repo_id
stringclasses
927 values
file_path
stringlengths
99
214
content
stringlengths
2
4.15M
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2658.json
{ "schema_version": "1.3.1", "id": "GO-2024-2658", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-1753", "GHSA-pmf3-c36m-g5cf" ], "related": [ "GHSA-874v-pj72-92f3" ], "summary": "Container escape at build time in github.com/containers/buildah", "details": "A crafted container file can use a dummy image with a symbolic link to the host filesystem as a mount source and cause the mount operation to mount the host filesystem during a build-time RUN step. The commands inside the RUN step will then have read-write access to the host filesystem.", "affected": [ { "package": { "name": "github.com/containers/buildah", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.35.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/containers/buildah/internal/volumes", "symbols": [ "GetBindMount", "GetVolumes" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/containers/buildah/commit/9de9c20ff368beb84b84fe660773d352519dc1c5" }, { "type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265513" } ], "credits": [ { "name": "@rmcnamara-snyk" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2658", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0526.json
{ "schema_version": "1.3.1", "id": "GO-2022-0526", "modified": "0001-01-01T00:00:00Z", "published": "2022-07-20T20:52:17Z", "aliases": [ "CVE-2022-30635" ], "summary": "Stack exhaustion when decoding certain messages in encoding/gob", "details": "Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion.", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.17.12" }, { "introduced": "1.18.0-0" }, { "fixed": "1.18.4" } ] } ], "ecosystem_specific": { "imports": [ { "path": "encoding/gob", "symbols": [ "Decoder.compileDec", "Decoder.compileIgnoreSingle", "Decoder.decIgnoreOpFor" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/417064" }, { "type": "FIX", "url": "https://go.googlesource.com/go/+/6fa37e98ea4382bf881428ee0c150ce591500eb7" }, { "type": "REPORT", "url": "https://go.dev/issue/53615" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0526", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2844.json
{ "schema_version": "1.3.1", "id": "GO-2024-2844", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2022-39307", "GHSA-3p62-42x7-gxg5" ], "summary": "Grafana User enumeration via forget password in github.com/grafana/grafana", "details": "Grafana User enumeration via forget password in github.com/grafana/grafana.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/grafana/grafana before v8.5.15, from v9.0.0 before v9.2.4.", "affected": [ { "package": { "name": "github.com/grafana/grafana", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "8.5.15" }, { "introduced": "9.0.0" }, { "fixed": "9.2.4" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/grafana/grafana/security/advisories/GHSA-3p62-42x7-gxg5" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-39307" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20221215-0004" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2844", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2833.json
{ "schema_version": "1.3.1", "id": "GO-2024-2833", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-34079", "GHSA-75r6-6jg8-pfcq" ], "summary": "Denial of service in github.com/octo-sts/app", "details": "Excessively large requests can be processed, consuming a large amount of resources. This could potentially lead to a denial of service.", "affected": [ { "package": { "name": "github.com/octo-sts/app", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.1.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/octo-sts/app/pkg/provider", "symbols": [ "Get" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/octo-sts/app/security/advisories/GHSA-75r6-6jg8-pfcq" }, { "type": "FIX", "url": "https://github.com/octo-sts/app/commit/74ba874c017cf973edd6711144cf4399a9fcff57" } ], "credits": [ { "name": "@enj" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2833", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2696.json
{ "schema_version": "1.3.1", "id": "GO-2024-2696", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-2447", "GHSA-wp43-vprh-c3w5" ], "summary": "Mattermost fails to authenticate the source of certain types of post actions in github.com/mattermost/mattermost-server", "details": "Mattermost fails to authenticate the source of certain types of post actions in github.com/mattermost/mattermost-server.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/mattermost/mattermost/server/v8 from v8.1.0 before v8.1.11.", "affected": [ { "package": { "name": "github.com/mattermost/mattermost-server", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "9.3.0+incompatible" }, { "fixed": "9.3.3+incompatible" }, { "introduced": "9.4.0+incompatible" }, { "fixed": "9.4.4+incompatible" }, { "introduced": "9.5.0+incompatible" }, { "fixed": "9.5.2+incompatible" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/mattermost/mattermost-server/v5", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/mattermost/mattermost-server/v6", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/mattermost/mattermost/server/v8", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "8.1.0" }, { "fixed": "8.1.11" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-wp43-vprh-c3w5" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-2447" }, { "type": "WEB", "url": "https://mattermost.com/security-updates" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2696", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0053.json
{ "schema_version": "1.3.1", "id": "GO-2021-0053", "modified": "0001-01-01T00:00:00Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2021-3121", "GHSA-c3h9-896r-86jm" ], "summary": "Panic due to improper input validation in github.com/gogo/protobuf", "details": "Due to improper bounds checking, maliciously crafted input to generated Unmarshal methods can cause an out-of-bounds panic. If parsing messages from untrusted parties, this may be used as a denial of service vector.", "affected": [ { "package": { "name": "github.com/gogo/protobuf", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.3.2" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/gogo/protobuf/plugin/unmarshal", "symbols": [ "unmarshal.Generate", "unmarshal.field" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/gogo/protobuf/commit/b03c65ea87cdc3521ede29f62fe3ce239267c1bc" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0053", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1881.json
{ "schema_version": "1.3.1", "id": "GO-2023-1881", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "GHSA-w5w5-2882-47pc" ], "summary": "The x/crisis package does not charge ConstantFee in github.com/cosmos/cosmos-sdk", "details": "If a transaction is sent to the x/crisis module to check an invariant, the ConstantFee parameter of the chain is not charged.\n\nNo patch will be released, as the package is planned to be deprecated and replaced.", "affected": [ { "package": { "name": "github.com/cosmos/cosmos-sdk", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/cosmos/cosmos-sdk/x/crisis" } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/cosmos/cosmos-sdk/security/advisories/GHSA-w5w5-2882-47pc" }, { "type": "REPORT", "url": "https://github.com/cosmos/cosmos-sdk/issues/15706" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-1881", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2613.json
{ "schema_version": "1.3.1", "id": "GO-2024-2613", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-27288", "GHSA-26w3-q4j8-4xjp" ], "summary": "Unauthorized Console access in github.com/1Panel-dev/1Panel", "details": "If the user attempts to access a secure entry point and intercepts with Burp, they can get access to the console page. This access does not return data nor allow modification operations.", "affected": [ { "package": { "name": "github.com/1Panel-dev/1Panel", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.10.1-lts" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-26w3-q4j8-4xjp" }, { "type": "WEB", "url": "https://github.com/1Panel-dev/1Panel/releases/tag/v1.10.1-lts" }, { "type": "FIX", "url": "https://github.com/1Panel-dev/1Panel/pull/4014" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2613", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0969.json
{ "schema_version": "1.3.1", "id": "GO-2022-0969", "modified": "0001-01-01T00:00:00Z", "published": "2022-09-12T20:23:06Z", "aliases": [ "CVE-2022-27664", "GHSA-69cg-p879-7622" ], "summary": "Denial of service in net/http and golang.org/x/net/http2", "details": "HTTP/2 server connections can hang forever waiting for a clean shutdown that was preempted by a fatal error. This condition can be exploited by a malicious client to cause a denial of service.", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.18.6" }, { "introduced": "1.19.0-0" }, { "fixed": "1.19.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "net/http", "symbols": [ "ListenAndServe", "ListenAndServeTLS", "Serve", "ServeTLS", "Server.ListenAndServe", "Server.ListenAndServeTLS", "Server.Serve", "Server.ServeTLS", "http2Server.ServeConn", "http2serverConn.goAway" ] } ] } }, { "package": { "name": "golang.org/x/net", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.0.0-20220906165146-f3363e06e74c" } ] } ], "ecosystem_specific": { "imports": [ { "path": "golang.org/x/net/http2", "symbols": [ "Server.ServeConn", "serverConn.goAway" ] } ] } } ], "references": [ { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s" }, { "type": "REPORT", "url": "https://go.dev/issue/54658" }, { "type": "FIX", "url": "https://go.dev/cl/428735" } ], "credits": [ { "name": "Bahruz Jabiyev" }, { "name": "Tommaso Innocenti" }, { "name": "Anthony Gavazzi" }, { "name": "Steven Sprecher" }, { "name": "Kaan Onarlioglu" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0969", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0081.json
{ "schema_version": "1.3.1", "id": "GO-2021-0081", "modified": "0001-01-01T00:00:00Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2019-10214", "GHSA-85p9-j7c9-v4gr" ], "summary": "Insufficiently Protected Credentials in github.com/containers/image", "details": "The HTTP client used to connect to the container registry authorization service explicitly disables TLS verification, allowing an attacker that is able to MITM the connection to steal credentials.", "affected": [ { "package": { "name": "github.com/containers/image", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "2.0.2-0.20190802080134-634605d06e73+incompatible" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/containers/image/docker", "symbols": [ "CheckAuth", "GetRepositoryTags", "Image.GetRepositoryTags", "NewReference", "ParseReference", "SearchRegistry", "dockerClient.getBearerToken", "dockerImageDestination.PutBlob", "dockerImageDestination.PutManifest", "dockerImageDestination.PutSignatures", "dockerImageDestination.SupportsSignatures", "dockerImageDestination.TryReusingBlob", "dockerImageSource.GetBlob", "dockerImageSource.GetManifest", "dockerImageSource.GetSignatures", "dockerReference.DeleteImage", "dockerReference.NewImage", "dockerReference.NewImageDestination", "dockerReference.NewImageSource", "dockerReference.PolicyConfigurationIdentity", "dockerTransport.ParseReference" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/containers/image/pull/669" }, { "type": "FIX", "url": "https://github.com/containers/image/commit/634605d06e738aec8332bcfd69162e7509ac7aaf" }, { "type": "WEB", "url": "https://github.com/containers/image/issues/654" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10214" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0081", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1559.json
