package": { "name": "github.com/shamaton/msgpack/v2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "2.1.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/shamaton/msgpack/v2", "symbols": [ "Unmarshal" ] } ] } } ], "references": [ { "type": "REPORT", "url": "https://github.com/shamaton/msgpack/issues/31" }, { "type": "FIX", "url": "https://github.com/shamaton/msgpack/pull/32" } ], "credits": [ { "name": "Red Canary" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0972", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2664.json
{ "schema_version": "1.3.1", "id": "GO-2024-2664", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-29892", "GHSA-gp8g-f42f-95q2" ], "summary": "ZITADEL's actions can overload reserved claims in github.com/zitadel/zitadel", "details": "ZITADEL's actions can overload reserved claims in github.com/zitadel/zitadel.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/zitadel/zitadel before v2.42.17, from v2.43.0 before v2.43.11, from v2.44.0 before v2.44.7, from v2.45.0 before v2.45.5, from v2.46.0 before v2.46.5, from v2.47.0 before v2.47.8, from v2.48.0 before v2.48.3.", "affected": [ { "package": { "name": "github.com/zitadel/zitadel", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "2.42.17" }, { "introduced": "2.43.0" }, { "fixed": "2.43.11" }, { "introduced": "2.44.0" }, { "fixed": "2.44.7" }, { "introduced": "2.45.0" }, { "fixed": "2.45.5" }, { "introduced": "2.46.0" }, { "fixed": "2.46.5" }, { "introduced": "2.47.0" }, { "fixed": "2.47.8" }, { "introduced": "2.48.0" }, { "fixed": "2.48.3" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/zitadel/zitadel/security/advisories/GHSA-gp8g-f42f-95q2" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-29892" }, { "type": "WEB", "url": "https://github.com/zitadel/zitadel/releases/tag/v2.42.17" }, { "type": "WEB", "url": "https://github.com/zitadel/zitadel/releases/tag/v2.43.11" }, { "type": "WEB", "url": "https://github.com/zitadel/zitadel/releases/tag/v2.44.7" }, { "type": "WEB", "url": "https://github.com/zitadel/zitadel/releases/tag/v2.45.5" }, { "type": "WEB", "url": "https://github.com/zitadel/zitadel/releases/tag/v2.46.5" }, { "type": "WEB", "url": "https://github.com/zitadel/zitadel/releases/tag/v2.47.8" }, { "type": "WEB", "url": "https://github.com/zitadel/zitadel/releases/tag/v2.48.3" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2664", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2900.json
{ "schema_version": "1.3.1", "id": "GO-2024-2900", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-36129", "GHSA-c74f-6mfw-mm4v" ], "summary": "Denial of Service via Zip/Decompression Bomb sent over HTTP or gRPC in go.opentelemetry.io/collector/config/configgrpc", "details": "An unsafe decompression vulnerability allows unauthenticated attackers to crash the collector via excessive memory consumption.", "affected": [ { "package": { "name": "go.opentelemetry.io/collector/config/configgrpc", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.102.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "go.opentelemetry.io/collector/config/configgrpc", "symbols": [ "ClientConfig.ToClientConn", "getGRPCCompressionName" ] } ] } }, { "package": { "name": "go.opentelemetry.io/collector/config/confighttp", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.102.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "go.opentelemetry.io/collector/config/confighttp", "symbols": [ "ServerConfig.ToServer", "clientInfoHandler.ServeHTTP", "decompressor.ServeHTTP", "httpContentDecompressor" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/open-telemetry/opentelemetry-collector/security/advisories/GHSA-c74f-6mfw-mm4v" }, { "type": "FIX", "url": "https://github.com/open-telemetry/opentelemetry-collector/pull/10289" }, { "type": "FIX", "url": "https://github.com/open-telemetry/opentelemetry-collector/pull/10323" }, { "type": "WEB", "url": "https://opentelemetry.io/blog/2024/cve-2024-36129" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2900", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2916.json
{ "schema_version": "1.3.1", "id": "GO-2024-2916", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-22261", "GHSA-vw63-824v-qf2j" ], "summary": "SQL Injection in Harbor scan log API in github.com/goharbor/harbor", "details": "SQL Injection in Harbor scan log API in github.com/goharbor/harbor", "affected": [ { "package": { "name": "github.com/goharbor/harbor", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "2.8.6+incompatible" }, { "introduced": "2.9.0+incompatible" }, { "fixed": "2.9.4+incompatible" }, { "introduced": "2.10.0+incompatible" }, { "fixed": "2.10.2+incompatible" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/goharbor/harbor/security/advisories/GHSA-vw63-824v-qf2j" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22261" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2916", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2826.json
{ "schema_version": "1.3.1", "id": "GO-2024-2826", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-32886", "GHSA-649x-hxfx-57j2" ], "summary": "Denial of service attack by triggering unbounded memory usage in vitess.io/vitess", "details": "When executing a query, the vtgate will go into an endless loop that also keeps consuming memory and eventually will OOM. This causes a denial of service.", "affected": [ { "package": { "name": "vitess.io/vitess", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.17.7" }, { "introduced": "0.18.0" }, { "fixed": "0.18.5" }, { "introduced": "0.19.0" }, { "fixed": "0.19.4" } ] } ], "ecosystem_specific": { "imports": [ { "path": "vitess.io/vitess/go/mysql/collations/charset", "symbols": [ "Convert", "ConvertFromBinary", "ConvertFromUTF8", "Validate", "convertSlow" ] }, { "path": "vitess.io/vitess/go/mysql/collations/charset/unicode", "symbols": [ "Charset_ucs2.DecodeRune", "Charset_utf16be.DecodeRune", "Charset_utf16be.EncodeRune", "Charset_utf32.EncodeRune" ] }, { "path": "vitess.io/vitess/go/vt/vtgate/evalengine", "symbols": [ "Add", "AggregateEvalTypes", "CoerceTo", "CoerceTypes", "Column.Format", "Column.FormatFast", "Comparison.ApplyTinyWeights", "Comparison.Compare", "Comparison.Less", "Comparison.More", "Comparison.Sort", "Comparison.SortResult", "CompiledExpr.Format", "CompiledExpr.FormatFast", "Divide", "EvalResult.MustBoolean", "EvalResult.String", "EvalResult.ToBoolean", "EvalResult.ToBooleanStrict", "EvalResult.TupleValues", "EvalResult.Value", "ExpressionEnv.Evaluate", "ExpressionEnv.EvaluateVM", "FieldResolver.Column", "IntroducerExpr.eval", "Literal.Format", "Literal.FormatFast", "Merger.Init", "Merger.Pop", "Merger.Push", "Multiply", "NewLiteralBinaryFromBit", "NewLiteralDateFromBytes", "NewLiteralDatetimeFromBytes", "NewLiteralDecimalFromBytes", "NewLiteralFloatFromBytes", "NewLiteralIntegralFromBytes", "NewLiteralTimeFromBytes", "NullSafeAdd", "NullsafeCompare", "NullsafeHashcode", "NullsafeHashcode128", "OrderByParams.Compare", "OrderByParams.String", "Sorter.Push", "Sorter.Sorted", "Subtract", "Translate", "TupleBindVariable.Format", "TupleBindVariable.FormatFast", "TupleExpr.Format", "TupleExpr.FormatFast", "UnsupportedCollationError.Error", "UntypedExpr.Compile", "UntypedExpr.Format", "UntypedExpr.FormatFast", "WeightString", "aggregationDecimal.Add", "aggregationDecimal.Max", "aggregationDecimal.Min", "aggregationFloat.Add", "aggregationFloat.Max", "aggregationFloat.Min", "aggregationInt.Add", "aggregationInt.Max", "aggregationInt.Min", "aggregationMinMax.Max", "aggregationMinMax.Min", "aggregationSumAny.Add", "aggregationSumCount.Add", "aggregationUint.Add", "aggregationUint.Max", "aggregationUint.Min", "argError.Error", "assembler.Fn_JSON_KEYS", "assembler.Fn_REGEXP_REPLACE_slow", "assembler.PushLiteral", "astCompiler.translateIntroducerExpr", "errJSONType.Error", "evalBytes.Hash" ] } ], "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "17.0.7" }, { "introduced": "18.0.0" }, { "fixed": "18.0.5" }, { "introduced": "19.0.0" }, { "fixed": "19.0.4" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/vitessio/vitess/security/advisories/GHSA-649x-hxfx-57j2" }, { "type": "FIX", "url": "https://github.com/vitessio/vitess/commit/2fd5ba1dbf6e9b32fdfdaf869d130066b1b5c0df" }, { "type": "FIX", "url": "https://github.com/vitessio/vitess/commit/9df4b66550e46b5d7079e21ed0e1b0f49f92b055" }, { "type": "FIX", "url": "https://github.com/vitessio/vitess/commit/c46dc5b6a4329a10589ca928392218d96031ac8d" }, { "type": "FIX", "url": "https://github.com/vitessio/vitess/commit/d438adf7e34a6cf00fe441db80842ec669a99202" }, { "type": "WEB", "url": "https://github.com/vitessio/vitess/blob/8f6cfaaa643a08dc111395a75a2d250ee746cfa8/go/mysql/collations/charset/convert.go#L73-L79" }, { "type": "WEB", "url": "https://github.com/vitessio/vitess/blob/8f6cfaaa643a08dc111395a75a2d250ee746cfa8/go/mysql/collations/charset/unicode/utf16.go#L69-L71" } ], "credits": [ { "name": "@dbussink, @mattrobenolt, and @vmg" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2826", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-1083.json
{ "schema_version": "1.3.1", "id": "GO-2022-1083", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2022-43677", "GHSA-59hj-62f5-fgmc" ], "summary": "Panic on malformed messages in github.com/free5gc/aper", "details": "A malformed message can crash the free5gc/amf and free5gc/ngap decoders via an index-out-of-range panic in aper.GetBitString.", "affected": [ { "package": { "name": "github.com/free5gc/aper", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/free5gc/aper", "symbols": [ "GetBitString", "GetBitsValue", "Marshal", "MarshalWithParams", "Unmarshal", "UnmarshalWithParams" ] } ] } } ], "references": [ { "type": "REPORT", "url": "https://github.com/free5gc/free5gc/issues/402" } ], "credits": [ { "name": "@fisherwky" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-1083", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-2186.json
{ "schema_version": "1.3.1", "id": "GO-2023-2186", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-45284" ], "summary": "Incorrect detection of reserved device names on Windows in path/filepath", "details": "On Windows, The IsLocal function does not correctly detect reserved device names in some cases.\n\nReserved names followed by spaces, such as \"COM1 \", and reserved names \"COM\" and \"LPT\" followed by superscript 1, 2, or 3, are incorrectly reported as local.\n\nWith fix, IsLocal now correctly reports these names as non-local.", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.20.11" }, { "introduced": "1.21.0-0" }, { "fixed": "1.21.4" } ] } ], "ecosystem_specific": { "imports": [ { "path": "path/filepath", "symbols": [ "IsLocal" ] } ] } } ], "references": [ { "type": "REPORT", "url": "https://go.dev/issue/63713" }, { "type": "FIX", "url": "https://go.dev/cl/540277" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/4tU8LZfBFkY" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-2186", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2020-0033.json
{ "schema_version": "1.3.1", "id": "GO-2020-0033", "modified": "0001-01-01T00:00:00Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2020-36559", "GHSA-vp56-r7qv-783v" ], "summary": "Path Traversal in aahframe.work", "details": "Due to improper sanitization of user input, HTTPEngine.Handle allows for directory traversal, allowing an attacker to read files outside of the target directory that the server has permission to read.", "affected": [ { "package": { "name": "aahframe.work", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.12.4" } ] } ], "ecosystem_specific": { "imports": [ { "path": "aahframe.work", "symbols": [ "Application.Run", "Application.ServeHTTP", "Application.Start", "HTTPEngine.Handle" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/go-aah/aah/pull/267" }, { "type": "FIX", "url": "https://github.com/go-aah/aah/commit/881dc9f71d1f7a4e8a9a39df9c5c081d3a2da1ec" }, { "type": "REPORT", "url": "https://github.com/go-aah/aah/issues/266" } ], "credits": [ { "name": "@snyff" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2020-0033", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0520.json
{ "schema_version": "1.3.1", "id": "GO-2022-0520", "modified": "0001-01-01T00:00:00Z", "published": "2022-07-28T17:23:05Z", "aliases": [ "CVE-2022-32148" ], "summary": "Exposure of client IP addresses in net/http", "details": "Client IP adresses may be unintentionally exposed via X-Forwarded-For headers.\n\nWhen httputil.ReverseProxy.ServeHTTP is called with a Request.Header map containing a nil value for the X-Forwarded-For header, ReverseProxy sets the client IP as the value of the X-Forwarded-For header, contrary to its documentation.\n\nIn the more usual case where a Director function sets the X-Forwarded-For header value to nil, ReverseProxy leaves the header unmodified as expected.", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.17.12" }, { "introduced": "1.18.0-0" }, { "fixed": "1.18.4" } ] } ], "ecosystem_specific": { "imports": [ { "path": "net/http", "symbols": [ "Header.Clone" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/412857" }, { "type": "FIX", "url": "https://go.googlesource.com/go/+/b2cc0fecc2ccd80e6d5d16542cc684f97b3a9c8a" }, { "type": "REPORT", "url": "https://go.dev/issue/53423" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "credits": [ { "name": "Christian Mehlmauer" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0520", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-1039.json
