repo_id
stringclasses
927 values
file_path
stringlengths
99
214
content
stringlengths
2
4.15M
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2684.json
{ "schema_version": "1.3.1", "id": "GO-2024-2684", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-22780", "GHSA-hwvw-gh23-qpvq" ], "summary": "CA17 TeamsACS Cross Site Scripting vulnerability in github.com/ca17/teamsacs", "details": "CA17 TeamsACS Cross Site Scripting vulnerability in github.com/ca17/teamsacs", "affected": [ { "package": { "name": "github.com/ca17/teamsacs", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-hwvw-gh23-qpvq" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22780" }, { "type": "WEB", "url": "https://fuo.fi/CVE-2024-22780" }, { "type": "WEB", "url": "https://github.com/CA17/TeamsACS/issues/26" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2684", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1505.json
{ "schema_version": "1.3.1", "id": "GO-2023-1505", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2022-47747", "GHSA-hj4g-4w36-x8hp" ], "summary": "Arbitrary file read vulnerability in github.com/uber/kraken", "details": "kraken contains an arbitrary file read vulnerability via component testfs.", "affected": [ { "package": { "name": "github.com/uber/kraken", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/uber/kraken/lib/backend/testfs", "symbols": [ "Server.Handler", "Server.downloadHandler" ] } ] } } ], "references": [ { "type": "REPORT", "url": "https://github.com/uber/kraken/issues/333" }, { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-hj4g-4w36-x8hp" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-1505", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2780.json
{ "schema_version": "1.3.1", "id": "GO-2024-2780", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2019-11245", "GHSA-r76g-g87f-vw8f" ], "summary": "Kubelet Incorrect Privilege Assignment in k8s.io/kubernetes", "details": "Kubelet Incorrect Privilege Assignment in k8s.io/kubernetes", "affected": [ { "package": { "name": "k8s.io/kubernetes", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "1.13.0" }, { "fixed": "1.13.7" }, { "introduced": "1.14.0" }, { "fixed": "1.14.3" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-r76g-g87f-vw8f" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11245" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1715726" }, { "type": "WEB", "url": "https://github.com/kubernetes/kubernetes/issues/78308" }, { "type": "WEB", "url": "https://github.com/kubernetes/kubernetes/pull/76665" }, { "type": "WEB", "url": "https://github.com/kubernetes/kubernetes/pull/76665/commits/26e3c8674e66f0d10170d34f5445f0aed207387f" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20190919-0003" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2780", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-1027.json
{ "schema_version": "1.3.1", "id": "GO-2022-1027", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2022-40082", "GHSA-c9qr-f6c8-rgxf" ], "summary": "Path traversal in github.com/cloudwego/hertz", "details": "Improper path sanitization on Windows permits path traversal attacks. Static file serving with the Static or StaticFS functions allows an attacker to access files from outside the filesystem root.\n\nThis vulnerability does not affect non-Windows systems.", "affected": [ { "package": { "name": "github.com/cloudwego/hertz", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.3.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/cloudwego/hertz/pkg/protocol", "goos": [ "windows" ], "symbols": [ "Cookie.SetPath", "Cookie.SetPathBytes", "NewRequest", "ParseURI", "Request.Host", "Request.ParseURI", "Request.Path", "Request.QueryString", "Request.SetHost", "Request.SetQueryString", "Request.URI", "URI.Parse", "URI.SetPath", "URI.SetPathBytes", "URI.Update", "URI.UpdateBytes", "normalizePath" ] } ] } } ], "references": [ { "type": "WEB", "url": "https://github.com/cloudwego/hertz/issues/228" }, { "type": "FIX", "url": "https://github.com/cloudwego/hertz/pull/229" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-1027", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2798.json
{ "schema_version": "1.3.1", "id": "GO-2024-2798", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-4183", "GHSA-wj37-mpq9-xrcm" ], "summary": "Mattermost fails to limit the number of active sessions in github.com/mattermost/mattermost-server", "details": "Mattermost fails to limit the number of active sessions in github.com/mattermost/mattermost-server", "affected": [ { "package": { "name": "github.com/mattermost/mattermost-server", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "8.1.0+incompatible" }, { "fixed": "8.1.12+incompatible" }, { "introduced": "9.4.0+incompatible" }, { "fixed": "9.4.5+incompatible" }, { "introduced": "9.5.0+incompatible" }, { "fixed": "9.5.3+incompatible" }, { "introduced": "9.6.0-rc1+incompatible" }, { "fixed": "9.6.1+incompatible" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-wj37-mpq9-xrcm" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4183" }, { "type": "WEB", "url": "https://github.com/mattermost/mattermost/commit/86920d641760552c5aafa5e1d14c93bd30039bc4" }, { "type": "WEB", "url": "https://github.com/mattermost/mattermost/commit/9d81eee979aee93374bff8ba6714d805e12ffb03" }, { "type": "WEB", "url": "https://github.com/mattermost/mattermost/commit/b45c3dac4c160992a1ce757ade968e8f5ec506c1" }, { "type": "WEB", "url": "https://github.com/mattermost/mattermost/commit/bc699e6789cf3ba1544235087897699aaa639e7d" }, { "type": "WEB", "url": "https://mattermost.com/security-updates" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2798", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-2163.json
{ "schema_version": "1.3.1", "id": "GO-2023-2163", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-46129", "GHSA-mr45-rx8q-wcm9" ], "summary": "Curve KeyPairs fail to encrypt in github.com/nats-io/nkeys", "details": "Curve KeyPairs always use the same (all-zeros) key to encrypt data, and provide no security.", "affected": [ { "package": { "name": "github.com/nats-io/nkeys", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0.4.0" }, { "fixed": "0.4.6" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/nats-io/nkeys", "symbols": [ "ckp.Open", "ckp.Seal", "ckp.SealWithRand", "decodePubCurveKey" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/nats-io/nkeys/security/advisories/GHSA-mr45-rx8q-wcm9" }, { "type": "FIX", "url": "https://github.com/nats-io/nkeys/commit/58fb9d69f42ea73fffad1d14e5914dc666f3daa1" } ], "credits": [ { "name": "Quentin Matillat (GitHub @tinou98)" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-2163", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2808.json
{ "schema_version": "1.3.1", "id": "GO-2024-2808", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-4128" ], "summary": "CSRF in firebase-tools emulator suite in github.com/firebase/firebase-tools", "details": "CSRF in firebase-tools emulator suite in github.com/firebase/firebase-tools", "affected": [ { "package": { "name": "github.com/firebase/firebase-tools", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4128" }, { "type": "FIX", "url": "https://github.com/firebase/firebase-tools/commit/068a2b08dc308c7ab4b569617f5fc8821237e3a0" }, { "type": "FIX", "url": "https://github.com/firebase/firebase-tools/pull/6944" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2808", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2575.json
{ "schema_version": "1.3.1", "id": "GO-2024-2575", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-26147", "GHSA-r53h-jv2g-vpx6" ], "summary": "Helm's Missing YAML Content Leads To Panic in helm.sh/helm/v3", "details": "Helm's Missing YAML Content Leads To Panic in helm.sh/helm/v3", "affected": [ { "package": { "name": "helm.sh/helm/v3", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "3.14.2" } ] } ], "ecosystem_specific": { "imports": [ { "path": "helm.sh/helm/v3/pkg/plugin", "symbols": [ "FindPlugins", "LoadAll", "LoadDir", "validatePluginData" ] }, { "path": "helm.sh/helm/v3/pkg/repo", "symbols": [ "ChartRepository.DownloadIndexFile", "ChartRepository.Load", "FindChartInAuthAndTLSAndPassRepoURL", "FindChartInAuthAndTLSRepoURL", "FindChartInAuthRepoURL", "FindChartInRepoURL", "LoadIndexFile", "loadIndex" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/helm/helm/security/advisories/GHSA-r53h-jv2g-vpx6" }, { "type": "FIX", "url": "https://github.com/helm/helm/commit/bb4cc9125503a923afb7988f3eb478722a8580af" } ], "credits": [ { "name": "Jakub Ciolek at AlphaSense" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2575", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2788.json
{ "schema_version": "1.3.1", "id": "GO-2024-2788", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-32868", "GHSA-7j7j-66cv-m239" ], "summary": "ZITADEL's Improper Lockout Mechanism Leads to MFA Bypass in github.com/zitadel/zitadel", "details": "ZITADEL's Improper Lockout Mechanism Leads to MFA Bypass in github.com/zitadel/zitadel.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/zitadel/zitadel before v2.50.0.", "affected": [ { "package": { "name": "github.com/zitadel/zitadel", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "2.50.0" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/zitadel/zitadel/security/advisories/GHSA-7j7j-66cv-m239" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-32868" }, { "type": "WEB", "url": "https://github.com/zitadel/zitadel/releases/tag/v2.50.0" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2788", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-1117.json
{ "schema_version": "1.3.1", "id": "GO-2022-1117", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2022-36111", "GHSA-672p-m5jq-mrh8" ], "summary": "Insufficient verification of proofs in github.com/codenotary/immudb", "details": "In certain scenarios, a malicious immudb server can provide a falsified proof that will be accepted by the client SDK signing a falsified transaction replacing the genuine one. This situation can not be triggered by a genuine immudb server and requires the client to perform a specific list of verified operations resulting in acceptance of an invalid state value.\n\nThis vulnerability only affects immudb client SDKs, the immudb server itself is not affected by this vulnerability.", "affected": [ { "package": { "name": "github.com/codenotary/immudb", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.4.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/codenotary/immudb/pkg/client/auditor", "symbols": [ "defaultAuditor.Run", "defaultAuditor.audit" ] }, { "path": "github.com/codenotary/immudb/pkg/client", "symbols": [ "immuClient.SafeGet", "immuClient.SafeReference", "immuClient.SafeSet", "immuClient.SafeZAdd", "immuClient.StreamVerifiedGet", "immuClient.StreamVerifiedSet", "immuClient.VerifiedGet", "immuClient.VerifiedGetAt", "immuClient.VerifiedGetAtRevision", "immuClient.VerifiedGetSince", "immuClient.VerifiedSet", "immuClient.VerifiedSetReference", "immuClient.VerifiedSetReferenceAt", "immuClient.VerifiedTxByID", "immuClient.VerifiedZAdd", "immuClient.VerifiedZAddAt", "immuClient.VerifyRow", "immuClient._streamVerifiedGet", "immuClient._streamVerifiedSet", "immuClient.verifiedGet" ] }, { "path": "github.com/codenotary/immudb/embedded/store", "symbols": [ "ImmuStore.DualProof", "VerifyDualProof", "VerifyLinearProof" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/codenotary/immudb/security/advisories/GHSA-672p-m5jq-mrh8" }, { "type": "ARTICLE", "url": "https://github.com/codenotary/immudb/tree/master/docs/security/vulnerabilities/linear-fake" }, { "type": "FIX", "url": "https://github.com/codenotary/immudb/commit/acf7f1b3d62436ea5e038acea1fc6394f90ab1c6" }, { "type": "FIX", "url": "https://github.com/codenotary/immudb/commit/7267d67e28be8f0257b71d734611a051593e8a81" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-1117", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1494.json
{ "schema_version": "1.3.1", "id": "GO-2023-1494", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2014-125064", "GHSA-g7mw-9pf9-p2pm" ], "summary": "SQL injection in github.com/elgs/gosqljson", "details": "There is a potential for SQL injection through manipulation of the sqlStatement argument.", "affected": [ { "package": { "name": "github.com/elgs/gosqljson", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.0.0-20220916234230-750f26ee23c7" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/elgs/gosqljson", "symbols": [ "ExecDb", "QueryDbToArray", "QueryDbToArrayJson", "QueryDbToMap", "QueryDbToMapJson" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/elgs/gosqljson/commit/2740b331546cb88eb61771df4c07d389e9f0363a" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-1494", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2937.json
{ "schema_version": "1.3.1", "id": "GO-2024-2937", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-24792", "GHSA-9phm-fm57-rhg8" ], "related": [ "CVE-2023-36308" ], "summary": "Panic when parsing invalid palette-color images in golang.org/x/image", "details": "Parsing a corrupt or malicious image with invalid color indices can cause a panic.", "affected": [ { "package": { "name": "golang.org/x/image", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.18.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "golang.org/x/image/tiff", "symbols": [ "Decode", "decoder.decode" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/588115" }, { "type": "REPORT", "url": "https://go.dev/issue/67624" } ], "credits": [ { "name": "John Wright \u003cjsw@google.com\u003e" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2937", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2803.json
{ "schema_version": "1.3.1", "id": "GO-2024-2803", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-32963", "GHSA-4jrx-5w4h-3gpm" ], "summary": "Navidrome Parameter Tampering vulnerability in github.com/navidrome/navidrome", "details": "Navidrome Parameter Tampering vulnerability in github.com/navidrome/navidrome", "affected": [ { "package": { "name": "github.com/navidrome/navidrome", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.52.0" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/navidrome/navidrome/security/advisories/GHSA-4jrx-5w4h-3gpm" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-32963" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2803", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2020-0016.json
{ "schema_version": "1.3.1", "id": "GO-2020-0016", "modified": "0001-01-01T00:00:00Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2021-29482", "GHSA-25xm-hr59-7c27" ], "summary": "Infinite loop in github.com/ulikunitz/xz", "details": "An attacker can construct a series of bytes such that calling Reader.Read on the bytes could cause an infinite loop. If parsing user supplied input, this may be used as a denial of service vector.", "affected": [ { "package": { "name": "github.com/ulikunitz/xz", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.5.8" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/ulikunitz/xz", "symbols": [ "Reader.Read", "blockHeader.UnmarshalBinary", "readUvarint", "streamReader.Read" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b" }, { "type": "WEB", "url": "https://github.com/ulikunitz/xz/issues/35" } ], "credits": [ { "name": "@0xdecaf" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2020-0016", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1878.json