{ "schema_version": "1.3.1", "id": "GO-2023-1559", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-23631", "GHSA-4gj3-6r43-3wfc" ], "summary": "Denial of service via HAMT decoding panic in github.com/ipfs/go-unixfsnode", "details": "Trying to read malformed HAMT sharded directories can cause panics and virtual memory leaks. If you are reading untrusted user input, an attacker can then trigger a panic.\n\nThis is caused by a bogus fanout parameter in the HAMT directory nodes.\n\nThere are no known workarounds (users are advised to upgrade).", "affected": [ { "package": { "name": "github.com/ipfs/go-unixfsnode", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.5.2" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/ipfs/go-unixfsnode/hamt", "symbols": [ "AttemptHAMTShardFromNode", "NewUnixFSHAMTShard", "NewUnixFSHAMTShardWithPreload", "_UnixFSHAMTShard.Length", "_UnixFSHAMTShard.Lookup", "_UnixFSHAMTShard.LookupByNode", "_UnixFSHAMTShard.LookupBySegment", "_UnixFSHAMTShard.LookupByString", "_UnixFSShardedDir__ListItr.Next", "bitField" ] }, { "path": "github.com/ipfs/go-unixfsnode/data/builder", "symbols": [ "BlockSizes", "BuildUnixFS", "BuildUnixFSDirectory", "BuildUnixFSFile", "BuildUnixFSRecursive", "BuildUnixFSShardedDirectory", "BuildUnixFSSymlink", "Data", "DataType", "Fanout", "FileSize", "FractionalNanoseconds", "HashType", "Mtime", "Permissions", "PermissionsString", "Seconds", "Time", "shard.bitmap", "shard.serialize" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/ipfs/go-unixfsnode/security/advisories/GHSA-4gj3-6r43-3wfc" }, { "type": "FIX", "url": "https://github.com/ipfs/go-unixfsnode/commit/59050ea8bc458ae55246ae09243e6e165923e076" } ], "credits": [ { "name": "Jorropo" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-1559", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0107.json
{ "schema_version": "1.3.1", "id": "GO-2021-0107", "modified": "0001-01-01T00:00:00Z", "published": "2021-07-28T18:08:05Z", "aliases": [ "CVE-2021-4236", "GHSA-5gjg-jgh4-gppm", "GHSA-jpgg-cp2x-qrw3" ], "summary": "Panic or authentication bypass in github.com/ecnepsnai/web", "details": "Web Sockets do not execute any AuthenticateMethod methods which may be set, leading to a nil pointer dereference if the returned UserData pointer is assumed to be non-nil, or authentication bypass.\n\nThis issue only affects WebSockets with an AuthenticateMethod hook. Request handlers that do not explicitly use WebSockets are not vulnerable.", "affected": [ { "package": { "name": "github.com/ecnepsnai/web", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "1.4.0" }, { "fixed": "1.5.2" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/ecnepsnai/web", "symbols": [ "Server.Socket", "Server.socketHandler" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/ecnepsnai/web/commit/5a78f8d5c41ce60dcf9f61aaf47a7a8dc3e0002f" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0107", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2482.json
{ "schema_version": "1.3.1", "id": "GO-2024-2482", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-23840", "GHSA-h3q2-8whx-c29h" ], "summary": "Information leak in github.com/goreleaser/goreleaser", "details": "Secret values can be printed to the --debug log when using a a custom publisher.", "affected": [ { "package": { "name": "github.com/goreleaser/goreleaser", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "1.23.0" }, { "fixed": "1.24.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/goreleaser/goreleaser/internal/shell", "symbols": [ "Run" ] }, { "path": "github.com/goreleaser/goreleaser/internal/pipe/sbom", "symbols": [ "Pipe.Run", "catalogArtifact" ] }, { "path": "github.com/goreleaser/goreleaser/internal/exec", "symbols": [ "Execute", "executeCommand" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/goreleaser/goreleaser/security/advisories/GHSA-h3q2-8whx-c29h" }, { "type": "FIX", "url": "https://github.com/goreleaser/goreleaser/commit/d5b6a533ca1dc3366983d5d31ee2d2b6232b83c0" } ], "credits": [ { "name": "@andreaangiolillo" }, { "name": "@caarlos0" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2482", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2855.json
{ "schema_version": "1.3.1", "id": "GO-2024-2855", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2022-31123", "GHSA-rhxj-gh46-jvw8" ], "summary": "Grafana Plugin signature bypass in github.com/grafana/grafana", "details": "Grafana Plugin signature bypass in github.com/grafana/grafana.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/grafana/grafana from v7.0.0 before v8.5.14, from v9.0.0 before v9.1.8.", "affected": [ { "package": { "name": "github.com/grafana/grafana", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "7.0.0" }, { "fixed": "8.5.14" }, { "introduced": "9.0.0" }, { "fixed": "9.1.8" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/grafana/grafana/security/advisories/GHSA-rhxj-gh46-jvw8" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31123" }, { "type": "WEB", "url": "https://github.com/grafana/grafana/releases/tag/v9.1.8" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20221124-0002" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2855", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2445.json
{ "schema_version": "1.3.1", "id": "GO-2024-2445", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "GHSA-c9v7-wmwj-vf6x" ], "summary": "SFTP is possible on the Proxy server for any user with SFTP access in github.com/gravitational/teleport", "details": "SFTP is possible on the Proxy server for any user with SFTP access in github.com/gravitational/teleport.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/gravitational/teleport before v12.4.31, from v13.0.0 before v13.4.13, from v14.0.0 before v14.2.4.", "affected": [ { "package": { "name": "github.com/gravitational/teleport", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "12.4.31" }, { "introduced": "13.0.0" }, { "fixed": "13.4.13" }, { "introduced": "14.0.0" }, { "fixed": "14.2.4" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/gravitational/teleport/security/advisories/GHSA-c9v7-wmwj-vf6x" }, { "type": "FIX", "url": "https://github.com/gravitational/teleport/commit/1c77fc49944ebcded32bbdd77c3e1f4f8a1c130d" }, { "type": "FIX", "url": "https://github.com/gravitational/teleport/pull/36136" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2445", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2965.json
{ "schema_version": "1.3.1", "id": "GO-2024-2965", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-39315" ], "summary": "Pomerium exposed OAuth2 access and ID tokens in user info endpoint response in github.com/pomerium/pomerium", "details": "Pomerium exposed OAuth2 access and ID tokens in user info endpoint response in github.com/pomerium/pomerium", "affected": [ { "package": { "name": "github.com/pomerium/pomerium", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.26.1" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-39315" }, { "type": "FIX", "url": "https://github.com/pomerium/pomerium/commit/4c7c4320afb2ced70ba19b46de1ac4383f3daa48" }, { "type": "WEB", "url": "https://github.com/pomerium/pomerium/security/advisories/GHSA-rrqr-7w59-637v" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2965", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2883.json
{ "schema_version": "1.3.1", "id": "GO-2024-2883", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "GHSA-mh55-gqvf-xfwm" ], "summary": "Denial of service via malicious preflight requests in github.com/rs/cors", "details": "Middleware causes a prohibitive amount of heap allocations when processing malicious preflight requests that include a Access-Control-Request-Headers (ACRH) header whose value contains many commas. This behavior can be abused by attackers to produce undue load on the middleware/server as an attempt to cause a denial of service.", "affected": [ { "package": { "name": "github.com/rs/cors", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "1.9.0" }, { "fixed": "1.11.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/rs/cors", "symbols": [ "AllowAll", "Cors.HandlerFunc", "Cors.ServeHTTP", "Cors.areHeadersAllowed", "Cors.handlePreflight", "Default", "New", "splitHeaderValues" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/rs/cors/pull/171" }, { "type": "REPORT", "url": "https://github.com/rs/cors/issues/170" } ], "credits": [ { "name": "@jub0bs" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2883", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2899.json
{ "schema_version": "1.3.1", "id": "GO-2024-2899", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-36127", "GHSA-v6mg-7f7p-qmqp" ], "summary": "apko Exposure of HTTP basic auth credentials in log output in chainguard.dev/apko", "details": "apko Exposure of HTTP basic auth credentials in log output in chainguard.dev/apko", "affected": [ { "package": { "name": "chainguard.dev/apko", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.14.5" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/chainguard-dev/apko/security/advisories/GHSA-v6mg-7f7p-qmqp" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-36127" }, { "type": "WEB", "url": "https://github.com/chainguard-dev/apko/commit/2c0533e4d52e83031a04f6a83ec63fc2a11eff01" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2899", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0229.json
{ "schema_version": "1.3.1", "id": "GO-2022-0229", "modified": "0001-01-01T00:00:00Z", "published": "2022-07-06T18:23:48Z", "aliases": [ "CVE-2020-7919", "GHSA-cjjc-xp8v-855w" ], "summary": "Panic in certificate parsing in crypto/x509 and golang.org/x/crypto/cryptobyte", "details": "On 32-bit architectures, a malformed input to crypto/x509 or the ASN.1 parsing functions of golang.org/x/crypto/cryptobyte can lead to a panic.\n\nThe malformed certificate can be delivered via a crypto/tls connection to a client, or to a server that accepts client certificates. net/http clients can be made to crash by an HTTPS server, while net/http servers that accept client certificates will recover the panic and are unaffected.", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.12.16" }, { "introduced": "1.13.0-0" }, { "fixed": "1.13.7" } ] } ], "ecosystem_specific": { "imports": [ { "path": "crypto/x509" } ] } }, { "package": { "name": "golang.org/x/crypto", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.0.0-20200124225646-8b5121be2f68" } ] } ], "ecosystem_specific": { "imports": [ { "path": "golang.org/x/crypto/cryptobyte" } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/216680" }, { "type": "FIX", "url": "https://go.googlesource.com/go/+/b13ce14c4a6aa59b7b041ad2b6eed2d23e15b574" }, { "type": "FIX", "url": "https://go.dev/cl/216677" }, { "type": "REPORT", "url": "https://go.dev/issue/36837" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/Hsw4mHYc470" } ], "credits": [ { "name": "Project Wycheproof" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0229", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1992.json
{ "schema_version": "1.3.1", "id": "GO-2023-1992", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2019-11841", "GHSA-x3jr-pf6g-c48f" ], "summary": "Misleading message verification in golang.org/x/crypto/openpgp/clearsign", "details": "The clearsign package accepts some malformed messages, making it possible for an attacker to trick a human user (but not a Go program) into thinking unverified text is part of the message.\n\nWith fix, messages with malformed headers in the SIGNED MESSAGE section are rejected.", "affected": [ { "package": { "name": "golang.org/x/crypto", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.0.0-20190424203555-c05e17bb3b2d" } ] } ], "ecosystem_specific": { "imports": [ { "path": "golang.org/x/crypto/openpgp/clearsign", "symbols": [ "Decode" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go-review.git.corp.google.com/c/crypto/+/173778" }, { "type": "FIX", "url": "https://go.googlesource.com/crypto/+/c05e17bb3b2dca130fc919668a96b4bec9eb9442" }, { "type": "WEB", "url": "https://groups.google.com/d/msg/golang-openpgp/6vdgZoTgbIY/K6bBY9z3DAAJ" } ], "credits": [ { "name": "Aida Mynzhasova (SEC Consult Vulnerability Lab)" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-1992", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1872.json
{ "schema_version": "1.3.1", "id": "GO-2023-1872", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-35933", "GHSA-hr9r-8phq-5x8j" ], "summary": "Denial of service in github.com/openfga/openfga", "details": "OpenFGA is vulnerable to a denial of service attack when certain Check and ListObjects calls are executed against authorization models that contain circular relationship definitions.", "affected": [ { "package": { "name": "github.com/openfga/openfga", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.1.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/openfga/openfga/pkg/typesystem", "symbols": [ "New", "NewAndValidate", "TypeSystem.validateNames", "TypeSystem.validateRelationTypeRestrictions" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/openfga/openfga/security/advisories/GHSA-hr9r-8phq-5x8j" }, { "type": "FIX", "url": "https://github.com/openfga/openfga/commit/087ce392595f3c319ab3028b5089118ea4063452" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-1872", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0346.json