{ "schema_version": "1.3.1", "id": "GO-2022-1039", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2022-41715" ], "summary": "Memory exhaustion when compiling regular expressions in regexp/syntax", "details": "Programs which compile regular expressions from untrusted sources may be vulnerable to memory exhaustion or denial of service.\n\nThe parsed regexp representation is linear in the size of the input, but in some cases the constant factor can be as high as 40,000, making relatively small regexps consume much larger amounts of memory.\n\nAfter fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Normal use of regular expressions is unaffected.", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.18.7" }, { "introduced": "1.19.0-0" }, { "fixed": "1.19.2" } ] } ], "ecosystem_specific": { "imports": [ { "path": "regexp/syntax", "symbols": [ "Parse", "parse", "parser.factor", "parser.push", "parser.repeat" ] } ] } } ], "references": [ { "type": "REPORT", "url": "https://go.dev/issue/55949" }, { "type": "FIX", "url": "https://go.dev/cl/439356" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU" } ], "credits": [ { "name": "Adam Korczynski (ADA Logics)" }, { "name": "OSS-Fuzz" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-1039", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2784.json
{ "schema_version": "1.3.1", "id": "GO-2024-2784", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2019-11202", "GHSA-xh8x-j8h3-m5ph" ], "summary": "Rancher Recreates Default User With Known Password Despite Deletion in github.com/rancher/rancher", "details": "Rancher Recreates Default User With Known Password Despite Deletion in github.com/rancher/rancher", "affected": [ { "package": { "name": "github.com/rancher/rancher", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "2.0.0+incompatible" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/rancher/rancher", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "2.1.0+incompatible" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/rancher/rancher", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "2.2.0+incompatible" }, { "fixed": "2.2.2+incompatible" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-xh8x-j8h3-m5ph" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11202" }, { "type": "WEB", "url": "https://forums.rancher.com/t/rancher-release-v2-2-2-addresses-rancher-cve-2019-11202-and-stability-issues/13977" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2784", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0083.json
{ "schema_version": "1.3.1", "id": "GO-2021-0083", "modified": "0001-01-01T00:00:00Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2019-12496", "GHSA-vfxc-r2gx-v2vq" ], "summary": "Improper certificate validation in github.com/hybridgroup/gobot", "details": "TLS certificate verification is skipped when connecting to a MQTT server. This allows an attacker who can MITM the connection to read, or forge, messages passed between the client and server.", "affected": [ { "package": { "name": "github.com/hybridgroup/gobot", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.12.1-0.20190521122906-c1aa4f867846" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/hybridgroup/gobot/platforms/mqtt", "symbols": [ "Adaptor.Connect", "Adaptor.newTLSConfig" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/hybridgroup/gobot/commit/c1aa4f867846da4669ecf3bc3318bd96b7ee6f3f" }, { "type": "WEB", "url": "https://github.com/hybridgroup/gobot/releases/tag/v1.13.0" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0083", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2850.json
{ "schema_version": "1.3.1", "id": "GO-2024-2850", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2021-32026", "GHSA-jj54-5q2m-q7pj" ], "summary": "NATS server TLS missing ciphersuite settings when CLI flags used in github.com/nats-io/nats-server", "details": "NATS server TLS missing ciphersuite settings when CLI flags used in github.com/nats-io/nats-server", "affected": [ { "package": { "name": "github.com/nats-io/nats-server", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/nats-io/nats-server/v2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "2.2.3" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/nats-io/nats-server/security/advisories/GHSA-jj54-5q2m-q7pj" }, { "type": "FIX", "url": "https://github.com/nats-io/nats-server/commit/ffccc2e1bd7aa2466bd9e631e976bfd7ca46f225" }, { "type": "WEB", "url": "https://advisories.nats.io" }, { "type": "WEB", "url": "https://advisories.nats.io/CVE/CVE-2021-32026.txt" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2850", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-1180.json
{ "schema_version": "1.3.1", "id": "GO-2022-1180", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2022-47633", "GHSA-m3cq-xcx9-3gvm" ], "summary": "Verification rule bypass in github.com/kyverno/kyverno", "details": "A malicious proxy/registry can bypass verifyImages rules.", "affected": [ { "package": { "name": "github.com/kyverno/kyverno", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "1.8.3" }, { "fixed": "1.8.5" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/kyverno/kyverno/pkg/engine", "symbols": [ "imageVerifier.verifyAttestation", "imageVerifier.verifyAttestations", "imageVerifier.verifyAttestorSet", "imageVerifier.verifyAttestors", "imageVerifier.verifyImage" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/kyverno/kyverno/security/advisories/GHSA-m3cq-xcx9-3gvm" }, { "type": "FIX", "url": "https://github.com/kyverno/kyverno/pull/5713" } ], "credits": [ { "name": "@slashben" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-1180", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1713.json
{ "schema_version": "1.3.1", "id": "GO-2023-1713", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-1800", "GHSA-xq3x-grrj-fj6x" ], "summary": "Path traversal in github.com/sjqzhang/go-fastdfs", "details": "An attacker can craft a remote request to upload a file to \"/group1/upload\" that uses path traversal to instead write the file contents to an attacker controlled path on the server.", "affected": [ { "package": { "name": "github.com/sjqzhang/go-fastdfs", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.4.5-0.20230408141131-61cbff5124c6" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/sjqzhang/go-fastdfs/server", "symbols": [ "HttpHandler.ServeHTTP", "Server.ConsumerUpload", "Server.CrossOrigin", "Server.Download", "Server.DownloadNormalFileByURI", "Server.Start", "Server.Upload", "Server.upload", "Start" ] } ] } } ], "references": [ { "type": "WEB", "url": "https://github.com/yangyanglo/ForCVE/blob/93a16663cd32a36d37d8a0f0102e1592254d0279/2023-0x05.md" }, { "type": "WEB", "url": "https://vuldb.com/?ctiid.224768" }, { "type": "WEB", "url": "https://vuldb.com/?id.224768" }, { "type": "FIX", "url": "https://github.com/sjqzhang/go-fastdfs/commit/61cbff5124c61e292994099372b11c06cdb5b80b" }, { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-xq3x-grrj-fj6x" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-1713", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2645.json
{ "schema_version": "1.3.1", "id": "GO-2024-2645", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-27920", "GHSA-w5wx-6g2r-r78q" ], "summary": "Nuclei allows unsigned code template execution through workflows in github.com/projectdiscovery/nuclei", "details": "Nuclei allows unsigned code template execution through workflows in github.com/projectdiscovery/nuclei", "affected": [ { "package": { "name": "github.com/projectdiscovery/nuclei", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/projectdiscovery/nuclei/v2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/projectdiscovery/nuclei/v3", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "3.0.0" }, { "fixed": "3.2.0" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/projectdiscovery/nuclei/security/advisories/GHSA-w5wx-6g2r-r78q" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27920" }, { "type": "FIX", "url": "https://github.com/projectdiscovery/nuclei/commit/e86f38299765b82ad724fdb701557e0eaff3884d" }, { "type": "FIX", "url": "https://github.com/projectdiscovery/nuclei/pull/4822" }, { "type": "WEB", "url": "https://docs.projectdiscovery.io/templates/protocols/code" }, { "type": "WEB", "url": "https://docs.projectdiscovery.io/templates/reference/template-signing" }, { "type": "WEB", "url": "https://docs.projectdiscovery.io/templates/workflows/overview" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2645", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0265.json
{ "schema_version": "1.3.1", "id": "GO-2021-0265", "modified": "0001-01-01T00:00:00Z", "published": "2022-08-15T18:06:07Z", "aliases": [ "CVE-2021-42248", "CVE-2021-42836", "GHSA-c9gm-7rfj-8w5h", "GHSA-ppj4-34rq-v8j9" ], "summary": "Denial of service via maliciously crafted path in github.com/tidwall/gjson", "details": "A maliciously crafted path can cause Get and other query functions to consume excessive amounts of CPU and time.", "affected": [ { "package": { "name": "github.com/tidwall/gjson", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.9.3" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/tidwall/gjson", "symbols": [ "Get", "GetBytes", "GetMany", "GetManyBytes", "Result.Get", "parseObject", "queryMatches" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/tidwall/gjson/commit/77a57fda87dca6d0d7d4627d512a630f89a91c96" }, { "type": "WEB", "url": "https://github.com/tidwall/gjson/issues/237" }, { "type": "WEB", "url": "https://github.com/tidwall/gjson/issues/236" }, { "type": "WEB", "url": "https://github.com/tidwall/gjson/commit/590010fdac311cc8990ef5c97448d4fec8f29944" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0265", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2699.json
{ "schema_version": "1.3.1", "id": "GO-2024-2699", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-28224", "GHSA-5jx5-hqx5-2vrj" ], "summary": "Ollama DNS rebinding vulnerability in github.com/jmorganca/ollama", "details": "Ollama DNS rebinding vulnerability in github.com/jmorganca/ollama", "affected": [ { "package": { "name": "github.com/jmorganca/ollama", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.1.29" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-5jx5-hqx5-2vrj" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-28224" }, { "type": "WEB", "url": "https://github.com/ollama/ollama/releases" }, { "type": "WEB", "url": "https://research.nccgroup.com/2024/04/08/technical-advisory-ollama-dns-rebinding-attack-cve-2024-28224" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2699", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1704.json
{ "schema_version": "1.3.1", "id": "GO-2023-1704", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-24534" ], "summary": "Excessive memory allocation in net/http and net/textproto", "details": "HTTP and MIME header parsing can allocate large amounts of memory, even when parsing small inputs, potentially leading to a denial of service.\n\nCertain unusual patterns of input data can cause the common function used to parse HTTP and MIME headers to allocate substantially more memory than required to hold the parsed headers. An attacker can exploit this behavior to cause an HTTP server to allocate large amounts of memory from a small request, potentially leading to memory exhaustion and a denial of service.\n\nWith fix, header parsing now correctly allocates only the memory required to hold parsed headers.", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.19.8" }, { "introduced": "1.20.0-0" }, { "fixed": "1.20.3" } ] } ], "ecosystem_specific": { "imports": [ { "path": "net/textproto", "symbols": [ "Reader.ReadMIMEHeader", "Reader.upcomingHeaderNewlines", "readMIMEHeader" ] } ] } } ], "references": [ { "type": "REPORT", "url": "https://go.dev/issue/58975" }, { "type": "FIX", "url": "https://go.dev/cl/481994" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8" } ], "credits": [ { "name": "Jakob Ackermann (@das7pad)" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-1704", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-2394.json