{ "schema_version": "1.3.1", "id": "GO-2023-1878", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-29406" ], "summary": "Insufficient sanitization of Host header in net/http", "details": "The HTTP/1 client does not fully validate the contents of the Host header. A maliciously crafted Host header can inject additional headers or entire requests.\n\nWith fix, the HTTP/1 client now refuses to send requests containing an invalid Request.Host or Request.URL.Host value.", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.19.11" }, { "introduced": "1.20.0-0" }, { "fixed": "1.20.6" } ] } ], "ecosystem_specific": { "imports": [ { "path": "net/http", "symbols": [ "Client.CloseIdleConnections", "Client.Do", "Client.Get", "Client.Head", "Client.Post", "Client.PostForm", "Get", "Head", "Post", "PostForm", "Request.Write", "Request.WriteProxy", "Request.write", "Transport.CancelRequest", "Transport.CloseIdleConnections", "Transport.RoundTrip" ] } ] } } ], "references": [ { "type": "REPORT", "url": "https://go.dev/issue/60374" }, { "type": "FIX", "url": "https://go.dev/cl/506996" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/2q13H6LEEx0" } ], "credits": [ { "name": "Bartek Nowotarski" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-1878", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0956.json
{ "schema_version": "1.3.1", "id": "GO-2022-0956", "modified": "0001-01-01T00:00:00Z", "published": "2022-08-29T22:15:46Z", "aliases": [ "CVE-2022-3064", "GHSA-6q6q-88xp-6f2r" ], "summary": "Excessive resource consumption in gopkg.in/yaml.v2", "details": "Parsing malicious or large YAML documents can consume excessive amounts of CPU or memory.", "affected": [ { "package": { "name": "gopkg.in/yaml.v2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "2.2.4" } ] } ], "ecosystem_specific": { "imports": [ { "path": "gopkg.in/yaml.v2", "symbols": [ "Decoder.Decode", "Unmarshal", "UnmarshalStrict", "decoder.unmarshal", "yaml_parser_increase_flow_level", "yaml_parser_roll_indent" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/go-yaml/yaml/commit/f221b8435cfb71e54062f6c6e99e9ade30b124d5" }, { "type": "WEB", "url": "https://github.com/go-yaml/yaml/releases/tag/v2.2.4" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0956", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2918.json
{ "schema_version": "1.3.1", "id": "GO-2024-2918", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-35255", "GHSA-m5vv-6r4h-3vj9" ], "summary": "Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/Azure/azure-sdk-for-go/sdk/azidentity", "details": "Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/Azure/azure-sdk-for-go/sdk/azidentity", "affected": [ { "package": { "name": "github.com/Azure/azure-sdk-for-go/sdk/azidentity", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.6.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/Azure/azure-sdk-for-go/sdk/azidentity", "symbols": [ "AzurePipelinesCredential.GetToken", "ChainedTokenCredential.GetToken", "ClientAssertionCredential.GetToken", "ClientCertificateCredential.GetToken", "ClientSecretCredential.GetToken", "DefaultAzureCredential.GetToken", "EnvironmentCredential.GetToken", "ManagedIdentityCredential.GetToken", "NewDefaultAzureCredential", "NewManagedIdentityCredential", "OnBehalfOfCredential.GetToken", "WorkloadIdentityCredential.GetToken", "confidentialClient.GetToken", "managedIdentityClient.authenticate", "managedIdentityClient.createAccessToken", "managedIdentityClient.createAppServiceAuthRequest", "managedIdentityClient.createAzureArcAuthRequest", "managedIdentityClient.createAzureMLAuthRequest", "managedIdentityClient.createCloudShellAuthRequest", "managedIdentityClient.createIMDSAuthRequest", "managedIdentityClient.createServiceFabricAuthRequest", "managedIdentityClient.getAzureArcSecretKey", "newManagedIdentityClient" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-m5vv-6r4h-3vj9" }, { "type": "FIX", "url": "https://github.com/Azure/azure-sdk-for-go/commit/50774cd9709905523136fb05e8c85a50e8984499" }, { "type": "WEB", "url": "https://github.com/AzureAD/microsoft-authentication-library-for-dotnet/issues/4806#issuecomment-2178960340" }, { "type": "WEB", "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35255" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2918", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2818.json
{ "schema_version": "1.3.1", "id": "GO-2024-2818", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-34478", "GHSA-3jgf-r68h-xfqm" ], "summary": "Consensus failures in github.com/btcsuite/btcd", "details": "Incorrect implementation of the consensus rules outlined in BIP 68 and BIP 112 making btcd susceptible to consensus failures. Specifically, it uses the transaction version as a signed integer when it is supposed to be treated as unsigned. There can be a chain split and loss of funds.", "affected": [ { "package": { "name": "github.com/btcsuite/btcd", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.24.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/btcsuite/btcd/blockchain", "symbols": [ "BlockChain.CalcSequenceLock", "BlockChain.CheckConnectBlockTemplate", "BlockChain.ProcessBlock", "BlockChain.calcSequenceLock", "ValidateTransactionScripts", "txValidator.Validate" ] }, { "path": "github.com/btcsuite/btcd/txscript", "symbols": [ "Engine.Execute", "Engine.Step", "opcodeCheckSequenceVerify" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-34478" }, { "type": "WEB", "url": "https://delvingbitcoin.org/t/disclosure-btcd-consensus-bugs-due-to-usage-of-signed-transaction-version/455" }, { "type": "WEB", "url": "https://github.com/btcsuite/btcd/blob/e4c88c3a3ecb1813529bf3dddc7a865bd418a6b8/blockchain/chain.go#L383C1-L392C3" }, { "type": "WEB", "url": "https://github.com/btcsuite/btcd/blob/e4c88c3a3ecb1813529bf3dddc7a865bd418a6b8/txscript/opcode.go#L1172C1-L1178C3" }, { "type": "FIX", "url": "https://github.com/btcsuite/btcd/pull/1981" } ], "credits": [ { "name": "Niklas Gögge" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2818", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-1045.json
{ "schema_version": "1.3.1", "id": "GO-2022-1045", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2022-39237", "GHSA-m5m3-46gj-wch8" ], "summary": "Improper validation of signature hash algorithms in github.com/sylabs/sif/v2", "details": "The Singularity Image Format (SIF) reference implementation does not verify that the hash algorithm(s) used are cryptographically secure when verifying digital signatures.", "affected": [ { "package": { "name": "github.com/sylabs/sif/v2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "2.8.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/sylabs/sif/v2/pkg/integrity", "symbols": [ "Signer.Sign", "Verifier.Verify", "digest.MarshalJSON", "digest.UnmarshalJSON", "newDigest", "signAndEncodeJSON", "verifyAndDecode" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/sylabs/sif/security/advisories/GHSA-m5m3-46gj-wch8" }, { "type": "FIX", "url": "https://github.com/sylabs/sif/commit/07fb86029a12e3210f6131e065570124605daeaa" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-1045", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-1098.json
{ "schema_version": "1.3.1", "id": "GO-2022-1098", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2022-44797", "GHSA-2chg-86hq-7w38" ], "summary": "Denial of service in message decoding in github.com/btcsuite/btcd", "details": "Erroneous message decoding can cause denial of service.\n\nImproper checking of maximum witness size during node message decoding prevented nodes in Lightning Labs lnd (before 0.15.2-beta) to sync.", "affected": [ { "package": { "name": "github.com/btcsuite/btcd", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.23.2" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/btcsuite/btcd/wire", "symbols": [ "MsgBlock.BtcDecode", "MsgBlock.Deserialize", "MsgBlock.DeserializeNoWitness", "MsgBlock.DeserializeTxLoc", "MsgTx.BtcDecode", "MsgTx.Deserialize", "MsgTx.DeserializeNoWitness", "ReadMessage", "ReadMessageN", "ReadMessageWithEncodingN" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-2chg-86hq-7w38" }, { "type": "REPORT", "url": "https://github.com/lightningnetwork/lnd/issues/7002" }, { "type": "FIX", "url": "https://github.com/btcsuite/btcd/pull/1896/commits/f523d4ccaa5f34a2f761f16a05f5d6e6665b1168" }, { "type": "WEB", "url": "https://github.com/btcsuite/btcd/releases/tag/v0.23.2" } ], "credits": [ { "name": "rsafier (Github user)" }, { "name": "Roasbeef (Github user)" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-1098", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-2044.json
{ "schema_version": "1.3.1", "id": "GO-2023-2044", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-39321" ], "summary": "Panic when processing post-handshake message on QUIC connections in crypto/tls", "details": "Processing an incomplete post-handshake message for a QUIC connection can cause a panic.", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "1.21.0-0" }, { "fixed": "1.21.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "crypto/tls", "symbols": [ "QUICConn.HandleData" ] } ] } } ], "references": [ { "type": "REPORT", "url": "https://go.dev/issue/62266" }, { "type": "FIX", "url": "https://go.dev/cl/523039" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ" } ], "credits": [ { "name": "Marten Seemann" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-2044", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0220.json
{ "schema_version": "1.3.1", "id": "GO-2022-0220", "modified": "0001-01-01T00:00:00Z", "published": "2022-05-25T18:01:46Z", "aliases": [ "CVE-2019-9634" ], "summary": "DLL injection on Windows in runtime and syscall", "details": "Go on Windows misused certain LoadLibrary functionality, leading to DLL injection.", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.11.10" }, { "introduced": "1.12.0-0" }, { "fixed": "1.12.2" } ] } ], "ecosystem_specific": { "imports": [ { "path": "runtime", "goos": [ "windows" ] }, { "path": "syscall", "goos": [ "windows" ], "symbols": [ "LoadDLL" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/165798" }, { "type": "FIX", "url": "https://go.googlesource.com/go/+/9b6e9f0c8c66355c0f0575d808b32f52c8c6d21c" }, { "type": "REPORT", "url": "https://go.dev/issue/28978" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/z9eTD34GEIs/m/Z_XmhTrVAwAJ" } ], "credits": [ { "name": "Samuel Cochran" }, { "name": "Jason Donenfeld" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0220", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2814.json
{ "schema_version": "1.3.1", "id": "GO-2024-2814", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-34066", "GHSA-gqmf-jqgv-v8fw" ], "summary": "Pterodactyl Wings vulnerable to Arbitrary File Write/Read in github.com/pterodactyl/wings", "details": "Pterodactyl Wings vulnerable to Arbitrary File Write/Read in github.com/pterodactyl/wings", "affected": [ { "package": { "name": "github.com/pterodactyl/wings", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.11.12" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/pterodactyl/wings/security/advisories/GHSA-gqmf-jqgv-v8fw" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-34066" }, { "type": "FIX", "url": "https://github.com/pterodactyl/wings/commit/5415f8ae07f533623bd8169836dd7e0b933964de" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2814", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-2383.json
{ "schema_version": "1.3.1", "id": "GO-2023-2383", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-45285" ], "summary": "Command 'go get' may unexpectedly fallback to insecure git in cmd/go", "details": "Using go get to fetch a module with the \".git\" suffix may unexpectedly fallback to the insecure \"git://\" protocol if the module is unavailable via the secure \"https://\" and \"git+ssh://\" protocols, even if GOINSECURE is not set for said module. This only affects users who are not using the module proxy and are fetching modules directly (i.e. GOPROXY=off).", "affected": [ { "package": { "name": "toolchain", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.20.12" }, { "introduced": "1.21.0-0" }, { "fixed": "1.21.5" } ] } ], "ecosystem_specific": { "imports": [ { "path": "cmd/go" } ] } } ], "references": [ { "type": "WEB", "url": "https://groups.google.com/g/golang-dev/c/6ypN5EjibjM/m/KmLVYH_uAgAJ" }, { "type": "REPORT", "url": "https://go.dev/issue/63845" }, { "type": "FIX", "url": "https://go.dev/cl/540257" } ], "credits": [ { "name": "David Leadbeater" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-2383", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2809.json
{ "schema_version": "1.3.1", "id": "GO-2024-2809", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-32359" ], "summary": "CVE-2024-32359 in github.com/carina-io/carina", "details": "CVE-2024-32359 in github.com/carina-io/carina", "affected": [ { "package": { "name": "github.com/carina-io/carina", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-32359" }, { "type": "WEB", "url": "http://carina.com" }, { "type": "WEB", "url": "https://gist.github.com/HouqiyuA/568d9857dab4ddba6b8b6a791e90f906" }, { "type": "WEB", "url": "https://github.com/HouqiyuA/k8s-rbac-poc" }, { "type": "WEB", "url": "https://github.com/carina-io/carina" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2809", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0103.json
{ "schema_version": "1.3.1", "id": "GO-2021-0103", "modified": "0001-01-01T00:00:00Z", "published": "2021-07-28T18:08:05Z", "aliases": [ "CVE-2020-26242", "GHSA-jm5c-rv3w-w83m" ], "summary": "Denial of service in github.com/holiman/uint256", "details": "Due to improper bounds checking, certain mathematical operations can cause a panic via an out of bounds read. If this package is used to process untrusted user inputs, this may be used as a vector for a denial of service attack.", "affected": [ { "package": { "name": "github.com/holiman/uint256", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0.1.0" }, { "fixed": "1.1.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/holiman/uint256", "symbols": [ "Int.AddMod", "Int.Div", "Int.Mod", "Int.MulMod", "Int.SDiv", "Int.SMod", "udivrem" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/holiman/uint256/pull/80" }, { "type": "FIX", "url": "https://github.com/holiman/uint256/commit/6785da6e3eea403260a5760029e722aa4ff1716d" } ], "credits": [ { "name": "Dima Stebaev" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0103", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-2024.json
{ "schema_version": "1.3.1", "id": "GO-2023-2024", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-40583", "GHSA-gcq9-qqwx-rgj3" ], "summary": "Out-of-memory vulnerability in github.com/libp2p/go-libp2p", "details": "A malicious actor can store an arbitrary amount of data in the memory of a remote node by sending the node a message with a signed peer record. Signed peer records from randomly generated peers can be sent by a malicious actor. This memory does not get garbage collected and so the remote node can run out of memory (OOM).", "affected": [ { "package": { "name": "github.com/libp2p/go-libp2p", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.27.4" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/libp2p/go-libp2p/core/record", "symbols": [ "ConsumeEnvelope" ] }, { "path": "github.com/libp2p/go-libp2p/p2p/protocol/identify", "symbols": [ "idService.IdentifyConn", "idService.IdentifyWait", "idService.consumeMessage", "netNotifiee.Connected" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/libp2p/go-libp2p/security/advisories/GHSA-gcq9-qqwx-rgj3" }, { "type": "FIX", "url": "https://github.com/libp2p/go-libp2p/commit/45d3c6fff662ddd6938982e7e9309ad5fa2ad8dd" } ], "credits": [ { "name": "Marten Seemann" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-2024", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0980.json