{ "schema_version": "1.3.1", "id": "GO-2022-0346", "modified": "0001-01-01T00:00:00Z", "published": "2022-07-15T23:30:27Z", "aliases": [ "CVE-2021-3762", "GHSA-mq47-6wwv-v79w" ], "summary": "Path traversal in github.com/quay/claircore", "details": "A maliciously crafted RPM file can cause the Scanner.Scan function to write files with arbitrary contents to arbitrary locations on the local filestem.", "affected": [ { "package": { "name": "github.com/quay/claircore", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.1.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/quay/claircore/rpm", "symbols": [ "Scanner.Scan" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/quay/claircore/pull/478" }, { "type": "FIX", "url": "https://github.com/quay/claircore/commit/691f2023a1720a0579e688b69a2f4bfe1f4b7821" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0346", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0228.json
{ "schema_version": "1.3.1", "id": "GO-2021-0228", "modified": "0001-01-01T00:00:00Z", "published": "2022-01-14T17:30:28Z", "aliases": [ "CVE-2020-7664", "GHSA-vpx7-vm66-qx8r" ], "summary": "Path traversal in github.com/unknwon/cae", "details": "The ExtractTo function doesn't securely escape file paths in zip archives which include leading or non-leading \"..\". This allows an attacker to add or replace files system-wide.", "affected": [ { "package": { "name": "github.com/unknwon/cae", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.0.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/unknwon/cae/tz", "symbols": [ "Create", "ExtractTo", "Open", "OpenFile", "TzArchive.Close", "TzArchive.ExtractTo", "TzArchive.ExtractToFunc", "TzArchive.Flush", "TzArchive.Open", "TzArchive.syncFiles" ] }, { "path": "github.com/unknwon/cae/zip", "symbols": [ "Create", "ExtractTo", "ExtractToFunc", "Open", "OpenFile", "ZipArchive.Close", "ZipArchive.ExtractTo", "ZipArchive.ExtractToFunc", "ZipArchive.Flush", "ZipArchive.Open" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/unknwon/cae/commit/07971c00a1bfd9dc171c3ad0bfab5b67c2287e11" }, { "type": "WEB", "url": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMUNKNWONCAEZIP-570383" } ], "credits": [ { "name": "Georgios Gkitsas of Snyk Security Team" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0228", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1703.json
{ "schema_version": "1.3.1", "id": "GO-2023-1703", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-24538" ], "summary": "Backticks not treated as string delimiters in html/template", "details": "Templates do not properly consider backticks (`) as Javascript string delimiters, and do not escape them as expected.\n\nBackticks are used, since ES6, for JS template literals. If a template contains a Go template action within a Javascript template literal, the contents of the action can be used to terminate the literal, injecting arbitrary Javascript code into the Go template.\n\nAs ES6 template literals are rather complex, and themselves can do string interpolation, the decision was made to simply disallow Go template actions from being used inside of them (e.g. \"var a = {{.}}\"), since there is no obviously safe way to allow this behavior. This takes the same approach as github.com/google/safehtml.\n\nWith fix, Template.Parse returns an Error when it encounters templates like this, with an ErrorCode of value 12. This ErrorCode is currently unexported, but will be exported in the release of Go 1.21.\n\nUsers who rely on the previous behavior can re-enable it using the GODEBUG flag jstmpllitinterp=1, with the caveat that backticks will now be escaped. This should be used with caution.", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.19.8" }, { "introduced": "1.20.0-0" }, { "fixed": "1.20.3" } ] } ], "ecosystem_specific": { "imports": [ { "path": "html/template", "symbols": [ "Template.Execute", "Template.ExecuteTemplate", "tJS", "tJSDelimited" ] } ] } } ], "references": [ { "type": "REPORT", "url": "https://go.dev/issue/59234" }, { "type": "FIX", "url": "https://go.dev/cl/482079" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8" } ], "credits": [ { "name": "Sohom Datta, Manipal Institute of Technology" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-1703", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0475.json
{ "schema_version": "1.3.1", "id": "GO-2022-0475", "modified": "0001-01-01T00:00:00Z", "published": "2022-07-28T17:24:30Z", "aliases": [ "CVE-2020-28366" ], "summary": "Arbitrary code execution in go command with cgo in cmd/go and cmd/cgo", "details": "The go command may execute arbitrary code at build time when cgo is in use. This may occur when running go get on a malicious package, or any other command that builds untrusted code.\n\nThis can be caused by malicious unquoted symbol name in a linked object file.", "affected": [ { "package": { "name": "toolchain", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.14.12" }, { "introduced": "1.15.0-0" }, { "fixed": "1.15.5" } ] } ], "ecosystem_specific": { "imports": [ { "path": "cmd/go", "symbols": [ "Builder.cgo" ] }, { "path": "cmd/cgo", "symbols": [ "dynimport" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/269658" }, { "type": "FIX", "url": "https://go.googlesource.com/go/+/062e0e5ce6df339dc26732438ad771f73dbf2292" }, { "type": "REPORT", "url": "https://go.dev/issue/42559" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM" } ], "credits": [ { "name": "Chris Brown (Tempus Ex)" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0475", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2442.json
{ "schema_version": "1.3.1", "id": "GO-2024-2442", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "GHSA-76cc-p55w-63g3" ], "summary": "Teleport Access List owners can escalate their privileges in github.com/gravitational/teleport", "details": "Teleport Access List owners can escalate their privileges in github.com/gravitational/teleport.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/gravitational/teleport from v13.0.0 before v13.4.13, from v14.0.0 before v14.2.4.", "affected": [ { "package": { "name": "github.com/gravitational/teleport", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "13.0.0" }, { "fixed": "13.4.13" }, { "introduced": "14.0.0" }, { "fixed": "14.2.4" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/gravitational/teleport/security/advisories/GHSA-76cc-p55w-63g3" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2442", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2755.json
{ "schema_version": "1.3.1", "id": "GO-2024-2755", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2020-8563", "GHSA-5xfg-wv98-264m" ], "summary": "Sensitive Information leak via Log File in Kubernetes in k8s.io/kubernetes", "details": "Sensitive Information leak via Log File in Kubernetes in k8s.io/kubernetes", "affected": [ { "package": { "name": "k8s.io/kubernetes", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.19.3" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-5xfg-wv98-264m" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8563" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886635" }, { "type": "WEB", "url": "https://github.com/kubernetes/kubernetes/issues/95621" }, { "type": "WEB", "url": "https://github.com/kubernetes/kubernetes/pull/95236" }, { "type": "WEB", "url": "https://github.com/kubernetes/kubernetes/pull/95236/commits/247f6dd09299bc7893c1e0affea11c0255025b96" }, { "type": "WEB", "url": "https://groups.google.com/g/kubernetes-announce/c/ScdmyORnPDk" }, { "type": "WEB", "url": "https://groups.google.com/g/kubernetes-security-discuss/c/vm-HcrFUOCs/m/36utxAM5CwAJ" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20210122-0006" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2755", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2642.json
{ "schema_version": "1.3.1", "id": "GO-2024-2642", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-27102", "GHSA-494h-9924-xww9" ], "summary": "Pterodactyl Wings vulnerable to improper isolation of server file access in github.com/pterodactyl/wings", "details": "Pterodactyl Wings vulnerable to improper isolation of server file access in github.com/pterodactyl/wings", "affected": [ { "package": { "name": "github.com/pterodactyl/wings", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.11.9" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/pterodactyl/wings/security/advisories/GHSA-494h-9924-xww9" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27102" }, { "type": "FIX", "url": "https://github.com/pterodactyl/wings/commit/d1c0ca526007113a0f74f56eba99511b4e989287" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2642", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0586.json
{ "schema_version": "1.3.1", "id": "GO-2022-0586", "modified": "0001-01-01T00:00:00Z", "published": "2022-05-26T00:01:27Z", "aliases": [ "CVE-2022-26945", "CVE-2022-30321", "CVE-2022-30322", "CVE-2022-30323", "GHSA-28r2-q6m8-9hpx", "GHSA-cjr4-fv6c-f3mv", "GHSA-fcgg-rvwg-jv58", "GHSA-x24g-9w7v-vprh" ], "summary": "Resource exhaustion in github.com/hashicorp/go-getter and related modules", "details": "Malicious HTTP responses can cause a number of misbehaviors, including overwriting local files, resource exhaustion, and panics.\n\n* Protocol switching, endless redirect, and configuration bypass are possible through abuse of custom HTTP response header processing.\n\n* Arbitrary host access is possible through go-getter path traversal, symlink processing, and command injection flaws.\n\n* Asymmetric resource exhaustion can occur when go-getter processes malicious HTTP responses.\n\n* A panic can be triggered when go-getter processed password-protected ZIP files.", "affected": [ { "package": { "name": "github.com/hashicorp/go-getter", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.6.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/hashicorp/go-getter" } ] } }, { "package": { "name": "github.com/hashicorp/go-getter/v2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "2.1.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/hashicorp/go-getter/v2" } ] } }, { "package": { "name": "github.com/hashicorp/go-getter/s3/v2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "2.1.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/hashicorp/go-getter/s3/v2", "symbols": [ "Getter.Get", "Getter.GetFile", "Getter.Mode" ] } ] } }, { "package": { "name": "github.com/hashicorp/go-getter/gcs/v2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "2.1.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/hashicorp/go-getter/gcs/v2", "symbols": [ "Getter.Get", "Getter.GetFile", "Getter.Mode" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://discuss.hashicorp.com/t/hcsec-2022-13-multiple-vulnerabilities-in-go-getter-library/39930" }, { "type": "FIX", "url": "https://github.com/hashicorp/go-getter/pull/361" }, { "type": "FIX", "url": "https://github.com/hashicorp/go-getter/commit/38e97387488f5439616be60874979433a12edb48" }, { "type": "WEB", "url": "https://github.com/hashicorp/go-getter/commit/a2ebce998f8d4105bd4b78d6c99a12803ad97a45" }, { "type": "WEB", "url": "https://github.com/hashicorp/go-getter/pull/359" } ], "credits": [ { "name": "Joern Schneeweisz of GitLab" }, { "name": "Alessio Della Libera of Snyk" }, { "name": "HashiCorp Product Security" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0586", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-2102.json