{ "schema_version": "1.3.1", "id": "GO-2023-2394", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-50463", "GHSA-rxg9-hgq7-8pwx" ], "summary": "Spoofed source IP address in github.com/shift72/caddy-geo-ip", "details": "The caddy-geo-ip (aka GeoIP) middleware for Caddy 2 allows attackers to spoof their source IP address via an X-Forwarded-For header, which may bypass a protection mechanism (trusted_proxy directive in reverse_proxy or IP address range restrictions).", "affected": [ { "package": { "name": "github.com/shift72/caddy-geo-ip", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/shift72/caddy-geo-ip" } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-50463" }, { "type": "REPORT", "url": "https://github.com/shift72/caddy-geo-ip/issues/4" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-2394", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2719.json
{ "schema_version": "1.3.1", "id": "GO-2024-2719", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-29903", "GHSA-95pr-fxf5-86gv" ], "summary": "Cosign malicious artifacts can cause machine-wide DoS in github.com/sigstore/cosign", "details": "Cosign malicious artifacts can cause machine-wide DoS in github.com/sigstore/cosign", "affected": [ { "package": { "name": "github.com/sigstore/cosign", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/sigstore/cosign/v2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "2.2.4" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/sigstore/cosign/security/advisories/GHSA-95pr-fxf5-86gv" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-29903" }, { "type": "FIX", "url": "https://github.com/sigstore/cosign/commit/629f5f8fa672973503edde75f84dcd984637629e" }, { "type": "WEB", "url": "https://github.com/sigstore/cosign/blob/14795db16417579fac0c00c11e166868d7976b61/pkg/cosign/verify.go#L948-L955" }, { "type": "WEB", "url": "https://github.com/sigstore/cosign/blob/286a98a4a99c1b2f32f84b0d560e324100312280/pkg/oci/remote/signatures.go#L56-L70" }, { "type": "WEB", "url": "https://github.com/sigstore/cosign/releases/tag/v2.2.4" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2719", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2020-0006.json
{ "schema_version": "1.3.1", "id": "GO-2020-0006", "modified": "0001-01-01T00:00:00Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2017-15133", "GHSA-p55x-7x9v-q8m4" ], "summary": "Denial of service via open idle connection in github.com/miekg/dns", "details": "An attacker may prevent TCP connections to a Server by opening a connection and leaving it idle, until the connection is closed by the server no other connections will be accepted.", "affected": [ { "package": { "name": "github.com/miekg/dns", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.0.4-0.20180125103619-43913f2f4fbd" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/miekg/dns", "symbols": [ "ActivateAndServe", "ListenAndServe", "ListenAndServeTLS", "Server.ActivateAndServe", "Server.ListenAndServe", "Server.serveTCP" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/miekg/dns/pull/631" }, { "type": "FIX", "url": "https://github.com/miekg/dns/commit/43913f2f4fbd7dcff930b8a809e709591e4dd79e" } ], "credits": [ { "name": "Pedro Sampaio" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2020-0006", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1751.json
{ "schema_version": "1.3.1", "id": "GO-2023-1751", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-24539" ], "summary": "Improper sanitization of CSS values in html/template", "details": "Angle brackets (\u003c\u003e) are not considered dangerous characters when inserted into CSS contexts. Templates containing multiple actions separated by a '/' character can result in unexpectedly closing the CSS context and allowing for injection of unexpected HTML, if executed with untrusted input.", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.19.9" }, { "introduced": "1.20.0-0" }, { "fixed": "1.20.4" } ] } ], "ecosystem_specific": { "imports": [ { "path": "html/template", "symbols": [ "Template.Execute", "Template.ExecuteTemplate", "cssValueFilter", "escaper.commit" ] } ] } } ], "references": [ { "type": "REPORT", "url": "https://go.dev/issue/59720" }, { "type": "FIX", "url": "https://go.dev/cl/491615" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU" } ], "credits": [ { "name": "Juho Nurminen of Mattermost" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-1751", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2922.json
{ "schema_version": "1.3.1", "id": "GO-2024-2922", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-37307", "GHSA-wh78-7948-358j" ], "summary": "Cilium leaks sensitive information in cilium-bugtool in github.com/cilium/cilium", "details": "Cilium leaks sensitive information in cilium-bugtool in github.com/cilium/cilium", "affected": [ { "package": { "name": "github.com/cilium/cilium", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "1.13.0" }, { "fixed": "1.13.17" }, { "introduced": "1.14.0" }, { "fixed": "1.14.12" }, { "introduced": "1.15.0" }, { "fixed": "1.15.6" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/cilium/cilium/security/advisories/GHSA-wh78-7948-358j" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-37307" }, { "type": "FIX", "url": "https://github.com/cilium/cilium/commit/0191b1ebcfdd61cefd06da0315a0e7d504167407" }, { "type": "FIX", "url": "https://github.com/cilium/cilium/commit/224e288a5bf40d0bb0f16c9413693b319633431a" }, { "type": "FIX", "url": "https://github.com/cilium/cilium/commit/9299c0fd0024e33397cffc666ff851e82af28741" }, { "type": "FIX", "url": "https://github.com/cilium/cilium/commit/958d7b77274bf2c272d8cdfd812631d644250653" }, { "type": "FIX", "url": "https://github.com/cilium/cilium/commit/9eb25ba40391a9b035d7e66401b862818f4aac4b" }, { "type": "FIX", "url": "https://github.com/cilium/cilium/commit/bf9a1ae1b2d2b2c9cca329d7aa96aa4858032a61" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2922", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0435.json
{ "schema_version": "1.3.1", "id": "GO-2022-0435", "modified": "0001-01-01T00:00:00Z", "published": "2022-05-20T21:17:46Z", "aliases": [ "CVE-2022-28327" ], "summary": "Panic due to large inputs affecting P-256 curves in crypto/elliptic", "details": "A crafted scalar input longer than 32 bytes can cause P256().ScalarMult or P256().ScalarBaseMult to panic. Indirect uses through crypto/ecdsa and crypto/tls are unaffected. amd64, arm64, ppc64le, and s390x are unaffected.", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.17.9" }, { "introduced": "1.18.0-0" }, { "fixed": "1.18.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "crypto/elliptic", "symbols": [ "CurveParams.ScalarBaseMult", "CurveParams.ScalarMult", "p256Curve.CombinedMult", "p256Curve.ScalarBaseMult", "p256Curve.ScalarMult", "p256GetScalar" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/397135" }, { "type": "FIX", "url": "https://go.googlesource.com/go/+/37065847d87df92b5eb246c88ba2085efcf0b331" }, { "type": "REPORT", "url": "https://go.dev/issue/52075" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8" } ], "credits": [ { "name": "Project Wycheproof" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0435", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0386.json
{ "schema_version": "1.3.1", "id": "GO-2022-0386", "modified": "0001-01-01T00:00:00Z", "published": "2022-07-01T20:11:22Z", "aliases": [ "CVE-2021-3127", "GHSA-62mh-w5cv-p88c", "GHSA-9r5x-fjv3-q6h4", "GHSA-j756-f273-xhp4" ], "summary": "Import token permissions checking not enforced in github.com/nats-io/jwt", "details": "Import tokens valid for one account may be used for any other account.\n\nValidation of Import token bindings incorrectly warns on mismatches, rather than rejecting the Goken. This permits a token for one account to be used for any other account.", "affected": [ { "package": { "name": "github.com/nats-io/jwt", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.2.3-0.20210314221642-a826c77dc9d2" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/nats-io/jwt", "symbols": [ "Account.Validate", "AccountClaims.Validate", "ActivationClaims.Validate", "Import.Validate", "Imports.Validate" ] } ] } }, { "package": { "name": "github.com/nats-io/jwt/v2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "2.0.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/nats-io/jwt/v2", "symbols": [ "Account.Validate", "AccountClaims.Validate", "Import.Validate", "Imports.Validate" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://advisories.nats.io/CVE/CVE-2021-3127.txt" }, { "type": "FIX", "url": "https://github.com/nats-io/jwt/pull/149" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0386", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1269.json
{ "schema_version": "1.3.1", "id": "GO-2023-1269", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-22460", "GHSA-c653-6hhg-9x92" ], "summary": "Panic in encoding in github.com/ipld/go-ipld-prime", "details": "Encoding data using the 'json' codec which contains a 'Bytes' type Node will cause the encoder to panic. The decoder is not impacted. If the codec is used to encode user supplied data, this may be used as a vector for a denial of service attack.", "affected": [ { "package": { "name": "github.com/ipld/go-ipld-prime", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.19.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/ipld/go-ipld-prime/codec/dagjson", "symbols": [ "Encode", "EncodeOptions.Encode", "Marshal" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/ipld/go-ipld-prime/security/advisories/GHSA-c653-6hhg-9x92" }, { "type": "FIX", "url": "https://github.com/ipld/go-ipld-prime/pull/472" } ], "credits": [ { "name": "@hacdias" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-1269", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0460.json
{ "schema_version": "1.3.1", "id": "GO-2022-0460", "modified": "0001-01-01T00:00:00Z", "published": "2022-07-01T20:07:34Z", "aliases": [ "CVE-2022-29190", "GHSA-cm8f-h6j3-p25c" ], "summary": "Infinite loop in github.com/pion/dtls/v2", "details": "An attacker can send packets that send the DTLS server or client into an infinite loop.", "affected": [ { "package": { "name": "github.com/pion/dtls/v2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "2.1.4" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/pion/dtls/v2", "symbols": [ "Client", "ClientWithContext", "Dial", "DialWithContext", "Resume", "Server", "ServerWithContext", "fragmentBuffer.pop", "handshakeFSM.Run", "listener.Accept" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/pion/dtls/commit/e0b2ce3592e8e7d73713ac67b363a2e192a4cecf" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0460", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2431.json
{ "schema_version": "1.3.1", "id": "GO-2024-2431", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-46740", "GHSA-4248-p65p-hcrm" ], "summary": "Insecure random string generator used for sensitive data in github.com/cubefs/cubefs", "details": "Insecure random string generator used for sensitive data in github.com/cubefs/cubefs.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/cubefs/cubefs before v3.3.1.", "affected": [ { "package": { "name": "github.com/cubefs/cubefs", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "3.3.1" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/cubefs/cubefs/security/advisories/GHSA-4248-p65p-hcrm" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-46740" }, { "type": "FIX", "url": "https://github.com/cubefs/cubefs/commit/8555c6402794cabdf2cc025c8bea1576122c07ba" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2431", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2687.json