{ "schema_version": "1.3.1", "id": "GO-2022-0980", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2022-38149", "GHSA-8449-7gc2-pwrp" ], "summary": "Exposure of Vault secrets via error messages in github.com/hashicorp/consul-template", "details": "The text of errors returned by Template.Execute can contain Vault secrets, potentially revealing these secrets in logs or error reports.", "affected": [ { "package": { "name": "github.com/hashicorp/consul-template", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.27.3" }, { "introduced": "0.28.0" }, { "fixed": "0.28.3" }, { "introduced": "0.29.0" }, { "fixed": "0.29.2" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/hashicorp/consul-template/template", "symbols": [ "Template.Execute" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://discuss.hashicorp.com/t/hsec-2022-16-consul-template-may-expose-vault-secrets-when-processing-invalid-input/43215" }, { "type": "FIX", "url": "https://github.com/hashicorp/consul-template/commit/d6a6f4af219c28e67d847ba0e0b2bea8f5bb9076" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0980", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2632.json
{ "schema_version": "1.3.1", "id": "GO-2024-2632", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-28122", "GHSA-hj3v-m684-v259" ], "summary": "JWX vulnerable to a denial of service attack using compressed JWE message in github.com/lestrrat-go/jwx", "details": "An attacker with a trusted public key may cause a Denial-of-Service (DoS) condition by crafting a malicious JSON Web Encryption (JWE) token with an exceptionally high compression ratio. When this token is processed by the recipient, it results in significant memory allocation and processing time during decompression.", "affected": [ { "package": { "name": "github.com/lestrrat-go/jwx", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.2.29" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/lestrrat-go/jwx/jwe", "symbols": [ "Decrypt", "Message.Decrypt", "uncompress" ] } ] } }, { "package": { "name": "github.com/lestrrat-go/jwx/v2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "2.0.21" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/lestrrat-go/jwx/v2/jwe", "symbols": [ "Decrypt", "Settings", "decryptCtx.decryptContent", "uncompress" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/lestrrat-go/jwx/security/advisories/GHSA-hj3v-m684-v259" }, { "type": "FIX", "url": "https://github.com/lestrrat-go/jwx/commit/d01027d74c7376d66037a10f4f64af9af26a7e34" }, { "type": "FIX", "url": "https://github.com/lestrrat-go/jwx/commit/d43f2ceb7f0c13714dfe8854d6439766e86faa76" }, { "type": "WEB", "url": "https://github.com/lestrrat-go/jwx/releases/tag/v1.2.29" }, { "type": "WEB", "url": "https://github.com/lestrrat-go/jwx/releases/tag/v2.0.21" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2632", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-1166.json
{ "schema_version": "1.3.1", "id": "GO-2022-1166", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2022-23526", "GHSA-67fx-wx78-jx33" ], "summary": "Denial of service via schema file in helm.sh/helm/v3", "details": "Certain JSON schema validation files can cause a Helm Client to panic, leading to a possible denial of service.\n\nThe chartutil package contains a parser that loads a JSON Schema validation file. For example, the Helm client when rendering a chart will validate its values with the schema file. The chartutil package parses the schema file and loads it into memory, but some schema files can cause array data structures to be created causing a memory violation.\n\nThe Helm Client will panic with a schema file that causes a memory violation panic. Helm is not a long running service so the panic will not affect future uses of the Helm client.", "affected": [ { "package": { "name": "helm.sh/helm/v3", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "3.10.3" } ] } ], "ecosystem_specific": { "imports": [ { "path": "helm.sh/helm/v3/pkg/chartutil", "symbols": [ "ToRenderValues", "ValidateAgainstSchema", "ValidateAgainstSingleSchema" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/helm/helm/security/advisories/GHSA-67fx-wx78-jx33" }, { "type": "FIX", "url": "https://github.com/helm/helm/commit/bafafa8bb1b571b61d7a9528da8d40c307dade3d" } ], "credits": [ { "name": "Ada Logics, in a fuzzing audit sponsored by CNCF" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-1166", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2744.json
{ "schema_version": "1.3.1", "id": "GO-2024-2744", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "GHSA-x883-2vmg-xwf7" ], "summary": "Access control change may take longer than expected in github.com/authelia/authelia/v4", "details": "If the file authentication backend is being used, the ewatch option is set to true, the refresh interval is configured to a non-disabled value, and an administrator changes a user's groups, then that user may be able to access resources that their previous groups had access to.", "affected": [ { "package": { "name": "github.com/authelia/authelia/v4", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "4.37.0" }, { "fixed": "4.38.0" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/authelia/authelia/security/advisories/GHSA-x883-2vmg-xwf7" }, { "type": "WEB", "url": "https://github.com/authelia/authelia/blob/v4.37.5/internal/handlers/handler_verify.go#L376-L394" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2744", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2859.json
{ "schema_version": "1.3.1", "id": "GO-2024-2859", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-31216", "GHSA-v554-xwgw-hc3w" ], "summary": "source-controller leaks Azure Storage SAS token into logs in github.com/fluxcd/source-controller", "details": "source-controller leaks Azure Storage SAS token into logs in github.com/fluxcd/source-controller", "affected": [ { "package": { "name": "github.com/fluxcd/source-controller", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.2.5" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/fluxcd/source-controller/security/advisories/GHSA-v554-xwgw-hc3w" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31216" }, { "type": "FIX", "url": "https://github.com/fluxcd/source-controller/commit/915d1a072a4f37dd460ba33079dc094aa6e72fa9" }, { "type": "FIX", "url": "https://github.com/fluxcd/source-controller/pull/1430" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2859", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0438.json
{ "schema_version": "1.3.1", "id": "GO-2022-0438", "modified": "0001-01-01T00:00:00Z", "published": "2022-07-01T20:07:52Z", "aliases": [ "CVE-2022-29810", "GHSA-27rq-4943-qcwp" ], "summary": "Exposure of sensitive information via log file in github.com/hashicorp/go-getter", "details": "The getter package can write SSH credentials to its logfile, exposing credentials to local users able to read the logfile.", "affected": [ { "package": { "name": "github.com/hashicorp/go-getter", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.5.11" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/hashicorp/go-getter", "symbols": [ "Client.ChecksumFromFile", "Client.Get", "FolderStorage.Get", "Get", "GetAny", "GetFile", "HttpGetter.Get", "RedactURL" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/hashicorp/go-getter/pull/348" }, { "type": "FIX", "url": "https://github.com/hashicorp/go-getter/commit/36b68b2f68a3ed10ee7ecbb0cb9f6b1dc5da49cc" }, { "type": "WEB", "url": "https://github.com/hashicorp/go-getter/releases/tag/v1.5.11" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0438", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1705.json
{ "schema_version": "1.3.1", "id": "GO-2023-1705", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-24536" ], "summary": "Excessive resource consumption in net/http, net/textproto and mime/multipart", "details": "Multipart form parsing can consume large amounts of CPU and memory when processing form inputs containing very large numbers of parts.\n\nThis stems from several causes:\n\n1. mime/multipart.Reader.ReadForm limits the total memory a parsed multipart form can consume. ReadForm can undercount the amount of memory consumed, leading it to accept larger inputs than intended.\n2. Limiting total memory does not account for increased pressure on the garbage collector from large numbers of small allocations in forms with many parts.\n3. ReadForm can allocate a large number of short-lived buffers, further increasing pressure on the garbage collector.\n\nThe combination of these factors can permit an attacker to cause an program that parses multipart forms to consume large amounts of CPU and memory, potentially resulting in a denial of service. This affects programs that use mime/multipart.Reader.ReadForm, as well as form parsing in the net/http package with the Request methods FormFile, FormValue, ParseMultipartForm, and PostFormValue.\n\nWith fix, ReadForm now does a better job of estimating the memory consumption of parsed forms, and performs many fewer short-lived allocations.\n\nIn addition, the fixed mime/multipart.Reader imposes the following limits on the size of parsed forms:\n\n1. Forms parsed with ReadForm may contain no more than 1000 parts. This limit may be adjusted with the environment variable GODEBUG=multipartmaxparts=.\n2. Form parts parsed with NextPart and NextRawPart may contain no more than 10,000 header fields. In addition, forms parsed with ReadForm may contain no more than 10,000 header fields across all parts. This limit may be adjusted with the environment variable GODEBUG=multipartmaxheaders=.", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.19.8" }, { "introduced": "1.20.0-0" }, { "fixed": "1.20.3" } ] } ], "ecosystem_specific": { "imports": [ { "path": "mime/multipart", "symbols": [ "Part.populateHeaders", "Reader.NextPart", "Reader.NextRawPart", "Reader.ReadForm", "Reader.nextPart", "Reader.readForm", "mimeHeaderSize", "newPart", "readMIMEHeader" ] }, { "path": "net/textproto", "symbols": [ "Reader.ReadMIMEHeader", "readMIMEHeader" ] } ] } } ], "references": [ { "type": "REPORT", "url": "https://go.dev/issue/59153" }, { "type": "FIX", "url": "https://go.dev/cl/482076" }, { "type": "FIX", "url": "https://go.dev/cl/482075" }, { "type": "FIX", "url": "https://go.dev/cl/482077" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8" } ], "credits": [ { "name": "Jakob Ackermann (@das7pad)" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-1705", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2800.json
{ "schema_version": "1.3.1", "id": "GO-2024-2800", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-3817", "GHSA-q64h-39hv-4cf7" ], "summary": "Argument injection when fetching remote default Git branches in github.com/hashicorp/go-getter", "details": "When go-getter is performing a Git operation, go-getter will try to clone the given repository. If a Git reference is not passed along with the Git url, go-getter will then try to check the remote repository's HEAD reference of its default branch by passing arguments to the Git binary on the host it is executing on.\n\nAn attacker may format a Git URL in order to inject additional Git arguments to the Git call.", "affected": [ { "package": { "name": "github.com/hashicorp/go-getter", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "1.5.9" }, { "fixed": "1.7.4" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/hashicorp/go-getter", "symbols": [ "Client.ChecksumFromFile", "Client.Get", "FolderStorage.Get", "Get", "GetAny", "GetFile", "GitGetter.Get", "GitGetter.GetFile", "GitGetter.clone", "HttpGetter.Get", "findRemoteDefaultBranch" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-q64h-39hv-4cf7" }, { "type": "FIX", "url": "https://github.com/hashicorp/go-getter/commit/268c11cae8cf0d9374783e06572679796abe9ce9" }, { "type": "WEB", "url": "https://discuss.hashicorp.com/t/hcsec-2024-09-hashicorp-go-getter-vulnerable-to-argument-injection-when-fetching-remote-default-git-branches/66040" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2800", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2657.json
{ "schema_version": "1.3.1", "id": "GO-2024-2657", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-28250", "GHSA-v6q2-4qr3-5cw6" ], "summary": "Unencrypted traffic between nodes with WireGuard in github.com/cilium/cilium", "details": "In Cilium clusters with WireGuard enabled and traffic matching Layer 7 policies: traffic that should be WireGuard-encrypted is sent unencrypted between a node's Envoy proxy and pods on other nodes, and traffic that should be WireGuard-encrypted is sent unencrypted between a node's DNS proxy and pods on other nodes.", "affected": [ { "package": { "name": "github.com/cilium/cilium", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "1.14.0" }, { "fixed": "1.14.8" }, { "introduced": "1.15.0" }, { "fixed": "1.15.2" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/cilium/cilium/security/advisories/GHSA-v6q2-4qr3-5cw6" } ], "credits": [ { "name": "@brb" }, { "name": "@giorio94" }, { "name": "@gandro" }, { "name": "@jschwinger233" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2657", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2020-0010.json
{ "schema_version": "1.3.1", "id": "GO-2020-0010", "modified": "0001-01-01T00:00:00Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2016-9121", "GHSA-86r9-39j9-99wp" ], "summary": "Elliptic curve key disclosure in github.com/square/go-jose", "details": "When using ECDH-ES an attacker can mount an invalid curve attack during decryption as the supplied public key is not checked to be on the same curve as the receivers private key.", "affected": [ { "package": { "name": "github.com/square/go-jose", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.0.4" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/square/go-jose/cipher", "symbols": [ "DeriveECDHES" ] }, { "path": "github.com/square/go-jose", "symbols": [ "JsonWebEncryption.Decrypt", "JsonWebKey.UnmarshalJSON", "ecDecrypterSigner.decryptKey", "rawJsonWebKey.ecPublicKey" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/square/go-jose/commit/c7581939a3656bb65e89d64da0a52364a33d2507" }, { "type": "WEB", "url": "https://www.openwall.com/lists/oss-security/2016/11/03/1" } ], "credits": [ { "name": "Quan Nguyen from Google's Information Security Engineering Team" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2020-0010", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0762.json
{ "schema_version": "1.3.1", "id": "GO-2022-0762", "modified": "0001-01-01T00:00:00Z", "published": "2021-05-18T21:07:37Z", "aliases": [ "CVE-2021-29272", "GHSA-3x58-xr87-2fcj" ], "summary": "Cross-site scripting due to incorrect sanitization in github.com/microcosm-cc/bluemonday", "details": "An XSS injection was possible because the sanitization of the Cyrillic character i bypass a protection mechanism against user-inputted HTML elements such as the \u003cscript\u003e tag.", "affected": [ { "package": { "name": "github.com/microcosm-cc/bluemonday", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.0.5" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/microcosm-cc/bluemonday", "symbols": [ "Policy.Sanitize", "Policy.SanitizeBytes", "Policy.SanitizeReader", "Policy.sanitize" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/microcosm-cc/bluemonday/commit/524f142fe46e945b7dcd291d7805c4b7dcf75bee" }, { "type": "WEB", "url": "https://github.com/microcosm-cc/bluemonday/issues/111" }, { "type": "WEB", "url": "https://github.com/microcosm-cc/bluemonday/releases/tag/v1.0.5" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0762", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-2160.json