{ "schema_version": "1.3.1", "id": "GO-2023-2102", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-39325", "GHSA-4374-p667-p6c8" ], "related": [ "CVE-2023-44487" ], "summary": "HTTP/2 rapid reset can cause excessive work in net/http", "details": "A malicious HTTP/2 client which rapidly creates requests and immediately resets them can cause excessive server resource consumption. While the total number of requests is bounded by the http2.Server.MaxConcurrentStreams setting, resetting an in-progress request allows the attacker to create a new request while the existing one is still executing.\n\nWith the fix applied, HTTP/2 servers now bound the number of simultaneously executing handler goroutines to the stream concurrency limit (MaxConcurrentStreams). New requests arriving when at the limit (which can only happen after the client has reset an existing, in-flight request) will be queued until a handler exits. If the request queue grows too large, the server will terminate the connection.\n\nThis issue is also fixed in golang.org/x/net/http2 for users manually configuring HTTP/2.\n\nThe default stream concurrency limit is 250 streams (requests) per HTTP/2 connection. This value may be adjusted using the golang.org/x/net/http2 package; see the Server.MaxConcurrentStreams setting and the ConfigureServer function.", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.20.10" }, { "introduced": "1.21.0-0" }, { "fixed": "1.21.3" } ] } ], "ecosystem_specific": { "imports": [ { "path": "net/http", "symbols": [ "ListenAndServe", "ListenAndServeTLS", "Serve", "ServeTLS", "Server.ListenAndServe", "Server.ListenAndServeTLS", "Server.Serve", "Server.ServeTLS", "http2Server.ServeConn", "http2serverConn.processHeaders", "http2serverConn.runHandler", "http2serverConn.serve", "http2serverConn.upgradeRequest" ] } ] } }, { "package": { "name": "golang.org/x/net", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.17.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "golang.org/x/net/http2", "symbols": [ "Server.ServeConn", "serverConn.processHeaders", "serverConn.runHandler", "serverConn.serve", "serverConn.upgradeRequest" ] } ] } } ], "references": [ { "type": "REPORT", "url": "https://go.dev/issue/63417" }, { "type": "FIX", "url": "https://go.dev/cl/534215" }, { "type": "FIX", "url": "https://go.dev/cl/534235" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/iNNxDTCjZvo/m/UDd7VKQuAAAJ" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-2102", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0189.json
{ "schema_version": "1.3.1", "id": "GO-2022-0189", "modified": "0001-01-01T00:00:00Z", "published": "2022-08-04T21:30:35Z", "aliases": [ "CVE-2018-16873" ], "summary": "Remote command execution via \"go get\" with \"-u\" flag in cmd/go", "details": "The \"go get\" command is vulnerable to remote code execution when executed with the -u flag and the import path of a malicious Go package, or a package that imports it directly or indirectly.\n\nSpecifically, it is only vulnerable in GOPATH mode, but not in module mode (the distinction is documented at https://golang.org/cmd/go/#hdr-Module_aware_go_get).\n\nUsing custom domains, it's possible to arrange things so that a Git repository is cloned to a folder named \".git\" by using a vanity import path that ends with \"/.git\". If the Git repository root contains a \"HEAD\" file, a \"config\" file, an \"objects\" directory, a \"refs\" directory, with some work to ensure the proper ordering of operations, \"go get -u\" can be tricked into considering the parent directory as a repository root, and running Git commands on it. That will use the \"config\" file in the original Git repository root for its configuration, and if that config file contains malicious commands, they will execute on the system running \"go get -u\".\n\nNote that forbidding import paths with a .git element might not be sufficient to mitigate this issue, as on certain systems there can be other aliases for VCS state folders.", "affected": [ { "package": { "name": "toolchain", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.10.6" }, { "introduced": "1.11.0-0" }, { "fixed": "1.11.3" } ] } ], "ecosystem_specific": { "imports": [ { "path": "cmd/go/internal/get", "symbols": [ "downloadPackage" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/154101" }, { "type": "FIX", "url": "https://go.googlesource.com/go/+/bc82d7c7db83487e05d7a88e06549d4ae2a688c3" }, { "type": "REPORT", "url": "https://go.dev/issue/29230" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/Kw31K8G7Fi0" } ], "credits": [ { "name": "Etienne Stalmans of Heroku" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0189", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2722.json
{ "schema_version": "1.3.1", "id": "GO-2024-2722", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-28869", "GHSA-4vwx-54mw-vqfw" ], "summary": "Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik", "details": "Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik", "affected": [ { "package": { "name": "github.com/traefik/traefik", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/traefik/traefik/v2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "2.11.2" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/traefik/traefik/v3", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "3.0.0-beta3" }, { "fixed": "3.0.0-rc5" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/traefik/traefik/security/advisories/GHSA-4vwx-54mw-vqfw" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-28869" }, { "type": "FIX", "url": "https://github.com/traefik/traefik/commit/240b83b77351dfd8cadb91c305b84e9d22e0f9c6" }, { "type": "WEB", "url": "https://doc.traefik.io/traefik/routing/entrypoints/#respondingtimeouts" }, { "type": "WEB", "url": "https://github.com/traefik/traefik/releases/tag/v2.11.2" }, { "type": "WEB", "url": "https://github.com/traefik/traefik/releases/tag/v3.0.0-rc5" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2722", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2796.json
{ "schema_version": "1.3.1", "id": "GO-2024-2796", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-22091", "GHSA-p2wq-4ggp-45f3" ], "summary": "Mattermost fails to limit the size of a request path in github.com/mattermost/mattermost-server", "details": "Mattermost fails to limit the size of a request path in github.com/mattermost/mattermost-server", "affected": [ { "package": { "name": "github.com/mattermost/mattermost-server", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "8.1.0+incompatible" }, { "fixed": "8.1.12+incompatible" }, { "introduced": "9.5.0+incompatible" }, { "fixed": "9.5.3+incompatible" }, { "introduced": "9.6.0-rc1+incompatible" }, { "fixed": "9.6.1+incompatible" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-p2wq-4ggp-45f3" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22091" }, { "type": "WEB", "url": "https://github.com/mattermost/mattermost/commit/13049d8b16b195f98246dff4812b5f64c1e5a627" }, { "type": "WEB", "url": "https://github.com/mattermost/mattermost/commit/49e7c477246e31c7a0bd85c1043599121755b260" }, { "type": "WEB", "url": "https://github.com/mattermost/mattermost/commit/54478f2ccbc6c4f110706966adfe0db2c16a566c" }, { "type": "WEB", "url": "https://github.com/mattermost/mattermost/commit/f6d320017549ec66efb5fdd4bc10b66ab36abb70" }, { "type": "WEB", "url": "https://mattermost.com/security-updates" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2796", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2857.json
{ "schema_version": "1.3.1", "id": "GO-2024-2857", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2022-31097", "GHSA-vw7q-p2qg-4m5f" ], "summary": "Grafana Stored Cross-site Scripting in Unified Alerting in github.com/grafana/grafana", "details": "Grafana Stored Cross-site Scripting in Unified Alerting in github.com/grafana/grafana.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/grafana/grafana from v8.0.0 before v8.3.10, from v8.4.0 before v8.4.10, from v8.5.0 before v8.5.9, from v9.0.0 before v9.0.3.", "affected": [ { "package": { "name": "github.com/grafana/grafana", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "8.0.0" }, { "fixed": "8.3.10" }, { "introduced": "8.4.0" }, { "fixed": "8.4.10" }, { "introduced": "8.5.0" }, { "fixed": "8.5.9" }, { "introduced": "9.0.0" }, { "fixed": "9.0.3" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/grafana/grafana/security/advisories/GHSA-vw7q-p2qg-4m5f" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31097" }, { "type": "WEB", "url": "https://grafana.com/docs/grafana/latest/release-notes/release-notes-8-5-9" }, { "type": "WEB", "url": "https://grafana.com/docs/grafana/latest/release-notes/release-notes-9-0-3" }, { "type": "WEB", "url": "https://grafana.com/docs/grafana/next/release-notes/release-notes-8-4-10" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20220901-0010" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2857", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2705.json
{ "schema_version": "1.3.1", "id": "GO-2024-2705", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-3135", "GHSA-jhvf-7c85-3c9g" ], "summary": "LocalAI cross-site request forgery vulnerability in github.com/go-skynet/LocalAI", "details": "LocalAI cross-site request forgery vulnerability in github.com/go-skynet/LocalAI", "affected": [ { "package": { "name": "github.com/go-skynet/LocalAI", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-jhvf-7c85-3c9g" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-3135" }, { "type": "WEB", "url": "https://huntr.com/bounties/7afdc4d3-4b68-45ea-96d0-cf9ed3712ae8" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2705", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0097.json
{ "schema_version": "1.3.1", "id": "GO-2021-0097", "modified": "0001-01-01T00:00:00Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2020-29242", "CVE-2020-29243", "CVE-2020-29244", "CVE-2020-29245", "GHSA-27mh-3343-6hg5", "GHSA-9wm7-rc47-g56m", "GHSA-9xm8-8qvc-vw3p", "GHSA-wg79-2cgp-qrjm" ], "summary": "Panic due to out-of-bounds read in github.com/dhowden/tag", "details": "Due to improper bounds checking, a number of methods can trigger a panic due to attempted out-of-bounds reads. If the package is used to parse user supplied input, this may be used as a vector for a denial of service attack.", "affected": [ { "package": { "name": "github.com/dhowden/tag", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.0.0-20201120070457-d52dcb253c63" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/dhowden/tag", "symbols": [ "ReadAtoms", "ReadDSFTags", "ReadFrom", "ReadID3v2Tags", "metadataMP4.readAtomData", "readAPICFrame", "readPICFrame", "readTextWithDescrFrame" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/dhowden/tag/commit/d52dcb253c63a153632bfee5f269dd411dcd8e96" }, { "type": "WEB", "url": "https://github.com/dhowden/tag/commit/a92213460e4838490ce3066ef11dc823cdc1740e" }, { "type": "WEB", "url": "https://github.com/dhowden/tag/commit/4b595ed4fac79f467594aa92f8953f90f817116e" }, { "type": "WEB", "url": "https://github.com/dhowden/tag/commit/6b18201aa5c5535511802ddfb4e4117686b4866d" } ], "credits": [ { "name": "@Jayl1n" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0097", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-1148.json
{ "schema_version": "1.3.1", "id": "GO-2022-1148", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2022-23492", "GHSA-j7qp-mfxf-8xjw" ], "summary": "Resource exhaustion in github.com/libp2p/go-libp2p", "details": "go-libp2p is vulnerable to targeted resource exhaustion attacks.\n\nThese attacks target libp2p's connection, stream, peer, and memory management. An attacker can cause the allocation of large amounts of memory ultimately leading to the process getting killed by the host's operating system.\n\nWhile a connection manager tasked with keeping the number of connections within manageable limits has been part of go-libp2p, this component was designed to handle the regular churn of peers, not a targeted resource exhaustion attack.\n\nIt's recommend to update to v0.21.0 onwards to get some useful functionality that will help in production environments like better metrics around resource usage, Grafana dashboards around resource usage, allow list support, and default autoscaling limits.", "affected": [ { "package": { "name": "github.com/libp2p/go-libp2p", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.18.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/libp2p/go-libp2p", "symbols": [ "DefaultStaticRelays", "Muxer", "New", "NewWithoutDefaults", "Security", "Transport" ] }, { "path": "github.com/libp2p/go-libp2p/config", "symbols": [ "Config.NewNode", "MuxerConstructor", "SecurityConstructor", "TransportConstructor", "makeArgumentConstructors", "makeConstructor", "makeMuxer", "makeTransports" ] }, { "path": "github.com/libp2p/go-libp2p/p2p/host/autonat", "symbols": [ "New", "autoNATService.handleStream", "client.DialBack" ] }, { "path": "github.com/libp2p/go-libp2p/p2p/host/basic", "symbols": [ "BasicHost.newStreamHandler", "NewHost" ] }, { "path": "github.com/libp2p/go-libp2p/p2p/protocol/circuitv1/relay", "symbols": [ "NewRelay" ] }, { "path": "github.com/libp2p/go-libp2p/p2p/protocol/circuitv2/client", "symbols": [ "Client.Dial", "Client.connectV1", "Client.connectV2" ] }, { "path": "github.com/libp2p/go-libp2p/p2p/protocol/circuitv2/relay", "symbols": [ "New", "Relay.Close", "Relay.handleConnect", "Relay.handleStream" ] }, { "path": "github.com/libp2p/go-libp2p/p2p/protocol/holepunch", "symbols": [ "Service.DirectConnect", "Service.handleNewStream", "Service.incomingHolePunch", "Service.initiateHolePunch", "netNotifiee.Connected" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/libp2p/go-libp2p/security/advisories/GHSA-j7qp-mfxf-8xjw" }, { "type": "FIX", "url": "https://github.com/libp2p/go-libp2p/commit/15d7dfbf54264ead8e6f49ca658d79c90635e2de" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-1148", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-1004.json