{ "schema_version": "1.3.1", "id": "GO-2024-2687", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-45288", "GHSA-4v7x-pqxf-cx7m" ], "summary": "HTTP/2 CONTINUATION flood in net/http", "details": "An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames.\n\nMaintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed.\n\nThis permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send.\n\nThe fix sets a limit on the amount of excess header frames we will process before closing a connection.", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.21.9" }, { "introduced": "1.22.0-0" }, { "fixed": "1.22.2" } ] } ], "ecosystem_specific": { "imports": [ { "path": "net/http", "symbols": [ "CanonicalHeaderKey", "Client.CloseIdleConnections", "Client.Do", "Client.Get", "Client.Head", "Client.Post", "Client.PostForm", "Cookie.String", "Cookie.Valid", "Dir.Open", "Error", "Get", "HandlerFunc.ServeHTTP", "Head", "Header.Add", "Header.Del", "Header.Get", "Header.Set", "Header.Values", "Header.Write", "Header.WriteSubset", "ListenAndServe", "ListenAndServeTLS", "NewRequest", "NewRequestWithContext", "NotFound", "ParseTime", "Post", "PostForm", "ProxyFromEnvironment", "ReadRequest", "ReadResponse", "Redirect", "Request.AddCookie", "Request.BasicAuth", "Request.FormFile", "Request.FormValue", "Request.MultipartReader", "Request.ParseForm", "Request.ParseMultipartForm", "Request.PostFormValue", "Request.Referer", "Request.SetBasicAuth", "Request.UserAgent", "Request.Write", "Request.WriteProxy", "Response.Cookies", "Response.Location", "Response.Write", "ResponseController.EnableFullDuplex", "ResponseController.Flush", "ResponseController.Hijack", "ResponseController.SetReadDeadline", "ResponseController.SetWriteDeadline", "Serve", "ServeContent", "ServeFile", "ServeMux.ServeHTTP", "ServeTLS", "Server.Close", "Server.ListenAndServe", "Server.ListenAndServeTLS", "Server.Serve", "Server.ServeTLS", "Server.SetKeepAlivesEnabled", "Server.Shutdown", "SetCookie", "Transport.CancelRequest", "Transport.Clone", "Transport.CloseIdleConnections", "Transport.RoundTrip", "body.Close", "body.Read", "bodyEOFSignal.Close", "bodyEOFSignal.Read", "bodyLocked.Read", "bufioFlushWriter.Write", "cancelTimerBody.Close", "cancelTimerBody.Read", "checkConnErrorWriter.Write", "chunkWriter.Write", "connReader.Read", "connectMethodKey.String", "expectContinueReader.Close", "expectContinueReader.Read", "extraHeader.Write", "fileHandler.ServeHTTP", "fileTransport.RoundTrip", "globalOptionsHandler.ServeHTTP", "gzipReader.Close", "gzipReader.Read", "http2ClientConn.Close", "http2ClientConn.Ping", "http2ClientConn.RoundTrip", "http2ClientConn.Shutdown", "http2ConnectionError.Error", "http2ErrCode.String", "http2FrameHeader.String", "http2FrameType.String", "http2FrameWriteRequest.String", "http2Framer.ReadFrame", "http2Framer.WriteContinuation", "http2Framer.WriteData", "http2Framer.WriteDataPadded", "http2Framer.WriteGoAway", "http2Framer.WriteHeaders", "http2Framer.WritePing", "http2Framer.WritePriority", "http2Framer.WritePushPromise", "http2Framer.WriteRSTStream", "http2Framer.WriteRawFrame", "http2Framer.WriteSettings", "http2Framer.WriteSettingsAck", "http2Framer.WriteWindowUpdate", "http2Framer.readMetaFrame", "http2GoAwayError.Error", "http2Server.ServeConn", "http2Setting.String", "http2SettingID.String", "http2SettingsFrame.ForeachSetting", "http2StreamError.Error", "http2Transport.CloseIdleConnections", "http2Transport.NewClientConn", "http2Transport.RoundTrip", "http2Transport.RoundTripOpt", "http2bufferedWriter.Flush", "http2bufferedWriter.Write", "http2chunkWriter.Write", "http2clientConnPool.GetClientConn", "http2connError.Error", "http2dataBuffer.Read", "http2duplicatePseudoHeaderError.Error", "http2gzipReader.Close", "http2gzipReader.Read", "http2headerFieldNameError.Error", "http2headerFieldValueError.Error", "http2noDialClientConnPool.GetClientConn", "http2noDialH2RoundTripper.RoundTrip", "http2pipe.Read", "http2priorityWriteScheduler.CloseStream", "http2priorityWriteScheduler.OpenStream", "http2pseudoHeaderError.Error", "http2requestBody.Close", "http2requestBody.Read", "http2responseWriter.Flush", "http2responseWriter.FlushError", "http2responseWriter.Push", "http2responseWriter.SetReadDeadline", "http2responseWriter.SetWriteDeadline", "http2responseWriter.Write", "http2responseWriter.WriteHeader", "http2responseWriter.WriteString", "http2roundRobinWriteScheduler.OpenStream", "http2serverConn.CloseConn", "http2serverConn.Flush", "http2stickyErrWriter.Write", "http2transportResponseBody.Close", "http2transportResponseBody.Read", "http2writeData.String", "initALPNRequest.ServeHTTP", "loggingConn.Close", "loggingConn.Read", "loggingConn.Write", "maxBytesReader.Close", "maxBytesReader.Read", "onceCloseListener.Close", "persistConn.Read", "persistConnWriter.ReadFrom", "persistConnWriter.Write", "populateResponse.Write", "populateResponse.WriteHeader", "readTrackingBody.Close", "readTrackingBody.Read", "readWriteCloserBody.Read", "redirectHandler.ServeHTTP", "response.Flush", "response.FlushError", "response.Hijack", "response.ReadFrom", "response.Write", "response.WriteHeader", "response.WriteString", "serverHandler.ServeHTTP", "socksDialer.DialWithConn", "socksUsernamePassword.Authenticate", "stringWriter.WriteString", "timeoutHandler.ServeHTTP", "timeoutWriter.Write", "timeoutWriter.WriteHeader", "transportReadFromServerError.Error" ] } ] } }, { "package": { "name": "golang.org/x/net", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.23.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "golang.org/x/net/http2", "symbols": [ "ClientConn.Close", "ClientConn.Ping", "ClientConn.RoundTrip", "ClientConn.Shutdown", "ConfigureServer", "ConfigureTransport", "ConfigureTransports", "ConnectionError.Error", "ErrCode.String", "FrameHeader.String", "FrameType.String", "FrameWriteRequest.String", "Framer.ReadFrame", "Framer.WriteContinuation", "Framer.WriteData", "Framer.WriteDataPadded", "Framer.WriteGoAway", "Framer.WriteHeaders", "Framer.WritePing", "Framer.WritePriority", "Framer.WritePushPromise", "Framer.WriteRSTStream", "Framer.WriteRawFrame", "Framer.WriteSettings", "Framer.WriteSettingsAck", "Framer.WriteWindowUpdate", "Framer.readMetaFrame", "GoAwayError.Error", "ReadFrameHeader", "Server.ServeConn", "Setting.String", "SettingID.String", "SettingsFrame.ForeachSetting", "StreamError.Error", "Transport.CloseIdleConnections", "Transport.NewClientConn", "Transport.RoundTrip", "Transport.RoundTripOpt", "bufferedWriter.Flush", "bufferedWriter.Write", "chunkWriter.Write", "clientConnPool.GetClientConn", "connError.Error", "dataBuffer.Read", "duplicatePseudoHeaderError.Error", "gzipReader.Close", "gzipReader.Read", "headerFieldNameError.Error", "headerFieldValueError.Error", "noDialClientConnPool.GetClientConn", "noDialH2RoundTripper.RoundTrip", "pipe.Read", "priorityWriteScheduler.CloseStream", "priorityWriteScheduler.OpenStream", "pseudoHeaderError.Error", "requestBody.Close", "requestBody.Read", "responseWriter.Flush", "responseWriter.FlushError", "responseWriter.Push", "responseWriter.SetReadDeadline", "responseWriter.SetWriteDeadline", "responseWriter.Write", "responseWriter.WriteHeader", "responseWriter.WriteString", "roundRobinWriteScheduler.OpenStream", "serverConn.CloseConn", "serverConn.Flush", "stickyErrWriter.Write", "transportResponseBody.Close", "transportResponseBody.Read", "writeData.String" ] } ] } } ], "references": [ { "type": "REPORT", "url": "https://go.dev/issue/65051" }, { "type": "FIX", "url": "https://go.dev/cl/576155" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/YgW0sx8mN3M" } ], "credits": [ { "name": "Bartek Nowotarski (https://nowotarski.info/)" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2687", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0979.json
{ "schema_version": "1.3.1", "id": "GO-2022-0979", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2022-3346", "GHSA-87mm-qxm5-cp3f" ], "summary": "Incorrect DNSSEC validation due to unchecked owner names in github.com/peterzen/goresolver", "details": "DNSSEC validation is not performed correctly. An attacker can cause this package to report successful validation for invalid, attacker-controlled records.\n\nThe owner name of RRSIG RRs is not validated, permitting an attacker to present the RRSIG for an attacker-controlled domain in a response for any other domain.", "affected": [ { "package": { "name": "github.com/peterzen/goresolver", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/peterzen/goresolver" } ] } } ], "references": [ { "type": "REPORT", "url": "https://github.com/peterzen/goresolver/issues/5" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0979", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0587.json
{ "schema_version": "1.3.1", "id": "GO-2022-0587", "modified": "0001-01-01T00:00:00Z", "published": "2022-05-20T00:00:26Z", "aliases": [ "CVE-2022-28946", "GHSA-x7f3-62pm-9p38" ], "summary": "Out of bounds memory access in github.com/open-policy-agent/opa", "details": "An issue in ast.Parser in Open Policy Agent causes the application to incorrectly interpret expressions, allowing a Denial of Service (DoS) via triggering out-of-range memory access.", "affected": [ { "package": { "name": "github.com/open-policy-agent/opa", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.40.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/open-policy-agent/opa/ast", "symbols": [ "CompileModules", "CompileModulesWithOpt", "MustCompileModules", "MustCompileModulesWithOpts", "MustParseBody", "MustParseBodyWithOpts", "MustParseExpr", "MustParseImports", "MustParseModule", "MustParseModuleWithOpts", "MustParsePackage", "MustParseRef", "MustParseRule", "MustParseStatement", "MustParseStatements", "MustParseTerm", "ParseBody", "ParseBodyWithOpts", "ParseExpr", "ParseImports", "ParseModule", "ParseModuleWithOpts", "ParsePackage", "ParseRef", "ParseRule", "ParseStatement", "ParseStatements", "ParseStatementsWithOpts", "ParseTerm", "Parser.Parse", "Parser.parseEvery", "Parser.parseSome", "metadataParser.Parse" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/open-policy-agent/opa/pull/4548" }, { "type": "FIX", "url": "https://github.com/open-policy-agent/opa/commit/e9d3828db670cbe11129885f37f08cbf04935264" } ], "credits": [ { "name": "Norbert Szetei of Doyensec" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0587", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1753.json
{ "schema_version": "1.3.1", "id": "GO-2023-1753", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-29400" ], "summary": "Improper handling of empty HTML attributes in html/template", "details": "Templates containing actions in unquoted HTML attributes (e.g. \"attr={{.}}\") executed with empty input can result in output with unexpected results when parsed due to HTML normalization rules. This may allow injection of arbitrary attributes into tags.", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.19.9" }, { "introduced": "1.20.0-0" }, { "fixed": "1.20.4" } ] } ], "ecosystem_specific": { "imports": [ { "path": "html/template", "symbols": [ "Template.Execute", "Template.ExecuteTemplate", "appendCmd", "htmlNospaceEscaper" ] } ] } } ], "references": [ { "type": "REPORT", "url": "https://go.dev/issue/59722" }, { "type": "FIX", "url": "https://go.dev/cl/491617" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU" } ], "credits": [ { "name": "Juho Nurminen of Mattermost" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-1753", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0521.json
{ "schema_version": "1.3.1", "id": "GO-2022-0521", "modified": "0001-01-01T00:00:00Z", "published": "2022-07-20T17:02:04Z", "aliases": [ "CVE-2022-28131" ], "summary": "Stack exhaustion from deeply nested XML documents in encoding/xml", "details": "Calling Decoder.Skip when parsing a deeply nested XML document can cause a panic due to stack exhaustion.", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.17.12" }, { "introduced": "1.18.0-0" }, { "fixed": "1.18.4" } ] } ], "ecosystem_specific": { "imports": [ { "path": "encoding/xml", "symbols": [ "Decoder.Skip" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/417062" }, { "type": "FIX", "url": "https://go.googlesource.com/go/+/08c46ed43d80bbb67cb904944ea3417989be4af3" }, { "type": "REPORT", "url": "https://go.dev/issue/53614" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "credits": [ { "name": "Go Security Team" }, { "name": "Juho Nurminen of Mattermost" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0521", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2898.json
{ "schema_version": "1.3.1", "id": "GO-2024-2898", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-36106", "GHSA-3cqf-953p-h5cp" ], "summary": "Argo-cd authenticated users can enumerate clusters by name in github.com/argoproj/argo-cd", "details": "Argo-cd authenticated users can enumerate clusters by name in github.com/argoproj/argo-cd", "affected": [ { "package": { "name": "github.com/argoproj/argo-cd", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0.11.0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/argoproj/argo-cd/v2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "2.9.17" }, { "introduced": "2.10.0" }, { "fixed": "2.10.12" }, { "introduced": "2.11.0" }, { "fixed": "2.11.3" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-3cqf-953p-h5cp" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-36106" }, { "type": "FIX", "url": "https://github.com/argoproj/argo-cd/commit/c2647055c261a550e5da075793260f6524e65ad9" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2898", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2852.json
{ "schema_version": "1.3.1", "id": "GO-2024-2852", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2022-31107", "GHSA-mx47-6497-3fv2" ], "summary": "Grafana account takeover via OAuth vulnerability in github.com/grafana/grafana", "details": "Grafana account takeover via OAuth vulnerability in github.com/grafana/grafana.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/grafana/grafana from v5.3.0 before v8.3.10, from v8.4.0 before v8.4.10, from v8.5.0 before v8.5.9, from v9.0.0 before v9.0.3.", "affected": [ { "package": { "name": "github.com/grafana/grafana", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "5.3.0" }, { "fixed": "8.3.10" }, { "introduced": "8.4.0" }, { "fixed": "8.4.10" }, { "introduced": "8.5.0" }, { "fixed": "8.5.9" }, { "introduced": "9.0.0" }, { "fixed": "9.0.3" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/grafana/grafana/security/advisories/GHSA-mx47-6497-3fv2" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31107" }, { "type": "WEB", "url": "https://grafana.com/docs/grafana/next/release-notes/release-notes-8-4-10" }, { "type": "WEB", "url": "https://grafana.com/docs/grafana/next/release-notes/release-notes-8-5-9" }, { "type": "WEB", "url": "https://grafana.com/docs/grafana/next/release-notes/release-notes-9-0-3" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20220901-0010" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2852", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0525.json