{ "schema_version": "1.3.1", "id": "GO-2023-2160", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-46239", "GHSA-3q6m-v84f-6p9h" ], "summary": "Panic during QUIC handshake in github.com/quic-go/quic-go", "details": "The QUIC handshake can cause a panic when processing a certain sequence of frames. A malicious peer can deliberately trigger this panic.", "affected": [ { "package": { "name": "github.com/quic-go/quic-go", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0.37.0" }, { "fixed": "0.37.3" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/quic-go/quic-go" } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/quic-go/quic-go/security/advisories/GHSA-3q6m-v84f-6p9h" }, { "type": "FIX", "url": "https://github.com/quic-go/quic-go/commit/b6a4725b60f1fe04e8f1ddcc3114e290fcea1617" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-2160", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2020-0027.json
{ "schema_version": "1.3.1", "id": "GO-2020-0027", "modified": "0001-01-01T00:00:00Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2018-6558", "GHSA-qj26-7grj-whg3" ], "summary": "Privilege escalation in github.com/google/fscrypt", "details": "After dropping and then elevating process privileges euid, guid, and groups are not properly restored to their original values, allowing an unprivileged user to gain membership in the root group.", "affected": [ { "package": { "name": "github.com/google/fscrypt", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.2.4" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/google/fscrypt/pam", "symbols": [ "Handle.StartAsPamUser", "Handle.StopAsPamUser", "NewHandle" ] }, { "path": "github.com/google/fscrypt/security", "symbols": [ "FindKey", "InsertKey", "RemoveKey", "SetProcessPrivileges", "UserKeyringID", "setGids", "setGroups", "setUids" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/google/fscrypt/commit/3022c1603d968c22f147b4a2c49c4637dd1be91b" }, { "type": "WEB", "url": "https://github.com/google/fscrypt/issues/77" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2020-0027", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2459.json
{ "schema_version": "1.3.1", "id": "GO-2024-2459", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-49295", "GHSA-ppxx-5m9h-6vxf" ], "summary": "Denial of service via path validation in github.com/quic-go/quic-go", "details": "Denial of service via path validation in github.com/quic-go/quic-go", "affected": [ { "package": { "name": "github.com/quic-go/quic-go", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.37.7" }, { "introduced": "0.38.0" }, { "fixed": "0.38.2" }, { "introduced": "0.39.0" }, { "fixed": "0.39.4" }, { "introduced": "0.40.0" }, { "fixed": "0.40.1" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-49295" }, { "type": "FIX", "url": "https://github.com/quic-go/quic-go/commit/17fc98c2d81dbe685c19702dc694a9d606ac56dc" }, { "type": "FIX", "url": "https://github.com/quic-go/quic-go/commit/21609ddfeff93668c7625a85eb09f1541fdad965" }, { "type": "FIX", "url": "https://github.com/quic-go/quic-go/commit/3a9c18bcd27a01c551ac9bf8bd2b4bded77c189a" }, { "type": "FIX", "url": "https://github.com/quic-go/quic-go/commit/554d543b50b917369fb1394cc5396d928166cf49" }, { "type": "FIX", "url": "https://github.com/quic-go/quic-go/commit/6cc3d58935426191296171a6c0d1ee965e10534e" }, { "type": "FIX", "url": "https://github.com/quic-go/quic-go/commit/9aaefe19fc3dc8c8917cc87e6128bb56d9e9e6cc" }, { "type": "FIX", "url": "https://github.com/quic-go/quic-go/commit/a0ffa757499913f7be69aa78f573a6aee3430ae4" }, { "type": "FIX", "url": "https://github.com/quic-go/quic-go/commit/d7aa627ebde91cf799ada2a07443faa9b1e5abb8" }, { "type": "WEB", "url": "https://seemann.io/posts/2023-12-18-exploiting-quics-path-validation/" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2459", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1832.json
{ "schema_version": "1.3.1", "id": "GO-2023-1832", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-33959", "GHSA-xhg5-42rf-296r" ], "summary": "Verification bypass in github.com/notaryproject/notation-go", "details": "An attacker who controls or compromises a registry can lead a user to verify the wrong artifact.", "affected": [ { "package": { "name": "github.com/notaryproject/notation-go", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.0.0-rc.6" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/notaryproject/notation-go", "symbols": [ "Sign", "Verify" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/notaryproject/notation-go/security/advisories/GHSA-xhg5-42rf-296r" }, { "type": "FIX", "url": "https://github.com/notaryproject/notation-go/commit/39c8ed050a65cca3f3f308534acb612096735a64" }, { "type": "FIX", "url": "https://github.com/notaryproject/notation-go/commit/eba60f5aed9c9e05dee55324423c95fe34700b4c" }, { "type": "WEB", "url": "https://github.com/notaryproject/notation-go/releases/tag/v1.0.0-rc.6" } ], "credits": [ { "name": "Adam Korczynski (@AdamKorcz)" }, { "name": "Shiwei Zhang (@shizhMSFT)" }, { "name": "Pritesh Bandi (@priteshbandi)" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-1832", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0068.json
{ "schema_version": "1.3.1", "id": "GO-2021-0068", "modified": "0001-01-01T00:00:00Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2021-3115" ], "summary": "Arbitrary code injection via the go command with cgo on Windows in cmd/go", "details": "The go command may execute arbitrary code at build time when using cgo on Windows. This can be triggered by running go get on a malicious module, or any other time the code is built.", "affected": [ { "package": { "name": "toolchain", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.14.14" }, { "introduced": "1.15.0-0" }, { "fixed": "1.15.7" } ] } ], "ecosystem_specific": { "imports": [ { "path": "cmd/go", "goos": [ "windows" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/284783" }, { "type": "FIX", "url": "https://go.googlesource.com/go/+/953d1feca9b21af075ad5fc8a3dad096d3ccc3a0" }, { "type": "REPORT", "url": "https://go.dev/issue/43783" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/mperVMGa98w/m/yo5W5wnvAAAJ" }, { "type": "FIX", "url": "https://go.dev/cl/284780" }, { "type": "FIX", "url": "https://go.googlesource.com/go/+/46e2e2e9d99925bbf724b12693c6d3e27a95d6a0" } ], "credits": [ { "name": "RyotaK" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0068", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2469.json
{ "schema_version": "1.3.1", "id": "GO-2024-2469", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "GHSA-f6jh-hvg2-9525" ], "summary": "Kyberslash timing attack possible in github.com/kudelskisecurity/crystals-go", "details": "Kyberslash timing attack possible in github.com/kudelskisecurity/crystals-go", "affected": [ { "package": { "name": "github.com/kudelskisecurity/crystals-go", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.0.0-20240116172146-2a6ca2d4e64d" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/kudelskisecurity/crystals-go/crystals-kyber", "symbols": [ "Kyber.Decaps", "Kyber.Decrypt", "Kyber.Encaps" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/kudelskisecurity/crystals-go/security/advisories/GHSA-f6jh-hvg2-9525" }, { "type": "FIX", "url": "https://github.com/kudelskisecurity/crystals-go/pull/20" }, { "type": "FIX", "url": "https://github.com/kudelskisecurity/crystals-go/pull/21" }, { "type": "REPORT", "url": "https://github.com/kudelskisecurity/crystals-go/issues/19" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2469", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0237.json
{ "schema_version": "1.3.1", "id": "GO-2021-0237", "modified": "0001-01-01T00:00:00Z", "published": "2022-01-11T17:18:11Z", "aliases": [ "CVE-2021-32721", "GHSA-mj9r-wwm8-7q52" ], "summary": "Open redirect in github.com/AndrewBurian/powermux", "details": "Attackers may be able to craft phishing links and other open redirects by exploiting PowerMux's trailing slash redirection feature. This may lead to users being redirected to untrusted sites after following an attacker crafted link.", "affected": [ { "package": { "name": "github.com/AndrewBurian/powermux", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.1.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/AndrewBurian/powermux", "symbols": [ "Route.execute", "ServeMux.Handler", "ServeMux.HandlerAndMiddleware", "ServeMux.ServeHTTP" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/AndrewBurian/powermux/pull/42" }, { "type": "FIX", "url": "https://github.com/AndrewBurian/powermux/commit/5e60a8a0372b35a898796c2697c40e8daabed8e9" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0237", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2919.json
{ "schema_version": "1.3.1", "id": "GO-2024-2919", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-5154", "GHSA-j9hf-98c3-wrm8" ], "summary": "malicious container creates symlink \"mtab\" on the host External in github.com/cri-o/cri-o", "details": "malicious container creates symlink \"mtab\" on the host External in github.com/cri-o/cri-o", "affected": [ { "package": { "name": "github.com/cri-o/cri-o", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "1.28.6" }, { "fixed": "1.28.7" }, { "introduced": "1.29.4" }, { "fixed": "1.29.5" }, { "introduced": "1.30.0" }, { "fixed": "1.30.1" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/cri-o/cri-o/security/advisories/GHSA-j9hf-98c3-wrm8" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-5154" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2024:3676" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2024:3700" }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2024-5154" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280190" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2919", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0178.json
{ "schema_version": "1.3.1", "id": "GO-2021-0178", "modified": "0001-01-01T00:00:00Z", "published": "2022-01-07T20:35:00Z", "aliases": [ "CVE-2017-15042" ], "summary": "Cleartext transmission of credentials in net/smtp", "details": "SMTP clients using net/smtp can use the PLAIN authentication scheme on network connections not secured with TLS, exposing passwords to man-in-the-middle SMTP servers.", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "1.1.0-0" }, { "fixed": "1.8.4" }, { "introduced": "1.9.0-0" }, { "fixed": "1.9.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "net/smtp", "symbols": [ "plainAuth.Start" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/68170" }, { "type": "FIX", "url": "https://go.googlesource.com/go/+/ec3b6131de8f9c9c25283260c95c616c74f6d790" }, { "type": "REPORT", "url": "https://go.dev/issue/22134" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-dev/c/RinSE3EiJBI/m/kYL7zb07AgAJ" } ], "credits": [ { "name": "Stevie Johnstone" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0178", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1547.json
{ "schema_version": "1.3.1", "id": "GO-2023-1547", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-25165", "GHSA-pwcw-6f5g-gxf8" ], "summary": "Information disclosure in helm.sh/helm/v3", "details": "An information disclosure vulnerability exists in the getHostByName template function.\n\nThe function getHostByName is a Helm template function introduced in Helm v3. The function is able to accept a hostname and return an IP address for that hostname. To get the IP address the function performs a DNS lookup. The DNS lookup happens when used with \"helm install|upgrade|template\" or when the Helm SDK is used to render a chart.\n\nInformation passed into the chart can be disclosed to the DNS servers used to lookup the IP address. For example, a malicious chart could inject getHostByName into a chart in order to disclose values to a malicious DNS server.", "affected": [ { "package": { "name": "helm.sh/helm/v3", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "3.11.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "helm.sh/helm/v3/cmd/helm", "symbols": [ "addInstallFlags", "main", "newUpgradeCmd" ] }, { "path": "helm.sh/helm/v3/pkg/action", "symbols": [ "Configuration.renderResources", "Install.Run", "Install.RunWithContext", "Lint.Run", "Upgrade.Run", "Upgrade.RunWithContext", "Upgrade.prepareUpgrade" ] }, { "path": "helm.sh/helm/v3/pkg/engine", "symbols": [ "Engine.Render", "Engine.initFunMap", "Render", "RenderWithClient" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/helm/helm/security/advisories/GHSA-pwcw-6f5g-gxf8" }, { "type": "FIX", "url": "https://github.com/helm/helm/commit/293b50c65d4d56187cd4e2f390f0ada46b4c4737" } ], "credits": [ { "name": "Philipp Stehle of SAP" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-1547", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0345.json
{ "schema_version": "1.3.1", "id": "GO-2022-0345", "modified": "0001-01-01T00:00:00Z", "published": "2022-07-15T23:30:21Z", "aliases": [ "CVE-2021-3602", "GHSA-7638-r9r3-rmjj" ], "summary": "Environment variable leakage in github.com/containers/buildah", "details": "The RunUsingChroot function unintentionally propagates environment variables from the current process to the child process.", "affected": [ { "package": { "name": "github.com/containers/buildah", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.22.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/containers/buildah/chroot", "symbols": [ "RunUsingChroot" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/containers/buildah/commit/a468ce0ffd347035d53ee0e26c205ef604097fb0" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0345", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0461.json
{ "schema_version": "1.3.1", "id": "GO-2022-0461", "modified": "0001-01-01T00:00:00Z", "published": "2022-07-01T20:07:25Z", "aliases": [ "CVE-2022-29189", "GHSA-cx94-mrg9-rq4j" ], "summary": "Unbounded memory consumption in github.com/pion/dtls/v2", "details": "Attacker can cause unbounded memory consumption.\n\nThe Pion DTLS client and server buffer handshake data with no upper limit, permitting an attacker to cause unbounded memory consumption by sending an unterminated handshake.", "affected": [ { "package": { "name": "github.com/pion/dtls/v2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "2.1.4" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/pion/dtls/v2", "symbols": [ "Client", "ClientWithContext", "Dial", "DialWithContext", "Resume", "Server", "ServerWithContext", "fragmentBuffer.push", "handshakeFSM.Run", "listener.Accept" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/pion/dtls/commit/a6397ff7282bc56dc37a68ea9211702edb4de1de" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0461", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2604.json
{ "schema_version": "1.3.1", "id": "GO-2024-2604", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-27302", "GHSA-fgxv-gw55-r5fq" ], "summary": "CORS Filter bypass in github.com/zeromicro/go-zero", "details": "The CORS Filter feature in go-zero allows users to specify an array of domains allowed in the CORS policy. However, the isOriginAllowed function uses strings.HasSuffix to check the origin, which can lead to a bypass via a domain like \"evil-victim.com\". This vulnerability is capable of breaking CORS policy and thus allowing any page to make requests and retrieve data on behalf of other users.", "affected": [ { "package": { "name": "github.com/zeromicro/go-zero", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.4.4" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/zeromicro/go-zero/rest/internal/cors", "symbols": [ "isOriginAllowed" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/zeromicro/go-zero/security/advisories/GHSA-fgxv-gw55-r5fq" }, { "type": "FIX", "url": "https://github.com/zeromicro/go-zero/commit/d9d79e930dff6218a873f4f02115df61c38b15db" } ], "credits": [ { "name": "cokeBeer" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2604", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-2153.json