{ "schema_version": "1.3.1", "id": "GO-2022-1004", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "GHSA-3633-5h82-39pq" ], "summary": "Improper handling of keys in github.com/theupdateframework/go-tuf", "details": "An attacker with the ability to insert public keys into a TUF repository can cause clients to accept a staged change that has not been signed by the correct threshold of signatures.", "affected": [ { "package": { "name": "github.com/theupdateframework/go-tuf", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.3.2" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/theupdateframework/go-tuf/verify", "symbols": [ "DB.Unmarshal", "DB.UnmarshalIgnoreExpired", "DB.UnmarshalTrusted", "DB.Verify", "DB.VerifyIgnoreExpiredCheck", "DB.VerifySignatures" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-3633-5h82-39pq" }, { "type": "FIX", "url": "https://github.com/theupdateframework/go-tuf/pull/369" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-1004", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2743.json
{ "schema_version": "1.3.1", "id": "GO-2024-2743", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-29217", "GHSA-cvqr-mwh6-2vc6" ], "summary": "XSS vulnerability via personal website in github.com/apache/incubator-answer", "details": "XSS vulnerability via personal website in github.com/apache/incubator-answer", "affected": [ { "package": { "name": "github.com/apache/incubator-answer", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.3.0" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-29217" }, { "type": "WEB", "url": "https://lists.apache.org/thread/nc0g1borr0d3wx25jm39pn7nyf268n0x" } ], "credits": [ { "name": "Tsubasa Umeuchi" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2743", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0197.json
{ "schema_version": "1.3.1", "id": "GO-2022-0197", "modified": "0001-01-01T00:00:00Z", "published": "2022-07-01T20:15:19Z", "aliases": [ "CVE-2018-17847", "CVE-2018-17848", "GHSA-4r78-hx75-jjj2", "GHSA-mv93-wvcp-7m7r" ], "summary": "Panic when parsing certain inputs in golang.org/x/net/html", "details": "The Parse function can panic on some invalid inputs.\n\nFor example, the Parse function panics on the input \"\u003csvg\u003e\u003ctemplate\u003e\u003cdesc\u003e\u003ct\u003e\u003csvg\u003e\u003c/template\u003e\".", "affected": [ { "package": { "name": "golang.org/x/net", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.0.0-20190125002852-4b62a64f59f7" } ] } ], "ecosystem_specific": { "imports": [ { "path": "golang.org/x/net/html", "symbols": [ "Parse", "ParseFragment", "nodeStack.contains" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/159397" }, { "type": "FIX", "url": "https://go.googlesource.com/net/+/4b62a64f59f73840b9ab79204c94fee61cd1ba2c" }, { "type": "REPORT", "url": "https://go.dev/issue/27846" } ], "credits": [ { "name": "@tr3ee" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0197", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0108.json
{ "schema_version": "1.3.1", "id": "GO-2021-0108", "modified": "0001-01-01T00:00:00Z", "published": "2021-07-28T18:08:05Z", "aliases": [ "CVE-2020-15111", "GHSA-9cx9-x2gp-9qvh" ], "summary": "CRLF vulnerability in Fiber in github.com/gofiber/fiber", "details": "Due to improper input sanitization, a maliciously constructed filename could cause a file download to use an attacker controlled filename, as well as injecting additional headers into an HTTP response.", "affected": [ { "package": { "name": "github.com/gofiber/fiber", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.12.6" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/gofiber/fiber", "symbols": [ "Ctx.Attachment" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/gofiber/fiber/pull/579" }, { "type": "FIX", "url": "https://github.com/gofiber/fiber/commit/f698b5d5066cfe594102ae252cd58a1fe57cf56f" } ], "credits": [ { "name": "Hasibul Hasan" }, { "name": "Abdullah Shaleh" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0108", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2785.json
{ "schema_version": "1.3.1", "id": "GO-2024-2785", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-0874", "GHSA-m9w6-wp3h-vq8g" ], "summary": "CoreDNS may return invalid cache entries in github.com/coredns/coredns", "details": "A flaw was found in coredns. This issue could lead to invalid cache entries returning due to incorrectly implemented caching.", "affected": [ { "package": { "name": "github.com/coredns/coredns", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.11.2" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/coredns/coredns/plugin/cache", "symbols": [ "Cache.ServeDNS", "Cache.exists", "Cache.getIgnoreTTL", "ResponseWriter.WriteMsg", "hash", "key", "newPrefetchResponseWriter", "verifyStaleResponseWriter.WriteMsg" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-m9w6-wp3h-vq8g" }, { "type": "FIX", "url": "https://github.com/coredns/coredns/commit/997c7f953962d47c242273f0e41398fdfb5b0151" }, { "type": "FIX", "url": "https://github.com/coredns/coredns/pull/6354" }, { "type": "REPORT", "url": "https://github.com/coredns/coredns/issues/6186" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2024:0041" }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2024-0874" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2219234" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2785", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1860.json
{ "schema_version": "1.3.1", "id": "GO-2023-1860", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "summary": "IBC protocol \"Huckleberry\" vulnerability in github.com/cosmos/ibc-go", "details": "The ibc-go module is affected by the Inter-Blockchain Communication (IBC) protocol \"Huckleberry\" vulnerability.", "affected": [ { "package": { "name": "github.com/cosmos/ibc-go/v7", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "7.0.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/cosmos/ibc-go/v7/modules/core/04-channel/keeper", "symbols": [ "Keeper.UnreceivedPackets" ] }, { "path": "github.com/cosmos/ibc-go/v7/modules/core/keeper", "symbols": [ "Keeper.RecvPacket", "Keeper.UnreceivedPackets" ] } ] } }, { "package": { "name": "github.com/cosmos/ibc-go/v6", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "6.1.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/cosmos/ibc-go/v6/modules/core/04-channel/keeper", "symbols": [ "Keeper.UnreceivedPackets" ] }, { "path": "github.com/cosmos/ibc-go/v6/modules/core/keeper", "symbols": [ "Keeper.RecvPacket" ] } ] } }, { "package": { "name": "github.com/cosmos/ibc-go/v5", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "5.2.1" }, { "introduced": "5.3.0" }, { "fixed": "5.3.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/cosmos/ibc-go/v5/modules/core/04-channel/keeper", "symbols": [ "Keeper.UnreceivedPackets" ] }, { "path": "github.com/cosmos/ibc-go/v5/modules/core/keeper", "symbols": [ "Keeper.RecvPacket" ] } ] } }, { "package": { "name": "github.com/cosmos/ibc-go/v4", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "4.1.3" }, { "introduced": "4.2.0" }, { "fixed": "4.2.2" }, { "introduced": "4.3.0" }, { "fixed": "4.3.1" }, { "introduced": "4.4.0" }, { "fixed": "4.4.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/cosmos/ibc-go/v4/modules/core/04-channel/keeper", "symbols": [ "Keeper.UnreceivedPackets" ] }, { "path": "github.com/cosmos/ibc-go/v4/modules/core/keeper", "symbols": [ "Keeper.RecvPacket" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://forum.cosmos.network/t/ibc-security-advisory-huckleberry/10731" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-1860", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0258.json
{ "schema_version": "1.3.1", "id": "GO-2021-0258", "modified": "0001-01-01T00:00:00Z", "published": "2022-01-14T17:30:31Z", "aliases": [ "CVE-2021-41230", "GHSA-j6wp-3859-vxfg" ], "summary": "Incorrect authorization in github.com/pomerium/pomerium", "details": "Pomerium is an open source identity-aware access proxy. Changes to the OIDC claims of a user after initial login are not reflected in policy evaluation when using allowed_idp_claims as part of policy. If using allowed_idp_claims and a user's claims are changed, Pomerium can make incorrect authorization decisions.\n\nFor users unable to upgrade clear data on databroker service by clearing redis or restarting the in-memory databroker to force claims to be updated.", "affected": [ { "package": { "name": "github.com/pomerium/pomerium", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.15.6" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/pomerium/pomerium/internal/identity/manager", "symbols": [ "Manager.Run", "Manager.RunLeased", "Manager.onUpdateRecords" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/pomerium/pomerium/pull/2724" }, { "type": "FIX", "url": "https://github.com/pomerium/pomerium/commit/f20542c4bf2cc691e4c324f7ec79e02e46d95511" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0258", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0572.json
{ "schema_version": "1.3.1", "id": "GO-2022-0572", "modified": "0001-01-01T00:00:00Z", "published": "2022-08-22T17:56:17Z", "aliases": [ "CVE-2021-30080", "GHSA-28r6-jm5h-mrgg" ], "summary": "Access control bypass via incorrect route lookup in github.com/beego/beego and beego/v2", "details": "An issue was discovered in the route lookup process in beego which attackers to bypass access control.", "affected": [ { "package": { "name": "github.com/astaxie/beego", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/astaxie/beego", "symbols": [ "App.Run", "ControllerRegister.FindPolicy", "ControllerRegister.FindRouter", "ControllerRegister.ServeHTTP", "FilterRouter.ValidRouter", "InitBeegoBeforeTest", "Run", "RunWithMiddleWares", "TestBeegoInit", "Tree.Match", "adminApp.Run" ] } ] } }, { "package": { "name": "github.com/beego/beego", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/beego/beego", "symbols": [ "App.Run", "ControllerRegister.FindPolicy", "ControllerRegister.FindRouter", "ControllerRegister.ServeHTTP", "FilterRouter.ValidRouter", "InitBeegoBeforeTest", "Run", "RunWithMiddleWares", "TestBeegoInit", "Tree.Match", "adminApp.Run" ] } ] } }, { "package": { "name": "github.com/beego/beego/v2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "2.0.0" }, { "fixed": "2.0.3" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/beego/beego/v2/server/web", "symbols": [ "AddNamespace", "AddViewPath", "Any", "AutoPrefix", "AutoRouter", "BuildTemplate", "Compare", "CompareNot", "Controller.Abort", "Controller.CheckXSRFCookie", "Controller.CustomAbort", "Controller.Delete", "Controller.DestroySession", "Controller.Get", "Controller.GetBool", "Controller.GetFile", "Controller.GetFloat", "Controller.GetInt", "Controller.GetInt16", "Controller.GetInt32", "Controller.GetInt64", "Controller.GetInt8", "Controller.GetSecureCookie", "Controller.GetString", "Controller.GetStrings", "Controller.GetUint16", "Controller.GetUint32", "Controller.GetUint64", "Controller.GetUint8", "Controller.Head", "Controller.Input", "Controller.IsAjax", "Controller.Options", "Controller.ParseForm", "Controller.Patch", "Controller.Post", "Controller.Put", "Controller.Redirect", "Controller.Render", "Controller.RenderBytes", "Controller.RenderString", "Controller.SaveToFile", "Controller.ServeFormatted", "Controller.ServeJSON", "Controller.ServeJSONP", "Controller.ServeXML", "Controller.ServeYAML", "Controller.SessionRegenerateID", "Controller.SetData", "Controller.SetSecureCookie", "Controller.Trace", "Controller.URLFor", "Controller.XSRFFormHTML", "Controller.XSRFToken", "ControllerRegister.Add", "ControllerRegister.AddAuto", "ControllerRegister.AddAutoPrefix", "ControllerRegister.AddMethod", "ControllerRegister.Any", "ControllerRegister.Delete", "ControllerRegister.FindPolicy", "ControllerRegister.FindRouter", "ControllerRegister.Get", "ControllerRegister.GetContext", "ControllerRegister.Handler", "ControllerRegister.Head", "ControllerRegister.Include", "ControllerRegister.InsertFilter", "ControllerRegister.InsertFilterChain", "ControllerRegister.Options", "ControllerRegister.Patch", "ControllerRegister.Post", "ControllerRegister.Put", "ControllerRegister.ServeHTTP", "ControllerRegister.URLFor", "Date", "DateFormat", "DateParse", "Delete", "Exception", "ExecuteTemplate", "ExecuteViewPathTemplate", "FileSystem.Open", "FilterRouter.ValidRouter", "FlashData.Error", "FlashData.Notice", "FlashData.Set", "FlashData.Store", "FlashData.Success", "FlashData.Warning", "Get", "GetConfig", "HTML2str", "Handler", "Head", "Htmlquote", "Htmlunquote", "HttpServer.Any", "HttpServer.AutoPrefix", "HttpServer.AutoRouter", "HttpServer.Delete", "HttpServer.Get", "HttpServer.Handler", "HttpServer.Head", "HttpServer.Include", "HttpServer.InsertFilter", "HttpServer.InsertFilterChain", "HttpServer.LogAccess", "HttpServer.Options", "HttpServer.Patch", "HttpServer.Post", "HttpServer.PrintTree", "HttpServer.Put", "HttpServer.RESTRouter", "HttpServer.Router", "HttpServer.Run", "Include", "InitBeegoBeforeTest", "InsertFilter", "InsertFilterChain", "LoadAppConfig", "LogAccess", "MapGet", "Namespace.Any", "Namespace.AutoPrefix", "Namespace.AutoRouter", "Namespace.Cond", "Namespace.Delete", "Namespace.Filter", "Namespace.Get", "Namespace.Handler", "Namespace.Head", "Namespace.Include", "Namespace.Namespace", "Namespace.Options", "Namespace.Patch", "Namespace.Post", "Namespace.Put", "Namespace.Router", "NewControllerRegister", "NewControllerRegisterWithCfg", "NewHttpServerWithCfg", "NewHttpSever", "NewNamespace", "NotNil", "Options", "ParseForm", "Patch", "Policy", "Post", "PrintTree", "Put", "RESTRouter", "ReadFromRequest", "RenderForm", "Router", "Run", "RunWithMiddleWares", "TestBeegoInit", "Tree.AddRouter", "Tree.AddTree", "Tree.Match", "URLFor", "URLMap.GetMap", "URLMap.GetMapData", "Walk", "adminApp.Run", "adminController.AdminIndex", "adminController.Healthcheck", "adminController.ListConf", "adminController.ProfIndex", "adminController.PrometheusMetrics", "adminController.QpsIndex", "adminController.TaskStatus", "beegoAppConfig.Bool", "beegoAppConfig.DefaultBool", "beegoAppConfig.SaveConfigFile", "beegoAppConfig.Unmarshaler" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/beego/beego/pull/4459" }, { "type": "FIX", "url": "https://github.com/beego/beego/commit/d5df5e470d0a8ed291930ae802fd7e6b95226519" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0572", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2486.json
{ "schema_version": "1.3.1", "id": "GO-2024-2486", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2020-10660", "GHSA-m979-w9wj-qfj9" ], "summary": "HashiCorp Vault Improper Privilege Management in github.com/hashicorp/vault", "details": "HashiCorp Vault Improper Privilege Management in github.com/hashicorp/vault", "affected": [ { "package": { "name": "github.com/hashicorp/vault", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0.9.0" }, { "fixed": "1.3.4" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-m979-w9wj-qfj9" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10660" }, { "type": "FIX", "url": "https://github.com/hashicorp/vault/commit/18485ee9d4352ac8e8396c580b5941ccf8e5b31a" }, { "type": "FIX", "url": "https://github.com/hashicorp/vault/pull/8606" }, { "type": "WEB", "url": "https://github.com/hashicorp/vault/blob/master/CHANGELOG.md#134-march-19th-2020" }, { "type": "WEB", "url": "https://www.hashicorp.com/blog/category/vault" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2486", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0251.json
{ "schema_version": "1.3.1", "id": "GO-2022-0251", "modified": "0001-01-01T00:00:00Z", "published": "2022-07-15T23:07:28Z", "aliases": [ "CVE-2021-3910", "GHSA-5mxh-2qfv-4g7j" ], "summary": "Panic on NUL character in ROA in github.com/cloudflare/cfrpki", "details": "OctoRPKI crashes when a repository returns an invalid ROA that is only an encoded NUL character (\\0).", "affected": [ { "package": { "name": "github.com/cloudflare/cfrpki", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.4.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/cloudflare/cfrpki/validator/lib", "symbols": [ "BER2DER", "DecodeManifest", "DecoderConfig.DecodeManifest", "readObject" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/cloudflare/cfrpki/commit/76f0f7a98da001fa04e5bc0407c6702f91096bfa" } ], "credits": [ { "name": "Koen van Hove" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0251", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0089.json
{ "schema_version": "1.3.1", "id": "GO-2021-0089", "modified": "0001-01-01T00:00:00Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2020-10675", "GHSA-rmh2-65xw-9m6q" ], "summary": "Infinite loop in github.com/buger/jsonparser", "details": "Parsing malformed JSON which contain opening brackets, but not closing brackets, leads to an infinite loop. If operating on untrusted user input this can be used as a denial of service vector.", "affected": [ { "package": { "name": "github.com/buger/jsonparser", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.0.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/buger/jsonparser", "symbols": [ "Delete", "findKeyStart" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/buger/jsonparser/pull/192" }, { "type": "FIX", "url": "https://github.com/buger/jsonparser/commit/91ac96899e492584984ded0c8f9a08f10b473717" }, { "type": "WEB", "url": "https://github.com/buger/jsonparser/issues/188" } ], "credits": [ { "name": "Cong Wang" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0089", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0462.json
{ "schema_version": "1.3.1", "id": "GO-2022-0462", "modified": "0001-01-01T00:00:00Z", "published": "2022-07-01T20:07:12Z", "aliases": [ "CVE-2022-29222", "GHSA-w45j-f832-hxvh" ], "summary": "Improper validation of client certificates in github.com/pion/dtls/v2", "details": "Client-provided certificates are not correctly validated, and must not be trusted.\n\nDTLS client certificates must be accompanied by proof that the client possesses the private key for the certificate. The Pion DTLS server accepted client certificates unaccompanied by this proof, permitting an attacker to present any certificate and have it accepted as valid.", "affected": [ { "package": { "name": "github.com/pion/dtls/v2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "2.1.5" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/pion/dtls/v2", "symbols": [ "Client", "ClientWithContext", "Dial", "DialWithContext", "Resume", "Server", "ServerWithContext", "flight4Parse", "handshakeFSM.Run", "listener.Accept" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/pion/dtls/commit/d2f797183a9f044ce976e6df6f362662ca722412" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0462", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2020-0013.json
{ "schema_version": "1.3.1", "id": "GO-2020-0013", "modified": "0001-01-01T00:00:00Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2017-3204", "GHSA-xhjq-w7xm-p8qj" ], "summary": "Man-in-the-middle attack in golang.org/x/crypto/ssh", "details": "By default host key verification is disabled which allows for man-in-the-middle attacks against SSH clients if ClientConfig.HostKeyCallback is not set.", "affected": [ { "package": { "name": "golang.org/x/crypto", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.0.0-20170330155735-e4e2799dd7aa" } ] } ], "ecosystem_specific": { "imports": [ { "path": "golang.org/x/crypto/ssh", "symbols": [ "Dial", "NewClientConn" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/38701" }, { "type": "FIX", "url": "https://go.googlesource.com/crypto/+/e4e2799dd7aab89f583e1d898300d96367750991" }, { "type": "REPORT", "url": "https://go.dev/issue/19767" }, { "type": "WEB", "url": "https://bridge.grumpy-troll.org/2017/04/golang-ssh-security/" } ], "credits": [ { "name": "Phil Pennock" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2020-0013", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2812.json
{ "schema_version": "1.3.1", "id": "GO-2024-2812", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "GHSA-v84h-653v-4pq9" ], "related": [ "GHSA-vhxv-fg4m-p2w8" ], "summary": "Some CORS middleware allow untrusted origins in github.com/jub0bs/fcors", "details": "Some CORS middleware (more specifically those created by specifying two or more origin patterns whose hosts share a proper suffix) incorrectly allow some untrusted origins, thereby opening the door to cross-origin attacks from the untrusted origins in question.\n\nFor example, specifying origin patterns \"https://foo.com\" and \"https://bar.com\" (in that order) would yield a middleware that would incorrectly allow untrusted origin \"https://barfoo.com\".", "affected": [ { "package": { "name": "github.com/jub0bs/fcors", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.9.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/jub0bs/fcors/internal/radix", "symbols": [ "Tree.Contains", "Tree.Insert", "lastByteIn", "lengthOfCommonSuffix", "node.add", "splitRight" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/jub0bs/fcors/security/advisories/GHSA-v84h-653v-4pq9" }, { "type": "FIX", "url": "https://github.com/jub0bs/fcors/commit/b5dcb889a49def37d7d9c25deb7135f4eb45625e" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2812", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2020-0047.json
{ "schema_version": "1.3.1", "id": "GO-2020-0047", "modified": "0001-01-01T00:00:00Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2020-36563", "GHSA-5rhg-xhgr-5hfj" ], "summary": "Weak hash (SHA-1) in github.com/RobotsAndPencils/go-saml", "details": "XML Digital Signatures generated and validated using this package use SHA-1, which may allow an attacker to craft inputs which cause hash collisions depending on their control over the input.", "affected": [ { "package": { "name": "github.com/RobotsAndPencils/go-saml", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/RobotsAndPencils/go-saml", "symbols": [ "AuthnRequest.Validate", "NewAuthnRequest", "NewSignedResponse", "ServiceProviderSettings.GetAuthnRequest" ] } ] } } ], "references": [ { "type": "WEB", "url": "https://github.com/RobotsAndPencils/go-saml/pull/38" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2020-0047", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2483.json
{ "schema_version": "1.3.1", "id": "GO-2024-2483", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2018-18625", "GHSA-6wh2-8hw7-jw94" ], "summary": "Grafana XSS via adding a link in General feature in github.com/grafana/grafana", "details": "Grafana XSS via adding a link in General feature in github.com/grafana/grafana", "affected": [ { "package": { "name": "github.com/grafana/grafana", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "6.0.0-beta1+incompatible" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-6wh2-8hw7-jw94" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-18625" }, { "type": "FIX", "url": "https://github.com/grafana/grafana/pull/11813" }, { "type": "FIX", "url": "https://github.com/grafana/grafana/pull/14984" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20200608-0008" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2483", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2921.json
{ "schema_version": "1.3.1", "id": "GO-2024-2921", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-5798", "GHSA-32cj-5wx4-gq8p" ], "summary": "HashiCorp Vault Incorrectly Validated JSON Web Tokens (JWT) Audience Claims in github.com/hashicorp/vault", "details": "HashiCorp Vault Incorrectly Validated JSON Web Tokens (JWT) Audience Claims in github.com/hashicorp/vault.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/hashicorp/vault before v1.15.9.", "affected": [ { "package": { "name": "github.com/hashicorp/vault", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0.11.0" }, { "fixed": "1.16.3" }, { "introduced": "1.17.0-rc1" }, { "fixed": "1.17.0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "1.15.9" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-32cj-5wx4-gq8p" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-5798" }, { "type": "WEB", "url": "https://discuss.hashicorp.com/t/hcsec-2024-11-vault-incorrectly-validated-json-web-tokens-jwt-audience-claims/67770" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2921", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2750.json