{ "schema_version": "1.3.1", "id": "GO-2022-0525", "modified": "0001-01-01T00:00:00Z", "published": "2022-07-25T17:34:18Z", "aliases": [ "CVE-2022-1705" ], "summary": "Improper sanitization of Transfer-Encoding headers in net/http", "details": "The HTTP/1 client accepted some invalid Transfer-Encoding headers as indicating a \"chunked\" encoding. This could potentially allow for request smuggling, but only if combined with an intermediate server that also improperly failed to reject the header as invalid.", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.17.12" }, { "introduced": "1.18.0-0" }, { "fixed": "1.18.4" } ] } ], "ecosystem_specific": { "imports": [ { "path": "net/http", "symbols": [ "transferReader.parseTransferEncoding" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/409874" }, { "type": "FIX", "url": "https://go.googlesource.com/go/+/e5017a93fcde94f09836200bca55324af037ee5f" }, { "type": "REPORT", "url": "https://go.dev/issue/53188" }, { "type": "FIX", "url": "https://go.dev/cl/410714" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "credits": [ { "name": "Zeyu Zhang (https://www.zeyu2001.com/)" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0525", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1766.json
{ "schema_version": "1.3.1", "id": "GO-2023-1766", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-25568", "GHSA-m974-xj4j-7qv5", "GHSA-q3j6-22wf-3jh9" ], "summary": "Denial of service from memory leak in github.com/ipfs/go-libipfs", "details": "An attacker can cause a Bitswap server to allocate and leak unbounded amounts of memory.", "affected": [ { "package": { "name": "github.com/ipfs/go-libipfs", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.4.1" }, { "introduced": "0.5.0" }, { "fixed": "0.6.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/ipfs/go-libipfs/bitswap/server" } ] } }, { "package": { "name": "github.com/ipfs/go-bitswap", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.12.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/ipfs/go-bitswap/server" } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/ipfs/go-libipfs/security/advisories/GHSA-m974-xj4j-7qv5" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-1766", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0444.json
{ "schema_version": "1.3.1", "id": "GO-2022-0444", "modified": "0001-01-01T00:00:00Z", "published": "2022-07-01T20:07:44Z", "aliases": [ "CVE-2022-29173", "GHSA-66x3-6cw3-v5gj" ], "summary": "Version rollback attack in github.com/theupdateframework/go-tuf", "details": "The TUF client is vulnerable to rollback attacks, in which an attacker causes a client to install software older than the software the client previously knew to be available.", "affected": [ { "package": { "name": "github.com/theupdateframework/go-tuf", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.3.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/theupdateframework/go-tuf/client", "symbols": [ "Client.Download", "Client.Init", "Client.Target", "Client.Update", "Client.UpdateRoots", "Client.decodeRoot", "Client.decodeTargets", "Client.decodeTimestamp", "Client.downloadMetaFromSnapshot", "Client.downloadMetaFromTimestamp" ] }, { "path": "github.com/theupdateframework/go-tuf/util", "symbols": [ "TimestampFileMetaEqual" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/theupdateframework/go-tuf/commit/ed6788e710fc3093a7ecc2d078bf734c0f200d8d" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0444", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0533.json
{ "schema_version": "1.3.1", "id": "GO-2022-0533", "modified": "0001-01-01T00:00:00Z", "published": "2022-07-28T17:25:07Z", "aliases": [ "CVE-2022-29804" ], "summary": "Path traversal via Clean on Windows in path/filepath", "details": "On Windows, the filepath.Clean function can convert certain invalid paths to valid, absolute paths, potentially allowing a directory traversal attack.\n\nFor example, Clean(\".\\c:\") returns \"c:\".", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.17.11" }, { "introduced": "1.18.0-0" }, { "fixed": "1.18.3" } ] } ], "ecosystem_specific": { "imports": [ { "path": "path/filepath", "goos": [ "windows" ], "symbols": [ "Clean" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/401595" }, { "type": "FIX", "url": "https://go.googlesource.com/go/+/9cd1818a7d019c02fa4898b3e45a323e35033290" }, { "type": "REPORT", "url": "https://go.dev/issue/52476" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg/m/IWz5T6x7AAAJ" } ], "credits": [ { "name": "Unrud" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0533", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0288.json
{ "schema_version": "1.3.1", "id": "GO-2022-0288", "modified": "0001-01-01T00:00:00Z", "published": "2022-07-15T23:08:33Z", "aliases": [ "CVE-2021-44716", "GHSA-vc3p-29h2-gpcp" ], "summary": "Unbounded memory growth in net/http and golang.org/x/net/http2", "details": "An attacker can cause unbounded memory growth in servers accepting HTTP/2 requests.", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.16.12" }, { "introduced": "1.17.0-0" }, { "fixed": "1.17.5" } ] } ], "ecosystem_specific": { "imports": [ { "path": "net/http", "symbols": [ "http2serverConn.canonicalHeader" ] } ] } }, { "package": { "name": "golang.org/x/net", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.0.0-20211209124913-491a49abca63" } ] } ], "ecosystem_specific": { "imports": [ { "path": "golang.org/x/net/http2", "symbols": [ "Server.ServeConn", "serverConn.canonicalHeader" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/369794" }, { "type": "REPORT", "url": "https://go.dev/issue/50058" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k" } ], "credits": [ { "name": "murakmii" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0288", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2530.json
{ "schema_version": "1.3.1", "id": "GO-2024-2530", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "GHSA-vjg6-93fv-qv64" ], "summary": "Etcd auth Inaccurate logging of authentication attempts for users with CN-based auth only in go.etcd.io/etcd", "details": "Etcd auth Inaccurate logging of authentication attempts for users with CN-based auth only in go.etcd.io/etcd.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: go.etcd.io/etcd/v3 before v3.3.23, from v3.4.0-rc.0 before v3.4.10.", "affected": [ { "package": { "name": "go.etcd.io/etcd", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "go.etcd.io/etcd/v3", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "3.3.23" }, { "introduced": "3.4.0-rc.0" }, { "fixed": "3.4.10" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/etcd-io/etcd/security/advisories/GHSA-vjg6-93fv-qv64" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2530", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0102.json
{ "schema_version": "1.3.1", "id": "GO-2021-0102", "modified": "0001-01-01T00:00:00Z", "published": "2021-07-28T18:08:05Z", "aliases": [ "CVE-2019-11289", "GHSA-5796-p3m6-9qj4" ], "summary": "Panic in decryption in code.cloudfoundry.org/gorouter", "details": "Due to improper input validation, a maliciously crafted input can cause a panic, due to incorrect nonce size. If this package is used to decrypt user supplied messages without checking the size of supplied nonces, this may be used as a vector for a denial of service attack.", "affected": [ { "package": { "name": "code.cloudfoundry.org/gorouter", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.0.0-20191101214924-b1b5c44e050f" } ] } ], "ecosystem_specific": { "imports": [ { "path": "code.cloudfoundry.org/gorouter/common/secure", "symbols": [ "AesGCM.Decrypt" ] } ] } }, { "package": { "name": "github.com/cloudfoundry/gorouter", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.0.0-20191101214924-b1b5c44e050f" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/cloudfoundry/gorouter/common/secure", "symbols": [ "AesGCM.Decrypt" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/cloudfoundry/gorouter/commit/b1b5c44e050f73b399b379ca63a42a2c5780a83f" }, { "type": "WEB", "url": "https://www.cloudfoundry.org/blog/cve-2019-11289/" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0102", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2557.json
{ "schema_version": "1.3.1", "id": "GO-2024-2557", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-21492", "GHSA-vp66-gf7w-9m4x" ], "summary": "Insufficient Session Expiration in github.com/greenpau/caddy-security", "details": "Insufficient Session Expiration in github.com/greenpau/caddy-security", "affected": [ { "package": { "name": "github.com/greenpau/caddy-security", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-vp66-gf7w-9m4x" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21492" }, { "type": "REPORT", "url": "https://github.com/greenpau/caddy-security/issues/272" }, { "type": "WEB", "url": "https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy" }, { "type": "WEB", "url": "https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-5920787" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2557", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0077.json
{ "schema_version": "1.3.1", "id": "GO-2021-0077", "modified": "0001-01-01T00:00:00Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2018-16886", "GHSA-h6xx-pmxh-3wgp" ], "summary": "Authentication bypass in go.etcd.io/etcd", "details": "A user can use a valid client certificate that contains a CommonName that matches a valid RBAC username to authenticate themselves as that user, despite lacking the required credentials. This may allow authentication bypass, but requires a certificate that is issued by a CA trusted by the server.", "affected": [ { "package": { "name": "go.etcd.io/etcd", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.5.0-alpha.5.0.20190108173120-83c051b701d3" } ] } ], "ecosystem_specific": { "imports": [ { "path": "go.etcd.io/etcd/auth", "symbols": [ "authStore.AuthInfoFromTLS" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/etcd-io/etcd/pull/10366" }, { "type": "FIX", "url": "https://github.com/etcd-io/etcd/commit/bf9d0d8291dc71ecbfb2690612954e1a298154b2" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0077", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-2412.json
{ "schema_version": "1.3.1", "id": "GO-2023-2412", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "GHSA-7ww5-4wqc-m92c" ], "summary": "RAPL accessibility in github.com/containerd/containerd", "details": "RAPL accessibility in github.com/containerd/containerd", "affected": [ { "package": { "name": "github.com/containerd/containerd", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.6.26" }, { "introduced": "1.7.0" }, { "fixed": "1.7.11" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/containerd/containerd/contrib/apparmor", "symbols": [ "DumpDefaultProfile", "LoadDefaultProfile", "generate" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/containerd/containerd/security/advisories/GHSA-7ww5-4wqc-m92c" }, { "type": "FIX", "url": "https://github.com/containerd/containerd/commit/67d356cb3095f3e8f8ad7d36f9a733fea1e7e28c" }, { "type": "FIX", "url": "https://github.com/containerd/containerd/commit/746b910f05855c8bfdb4415a1c0f958b234910e5" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-2412", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2612.json
{ "schema_version": "1.3.1", "id": "GO-2024-2612", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-2056" ], "summary": "Artica Proxy Loopback Services Remotely Accessible Unauthenticated in github.com/gvalkov/tailon", "details": "Artica Proxy Loopback Services Remotely Accessible Unauthenticated in github.com/gvalkov/tailon", "affected": [ { "package": { "name": "github.com/gvalkov/tailon", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-2056" }, { "type": "WEB", "url": "http://seclists.org/fulldisclosure/2024/Mar/14" }, { "type": "WEB", "url": "https://github.com/gvalkov/tailon#security" }, { "type": "WEB", "url": "https://korelogic.com/Resources/Advisories/KL-001-2024-004.txt" } ], "credits": [ { "name": "Jim Becher of KoreLogic, Inc." }, { "name": "Jaggar Henry of KoreLogic, Inc." } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2612", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0272.json