{ "schema_version": "1.3.1", "id": "GO-2023-2153", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "GHSA-m425-mq94-257g" ], "related": [ "CVE-2023-44487" ], "summary": "Denial of service from HTTP/2 Rapid Reset in google.golang.org/grpc", "details": "An attacker can send HTTP/2 requests, cancel them, and send subsequent requests. This is valid by the HTTP/2 protocol, but would cause the gRPC-Go server to launch more concurrent method handlers than the configured maximum stream limit, grpc.MaxConcurrentStreams. This results in a denial of service due to resource consumption.", "affected": [ { "package": { "name": "google.golang.org/grpc", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.56.3" }, { "introduced": "1.57.0" }, { "fixed": "1.57.1" }, { "introduced": "1.58.0" }, { "fixed": "1.58.3" } ] } ], "ecosystem_specific": { "imports": [ { "path": "google.golang.org/grpc/internal/transport", "symbols": [ "NewServerTransport" ] }, { "path": "google.golang.org/grpc", "symbols": [ "NewServer", "Server.Serve", "Server.initServerWorkers" ] } ] } } ], "references": [ { "type": "WEB", "url": "https://github.com/grpc/grpc-go/pull/6703" }, { "type": "FIX", "url": "https://github.com/grpc/grpc-go/commit/f2180b4d5403d2210b30b93098eb7da31c05c721" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-2153", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2689.json
{ "schema_version": "1.3.1", "id": "GO-2024-2689", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-2689", "GHSA-wmxc-v39r-p9wf" ], "summary": "Temporal Server Denial of Service in go.temporal.io/server", "details": "Temporal Server Denial of Service in go.temporal.io/server", "affected": [ { "package": { "name": "go.temporal.io/server", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.20.5" }, { "introduced": "1.21.0" }, { "fixed": "1.21.6" }, { "introduced": "1.22.0-rc1" }, { "fixed": "1.22.7" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-wmxc-v39r-p9wf" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-2689" }, { "type": "WEB", "url": "https://github.com/temporalio/temporal/commit/2099dfd945accbf794404c3b8d990d109de19f06" }, { "type": "WEB", "url": "https://github.com/temporalio/temporal/commit/679e3dc2ca8bd39e02c760f686cc8807f817bbfd" }, { "type": "WEB", "url": "https://github.com/temporalio/temporal/commit/f1fab97129f964dcca17d1f7c344f38666d1ee5f" }, { "type": "WEB", "url": "https://github.com/temporalio/temporal/releases" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2689", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2783.json
{ "schema_version": "1.3.1", "id": "GO-2024-2783", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2022-3800", "GHSA-rwcf-gq22-ph83" ], "summary": "IBAX go-ibax vulnerable to SQL injection in github.com/IBAX-io/go-ibax", "details": "IBAX go-ibax vulnerable to SQL injection in github.com/IBAX-io/go-ibax", "affected": [ { "package": { "name": "github.com/IBAX-io/go-ibax", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.4.2" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-rwcf-gq22-ph83" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3800" }, { "type": "FIX", "url": "https://github.com/IBAX-io/go-ibax/commit/b0183d8e550836dc50282ee74ff421ee41b25a37" }, { "type": "REPORT", "url": "https://github.com/IBAX-io/go-ibax/issues/2061" }, { "type": "WEB", "url": "https://vuldb.com/?id.212636" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2783", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-2386.json
{ "schema_version": "1.3.1", "id": "GO-2023-2386", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-45292", "GHSA-5mmw-p5qv-w3x5" ], "summary": "Captcha verification bypass in github.com/mojocn/base64Captcha", "details": "When using the default implementation of Verify to check a Captcha, verification can be bypassed.\n\nFor example, if the first parameter is a non-existent id, the second parameter is an empty string, and the third parameter is true, the function will always consider the Captcha to be correct.", "affected": [ { "package": { "name": "github.com/mojocn/base64Captcha", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.3.6" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/mojocn/base64Captcha", "symbols": [ "memoryStore.Verify" ] } ] } } ], "references": [ { "type": "REPORT", "url": "https://github.com/mojocn/base64Captcha/issues/120" }, { "type": "FIX", "url": "https://github.com/mojocn/base64Captcha/commit/9b11012caca58925f1e47c770f79f2fa47e3ad13" }, { "type": "FIX", "url": "https://github.com/mojocn/base64Captcha/commit/5ab86bd6f333aad3936f912fc52b411168dcd4a7" } ], "credits": [ { "name": "@cangkuai" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-2386", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2753.json
{ "schema_version": "1.3.1", "id": "GO-2024-2753", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2020-8557", "GHSA-55qj-gj3x-jq9r" ], "summary": "Denial of service in Kubernetes in k8s.io/kubernetes", "details": "Denial of service in Kubernetes in k8s.io/kubernetes", "affected": [ { "package": { "name": "k8s.io/kubernetes", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "1.1.0" }, { "fixed": "1.16.13" }, { "introduced": "1.17.0" }, { "fixed": "1.17.9" }, { "introduced": "1.18.0" }, { "fixed": "1.18.6" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-55qj-gj3x-jq9r" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8557" }, { "type": "WEB", "url": "https://github.com/kubernetes/kubernetes/commit/530f199b6e07cdaab32361e39709ac45f3fdc446" }, { "type": "WEB", "url": "https://github.com/kubernetes/kubernetes/commit/68750fefd3df76b7b008ef7b18e8acd18d5c2f2e" }, { "type": "WEB", "url": "https://github.com/kubernetes/kubernetes/commit/7fd849cffa2f93061fbcb0a6ae4efd0539b1e981" }, { "type": "WEB", "url": "https://github.com/kubernetes/kubernetes/issues/93032" }, { "type": "WEB", "url": "https://github.com/kubernetes/kubernetes/pull/92921" }, { "type": "WEB", "url": "https://groups.google.com/g/kubernetes-security-announce/c/cB_JUsYEKyY/m/vVSO61AhBwAJ" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20200821-0002" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2753", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2020-0001.json
{ "schema_version": "1.3.1", "id": "GO-2020-0001", "modified": "0001-01-01T00:00:00Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2020-36567", "GHSA-6vm3-jj99-7229" ], "summary": "Arbitrary log line injection in github.com/gin-gonic/gin", "details": "The default Formatter for the Logger middleware (LoggerConfig.Formatter), which is included in the Default engine, allows attackers to inject arbitrary log entries by manipulating the request path.", "affected": [ { "package": { "name": "github.com/gin-gonic/gin", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.6.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/gin-gonic/gin", "symbols": [ "Default", "Logger", "LoggerWithConfig", "LoggerWithFormatter", "LoggerWithWriter" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/gin-gonic/gin/pull/2237" }, { "type": "FIX", "url": "https://github.com/gin-gonic/gin/commit/a71af9c144f9579f6dbe945341c1df37aaf09c0d" } ], "credits": [ { "name": "@thinkerou \u003cthinkerou@gmail.com\u003e" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2020-0001", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1497.json
{ "schema_version": "1.3.1", "id": "GO-2023-1497", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2022-23538", "GHSA-7p8m-22h4-9pj7" ], "summary": "Leaked user credentials in github.com/sylabs/scs-library-client", "details": "When the scs-library-client is used to pull a container image, with authentication, the HTTP Authorization header sent by the client to the library service may be incorrectly leaked to an S3 backing storage provider.", "affected": [ { "package": { "name": "github.com/sylabs/scs-library-client", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.3.4" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/sylabs/scs-library-client/client", "symbols": [ "Client.ConcurrentDownloadImage", "Client.UploadImage", "Client.httpGetRangeRequest" ] } ] } }, { "package": { "name": "github.com/sylabs/scs-library-client", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "1.4.0" }, { "fixed": "1.4.2" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/sylabs/scs-library-client/client", "symbols": [ "Client.ConcurrentDownloadImage", "Client.legacyDownloadImage" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/sylabs/scs-library-client/commit/68ac4cab5cda0afd8758ff5b5e2e57be6a22fcfa" }, { "type": "FIX", "url": "https://github.com/sylabs/scs-library-client/commit/eebd7caaab310b1fa803e55b8fc1acd9dcd2d00c" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-1497", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2819.json
{ "schema_version": "1.3.1", "id": "GO-2024-2819", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-32972", "GHSA-4xc9-8hmq-j652" ], "summary": "Denial of Service in github.com/ethereum/go-ethereum", "details": "A vulnerable node can be made to consume very large amounts of memory when handling specially crafted p2p messages sent from an attacker node. This can result in a denial of service as the node runs out of memory.", "affected": [ { "package": { "name": "github.com/ethereum/go-ethereum", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.13.15" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-4xc9-8hmq-j652" } ], "credits": [ { "name": "DongHan Kim" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2819", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0087.json
{ "schema_version": "1.3.1", "id": "GO-2021-0087", "modified": "0001-01-01T00:00:00Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2019-19921", "GHSA-fh74-hm69-rqjw" ], "summary": "Race condition in github.com/opencontainers/runc", "details": "A race while mounting volumes allows a possible symlink-exchange attack, allowing a user whom can start multiple containers with custom volume mount configurations to escape the container.", "affected": [ { "package": { "name": "github.com/opencontainers/runc", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.0.0-rc9.0.20200122160610-2fc03cc11c77" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/opencontainers/runc/libcontainer", "symbols": [ "mountToRootfs" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/opencontainers/runc/pull/2207" }, { "type": "FIX", "url": "https://github.com/opencontainers/runc/commit/2fc03cc11c775b7a8b2e48d7ee447cb9bef32ad0" }, { "type": "WEB", "url": "https://github.com/opencontainers/runc/issues/2197" } ], "credits": [ { "name": "Leopold Schabel" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0087", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-1043.json
{ "schema_version": "1.3.1", "id": "GO-2022-1043", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2022-39273", "GHSA-67x4-qr35-qvrm" ], "summary": "Hardcoded hashed password in github.com/flyteorg/flyteadmin", "details": "Default authorization server's configuration settings contain a known hardcoded hashed password.\n\nUsers who enable auth but do not override this setting may unknowingly allow public traffic in by way of this default password with attackers effectively impersonating propeller.", "affected": [ { "package": { "name": "github.com/flyteorg/flyteadmin", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "1.0.0" }, { "fixed": "1.1.44" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/flyteorg/flyteadmin/auth/config" } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-67x4-qr35-qvrm" }, { "type": "FIX", "url": "https://github.com/flyteorg/flyteadmin/pull/478" }, { "type": "WEB", "url": "https://docs.flyte.org/en/latest/deployment/cluster_config/auth_setup.html#oauth2-authorization-server" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-1043", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2568.json
{ "schema_version": "1.3.1", "id": "GO-2024-2568", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-25630", "GHSA-7496-fgv9-xw82" ], "summary": "Unencrypted ingress/health traffic when using Wireguard transparent encryption in github.com/cilium/cilium", "details": "Unencrypted ingress/health traffic when using Wireguard transparent encryption in github.com/cilium/cilium", "affected": [ { "package": { "name": "github.com/cilium/cilium", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.14.7" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/cilium/cilium/security/advisories/GHSA-7496-fgv9-xw82" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-25630" }, { "type": "WEB", "url": "https://docs.cilium.io/en/stable/security/network/encryption-wireguard/#encryption-wg" }, { "type": "WEB", "url": "https://github.com/cilium/cilium/releases/tag/v1.14.7" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2568", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2660.json
{ "schema_version": "1.3.1", "id": "GO-2024-2660", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-1394", "GHSA-78hx-gp6g-7mj6" ], "summary": "Memory leak in github.com/golang-fips/openssl/v2 and github.com/microsoft/go-crypto-openssl", "details": "Using crafted public RSA keys can cause a small memory leak when encrypting and verifying payloads. This can be gradually leveraged into a denial of service attack.", "affected": [ { "package": { "name": "github.com/golang-fips/openssl/v2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "2.0.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/golang-fips/openssl/v2", "symbols": [ "DecryptRSANoPadding", "DecryptRSAOAEP", "DecryptRSAPKCS1", "EncryptRSANoPadding", "EncryptRSAOAEP", "EncryptRSAPKCS1", "NewGCMTLS", "NewGCMTLS13", "NewRC4Cipher", "SignMarshalECDSA", "SignRSAPKCS1v15", "SignRSAPSS", "VerifyECDSA", "VerifyRSAPKCS1v15", "VerifyRSAPSS", "aesCipher.Decrypt", "aesCipher.Encrypt", "aesCipher.NewCBCDecrypter", "aesCipher.NewCBCEncrypter", "aesCipher.NewCTR", "aesCipher.NewGCM", "aesCipher.NewGCMTLS", "aesCipher.NewGCMTLS13", "desCipher.Decrypt", "desCipher.Encrypt", "desCipher.NewCBCDecrypter", "desCipher.NewCBCEncrypter", "desCipherWithoutCBC.Decrypt", "desCipherWithoutCBC.Encrypt", "newCipherCtx", "noGCM.Decrypt", "noGCM.Encrypt", "setupEVP" ] } ] } }, { "package": { "name": "github.com/microsoft/go-crypto-openssl", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.2.9" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/microsoft/go-crypto-openssl/openssl", "symbols": [ "DecryptRSANoPadding", "DecryptRSAOAEP", "DecryptRSAOAEPWithMGF1Hash", "DecryptRSAPKCS1", "EncryptRSANoPadding", "EncryptRSAOAEP", "EncryptRSAOAEPWithMGF1Hash", "EncryptRSAPKCS1", "SignMarshalECDSA", "SignRSAPKCS1v15", "SignRSAPSS", "VerifyECDSA", "VerifyRSAPKCS1v15", "VerifyRSAPSS", "setupEVP" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/golang-fips/openssl/commit/85d31d0d257ce842c8a1e63c4d230ae850348136" }, { "type": "FIX", "url": "https://github.com/microsoft/go-crypto-openssl/commit/104fe7f6912788d2ad44602f77a0a0a62f1f259f" } ], "credits": [ { "name": "@qmuntal and @r3kumar" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2660", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2440.json
{ "schema_version": "1.3.1", "id": "GO-2024-2440", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-43741", "GHSA-r5hg-349q-mg2q" ], "summary": "Buildkite Elastic CI for AWS time-of-check-time-of-use race condition vulnerability in github.com/buildkite/elastic-ci-stack-for-aws", "details": "Buildkite Elastic CI for AWS time-of-check-time-of-use race condition vulnerability in github.com/buildkite/elastic-ci-stack-for-aws", "affected": [ { "package": { "name": "github.com/buildkite/elastic-ci-stack-for-aws", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/buildkite/elastic-ci-stack-for-aws/v5", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/buildkite/elastic-ci-stack-for-aws/v6", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "6.7.1" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-r5hg-349q-mg2q" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-43741" }, { "type": "FIX", "url": "https://github.com/buildkite/elastic-ci-stack-for-aws/commit/edad0b158ea10a6647bb1c84629d93f5c3d8770e" }, { "type": "WEB", "url": "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2023-0003.md" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2440", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0209.json