{ "schema_version": "1.3.1", "id": "GO-2024-2750", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2020-8567", "GHSA-2v35-wj4r-rcmv" ], "summary": "Kubernetes Secrets Store CSI Driver plugins arbitrary file write in github.com/Azure/secrets-store-csi-driver-provider-azure", "details": "Kubernetes Secrets Store CSI Driver plugins arbitrary file write in github.com/Azure/secrets-store-csi-driver-provider-azure.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/Azure/secrets-store-csi-driver-provider-azure before v0.0.10.; github.com/hashicorp/vault-csi-provider before v0.0.6.", "affected": [ { "package": { "name": "github.com/Azure/secrets-store-csi-driver-provider-azure", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "0.0.10" } ] } ] } }, { "package": { "name": "github.com/GoogleCloudPlatform/secrets-store-csi-driver-provider-gcp", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.2.0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/hashicorp/vault-csi-provider", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "0.0.6" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-2v35-wj4r-rcmv" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8567" }, { "type": "FIX", "url": "https://github.com/Azure/secrets-store-csi-driver-provider-azure/pull/298" }, { "type": "FIX", "url": "https://github.com/GoogleCloudPlatform/secrets-store-csi-driver-provider-gcp/pull/74" }, { "type": "WEB", "url": "https://github.com/hashicorp/secrets-store-csi-driver-provider-vault/pull/50" }, { "type": "WEB", "url": "https://github.com/kubernetes-sigs/secrets-store-csi-driver/issues/384" }, { "type": "WEB", "url": "https://groups.google.com/g/kubernetes-secrets-store-csi-driver/c/BI2qisiNXHY" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2750", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-2399.json
{ "schema_version": "1.3.1", "id": "GO-2023-2399", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-6337", "GHSA-6p62-6cg9-f5f5" ], "summary": "Denial of service via memory exhaustion in github.com/hashicorp/vault", "details": "Unauthenticated and authenticated HTTP requests from a client will be attempted to be mapped to memory. Large requests may result in the exhaustion of available memory on the host, which may cause crashes and denial of service.", "affected": [ { "package": { "name": "github.com/hashicorp/vault", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "1.12.0" }, { "fixed": "1.13.12" }, { "introduced": "1.14.0" }, { "fixed": "1.14.8" }, { "introduced": "1.15.0" }, { "fixed": "1.15.4" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/hashicorp/vault/helper/forwarding", "symbols": [ "GenerateForwardedHTTPRequest", "GenerateForwardedRequest" ] }, { "path": "github.com/hashicorp/vault/http", "symbols": [ "HandlerAnchor.Handler", "TestServer", "TestServerWithListener", "TestServerWithListenerAndProperties", "handler", "parseFormRequest", "parseJSONRequest", "rateLimitQuotaWrapping", "wrapGenericHandler" ] }, { "path": "github.com/hashicorp/vault/vault", "symbols": [ "Core.DetermineRoleFromLoginRequest", "Core.DetermineRoleFromLoginRequestFromBytes", "Core.ForwardRequest", "Core.HandleRequest", "NewSystemBackend", "NewTestCluster", "SystemBackend.handleStorageRaftSnapshotWrite", "TestCluster.InitCores", "TestCoreUnsealed", "TestCoreUnsealedRaw", "TestCoreUnsealedWithConfig", "TestCoreUnsealedWithMetrics", "TestCoreWithCustomResponseHeaderAndUI" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6337" }, { "type": "WEB", "url": "https://discuss.hashicorp.com/t/hcsec-2023-34-vault-vulnerable-to-denial-of-service-through-memory-exhaustion-when-handling-large-http-requests/60741" }, { "type": "FIX", "url": "https://github.com/hashicorp/vault/pull/24354" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-2399", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2635.json
{ "schema_version": "1.3.1", "id": "GO-2024-2635", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-1952", "GHSA-r4fm-g65h-cr54" ], "summary": "Mattermost incorrectly allows access individual posts in github.com/mattermost/mattermost-server", "details": "Mattermost incorrectly allows access individual posts in github.com/mattermost/mattermost-server.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/mattermost/mattermost/server/v8 before v8.1.9.", "affected": [ { "package": { "name": "github.com/mattermost/mattermost-server", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "9.0.0+incompatible" }, { "fixed": "9.4.0+incompatible" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/mattermost/mattermost-server/v5", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/mattermost/mattermost-server/v6", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/mattermost/mattermost/server/v8", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "8.1.9" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-r4fm-g65h-cr54" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-1952" }, { "type": "WEB", "url": "https://mattermost.com/security-updates" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2635", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0069.json
{ "schema_version": "1.3.1", "id": "GO-2021-0069", "modified": "0001-01-01T00:00:00Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2020-28362" ], "summary": "Panic during division of very large numbers in math/big", "details": "A number of math/big.Int methods can panic when provided large inputs due to a flawed division method.", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "1.14.0-0" }, { "fixed": "1.14.12" }, { "introduced": "1.15.0-0" }, { "fixed": "1.15.5" } ] } ], "ecosystem_specific": { "imports": [ { "path": "math/big", "symbols": [ "nat.divRecursiveStep" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/269657" }, { "type": "FIX", "url": "https://go.googlesource.com/go/+/1e1fa5903b760c6714ba17e50bf850b01f49135c" }, { "type": "REPORT", "url": "https://go.dev/issue/42552" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0069", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2848.json
{ "schema_version": "1.3.1", "id": "GO-2024-2848", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2022-39229", "GHSA-gj7m-853r-289r" ], "summary": "Grafana when using email as a username can block other users from signing in in github.com/grafana/grafana", "details": "Grafana when using email as a username can block other users from signing in in github.com/grafana/grafana.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/grafana/grafana before v8.5.14, from v9.0.0 before v9.1.8.", "affected": [ { "package": { "name": "github.com/grafana/grafana", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "8.5.14" }, { "introduced": "9.0.0" }, { "fixed": "9.1.8" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/grafana/grafana/security/advisories/GHSA-gj7m-853r-289r" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-39229" }, { "type": "FIX", "url": "https://github.com/grafana/grafana/commit/5644758f0c5ae9955a4e5480d71f9bef57fdce35" }, { "type": "WEB", "url": "https://github.com/grafana/grafana/releases/tag/v9.1.8" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2848", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2558.json
{ "schema_version": "1.3.1", "id": "GO-2024-2558", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-21494", "GHSA-vj36-3ccr-6563" ], "summary": "Authentication Bypass by Spoofing in github.com/greenpau/caddy-security", "details": "Authentication Bypass by Spoofing in github.com/greenpau/caddy-security", "affected": [ { "package": { "name": "github.com/greenpau/caddy-security", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-vj36-3ccr-6563" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21494" }, { "type": "REPORT", "url": "https://github.com/greenpau/caddy-security/issues/266" }, { "type": "WEB", "url": "https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy" }, { "type": "WEB", "url": "https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-6249859" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2558", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2641.json
{ "schema_version": "1.3.1", "id": "GO-2024-2641", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-28236", "GHSA-pwx5-6wxg-px5h" ], "summary": "Insecure Variable Substitution in Vela in github.com/go-vela/worker", "details": "Insecure Variable Substitution in Vela in github.com/go-vela/worker", "affected": [ { "package": { "name": "github.com/go-vela/worker", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.23.2" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/go-vela/worker/security/advisories/GHSA-pwx5-6wxg-px5h" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-28236" }, { "type": "FIX", "url": "https://github.com/go-vela/worker/commit/e1572743b008e4fbce31ebb1dcd23bf6a1a30297" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2641", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2581.json
{ "schema_version": "1.3.1", "id": "GO-2024-2581", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "GHSA-fvv5-h29g-f6w5" ], "summary": "User with ci:ReadAction permissions and write permissions to one path in a repository may copy objects from any path in the repository in github.com/treeverse/lakefs", "details": "User with ci:ReadAction permissions and write permissions to one path in a repository may copy objects from any path in the repository in github.com/treeverse/lakefs", "affected": [ { "package": { "name": "github.com/treeverse/lakefs", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0.90.0" }, { "fixed": "1.12.1" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/treeverse/lakeFS/security/advisories/GHSA-fvv5-h29g-f6w5" }, { "type": "WEB", "url": "https://github.com/treeverse/lakeFS/commit/56556ee5406fc5425b9302cd08a8d412635fdcd7" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2581", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-1143.json
{ "schema_version": "1.3.1", "id": "GO-2022-1143", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2022-41720" ], "summary": "Restricted file access on Windows in os and net/http", "details": "On Windows, restricted files can be accessed via os.DirFS and http.Dir.\n\nThe os.DirFS function and http.Dir type provide access to a tree of files rooted at a given directory. These functions permit access to Windows device files under that root. For example, os.DirFS(\"C:/tmp\").Open(\"COM1\") opens the COM1 device. Both os.DirFS and http.Dir only provide read-only filesystem access.\n\nIn addition, on Windows, an os.DirFS for the directory (the root of the current drive) can permit a maliciously crafted path to escape from the drive and access any path on the system.\n\nWith fix applied, the behavior of os.DirFS(\"\") has changed. Previously, an empty root was treated equivalently to \"/\", so os.DirFS(\"\").Open(\"tmp\") would open the path \"/tmp\". This now returns an error.", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.18.9" }, { "introduced": "1.19.0-0" }, { "fixed": "1.19.4" } ] } ], "ecosystem_specific": { "imports": [ { "path": "os", "goos": [ "windows" ], "symbols": [ "DirFS", "dirFS.Open", "dirFS.Stat" ] }, { "path": "net/http", "goos": [ "windows" ], "symbols": [ "Dir.Open", "ServeFile", "fileHandler.ServeHTTP", "fileTransport.RoundTrip" ] } ] } } ], "references": [ { "type": "REPORT", "url": "https://go.dev/issue/56694" }, { "type": "FIX", "url": "https://go.dev/cl/455716" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/L_3rmdT0BMU/m/yZDrXjIiBQAJ" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-1143", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2824.json
{ "schema_version": "1.3.1", "id": "GO-2024-2824", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-24788" ], "summary": "Malformed DNS message can cause infinite loop in net", "details": "A malformed DNS message in response to a query can cause the Lookup functions to get stuck in an infinite loop.", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "1.22.0-0" }, { "fixed": "1.22.3" } ] } ], "ecosystem_specific": { "imports": [ { "path": "net", "symbols": [ "Dial", "DialTimeout", "Dialer.Dial", "Dialer.DialContext", "Listen", "ListenConfig.Listen", "ListenConfig.ListenPacket", "ListenPacket", "LookupAddr", "LookupCNAME", "LookupHost", "LookupIP", "LookupMX", "LookupNS", "LookupSRV", "LookupTXT", "ResolveIPAddr", "ResolveTCPAddr", "ResolveUDPAddr", "Resolver.LookupAddr", "Resolver.LookupCNAME", "Resolver.LookupHost", "Resolver.LookupIP", "Resolver.LookupIPAddr", "Resolver.LookupMX", "Resolver.LookupNS", "Resolver.LookupNetIP", "Resolver.LookupSRV", "Resolver.LookupTXT", "extractExtendedRCode" ] } ] } } ], "references": [ { "type": "REPORT", "url": "https://go.dev/issue/66754" }, { "type": "FIX", "url": "https://go.dev/cl/578375" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/wkkO4P9stm0" } ], "credits": [ { "name": "@long-name-let-people-remember-you" }, { "name": "Mateusz Poliwczak" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2824", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2539.json