{ "schema_version": "1.3.1", "id": "GO-2022-0272", "modified": "0001-01-01T00:00:00Z", "published": "2022-07-15T23:08:12Z", "aliases": [ "CVE-2021-23772", "GHSA-jcxc-rh6w-wf49" ], "summary": "Directory traversal in github.com/kataras/iris and github.com/kataras/iris/v12", "details": "The Context.UploadFormFiles function is vulnerable to directory traversal attacks, and can be made to write to arbitrary locations outside the destination directory.\n\nThis vulnerability only occurs when built with Go versions prior to 1.17. Go 1.17 and later strip directory paths from filenames returned by \"mime/multipart\".Part.FileName, which avoids this issue.", "affected": [ { "package": { "name": "github.com/kataras/iris/v12", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "12.2.0-alpha8" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/kataras/iris/v12/context", "symbols": [ "Context.UploadFormFiles" ] } ] } }, { "package": { "name": "github.com/kataras/iris", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/kataras/iris/context", "symbols": [ "Context.UploadFormFiles" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/kataras/iris/commit/e213dba0d32ff66653e0ef124bc5088817264b08" }, { "type": "WEB", "url": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMKATARASIRIS-2325169" }, { "type": "WEB", "url": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMKATARASIRISV12-2325170" } ], "credits": [ { "name": "Snyk Security Team" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0272", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0515.json
{ "schema_version": "1.3.1", "id": "GO-2022-0515", "modified": "0001-01-01T00:00:00Z", "published": "2022-07-20T17:01:45Z", "aliases": [ "CVE-2022-1962" ], "summary": "Stack exhaustion due to deeply nested types in go/parser", "details": "Calling any of the Parse functions on Go source code which contains deeply nested types or declarations can cause a panic due to stack exhaustion.", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.17.12" }, { "introduced": "1.18.0-0" }, { "fixed": "1.18.4" } ] } ], "ecosystem_specific": { "imports": [ { "path": "go/parser", "symbols": [ "ParseExprFrom", "ParseFile", "parser.parseBinaryExpr", "parser.parseIfStmt", "parser.parsePrimaryExpr", "parser.parseStmt", "parser.parseUnaryExpr", "parser.tryIdentOrType", "resolver.closeScope", "resolver.openScope" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/417063" }, { "type": "FIX", "url": "https://go.googlesource.com/go/+/695be961d57508da5a82217f7415200a11845879" }, { "type": "REPORT", "url": "https://go.dev/issue/53616" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "credits": [ { "name": "Juho Nurminen of Mattermost" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0515", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2493.json
{ "schema_version": "1.3.1", "id": "GO-2024-2493", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-23651", "GHSA-m3r6-h7wv-7xxv" ], "summary": "Host system file access in github.com/moby/buildkit", "details": "Two malicious build steps running in parallel sharing the same cache mounts with subpaths could cause a race condition that can lead to files from the host system being accessible to the build container.", "affected": [ { "package": { "name": "github.com/moby/buildkit", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.12.5" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/moby/buildkit/executor/oci", "symbols": [ "sub", "submounts.cleanup", "submounts.subMount" ] }, { "path": "github.com/moby/buildkit/snapshot", "symbols": [ "LocalMounter", "LocalMounterWithMounts", "localMounter.Mount" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/moby/buildkit/pull/4604" } ], "credits": [ { "name": "@rmcnamara-snyk" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2493", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2891.json
{ "schema_version": "1.3.1", "id": "GO-2024-2891", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-32873", "GHSA-pxv8-qhrh-jc7v" ], "related": [ "CVE-2024-37158", "CVE-2024-37159" ], "summary": "evmos allows transferring unvested tokens after delegations in github.com/evmos/evmos", "details": "evmos allows transferring unvested tokens after delegations in github.com/evmos/evmos", "affected": [ { "package": { "name": "github.com/evmos/evmos", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v3", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v4", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v5", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v6", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v7", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v8", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v9", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v10", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v11", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v12", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v13", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v14", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v15", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v16", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v17", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v18", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "18.0.0" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/evmos/evmos/security/advisories/GHSA-pxv8-qhrh-jc7v" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-32873" }, { "type": "FIX", "url": "https://github.com/evmos/evmos/commit/b2a09ca66613d8b04decd3f2dcba8e1e77709dcb" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2891", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2766.json
{ "schema_version": "1.3.1", "id": "GO-2024-2766", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2020-14370", "GHSA-c3wv-qmjj-45r6" ], "summary": "Information disclosure in podman in github.com/containers/libpod", "details": "Information disclosure in podman in github.com/containers/libpod", "affected": [ { "package": { "name": "github.com/containers/libpod", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/containers/libpod/v2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "2.0.5" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-c3wv-qmjj-45r6" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14370" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1874268" }, { "type": "WEB", "url": "https://github.com/containers/podman/commit/a7e864e6e7de894d4edde4fff00e53dc6a0b5074" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G6BPCZX4ASKNONL3MSCK564IVXNYSKLP" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y74V7HGQBNLT6XECCSNZNFZIB7G7XSAR" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z4Y2FSGQWP4AFT5AZ6UBN6RKHVXUBRFV" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2766", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2648.json
{ "schema_version": "1.3.1", "id": "GO-2024-2648", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "GHSA-69p4-j5v5-x234" ], "summary": "Server/API for Vela Insecure Variable Substitution in github.com/go-vela/server", "details": "Server/API for Vela Insecure Variable Substitution in github.com/go-vela/server", "affected": [ { "package": { "name": "github.com/go-vela/server", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.23.2" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/go-vela/server/security/advisories/GHSA-69p4-j5v5-x234" }, { "type": "FIX", "url": "https://github.com/go-vela/server/commit/a645c822da1d91e1f4159b69685224232683bebb" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2648", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-2041.json
{ "schema_version": "1.3.1", "id": "GO-2023-2041", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-39318" ], "summary": "Improper handling of HTML-like comments in script contexts in html/template", "details": "The html/template package does not properly handle HTML-like \"\" comment tokens, nor hashbang \"#!\" comment tokens, in \u003cscript\u003e contexts. This may cause the template parser to improperly interpret the contents of \u003cscript\u003e contexts, causing actions to be improperly escaped. This may be leveraged to perform an XSS attack.", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.20.8" }, { "introduced": "1.21.0-0" }, { "fixed": "1.21.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "html/template", "symbols": [ "Template.Execute", "Template.ExecuteTemplate", "escaper.escapeText", "isComment", "tJS", "tLineCmt" ] } ] } } ], "references": [ { "type": "REPORT", "url": "https://go.dev/issue/62196" }, { "type": "FIX", "url": "https://go.dev/cl/526156" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ" } ], "credits": [ { "name": "Takeshi Kaneko (GMO Cybersecurity by Ierae, Inc.)" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-2041", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2928.json
{ "schema_version": "1.3.1", "id": "GO-2024-2928", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-37896" ], "summary": "SQL injection vulnerability in Gin-vue-admin in github.com/flipped-aurora/gin-vue-admin", "details": "SQL injection vulnerability in Gin-vue-admin in github.com/flipped-aurora/gin-vue-admin", "affected": [ { "package": { "name": "github.com/flipped-aurora/gin-vue-admin", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "2.6.6+incompatible" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-37896" }, { "type": "FIX", "url": "https://github.com/flipped-aurora/gin-vue-admin/commit/53d03382188868464ade489ab0713b54392d227f" }, { "type": "WEB", "url": "https://github.com/flipped-aurora/gin-vue-admin/security/advisories/GHSA-gf3r-h744-mqgp" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2928", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2520.json
{ "schema_version": "1.3.1", "id": "GO-2024-2520", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2020-24303", "GHSA-mvpr-q6rh-8vrp" ], "summary": "Grafana XSS via a query alias for the ElasticSearch datasource in github.com/grafana/grafana", "details": "Grafana XSS via a query alias for the ElasticSearch datasource in github.com/grafana/grafana.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/grafana/grafana before v7.1.0-beta1.", "affected": [ { "package": { "name": "github.com/grafana/grafana", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "7.1.0-beta1" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-mvpr-q6rh-8vrp" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24303" }, { "type": "FIX", "url": "https://github.com/grafana/grafana/pull/25401" }, { "type": "WEB", "url": "https://github.com/grafana/grafana/blob/master/CHANGELOG.md#710-beta-1-2020-07-01" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20201123-0002" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2520", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1857.json
{ "schema_version": "1.3.1", "id": "GO-2023-1857", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "GHSA-f99h-w337-mv56" ], "summary": "Panic when parsing ranges with invalid masks in github.com/malfunkt/iprange", "details": "Parsing a range with a mask larger than 32 bits causes a panic.", "affected": [ { "package": { "name": "github.com/malfunkt/iprange", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/malfunkt/iprange", "symbols": [ "Parse", "ParseList" ] } ] } } ], "references": [ { "type": "REPORT", "url": "https://github.com/malfunkt/iprange/issues/1" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-1857", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2902.json
{ "schema_version": "1.3.1", "id": "GO-2024-2902", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-37152", "GHSA-87p9-x75h-p4j2" ], "summary": "Unauthenticated Access to sensitive settings in Argo CD in github.com/argoproj/argo-cd", "details": "Unauthenticated Access to sensitive settings in Argo CD in github.com/argoproj/argo-cd", "affected": [ { "package": { "name": "github.com/argoproj/argo-cd", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/argoproj/argo-cd/v2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "2.9.3" }, { "fixed": "2.9.17" }, { "introduced": "2.10.0" }, { "fixed": "2.10.12" }, { "introduced": "2.11.0" }, { "fixed": "2.11.3" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-87p9-x75h-p4j2" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-37152" }, { "type": "FIX", "url": "https://github.com/argoproj/argo-cd/commit/256d90178b11b04bc8174d08d7b663a2a7b1771b" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2902", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2670.json
{ "schema_version": "1.3.1", "id": "GO-2024-2670", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-3072", "GHSA-rpvr-38xv-xvxq" ], "summary": "ACL security vulnerability in github.com/hashicorp/nomad", "details": "An ACL policy using a block without label can be applied to unexpected resources in Nomad, a distributed, highly available scheduler designed for effortless operations and management of applications.", "affected": [ { "package": { "name": "github.com/hashicorp/nomad", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0.7.0" }, { "fixed": "1.4.11" }, { "introduced": "1.5.0" }, { "fixed": "1.5.6" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "WEB", "url": "https://discuss.hashicorp.com/t/hcsec-2023-20-nomad-acl-policies-without-label-are-applied-to-unexpected-resources/56270" } ], "credits": [ { "name": "anonymous4ACL24" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2670", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2020-0017.json