{ "schema_version": "1.3.1", "id": "GO-2022-0209", "modified": "0001-01-01T00:00:00Z", "published": "2022-07-01T20:15:25Z", "aliases": [ "CVE-2019-11840", "GHSA-r5c5-pr8j-pfp7" ], "summary": "Insufficiently random values in golang.org/x/crypto/salsa20", "details": "XORKeyStream generates incorrect and insecure output for very large inputs.\n\nIf more than 256 GiB of keystream is generated, or if the counter otherwise grows greater than 32 bits, the amd64 implementation will first generate incorrect output, and then cycle back to previously generated keystream. Repeated keystream bytes can lead to loss of confidentiality in encryption applications, or to predictability in CSPRNG applications.\n\nThe issue might affect uses of golang.org/x/crypto/nacl with extremely large messages.\n\nArchitectures other than amd64 and uses that generate less than 256 GiB of keystream for a single salsa20.XORKeyStream invocation are unaffected.", "affected": [ { "package": { "name": "golang.org/x/crypto", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.0.0-20190320223903-b7391e95e576" } ] } ], "ecosystem_specific": { "imports": [ { "path": "golang.org/x/crypto/salsa20/salsa", "goarch": [ "amd64" ], "symbols": [ "XORKeyStream" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/168406" }, { "type": "FIX", "url": "https://go.googlesource.com/crypto/+/b7391e95e576cacdcdd422573063bc057239113d" }, { "type": "REPORT", "url": "https://go.dev/issue/30965" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/tjyNcJxb2vQ/m/n0NRBziSCAAJ" } ], "credits": [ { "name": "Michael McLoughlin" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0209", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2879.json
{ "schema_version": "1.3.1", "id": "GO-2024-2879", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-35223", "GHSA-284c-x8m7-9w5h" ], "summary": "Dapr API Token Exposure in github.com/dapr/dapr", "details": "Dapr API Token Exposure in github.com/dapr/dapr", "affected": [ { "package": { "name": "github.com/dapr/dapr", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "1.13.0" }, { "fixed": "1.13.3" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/dapr/dapr/security/advisories/GHSA-284c-x8m7-9w5h" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-35223" }, { "type": "FIX", "url": "https://github.com/dapr/dapr/commit/e0591e43d0cdfd30a2f2960dce5d9892dc98bc2c" }, { "type": "FIX", "url": "https://github.com/dapr/dapr/pull/7404" }, { "type": "REPORT", "url": "https://github.com/dapr/dapr/issues/7344" }, { "type": "WEB", "url": "https://github.com/dapr/dapr/releases/tag/v1.13.3" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2879", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0621.json
{ "schema_version": "1.3.1", "id": "GO-2022-0621", "modified": "0001-01-01T00:00:00Z", "published": "2021-05-18T15:38:54Z", "aliases": [ "CVE-2019-10223", "CVE-2019-17110", "GHSA-2v6x-frw8-7r7f", "GHSA-c92w-72c5-9x59" ], "summary": "Exposure of sensitive information in k8s.io/kube-state-metrics", "details": "Exposing annotations as metrics can leak secrets.\n\nAn experimental feature of kube-state-metrics enables annotations to be exposed as metrics. By default, metrics only expose metadata about secrets. However, a combination of the default kubectl behavior and this new feature can cause the entire secret content to end up in metric labels.", "affected": [ { "package": { "name": "k8s.io/kube-state-metrics", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "1.7.0" }, { "fixed": "1.7.2" } ] } ], "ecosystem_specific": { "imports": [ { "path": "k8s.io/kube-state-metrics/internal/store", "symbols": [ "Builder.Build", "kubeAnnotationsToPrometheusLabels" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/kubernetes/kube-state-metrics/commit/03122fe3e2df49a9a7298b8af921d3c37c430f7f" } ], "credits": [ { "name": "Moritz S." } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0621", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1681.json
{ "schema_version": "1.3.1", "id": "GO-2023-1681", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-0778", "GHSA-qwqv-rqgf-8qh8" ], "summary": "Time-of-check time-of-use race condition in github.com/containers/podman/v4", "details": "A Time-of-check Time-of-use (TOCTOU) flaw appears in this version of podman. This issue may allow a malicious user to replace a normal file in a volume with a symlink while exporting the volume, allowing for access to arbitrary files on the host file system.", "affected": [ { "package": { "name": "github.com/containers/podman/v4", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "4.4.2" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/containers/podman/v4/utils", "symbols": [ "CreateTarFromSrc" ] } ] } } ], "references": [ { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168256" }, { "type": "FIX", "url": "https://github.com/containers/podman/pull/17528" }, { "type": "FIX", "url": "https://github.com/containers/podman/pull/17532" }, { "type": "FIX", "url": "https://github.com/containers/podman/commit/6ca857feb07a5fdc96fd947afef03916291673d8" }, { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-qwqv-rqgf-8qh8" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-1681", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2485.json
{ "schema_version": "1.3.1", "id": "GO-2024-2485", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2020-10661", "GHSA-j6vv-vv26-rh7c" ], "summary": "HashiCorp Vault Improper Privilege Management in github.com/hashicorp/vault", "details": "HashiCorp Vault Improper Privilege Management in github.com/hashicorp/vault", "affected": [ { "package": { "name": "github.com/hashicorp/vault", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0.11.0" }, { "fixed": "1.3.4" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-j6vv-vv26-rh7c" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10661" }, { "type": "FIX", "url": "https://github.com/hashicorp/vault/commit/18485ee9d4352ac8e8396c580b5941ccf8e5b31a" }, { "type": "WEB", "url": "https://github.com/hashicorp/vault/blob/master/CHANGELOG.md#134-march-19th-2020" }, { "type": "WEB", "url": "https://www.hashicorp.com/blog/category/vault" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2485", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0187.json
{ "schema_version": "1.3.1", "id": "GO-2022-0187", "modified": "0001-01-01T00:00:00Z", "published": "2022-07-01T20:11:15Z", "aliases": [ "CVE-2017-8932" ], "summary": "Incorrect computation for P-256 curves in crypto/elliptic", "details": "The ScalarMult implementation of curve P-256 for amd64 architectures generates incorrect results for certain specific input points. An adaptive attack can progressively extract the scalar input to ScalarMult by submitting crafted points and observing failures to derive correct output. This leads to a full key recovery attack against static ECDH, as used in popular JWT libraries.", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "1.6.0-0" }, { "fixed": "1.7.6" }, { "introduced": "1.8.0-0" }, { "fixed": "1.8.2" } ] } ], "ecosystem_specific": { "imports": [ { "path": "crypto/elliptic", "goarch": [ "amd64" ], "symbols": [ "p256SubInternal" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/41070" }, { "type": "FIX", "url": "https://go.googlesource.com/go/+/9294fa2749ffee7edbbb817a0ef9fe633136fa9c" }, { "type": "REPORT", "url": "https://go.dev/issue/20040" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/B5ww0iFt1_Q/m/TgUFJV14BgAJ" } ], "credits": [ { "name": "Vlad Krasnov" }, { "name": "Filippo Valsorda at Cloudflare" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0187", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2930.json
{ "schema_version": "1.3.1", "id": "GO-2024-2930", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-32191", "GHSA-6gr4-52w6-vmqx" ], "summary": "RKE credentials are stored in the RKE1 Cluster state ConfigMap in github.com/rancher/rke", "details": "When RKE provisions a cluster, it stores the cluster state in a configmap called \"full-cluster-state\" inside the \"kube-system\" namespace of the cluster itself. This cluster state object contains information used to set up the K8s cluster, which may include sensitive data.", "affected": [ { "package": { "name": "github.com/rancher/rke", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "1.4.18" }, { "fixed": "1.4.19" }, { "introduced": "1.5.9" }, { "fixed": "1.5.10" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/rancher/rke/k8s", "symbols": [ "GetSecret", "GetSecretsList", "GetSystemSecret", "UpdateSecret" ] }, { "path": "github.com/rancher/rke/cluster", "symbols": [ "Cluster.CheckClusterPorts", "Cluster.CleanDeadLogs", "Cluster.CleanupNodes", "Cluster.ClusterRemove", "Cluster.DeployControlPlane", "Cluster.DeployRestoreCerts", "Cluster.DeployStateFile", "Cluster.DeployWorkerPlane", "Cluster.DisableSecretsEncryption", "Cluster.GetStateFileFromConfigMap", "Cluster.PrePullK8sImages", "Cluster.ReconcileDesiredStateEncryptionConfig", "Cluster.RewriteSecrets", "Cluster.RotateEncryptionKey", "Cluster.RunSELinuxCheck", "Cluster.SetUpHosts", "Cluster.StoreAddonConfigMap", "Cluster.SyncLabelsAndTaints", "Cluster.TunnelHosts", "Cluster.UpdateClusterCurrentState", "Cluster.UpgradeControlPlane", "Cluster.UpgradeWorkerPlane", "ConfigureCluster", "FullState.WriteStateFile", "GetClusterCertsFromKubernetes", "GetK8sVersion", "GetStateFromKubernetes", "ReadStateFile", "RebuildKubeconfig", "RebuildState", "ReconcileCluster", "ReconcileEncryptionProviderConfig", "RestartClusterPods", "SaveFullStateToKubernetes", "buildFreshState" ] }, { "path": "github.com/rancher/rke/cmd", "symbols": [ "ClusterInit", "ClusterRemove", "ClusterUp", "RestoreEtcdSnapshot", "RestoreEtcdSnapshotFromCli", "RetrieveClusterStateConfigMap", "RotateEncryptionKey", "SnapshotRemoveFromEtcdHosts", "SnapshotSaveEtcdHosts", "SnapshotSaveEtcdHostsFromCli", "getStateFile", "saveClusterState" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/rancher/rke/security/advisories/GHSA-6gr4-52w6-vmqx" }, { "type": "FIX", "url": "https://github.com/rancher/rke/commit/cf49199481a1891909acb1384eed73a5c987d5bd" }, { "type": "FIX", "url": "https://github.com/rancher/rke/commit/f7485b8dce376db0fc15a7c3ceb3de7029c8d0cf" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2930", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2968.json
{ "schema_version": "1.3.1", "id": "GO-2024-2968", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-39683", "GHSA-cvw9-c57h-3397" ], "summary": "ZITADEL Vulnerable to Session Information Leakage in github.com/zitadel/zitadel", "details": "ZITADEL Vulnerable to Session Information Leakage in github.com/zitadel/zitadel.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/zitadel/zitadel from v2.0.0 before v2.53.8, from v2.54.0 before v2.54.5, from v2.55.0 before v2.55.1.", "affected": [ { "package": { "name": "github.com/zitadel/zitadel", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "2.0.0" }, { "fixed": "2.53.8" }, { "introduced": "2.54.0" }, { "fixed": "2.54.5" }, { "introduced": "2.55.0" }, { "fixed": "2.55.1" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/zitadel/zitadel/security/advisories/GHSA-cvw9-c57h-3397" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-39683" }, { "type": "FIX", "url": "https://github.com/zitadel/zitadel/commit/4a262e42abac2208b02fefaf68ba1a5121649f04" }, { "type": "FIX", "url": "https://github.com/zitadel/zitadel/commit/c2093ce01507ca8fc811609ff5d391693360c3da" }, { "type": "FIX", "url": "https://github.com/zitadel/zitadel/commit/d04f208486a418a45b884b9ca8433e5ad9790d73" }, { "type": "FIX", "url": "https://github.com/zitadel/zitadel/pull/8231" }, { "type": "REPORT", "url": "https://github.com/zitadel/zitadel/issues/8213" }, { "type": "WEB", "url": "https://discord.com/channels/927474939156643850/1254096852937347153" }, { "type": "WEB", "url": "https://github.com/zitadel/zitadel/releases/tag/v2.53.8" }, { "type": "WEB", "url": "https://github.com/zitadel/zitadel/releases/tag/v2.54.5" }, { "type": "WEB", "url": "https://github.com/zitadel/zitadel/releases/tag/v2.55.1" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2968", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-1114.json
{ "schema_version": "1.3.1", "id": "GO-2022-1114", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2022-41920", "GHSA-pp3f-xrw5-q5j4" ], "summary": "ZipSlip when unzipping files in github.com/duke-git/lancet", "details": "A ZipSlip vulnerability exists when using the fileutil package to unzip files.", "affected": [ { "package": { "name": "github.com/duke-git/lancet", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.3.4" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/duke-git/lancet/fileutil", "symbols": [ "UnZip" ] } ] } }, { "package": { "name": "github.com/duke-git/lancet/v2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "2.0.0" }, { "fixed": "2.1.10" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/duke-git/lancet/v2/fileutil", "symbols": [ "UnZip" ] } ] } } ], "references": [ { "type": "REPORT", "url": "https://github.com/duke-git/lancet/issues/62" }, { "type": "FIX", "url": "https://github.com/duke-git/lancet/commit/f133b32faa05eb93e66175d01827afa4b7094572" }, { "type": "FIX", "url": "https://github.com/duke-git/lancet/commit/f869a0a67098e92d24ddd913e188b32404fa72c9" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-1114", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2717.json
{ "schema_version": "1.3.1", "id": "GO-2024-2717", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-2029", "GHSA-wx43-g55g-2jf4" ], "summary": "LocalAI Command Injection in audioToWav in github.com/go-skynet/LocalAI", "details": "LocalAI Command Injection in audioToWav in github.com/go-skynet/LocalAI.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/go-skynet/LocalAI before v2.10.0.", "affected": [ { "package": { "name": "github.com/go-skynet/LocalAI", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "2.10.0" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-wx43-g55g-2jf4" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-2029" }, { "type": "WEB", "url": "https://github.com/mudler/localai/commit/31a4c9c9d3abc58de2bdc5305419181c8b33eb1c" }, { "type": "WEB", "url": "https://huntr.com/bounties/e092528a-ce3b-4e66-9b98-3f56d6b276b0" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2717", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0588.json
{ "schema_version": "1.3.1", "id": "GO-2022-0588", "modified": "0001-01-01T00:00:00Z", "published": "2022-08-15T18:02:24Z", "aliases": [ "CVE-2021-42576", "GHSA-x95h-979x-cf3j" ], "summary": "Cross-site scripting via leaked style elements in github.com/microcosm-cc/bluemonday", "details": "The bluemonday HTML sanitizer can leak the contents of a \"style\" element into HTML output, potentially causing XSS vulnerabilities.\n\nThe default bluemonday sanitization policies are not vulnerable. Only user-defined policies allowing \"select\", \"style\", and \"option\" elements are affected.\n\nPermitting the \"style\" element in policies is hazardous, because bluemonday does not contain a CSS sanitizer. Newer versions of bluemonday suppress \"style\" and \"script\" elements even when allowed by a policy unless the policy explicitly requests unsafe processing.", "affected": [ { "package": { "name": "github.com/microcosm-cc/bluemonday", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.0.16" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/microcosm-cc/bluemonday", "symbols": [ "Policy.AllowElements", "Policy.AllowElementsMatching", "Policy.AllowLists", "Policy.AllowTables", "UGCPolicy" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/microcosm-cc/bluemonday/commit/c788a2a4d42e081ad54a31368478820bb4a42fb4" }, { "type": "WEB", "url": "https://docs.google.com/document/d/11SoX296sMS0XoQiQbpxc5pNxSdbJKDJkm5BDv0zrX50/" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0588", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0057.json