{ "schema_version": "1.3.1", "id": "GO-2020-0017", "modified": "0001-01-01T00:00:00Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2020-26160", "GHSA-w73w-5m7g-f7qc" ], "summary": "Authorization bypass in github.com/dgrijalva/jwt-go", "details": "If a JWT contains an audience claim with an array of strings, rather than a single string, and MapClaims.VerifyAudience is called with req set to false, then audience verification will be bypassed, allowing an invalid set of audiences to be provided.", "affected": [ { "package": { "name": "github.com/dgrijalva/jwt-go", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0.0.0-20150717181359-44718f8a89b0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/dgrijalva/jwt-go", "symbols": [ "MapClaims.VerifyAudience" ] } ] } }, { "package": { "name": "github.com/dgrijalva/jwt-go/v4", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "4.0.0-preview1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/dgrijalva/jwt-go/v4", "symbols": [ "MapClaims.VerifyAudience" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/dgrijalva/jwt-go/commit/ec0a89a131e3e8567adcb21254a5cd20a70ea4ab" }, { "type": "WEB", "url": "https://github.com/dgrijalva/jwt-go/issues/422" } ], "credits": [ { "name": "@christopher-wong" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2020-0017", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2958.json
{ "schema_version": "1.3.1", "id": "GO-2024-2958", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-37298", "GHSA-3669-72x9-r9p3" ], "summary": "Potential memory exhaustion attack due to sparse slice deserialization in github.com/gorilla/schema", "details": "Potential memory exhaustion attack due to sparse slice deserialization in github.com/gorilla/schema", "affected": [ { "package": { "name": "github.com/gorilla/schema", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.4.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/gorilla/schema", "symbols": [ "Decoder.Decode", "Decoder.decode", "NewDecoder" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/gorilla/schema/security/advisories/GHSA-3669-72x9-r9p3" }, { "type": "FIX", "url": "https://github.com/gorilla/schema/commit/cd59f2f12cbdfa9c06aa63e425d1fe4a806967ff" }, { "type": "WEB", "url": "https://github.com/gorilla/schema/blob/main/decoder.go#L223" } ], "credits": [ { "name": "@AlexVasiluta" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2958", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2020-0046.json
{ "schema_version": "1.3.1", "id": "GO-2020-0046", "modified": "0001-01-01T00:00:00Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2020-7711", "CVE-2020-7731", "GHSA-gq5r-cc4w-g8xf", "GHSA-mqqv-chpx-vq25", "GHSA-prjq-f4q3-fvfr" ], "summary": "Panic due to malformed XML digital signature in github.com/russellhaering/goxmldsig", "details": "Due to a nil pointer dereference, a malformed XML Digital Signature can cause a panic during validation. If user supplied signatures are being validated, this may be used as a denial of service vector.", "affected": [ { "package": { "name": "github.com/russellhaering/goxmldsig", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.1.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/russellhaering/goxmldsig", "symbols": [ "ValidationContext.Validate", "ValidationContext.validateSignature" ] } ] } }, { "package": { "name": "github.com/russellhaering/gosaml2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.7.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/russellhaering/gosaml2", "symbols": [ "SAMLServiceProvider.RetrieveAssertionInfo", "SAMLServiceProvider.ValidateEncodedLogoutRequestPOST", "SAMLServiceProvider.ValidateEncodedLogoutResponsePOST", "SAMLServiceProvider.ValidateEncodedResponse", "SAMLServiceProvider.validateAssertionSignatures" ] } ] } } ], "references": [ { "type": "WEB", "url": "https://github.com/russellhaering/goxmldsig/issues/48" }, { "type": "WEB", "url": "https://github.com/russellhaering/gosaml2/issues/59" } ], "credits": [ { "name": "@stevenjohnstone" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2020-0046", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2020-0045.json
{ "schema_version": "1.3.1", "id": "GO-2020-0045", "modified": "0001-01-01T00:00:00Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2016-15005", "GHSA-q9qr-jwpw-3qvv" ], "summary": "Cryptographically weak random number generation in github.com/dinever/golf", "details": "CSRF tokens are generated using math/rand, which is not a cryptographically secure random number generator, allowing an attacker to predict values and bypass CSRF protections with relatively few requests.", "affected": [ { "package": { "name": "github.com/dinever/golf", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.3.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/dinever/golf", "symbols": [ "Context.Render", "Context.RenderFromString", "randomBytes" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/dinever/golf/pull/24" }, { "type": "FIX", "url": "https://github.com/dinever/golf/commit/3776f338be48b5bc5e8cf9faff7851fc52a3f1fe" }, { "type": "REPORT", "url": "https://github.com/dinever/golf/issues/20" } ], "credits": [ { "name": "@elithrar" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2020-0045", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-1201.json
{ "schema_version": "1.3.1", "id": "GO-2022-1201", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2021-4294", "GHSA-m7qp-cj9p-gj85" ], "summary": "Timing attack in github.com/openshift/osin", "details": "Client secret checks are vulnerable to timing attacks, which could permit an attacker to determine client secrets.", "affected": [ { "package": { "name": "github.com/openshift/osin", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.0.2-0.20210113124101-8612686d6dda" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/openshift/osin", "symbols": [ "CheckClientSecret", "DefaultClient.ClientSecretMatches", "Server.HandleAccessRequest", "Server.HandleAuthorizeRequest" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/openshift/osin/pull/200" }, { "type": "FIX", "url": "https://github.com/openshift/osin/commit/8612686d6dda34ae9ef6b5a974e4b7accb4fea29" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-1201", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2888.json
{ "schema_version": "1.3.1", "id": "GO-2024-2888", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-24789" ], "summary": "Mishandling of corrupt central directory record in archive/zip", "details": "The archive/zip package's handling of certain types of invalid zip files differs from the behavior of most zip implementations. This misalignment could be exploited to create an zip file with contents that vary depending on the implementation reading the file. The archive/zip package now rejects files containing these errors.", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.21.11" }, { "introduced": "1.22.0-0" }, { "fixed": "1.22.4" } ] } ], "ecosystem_specific": { "imports": [ { "path": "archive/zip", "symbols": [ "NewReader", "OpenReader", "findSignatureInBlock" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/585397" }, { "type": "REPORT", "url": "https://go.dev/issue/66869" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/XbxouI9gY7k/m/TuoGEhxIEwAJ" } ], "credits": [ { "name": "Yufan You (@ouuan)" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2888", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2020-0004.json
{ "schema_version": "1.3.1", "id": "GO-2020-0004", "modified": "0001-01-01T00:00:00Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2020-36569", "GHSA-hrm3-3xm6-x33h" ], "summary": "Authentication bypass in github.com/nanobox-io/golang-nanoauth", "details": "If any of the ListenAndServe functions are called with an empty token, token authentication is disabled globally for all listeners.\n\nAlso, a minor timing side channel was present allowing attackers with very low latency and able to make many requests to potentially recover the token.", "affected": [ { "package": { "name": "github.com/nanobox-io/golang-nanoauth", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0.0.0-20160722212129-ac0cc4484ad4" }, { "fixed": "0.0.0-20200131131040-063a3fb69896" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/nanobox-io/golang-nanoauth", "symbols": [ "Auth.ListenAndServe", "Auth.ListenAndServeTLS", "Auth.ServeHTTP", "ListenAndServe", "ListenAndServeTLS" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/nanobox-io/golang-nanoauth/pull/5" }, { "type": "FIX", "url": "https://github.com/nanobox-io/golang-nanoauth/commit/063a3fb69896acf985759f0fe3851f15973993f3" } ], "credits": [ { "name": "@bouk" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2020-0004", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0201.json
{ "schema_version": "1.3.1", "id": "GO-2022-0201", "modified": "0001-01-01T00:00:00Z", "published": "2022-08-09T18:15:41Z", "aliases": [ "CVE-2018-6574" ], "summary": "Remote command execution via \"go get\" command with cgo in cmd/go", "details": "The \"go get\" command with cgo is vulnerable to remote command execution by leveraging the gcc or clang plugin feature.\n\nWhen cgo is enabled, the build step during \"go get\" invokes the host C compiler, gcc or clang, adding compiler flags specified in the Go source files. Both gcc and clang support a plugin mechanism in which a shared-library plugin is loaded into the compiler, as directed by compiler flags. This means that a Go package repository can contain an attack.so file along with a Go source file that says (for example) \"// #cgo CFLAGS: -fplugin=attack.so\" causing the attack plugin to be loaded into the host C compiler during the build. Gcc and clang plugins are completely unrestricted in their access to the host system.", "affected": [ { "package": { "name": "toolchain", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.8.7" }, { "introduced": "1.9.0-0" }, { "fixed": "1.9.4" } ] } ], "ecosystem_specific": { "imports": [ { "path": "cmd/go" } ] } } ], "references": [ { "type": "FIX", "url": "https://go.googlesource.com/go/+/1dcb5836ad2c60776561da2923c70576ba2eefc6" }, { "type": "REPORT", "url": "https://go.dev/issue/23672" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-nuts/c/Gbhh1NxAjMU" } ], "credits": [ { "name": "Christopher Brown of Mattermost" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0201", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-2413.json
{ "schema_version": "1.3.1", "id": "GO-2023-2413", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-49922", "GHSA-hj4r-2c9c-29h3" ], "summary": "Sensitive information logged in github.com/elastic/beats/v7", "details": "Sensitive information logged in github.com/elastic/beats/v7", "affected": [ { "package": { "name": "github.com/elastic/beats/v7", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "7.17.16" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/elastic/beats/v7/libbeat/processors/script/javascript", "symbols": [ "jsProcessor.Run", "session.runProcessFunc" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-49922" }, { "type": "FIX", "url": "https://github.com/elastic/beats/commit/9bd7de84ab9c31bb4e1c0a348a7b7c26817a0996" }, { "type": "WEB", "url": "https://discuss.elastic.co/t/beats-and-elastic-agent-8-11-3-7-17-16-security-update-esa-2023-30/349180" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-2413", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2853.json
{ "schema_version": "1.3.1", "id": "GO-2024-2853", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-35175", "GHSA-4w53-6jvp-gg52" ], "summary": "sshpiper's enabling of proxy protocol without proper feature flagging allows faking source address in github.com/tg123/sshpiper", "details": "sshpiper's enabling of proxy protocol without proper feature flagging allows faking source address in github.com/tg123/sshpiper", "affected": [ { "package": { "name": "github.com/tg123/sshpiper", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "1.0.50" }, { "fixed": "1.3.0" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/tg123/sshpiper/security/advisories/GHSA-4w53-6jvp-gg52" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-35175" }, { "type": "FIX", "url": "https://github.com/tg123/sshpiper/commit/2ddd69876a1e1119059debc59fe869cb4e754430" }, { "type": "FIX", "url": "https://github.com/tg123/sshpiper/commit/70fb830dca26bea7ced772ce5d834a3e88ae7f53" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2853", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0071.json
{ "schema_version": "1.3.1", "id": "GO-2021-0071", "modified": "0001-01-01T00:00:00Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2015-1340", "GHSA-8mpq-fmr3-6jxv" ], "summary": "Race condition in github.com/lxc/lxd", "details": "A race between chown and chmod operations during a container filesystem shift may allow a user who can modify the filesystem to chmod an arbitrary path of their choice, rather than the expected path.", "affected": [ { "package": { "name": "github.com/lxc/lxd", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.0.0-20151004155856-19c6961cc101" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/lxc/lxd/shared", "symbols": [ "IdmapSet.doUidshiftIntoContainer" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/lxc/lxd/commit/19c6961cc1012c8a529f20807328a9357f5034f4" }, { "type": "WEB", "url": "https://bugs.launchpad.net/ubuntu/+source/lxd/+bug/1502270" } ], "credits": [ { "name": "Seth Arnold" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0071", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-1095.json
{ "schema_version": "1.3.1", "id": "GO-2022-1095", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2022-41716" ], "summary": "Unsanitized NUL in environment variables on Windows in syscall and os/exec", "details": "Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows.\n\nIn syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string \"A=B\\x00C=D\" sets the variables \"A=B\" and \"C=D\".", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.18.8" }, { "introduced": "1.19.0-0" }, { "fixed": "1.19.3" } ] } ], "ecosystem_specific": { "imports": [ { "path": "syscall", "goos": [ "windows" ], "symbols": [ "StartProcess" ] }, { "path": "os/exec", "goos": [ "windows" ], "symbols": [ "Cmd.CombinedOutput", "Cmd.Environ", "Cmd.Output", "Cmd.Run", "Cmd.Start", "Cmd.environ", "dedupEnv", "dedupEnvCase" ] } ] } } ], "references": [ { "type": "REPORT", "url": "https://go.dev/issue/56284" }, { "type": "FIX", "url": "https://go.dev/cl/446916" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/mbHY1UY3BaM/m/hSpmRzk-AgAJ" } ], "credits": [ { "name": "RyotaK (https://twitter.com/ryotkak)" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-1095", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0099.json
{ "schema_version": "1.3.1", "id": "GO-2021-0099", "modified": "0001-01-01T00:00:00Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2021-21272", "GHSA-g5v4-5x39-vwhx" ], "summary": "Zip slip directory exploit in github.com/deislabs/oras", "details": "Due to improper path validation, using the github.com/deislabs/oras/pkg/content.FileStore content store may result in directory traversal during archive extraction, allowing a malicious archive to write paths to arbitrary paths that the process can write to.", "affected": [ { "package": { "name": "github.com/deislabs/oras", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.9.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/deislabs/oras/pkg/content", "symbols": [ "extractTarDirectory", "fileWriter.Commit" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/deislabs/oras/commit/96cd90423303f1bb42bd043cb4c36085e6e91e8e" } ], "credits": [ { "name": "Chris Smowton" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0099", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-1026.json
{ "schema_version": "1.3.1", "id": "GO-2022-1026", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2022-3347", "GHSA-jr65-gpj5-cw74" ], "summary": "Incorrect validation of root DNSSEC public keys in github.com/peterzen/goresolver", "details": "DNSSEC validation is not performed correctly. An attacker can cause this package to report successful validation for invalid, attacker-controlled records.\n\nRoot DNSSEC public keys are not validated, permitting an attacker to present a self-signed root key and delegation chain.", "affected": [ { "package": { "name": "github.com/peterzen/goresolver", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/peterzen/goresolver" } ] } } ], "references": [ { "type": "REPORT", "url": "https://github.com/peterzen/goresolver/issues/5#issuecomment-1150214257" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-1026", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2887.json
{ "schema_version": "1.3.1", "id": "GO-2024-2887", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-24790" ], "summary": "Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses in net/netip", "details": "The various Is methods (IsPrivate, IsLoopback, etc) did not work as expected for IPv4-mapped IPv6 addresses, returning false for addresses which would return true in their traditional IPv4 forms.", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.21.11" }, { "introduced": "1.22.0-0" }, { "fixed": "1.22.4" } ] } ], "ecosystem_specific": { "imports": [ { "path": "net/netip", "symbols": [ "Addr.IsGlobalUnicast", "Addr.IsInterfaceLocalMulticast", "Addr.IsLinkLocalMulticast", "Addr.IsLoopback", "Addr.IsMulticast", "Addr.IsPrivate" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/590316" }, { "type": "REPORT", "url": "https://go.dev/issue/67680" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/XbxouI9gY7k/m/TuoGEhxIEwAJ" } ], "credits": [ { "name": "Enze Wang of Alioth (@zer0yu)" }, { "name": "Jianjun Chen of Zhongguancun Lab (@chenjj)" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2887", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2927.json
{ "schema_version": "1.3.1", "id": "GO-2024-2927", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-37159" ], "summary": "Evmos is missing create validator check in github.com/evmos/evmos", "details": "Evmos is missing create validator check in github.com/evmos/evmos", "affected": [ { "package": { "name": "github.com/evmos/evmos", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v3", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v4", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v5", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v6", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v7", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v8", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v9", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v10", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v11", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v12", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v13", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v14", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v15", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v16", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v17", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v18", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "18.0.0" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-37159" }, { "type": "FIX", "url": "https://github.com/evmos/evmos/commit/b2a09ca66613d8b04decd3f2dcba8e1e77709dcb" }, { "type": "WEB", "url": "https://github.com/evmos/evmos/security/advisories/GHSA-pxv8-qhrh-jc7v" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2927", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2606.json
{ "schema_version": "1.3.1", "id": "GO-2024-2606", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-27304", "GHSA-mrww-27vc-gghv", "GHSA-7jwh-3vrq-q3m8" ], "summary": "SQL injection in github.com/jackc/pgproto3 and github.com/jackc/pgx", "details": "An integer overflow in the calculated message size of a query or bind message could allow a single large message to be sent as multiple messages under the attacker's control. This could lead to SQL injection if an attacker can cause a single query or bind message to exceed 4 GB in size.", "affected": [ { "package": { "name": "github.com/jackc/pgproto3/v2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "2.3.3" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/jackc/pgproto3/v2", "symbols": [ "AuthenticationCleartextPassword.Encode", "AuthenticationGSS.Encode", "AuthenticationGSSContinue.Encode", "AuthenticationMD5Password.Encode", "AuthenticationOk.Encode", "AuthenticationSASL.Encode", "AuthenticationSASLContinue.Encode", "AuthenticationSASLFinal.Encode", "Backend.Send", "BackendKeyData.Encode", "Bind.Encode", "BindComplete.Encode", "CancelRequest.Encode", "Close.Encode", "CloseComplete.Encode", "CommandComplete.Encode", "CopyBothResponse.Encode", "CopyData.Encode", "CopyDone.Encode", "CopyFail.Encode", "CopyInResponse.Encode", "CopyOutResponse.Encode", "DataRow.Encode", "Describe.Encode", "EmptyQueryResponse.Encode", "ErrorResponse.Encode", "ErrorResponse.marshalBinary", "Execute.Encode", "Flush.Encode", "Frontend.Send", "FunctionCall.Encode", "FunctionCallResponse.Encode", "GSSEncRequest.Encode", "GSSResponse.Encode", "NoData.Encode", "NoticeResponse.Encode", "NotificationResponse.Encode", "ParameterDescription.Encode", "ParameterStatus.Encode", "Parse.Encode", "ParseComplete.Encode", "PasswordMessage.Encode", "PortalSuspended.Encode", "Query.Encode", "ReadyForQuery.Encode", "RowDescription.Encode", "SASLInitialResponse.Encode", "SASLResponse.Encode", "SSLRequest.Encode", "StartupMessage.Encode", "Sync.Encode", "Terminate.Encode" ] }, { "path": "github.com/jackc/pgproto3/v2/example/pgfortune", "symbols": [ "PgFortuneBackend.Run", "PgFortuneBackend.handleStartup", "main" ] } ] } }, { "package": { "name": "github.com/jackc/pgx/v4", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "4.18.2" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/jackc/pgx/v4/internal/sanitize", "symbols": [ "Query.Sanitize", "SanitizeSQL" ] } ] } }, { "package": { "name": "github.com/jackc/pgx/v5", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "5.0.0" }, { "fixed": "5.5.4" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/jackc/pgx/v5/internal/sanitize", "symbols": [ "Query.Sanitize", "SanitizeSQL" ] }, { "path": "github.com/jackc/pgx/v5/pgproto3", "symbols": [ "AuthenticationCleartextPassword.Encode", "AuthenticationGSS.Encode", "AuthenticationGSSContinue.Encode", "AuthenticationMD5Password.Encode", "AuthenticationOk.Encode", "AuthenticationSASL.Encode", "AuthenticationSASLContinue.Encode", "AuthenticationSASLFinal.Encode", "Backend.Flush", "Backend.Send", "BackendKeyData.Encode", "Bind.Encode", "BindComplete.Encode", "CancelRequest.Encode", "Close.Encode", "CloseComplete.Encode", "CommandComplete.Encode", "CopyBothResponse.Encode", "CopyData.Encode", "CopyDone.Encode", "CopyFail.Encode", "CopyInResponse.Encode", "CopyOutResponse.Encode", "DataRow.Encode", "Describe.Encode", "EmptyQueryResponse.Encode", "ErrorResponse.Encode", "ErrorResponse.marshalBinary", "Execute.Encode", "Flush.Encode", "Frontend.Flush", "Frontend.Send", "Frontend.SendBind", "Frontend.SendClose", "Frontend.SendDescribe", "Frontend.SendExecute", "Frontend.SendParse", "Frontend.SendQuery", "Frontend.SendSync", "Frontend.SendUnbufferedEncodedCopyData", "FunctionCall.Encode", "FunctionCallResponse.Encode", "GSSEncRequest.Encode", "GSSResponse.Encode", "NoData.Encode", "NoticeResponse.Encode", "NotificationResponse.Encode", "ParameterDescription.Encode", "ParameterStatus.Encode", "Parse.Encode", "ParseComplete.Encode", "PasswordMessage.Encode", "PortalSuspended.Encode", "Query.Encode", "ReadyForQuery.Encode", "RowDescription.Encode", "SASLInitialResponse.Encode", "SASLResponse.Encode", "SSLRequest.Encode", "StartupMessage.Encode", "Sync.Encode", "Terminate.Encode" ] }, { "path": "github.com/jackc/pgx/v5/pgconn", "symbols": [ "Batch.ExecParams", "Batch.ExecPrepared", "Connect", "ConnectConfig", "ConnectWithOptions", "MultiResultReader.Close", "MultiResultReader.NextResult", "MultiResultReader.ReadAll", "PgConn.CheckConn", "PgConn.Close", "PgConn.CopyFrom", "PgConn.CopyTo", "PgConn.Deallocate", "PgConn.Exec", "PgConn.ExecBatch", "PgConn.ExecParams", "PgConn.ExecPrepared", "PgConn.Ping", "PgConn.Prepare", "PgConn.ReceiveMessage", "PgConn.SyncConn", "PgConn.WaitForNotification", "Pipeline.Close", "Pipeline.Flush", "Pipeline.GetResults", "Pipeline.SendDeallocate", "Pipeline.SendPrepare", "Pipeline.SendQueryParams", "Pipeline.SendQueryPrepared", "Pipeline.Sync", "ResultReader.Close", "ResultReader.NextRow", "ResultReader.Read", "ValidateConnectTargetSessionAttrsPreferStandby", "ValidateConnectTargetSessionAttrsPrimary", "ValidateConnectTargetSessionAttrsReadOnly", "ValidateConnectTargetSessionAttrsReadWrite", "ValidateConnectTargetSessionAttrsStandby" ] }, { "path": "github.com/jackc/pgx/v5/pgproto3/example/pgfortune", "symbols": [ "PgFortuneBackend.Run", "PgFortuneBackend.handleStartup", "main" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/jackc/pgx/security/advisories/GHSA-mrww-27vc-gghv" }, { "type": "FIX", "url": "https://github.com/jackc/pgproto3/commit/945c2126f6db8f3bea7eeebe307c01fe92bca007" }, { "type": "FIX", "url": "https://github.com/jackc/pgx/commit/adbb38f298c76e283ffc7c7a3f571036fea47fd4" }, { "type": "FIX", "url": "https://github.com/jackc/pgx/commit/c543134753a0c5d22881c12404025724cb05ffd8" }, { "type": "FIX", "url": "https://github.com/jackc/pgx/commit/f94eb0e2f96782042c96801b5ac448f44f0a81df" } ], "credits": [ { "name": "paul-gerste-sonarsource" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2606", "review_status": "REVIEWED" } }