{ "schema_version": "1.3.1", "id": "GO-2021-0057", "modified": "0001-01-01T00:00:00Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2020-35381", "GHSA-8vrw-m3j9-j27c" ], "summary": "Panic due to improper input validation in github.com/buger/jsonparser", "details": "Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.", "affected": [ { "package": { "name": "github.com/buger/jsonparser", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.1.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/buger/jsonparser", "symbols": [ "ArrayEach", "Delete", "EachKey", "FuzzDelete", "FuzzEachKey", "FuzzGetBoolean", "FuzzGetFloat", "FuzzGetInt", "FuzzGetString", "FuzzGetUnsafeString", "FuzzObjectEach", "FuzzSet", "Get", "GetBoolean", "GetFloat", "GetInt", "GetString", "GetUnsafeString", "ObjectEach", "Set", "searchKeys" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/buger/jsonparser/pull/221" }, { "type": "FIX", "url": "https://github.com/buger/jsonparser/commit/df3ea76ece10095374fd1c9a22a4fb85a44efc42" }, { "type": "WEB", "url": "https://github.com/buger/jsonparser/issues/219" } ], "credits": [ { "name": "@toptotu" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0057", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2600.json
{ "schema_version": "1.3.1", "id": "GO-2024-2600", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-45289" ], "summary": "Incorrect forwarding of sensitive headers and cookies on HTTP redirect in net/http", "details": "When following an HTTP redirect to a domain which is not a subdomain match or exact match of the initial domain, an http.Client does not forward sensitive headers such as \"Authorization\" or \"Cookie\". For example, a redirect from foo.com to www.foo.com will forward the Authorization header, but a redirect to bar.com will not.\n\nA maliciously crafted HTTP redirect could cause sensitive headers to be unexpectedly forwarded.", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.21.8" }, { "introduced": "1.22.0-0" }, { "fixed": "1.22.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "net/http", "symbols": [ "Client.Do", "Client.Get", "Client.Head", "Client.Post", "Client.PostForm", "Get", "Head", "Post", "PostForm", "isDomainOrSubdomain" ] }, { "path": "net/http/cookiejar", "symbols": [ "Jar.Cookies", "Jar.SetCookies", "isIP" ] } ] } } ], "references": [ { "type": "REPORT", "url": "https://go.dev/issue/65065" }, { "type": "FIX", "url": "https://go.dev/cl/569340" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/5pwGVUPoMbg" } ], "credits": [ { "name": "Juho Nurminen of Mattermost" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2600", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2574.json
{ "schema_version": "1.3.1", "id": "GO-2024-2574", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-25124", "GHSA-fmg4-x8pw-hjhg" ], "summary": "Insecure CORS Configuration allowing wildcard origin with credentials in github.com/gofiber/fiber/v2", "details": "The CORS middleware allows for insecure configurations that could potentially expose the application to multiple CORS-related vulnerabilities. Specifically, it allows setting the Access-Control-Allow-Origin header to a wildcard (\"*\") while also having the Access-Control-Allow-Credentials set to true, which goes against recommended security best practices.", "affected": [ { "package": { "name": "github.com/gofiber/fiber/v2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "2.52.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/gofiber/fiber/v2/middleware/cors", "symbols": [ "New", "matchSubdomain" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/gofiber/fiber/security/advisories/GHSA-fmg4-x8pw-hjhg" }, { "type": "FIX", "url": "https://github.com/gofiber/fiber/commit/f0cd3b44b086544a37886232d0530601f2406c23" }, { "type": "WEB", "url": "http://blog.portswigger.net/2016/10/exploiting-cors-misconfigurations-for.html" }, { "type": "WEB", "url": "https://codeql.github.com/codeql-query-help/javascript/js-cors-misconfiguration-for-credentials" }, { "type": "WEB", "url": "https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS/Errors/CORSNotSupportingCredentials" }, { "type": "WEB", "url": "https://fetch.spec.whatwg.org/#cors-protocol-and-credentials" }, { "type": "WEB", "url": "https://github.com/gofiber/fiber/releases/tag/v2.52.1" }, { "type": "WEB", "url": "https://saturncloud.io/blog/cors-cannot-use-wildcard-in-accesscontrolalloworigin-when-credentials-flag-is-true" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2574", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-1086.json
{ "schema_version": "1.3.1", "id": "GO-2022-1086", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2022-38580", "GHSA-f2rj-m42r-6jm2" ], "summary": "Server-side request forger via X-Skipper-Proxy in github.com/zalando/skipper", "details": "An attacker can access the internal metadata server or other unauthenticated URLs by adding a specific header (X-Skipper-Proxy) to the http request.", "affected": [ { "package": { "name": "github.com/zalando/skipper", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.13.237" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/zalando/skipper/proxy", "symbols": [ "Proxy.ServeHTTP", "context.Loopback", "forwardToProxy", "mapRequest", "proxyFromHeader" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/zalando/skipper/security/advisories/GHSA-f2rj-m42r-6jm2" }, { "type": "FIX", "url": "https://github.com/zalando/skipper/pull/2058" }, { "type": "WEB", "url": "https://github.com/zalando/skipper/releases/tag/v0.13.237" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-1086", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2940.json
{ "schema_version": "1.3.1", "id": "GO-2024-2940", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-37897", "GHSA-hw5f-6wvv-xcrh" ], "summary": "SFTPGo has insufficient access control for password reset in github.com/drakkan/sftpgo", "details": "SFTPGo has insufficient access control for password reset in github.com/drakkan/sftpgo", "affected": [ { "package": { "name": "github.com/drakkan/sftpgo", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/drakkan/sftpgo/v2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "2.2.0" }, { "fixed": "2.6.1" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/drakkan/sftpgo/security/advisories/GHSA-hw5f-6wvv-xcrh" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-37897" }, { "type": "FIX", "url": "https://github.com/drakkan/sftpgo/commit/1f8ac8bfe16100b0484d6c91e1e8361687324423" }, { "type": "FIX", "url": "https://github.com/drakkan/sftpgo/commit/3462bba3f41cbc75486474991b9e3ac1b5f1e583" }, { "type": "WEB", "url": "https://github.com/drakkan/sftpgo/releases/tag/v2.6.1" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2940", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-1129.json
{ "schema_version": "1.3.1", "id": "GO-2022-1129", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2022-41912", "GHSA-j2jp-wvqg-wc2g" ], "summary": "Authentication bypass in github.com/crewjam/saml", "details": "Authentication bypass is possible when processing SAML responses containing multiple Assertion elements.", "affected": [ { "package": { "name": "github.com/crewjam/saml", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.4.9" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/crewjam/saml", "symbols": [ "ServiceProvider.ParseResponse", "ServiceProvider.ParseXMLArtifactResponse", "ServiceProvider.ParseXMLResponse", "ServiceProvider.ValidateLogoutResponseForm", "ServiceProvider.ValidateLogoutResponseRedirect", "ServiceProvider.ValidateLogoutResponseRequest", "ServiceProvider.validateSignature", "findChild" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/prometheus/exporter-toolkit/security/advisories/GHSA-7rg2-cxvp-9p7p" }, { "type": "FIX", "url": "https://github.com/crewjam/saml/commit/aee3fb1edeeaf1088fcb458727e0fd863d277f8b" } ], "credits": [ { "name": "Felix Wilhelm from Google Project Zero" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-1129", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0203.json
{ "schema_version": "1.3.1", "id": "GO-2022-0203", "modified": "0001-01-01T00:00:00Z", "published": "2022-08-09T23:19:00Z", "aliases": [ "CVE-2018-7187" ], "summary": "Remote command execution via \"go get\" command with \"-insecure\" option in cmd/go", "details": "The \"go get\" command is vulnerable to remote code execution.\n\nWhen the -insecure command-line option is used, \"go get\" does not validate the import path (get/vcs.go only checks for \"://\" anywhere in the string), which allows remote attackers to execute arbitrary OS commands via a crafted web site.", "affected": [ { "package": { "name": "toolchain", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.9.5" }, { "introduced": "1.10.0-0" }, { "fixed": "1.10.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "cmd/go" } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/94603" }, { "type": "FIX", "url": "https://go.googlesource.com/go/+/c941e27e70c3e06e1011d2dd71d72a7a06a9bcbc" }, { "type": "REPORT", "url": "https://go.dev/issue/23867" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/IkPkOF8JqLs/m/TFBbWHJYAwAJ" } ], "credits": [ { "name": "Arthur Khashaev" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0203", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1595.json
{ "schema_version": "1.3.1", "id": "GO-2023-1595", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-24533", "GHSA-f6hc-9g49-xmx7" ], "summary": "Incorrect multiplication of unreduced P-256 scalars in filippo.io/nistec", "details": "Multiplication of certain unreduced P-256 scalars produce incorrect results.\n\nThere are no protocols known at this time that can be attacked due to this.", "affected": [ { "package": { "name": "filippo.io/nistec", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.0.2" } ] } ], "ecosystem_specific": { "imports": [ { "path": "filippo.io/nistec", "goarch": [ "amd64", "arm64", "ppc64le", "s390x" ], "symbols": [ "P256Point.ScalarBaseMult", "P256Point.ScalarMult", "p256OrdInverse" ] } ] } } ], "references": [ { "type": "REPORT", "url": "https://go.dev/issue/58647" }, { "type": "FIX", "url": "https://github.com/FiloSottile/nistec/commit/c58aa1223ccf3943513e1e661cebce95af137244" } ], "credits": [ { "name": "Guido Vranken via the Ethereum Foundation bug bounty program" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-1595", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2861.json
{ "schema_version": "1.3.1", "id": "GO-2024-2861", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-3744", "GHSA-qjqg-4wg7-957h" ], "summary": "azure-file-csi-driver leaks service account tokens in the logs in sigs.k8s.io/azurefile-csi-driver", "details": "azure-file-csi-driver leaks service account tokens in the logs in sigs.k8s.io/azurefile-csi-driver", "affected": [ { "package": { "name": "sigs.k8s.io/azurefile-csi-driver", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.29.4" }, { "introduced": "1.30.0" }, { "fixed": "1.30.1" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-qjqg-4wg7-957h" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3744" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2024/05/09/4" }, { "type": "WEB", "url": "https://github.com/kubernetes-sigs/azurefile-csi-driver/commit/a1b7446de942136419f07394efeef804523f87ae" }, { "type": "WEB", "url": "https://github.com/kubernetes-sigs/azurefile-csi-driver/commit/e11ff3dc2c03894cde692213308f9991e7bbd5bf" }, { "type": "WEB", "url": "https://github.com/kubernetes/kubernetes/issues/124759" }, { "type": "WEB", "url": "https://groups.google.com/g/kubernetes-security-announce/c/hcgZE2MQo1A/m/Y4C6q-CYAgAJ" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2861", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2592.json
{ "schema_version": "1.3.1", "id": "GO-2024-2592", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-1942", "GHSA-hwjf-4667-gqwx" ], "summary": "Mattermost allows attackers access to posts in channels they are not a member of in github.com/mattermost/mattermost-server", "details": "Mattermost allows attackers access to posts in channels they are not a member of in github.com/mattermost/mattermost-server.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/mattermost/mattermost/server/v8 before v8.1.9.", "affected": [ { "package": { "name": "github.com/mattermost/mattermost-server", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "9.2.0+incompatible" }, { "fixed": "9.2.5+incompatible" }, { "introduced": "9.3.0+incompatible" }, { "fixed": "9.3.1+incompatible" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/mattermost/mattermost-server/v5", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/mattermost/mattermost-server/v6", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/mattermost/mattermost/server/v8", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "8.1.9" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-hwjf-4667-gqwx" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-1942" }, { "type": "WEB", "url": "https://mattermost.com/security-updates" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2592", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-1178.json
{ "schema_version": "1.3.1", "id": "GO-2022-1178", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2022-39304", "GHSA-h4q8-96p6-jcgr" ], "summary": "JWT leak in github.com/bradleyfalzon/ghinstallation", "details": "Errors returned by ghinstallation.Transport can include the JWT used for the failed operation. If the error is exposed to an untrusted party, this JWT could be extracted and used to authenticate further requests.", "affected": [ { "package": { "name": "github.com/bradleyfalzon/ghinstallation", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.1.2-0.20210308182858-d24f14f8be70" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/bradleyfalzon/ghinstallation", "symbols": [ "Transport.RoundTrip", "Transport.Token", "Transport.refreshToken" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/bradleyfalzon/ghinstallation/security/advisories/GHSA-h4q8-96p6-jcgr" }, { "type": "FIX", "url": "https://github.com/bradleyfalzon/ghinstallation/commit/d24f14f8be70d94129d76026e8b0f4f9170c8c3e" }, { "type": "WEB", "url": "https://docs.github.com/en/developers/apps/building-github-apps/authenticating-with-github-apps#authenticating-as-an-installation" } ], "credits": [ { "name": "@Miskerest" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-1178", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2540.json
{ "schema_version": "1.3.1", "id": "GO-2024-2540", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-24774", "GHSA-qr8f-cjw7-838m" ], "summary": "Mattermost Jira Plugin does not properly check security levels in github.com/mattermost/mattermost-plugin-jira", "details": "Mattermost Jira Plugin does not properly check security levels in github.com/mattermost/mattermost-plugin-jira.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/mattermost/mattermost-plugin-jira before v4.0.0-rc1.", "affected": [ { "package": { "name": "github.com/mattermost/mattermost-plugin-jira", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "4.0.0-rc1" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-qr8f-cjw7-838m" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-24774" }, { "type": "FIX", "url": "https://github.com/mattermost/mattermost-plugin-jira/commit/5f5e084d169bf6b82d5c46a7a7eb033e1a01c6de" }, { "type": "WEB", "url": "https://mattermost.com/security-updates" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2540", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2847.json
{ "schema_version": "1.3.1", "id": "GO-2024-2847", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2022-35957", "GHSA-ff5c-938w-8c9q" ], "summary": "Grafana Escalation from admin to server admin when auth proxy is used in github.com/grafana/grafana", "details": "Grafana Escalation from admin to server admin when auth proxy is used in github.com/grafana/grafana.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/grafana/grafana before v8.5.13, from v9.0.0 before v9.0.9, from v9.1.0 before v9.1.6.", "affected": [ { "package": { "name": "github.com/grafana/grafana", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "8.5.13" }, { "introduced": "9.0.0" }, { "fixed": "9.0.9" }, { "introduced": "9.1.0" }, { "fixed": "9.1.6" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/grafana/grafana/security/advisories/GHSA-ff5c-938w-8c9q" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-35957" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WYU5C2RITLHVZSTCWNGQWA6KSPYNXM2H" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20221215-0001" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2847", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0160.json
{ "schema_version": "1.3.1", "id": "GO-2021-0160", "modified": "0001-01-01T00:00:00Z", "published": "2022-01-05T15:31:16Z", "aliases": [ "CVE-2015-8618" ], "summary": "Incorrect calculation affecting RSA computations in math/big", "details": "Int.Exp Montgomery mishandled carry propagation and produced an incorrect output, which makes it easier for attackers to obtain private RSA keys via unspecified vectors.\n\nThis issue can affect RSA computations in crypto/rsa, which is used by crypto/tls. TLS servers on 32-bit systems could plausibly leak their RSA private key due to this issue. Other protocol implementations that create many RSA signatures could also be impacted in the same way.\n\nSpecifically, incorrect results in one part of the RSA Chinese Remainder computation can cause the result to be incorrect in such a way that it leaks one of the primes. While RSA blinding should prevent an attacker from crafting specific inputs that trigger the bug, on 32-bit systems the bug can be expected to occur at random around one in 2^26 times. Thus collecting around 64 million signatures (of known data) from an affected server should be enough to extract the private key used.\n\nNote that on 64-bit systems, the frequency of the bug is so low (less than one in 2^50) that it would be very difficult to exploit.", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "1.5.0-0" }, { "fixed": "1.5.3" } ] } ], "ecosystem_specific": { "imports": [ { "path": "math/big", "symbols": [ "nat.expNNMontgomery", "nat.montgomery" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/18491" }, { "type": "FIX", "url": "https://go.googlesource.com/go/+/1e066cad1ba23f4064545355b8737e4762dd6838" }, { "type": "FIX", "url": "https://go.googlesource.com/go/+/4306352182bf94f86f0cfc6a8b0ed461cbf1d82c" }, { "type": "FIX", "url": "https://go.dev/cl/17672" }, { "type": "REPORT", "url": "https://go.dev/issue/13515" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/MEATuOi_ei4" } ], "credits": [ { "name": "Nick Craig-Wood" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0160", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0248.json
{ "schema_version": "1.3.1", "id": "GO-2022-0248", "modified": "0001-01-01T00:00:00Z", "published": "2022-07-15T23:07:18Z", "aliases": [ "CVE-2021-3907", "GHSA-cqh2-vc2f-q4fh", "GHSA-8459-6rc9-8vf8" ], "related": [ "GHSA-3jhm-87m6-x959" ], "summary": "Directory traversal in manifest path extraction in github.com/cloudflare/cfrpki", "details": "Manifest path extraction is vulnerable to directory traversal attacks.\n\nThe ExtractPathManifest function permits file paths containing relative directory components (\"..\"), permitting files to reference arbitrary locations on the filesystem.", "affected": [ { "package": { "name": "github.com/cloudflare/cfrpki", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.4.4" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/cloudflare/cfrpki/validator/pki", "symbols": [ "ExtractPathManifest", "SimpleManager.Explore", "SimpleManager.ExploreAdd", "Validator.AddManifest", "Validator.AddResource" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/cloudflare/cfrpki/commit/eb9cc4db7b7b79e44f56dfaa959fccdfb2af8284" }, { "type": "FIX", "url": "https://github.com/cloudflare/cfrpki/commit/a053a808feeb3115c76b6cc263ee55598ce6e8cd" } ], "credits": [ { "name": "Koen van Hove" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0248", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2453.json
{ "schema_version": "1.3.1", "id": "GO-2024-2453", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "GHSA-9763-4f94-gfch" ], "summary": "Timing side channel in github.com/cloudflare/circl", "details": "Timing side channel in github.com/cloudflare/circl", "affected": [ { "package": { "name": "github.com/cloudflare/circl", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.3.7" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/cloudflare/circl/pke/kyber/internal/common", "symbols": [ "Poly.CompressTo" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/cloudflare/circl/security/advisories/GHSA-9763-4f94-gfch" }, { "type": "FIX", "url": "https://github.com/cloudflare/circl/commit/75ef91e8a2f438e6ce2b6e620d236add8be1887d" }, { "type": "WEB", "url": "https://kyberslash.cr.yp.to/" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2453", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2816.json
{ "schema_version": "1.3.1", "id": "GO-2024-2816", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-33394", "GHSA-4q63-mr2m-57hf" ], "summary": "kubevirt allows a local attacker to execute arbitrary code via a crafted command in kubevirt.io/kubevirt", "details": "kubevirt allows a local attacker to execute arbitrary code via a crafted command in kubevirt.io/kubevirt", "affected": [ { "package": { "name": "kubevirt.io/kubevirt", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-4q63-mr2m-57hf" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-33394" }, { "type": "WEB", "url": "https://gist.github.com/HouqiyuA/1b75e23ece7ad98490aec1c887bdf49b" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2816", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2020-0007.json
{ "schema_version": "1.3.1", "id": "GO-2020-0007", "modified": "0001-01-01T00:00:00Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2017-18367", "GHSA-58v3-j75h-xr49" ], "summary": "Improper input validation in github.com/seccomp/libseccomp-golang", "details": "Filters containing rules with multiple syscall arguments are improperly constructed, such that all arguments are required to match rather than any of the arguments (AND is used rather than OR). These filters can be bypassed by only specifying a subset of the arguments due to this behavior.", "affected": [ { "package": { "name": "github.com/seccomp/libseccomp-golang", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.9.1-0.20170424173420-06e7a29f36a3" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/seccomp/libseccomp-golang", "symbols": [ "ScmpFilter.AddRule", "ScmpFilter.AddRuleConditional", "ScmpFilter.AddRuleConditionalExact", "ScmpFilter.AddRuleExact", "ScmpFilter.addRuleGeneric" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/seccomp/libseccomp-golang/commit/06e7a29f36a34b8cf419aeb87b979ee508e58f9e" } ], "credits": [ { "name": "@ihac" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2020-0007", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2537.json
{ "schema_version": "1.3.1", "id": "GO-2024-2537", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-22649", "GHSA-xfj7-qf8w-2gcr" ], "summary": "Rancher 'Audit Log' leaks sensitive information in github.com/rancher/rancher", "details": "Rancher 'Audit Log' leaks sensitive information in github.com/rancher/rancher.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/rancher/rancher from v2.6.0 before v2.6.14, from v2.7.0 before v2.7.10, from v2.8.0 before v2.8.2.", "affected": [ { "package": { "name": "github.com/rancher/rancher", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "2.6.0" }, { "fixed": "2.6.14" }, { "introduced": "2.7.0" }, { "fixed": "2.7.10" }, { "introduced": "2.8.0" }, { "fixed": "2.8.2" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/rancher/rancher/security/advisories/GHSA-xfj7-qf8w-2gcr" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2537", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2020-0043.json
{ "schema_version": "1.3.1", "id": "GO-2020-0043", "modified": "0001-01-01T00:00:00Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2018-21246", "GHSA-gr7w-x2jp-3xgw" ], "summary": "Authentication bypass in github.com/mholt/caddy", "details": "Due to improper TLS verification when serving traffic for multiple SNIs, an attacker may bypass TLS client authentication by indicating an SNI during the TLS handshake that is different from the name in the HTTP Host header.", "affected": [ { "package": { "name": "github.com/mholt/caddy", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.10.13" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/mholt/caddy/caddyhttp/httpserver", "symbols": [ "Server.serveHTTP", "assertConfigsCompatible", "httpContext.MakeServers" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/caddyserver/caddy/pull/2099" }, { "type": "FIX", "url": "https://github.com/caddyserver/caddy/commit/4d9ee000c8d2cbcdd8284007c1e0f2da7bc3c7c3" }, { "type": "WEB", "url": "https://bugs.gentoo.org/715214" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2020-0043", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0163.json
{ "schema_version": "1.3.1", "id": "GO-2021-0163", "modified": "0001-01-01T00:00:00Z", "published": "2022-01-05T22:41:50Z", "aliases": [ "CVE-2016-3958" ], "summary": "Privilege escalation on Windows via malicious DLL in syscall", "details": "Untrusted search path vulnerability on Windows related to LoadLibrary allows local users to gain privileges via a malicious DLL in the current working directory.", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.5.4" }, { "introduced": "1.6.0-0" }, { "fixed": "1.6.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "syscall", "symbols": [ "LoadLibrary" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/21428" }, { "type": "FIX", "url": "https://go.googlesource.com/go/+/6a0bb87bd0bf0fdf8ddbd35f77a75ebd412f61b0" }, { "type": "REPORT", "url": "https://go.dev/issue/14959" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/9eqIHqaWvck" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0163", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2698.json
{ "schema_version": "1.3.1", "id": "GO-2024-2698", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-0406", "GHSA-rhh4-rh7c-7r5v" ], "summary": "Archiver Path Traversal vulnerability in github.com/mholt/archiver", "details": "A flaw was discovered in the mholt/archiver package. This flaw allows an attacker to create a specially crafted tar file, which, when unpacked, may allow access to restricted files or directories. This issue can allow the creation or overwriting of files with the user's or application's privileges using the library.", "affected": [ { "package": { "name": "github.com/mholt/archiver", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/mholt/archiver/v3", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-rhh4-rh7c-7r5v" }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2024-0406" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257749" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2698", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2608.json
{ "schema_version": "1.3.1", "id": "GO-2024-2608", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-27916", "GHSA-v627-69v2-xx37" ], "summary": "Minder access control bypass in github.com/stacklok/minder", "details": "A Minder user can use the endpoints to access any repository in the DB, irrespective of who owns the repo and any permissions that user may have. The DB query used checks by repo owner, repo name and provider name (which is always \"github\"). These query values are not distinct for the particular user, as long as the user has valid credentials and a provider, they can set the repo owner/name to any value they want and the server will return information on this repo. DeleteRepositoryByName uses the same query and a user can delete another user's repo using this technique. The GetArtifactByName endpoint also uses this DB query.", "affected": [ { "package": { "name": "github.com/stacklok/minder", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.0.33" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/stacklok/minder/internal/db", "symbols": [ "Queries.GetRepositoryByRepoName" ] }, { "path": "github.com/stacklok/minder/internal/controlplane", "symbols": [ "EntityContextProjectInterceptor", "ProjectAuthorizationInterceptor", "Server.DeleteRepositoryByName", "Server.GetArtifactByName", "Server.GetRepositoryByName", "Server.StartGRPCServer", "TokenValidationInterceptor" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/stacklok/minder/security/advisories/GHSA-v627-69v2-xx37" }, { "type": "FIX", "url": "https://github.com/stacklok/minder/commit/45750b4e9fb2de33365758366e06c19e999bd2eb" } ], "credits": [ { "name": "dmjb" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2608", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0245.json
{ "schema_version": "1.3.1", "id": "GO-2021-0245", "modified": "0001-01-01T00:00:00Z", "published": "2022-02-17T17:32:24Z", "aliases": [ "CVE-2021-36221" ], "summary": "Panic in ReverseProxy in net/http/httputil", "details": "ReverseProxy can panic after encountering a problem copying a proxied response body.", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.15.15" }, { "introduced": "1.16.0-0" }, { "fixed": "1.16.7" } ] } ], "ecosystem_specific": { "imports": [ { "path": "net/http/httputil", "symbols": [ "ReverseProxy.ServeHTTP" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/333191" }, { "type": "FIX", "url": "https://go.googlesource.com/go/+/b7a85e0003cedb1b48a1fd3ae5b746ec6330102e" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/uHACNfXAZqk" }, { "type": "REPORT", "url": "https://go.dev/issue/46866" } ], "credits": [ { "name": "Andrew Crump" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0245", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2972.json
{ "schema_version": "1.3.1", "id": "GO-2024-2972", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-39933", "GHSA-8mm6-wmpp-mmm3" ], "summary": "Gogs allows argument injection during the tagging of a new release in github.com/gogs/gogs", "details": "Gogs allows argument injection during the tagging of a new release in github.com/gogs/gogs", "affected": [ { "package": { "name": "github.com/gogs/gogs", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-8mm6-wmpp-mmm3" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-39933" }, { "type": "WEB", "url": "https://www.sonarsource.com/blog/securing-developer-tools-unpatched-code-vulnerabilities-in-gogs-1" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2972", "review_status": "UNREVIEWED" } }