{ "schema_version": "1.3.1", "id": "GO-2024-2539", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-23319", "GHSA-4fp6-574p-fc35" ], "summary": "Cross-site request forgery via logout button in github.com/mattermost/mattermost-plugin-jira", "details": "Cross-site request forgery via logout button in github.com/mattermost/mattermost-plugin-jira", "affected": [ { "package": { "name": "github.com/mattermost/mattermost-plugin-jira", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.1.2-0.20230830170046-f4cf4c6de017" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/mattermost/mattermost-plugin-jira/server", "symbols": [ "Plugin.httpOAuth1aDisconnect", "Plugin.initializeRouter" ] } ], "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "4.0.0-rc2" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23319" }, { "type": "FIX", "url": "https://github.com/mattermost/mattermost-plugin-jira/commit/f4cf4c6de017ef6aa4428d393b78f418dd84cd8e" }, { "type": "WEB", "url": "https://mattermost.com/security-updates" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2539", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2020-0012.json
{ "schema_version": "1.3.1", "id": "GO-2020-0012", "modified": "0001-01-01T00:00:00Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2020-9283", "GHSA-ffhg-7mh4-33c4" ], "summary": "Panic due to improper verification of cryptographic signatures in golang.org/x/crypto/ssh", "details": "An attacker can craft an ssh-ed25519 or sk-ssh-ed25519@openssh.com public key, such that the library will panic when trying to verify a signature with it. If verifying signatures using user supplied public keys, this may be used as a denial of service vector.", "affected": [ { "package": { "name": "golang.org/x/crypto", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.0.0-20200220183623-bac4c82f6975" } ] } ], "ecosystem_specific": { "imports": [ { "path": "golang.org/x/crypto/ssh", "symbols": [ "CertChecker.Authenticate", "CertChecker.CheckCert", "CertChecker.CheckHostKey", "Certificate.Verify", "Dial", "NewClientConn", "NewPublicKey", "NewServerConn", "NewSignerFromKey", "NewSignerFromSigner", "ParseAuthorizedKey", "ParseKnownHosts", "ParsePrivateKey", "ParsePrivateKeyWithPassphrase", "ParsePublicKey", "ParseRawPrivateKey", "ParseRawPrivateKeyWithPassphrase", "ed25519PublicKey.Verify", "parseED25519", "parseSKEd25519", "skEd25519PublicKey.Verify" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/220357" }, { "type": "FIX", "url": "https://go.googlesource.com/crypto/+/bac4c82f69751a6dd76e702d54b3ceb88adab236" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/3L45YRc91SY" } ], "credits": [ { "name": "Alex Gaynor, Fish in a Barrel" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2020-0012", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1572.json
{ "schema_version": "1.3.1", "id": "GO-2023-1572", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2022-41727", "GHSA-qgc7-mgm3-q253" ], "summary": "Denial of service via crafted TIFF image in golang.org/x/image/tiff", "details": "An attacker can craft a malformed TIFF image which will consume a significant amount of memory when passed to DecodeConfig. This could lead to a denial of service.", "affected": [ { "package": { "name": "golang.org/x/image", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.5.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "golang.org/x/image/tiff", "symbols": [ "Decode", "DecodeConfig", "decoder.ifdUint", "newDecoder" ] } ] } } ], "references": [ { "type": "REPORT", "url": "https://go.dev/issue/58003" }, { "type": "FIX", "url": "https://go.dev/cl/468195" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/ag-FiyjlD5o" } ], "credits": [ { "name": "Philippe Antoine (Catena cyber)" }, { "name": "OSS Fuzz" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-1572", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0252.json
{ "schema_version": "1.3.1", "id": "GO-2022-0252", "modified": "0001-01-01T00:00:00Z", "published": "2022-07-15T23:07:41Z", "aliases": [ "CVE-2021-3911", "GHSA-w6ww-fmfx-2x22" ], "summary": "Panic on misconfigured IP address in github.com/cloudflare/cfrpki", "details": "OctoRPKI crashes when a repository returns an ROA with a IP address that contains too many bits.", "affected": [ { "package": { "name": "github.com/cloudflare/cfrpki", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.4.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/cloudflare/cfrpki/validator/lib", "symbols": [ "DecodeROA", "DecoderConfig.DecodeROA", "GetRangeIP", "IPNet.GetRange", "RPKICertificate.ValidateIPCertificate", "RPKIROA.ValidateIPRoaCertificate", "ValidateIPCertificateList", "ValidateIPRoaCertificateList" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/cloudflare/cfrpki/commit/2882307febd66801de97b2a2ce4d93fe58132005" } ], "credits": [ { "name": "Koen van Hove" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0252", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1495.json
{ "schema_version": "1.3.1", "id": "GO-2023-1495", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2022-41721", "GHSA-fxg5-wq6x-vr4w" ], "summary": "Request smuggling due to improper request handling in golang.org/x/net/http2/h2c", "details": "A request smuggling attack is possible when using MaxBytesHandler.\n\nWhen using MaxBytesHandler, the body of an HTTP request is not fully consumed. When the server attempts to read HTTP2 frames from the connection, it will instead be reading the body of the HTTP request, which could be attacker-manipulated to represent arbitrary HTTP2 requests.", "affected": [ { "package": { "name": "golang.org/x/net", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0.0.0-20220524220425-1d687d428aca" }, { "fixed": "0.1.1-0.20221104162952-702349b0e862" } ] } ], "ecosystem_specific": { "imports": [ { "path": "golang.org/x/net/http2/h2c", "symbols": [ "h2cHandler.ServeHTTP", "h2cUpgrade" ] } ] } } ], "references": [ { "type": "REPORT", "url": "https://go.dev/issue/56352" }, { "type": "FIX", "url": "https://go.dev/cl/447396" } ], "credits": [ { "name": "John Howard (Google)" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-1495", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1788.json
{ "schema_version": "1.3.1", "id": "GO-2023-1788", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-32698", "GHSA-w7jw-q4fg-qc4c" ], "summary": "Incorrect permissions in github.com/goreleaser/nfpm/v2", "details": "When nfpm packages files without additional configuration to enforce its own permissions, the files could be packaged with incorrect permissions (chmod 666 or 777). Anyone who uses nfpm to create packages and does not check or set file permissions before packaging could result in files or folders being packaged with incorrect permissions.", "affected": [ { "package": { "name": "github.com/goreleaser/nfpm/v2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "2.0.0" }, { "fixed": "2.29.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/goreleaser/nfpm/v2", "symbols": [ "Config.Validate", "Info.Validate", "Parse", "ParseFile", "ParseFileWithEnvMapping", "ParseWithEnvMapping", "PrepareForPackager", "Validate", "WithDefaults" ] }, { "path": "github.com/goreleaser/nfpm/v2/files", "symbols": [ "Content.WithFileInfoDefaults", "PrepareForPackager", "addGlobbedFiles", "addTree" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/goreleaser/nfpm/commit/ed9abdf63d5012cc884f2a83b4ab2b42b3680d30" }, { "type": "WEB", "url": "https://github.com/goreleaser/nfpm/releases/tag/v2.29.0" }, { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-w7jw-q4fg-qc4c" } ], "credits": [ { "name": "oCHRISo" }, { "name": "caarlos0" }, { "name": "djgilcrease" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-1788", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0563.json
{ "schema_version": "1.3.1", "id": "GO-2022-0563", "modified": "0001-01-01T00:00:00Z", "published": "2022-02-05T00:00:31Z", "aliases": [ "CVE-2021-46398", "GHSA-72wf-hwcq-65h9" ], "summary": "Cross-site request forgery in github.com/filebrowser/filebrowser/v2", "details": "A Cross-Site Request Forgery vulnerability exists in Filebrowser that allows attackers to create a backdoor user with admin privilege and get access to the filesystem via a malicious HTML webpage that is sent to the victim.", "affected": [ { "package": { "name": "github.com/filebrowser/filebrowser/v2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "2.18.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/filebrowser/filebrowser/v2/http", "symbols": [ "NewHandler" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/filebrowser/filebrowser/commit/74b7cd8e81840537a8206317344f118093153e8d" }, { "type": "WEB", "url": "https://github.com/filebrowser/filebrowser/issues/1621" }, { "type": "WEB", "url": "https://systemweakness.com/critical-csrf-to-rce-in-filebrowser-865a3c34b8e7" } ], "credits": [ { "name": "Febin" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0563", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0076.json
{ "schema_version": "1.3.1", "id": "GO-2021-0076", "modified": "0001-01-01T00:00:00Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2018-14632", "GHSA-gxhv-3hwf-wjp9" ], "summary": "Out-of-bounds write in github.com/evanphx/json-patch", "details": "A malicious JSON patch can cause a panic due to an out-of-bounds write attempt. This can be used as a denial of service vector if exposed to arbitrary user input.", "affected": [ { "package": { "name": "github.com/evanphx/json-patch", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.5.2" }, { "introduced": "3.0.0+incompatible" }, { "fixed": "3.0.1-0.20180525145409-4c9aadca8f89+incompatible" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/evanphx/json-patch", "symbols": [ "Patch.Apply", "Patch.ApplyIndent", "partialArray.add" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/evanphx/json-patch/pull/57" }, { "type": "FIX", "url": "https://github.com/evanphx/json-patch/commit/4c9aadca8f89e349c999f04e28199e96e81aba03" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0076", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1268.json
{ "schema_version": "1.3.1", "id": "GO-2023-1268", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2022-48195", "GHSA-gvfj-fxx3-j323" ], "summary": "Authentication failure in mellium.im/sasl", "details": "An issue was discovered in Mellium mellium.im/sasl before 0.3.1. When performing SCRAM-based SASL authentication, if the remote end advertises support for channel binding, no random nonce is generated (instead, the nonce is empty). This causes authentication to fail in the best case, but (if paired with a remote end that does not validate the length of the nonce) could lead to insufficient randomness being used during authentication.", "affected": [ { "package": { "name": "mellium.im/sasl", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.3.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "mellium.im/sasl", "symbols": [ "NewClient", "NewServer" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://mellium.im/cve/cve-2022-48195/" }, { "type": "FIX", "url": "https://codeberg.org/mellium/sasl/commit/e6cbf681b247c4efa1477eaad2cc47a01707b732" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-1268", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-1113.json
{ "schema_version": "1.3.1", "id": "GO-2022-1113", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2022-39383", "GHSA-m5xf-x7q6-3rm7" ], "summary": "Server-side request forgery in github.com/oam-dev/kubevela", "details": "When using Helm Chart as the component delivery method, the request address of the warehouse is not restricted, and there is a blind SSRF vulnerability.", "affected": [ { "package": { "name": "github.com/oam-dev/kubevela", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.5.8" }, { "introduced": "1.6.0" }, { "fixed": "1.6.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/oam-dev/kubevela/pkg/utils/common", "symbols": [ "HTTPGetResponse" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/kubevela/kubevela/security/advisories/GHSA-m5xf-x7q6-3rm7" }, { "type": "FIX", "url": "https://github.com/kubevela/kubevela/pull/5000" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-1113", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2521.json
{ "schema_version": "1.3.1", "id": "GO-2024-2521", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2019-14271", "GHSA-v2cv-wwxq-qq97" ], "summary": "Moby Docker cp broken with debian containers in github.com/docker/docker", "details": "In Docker 19.03.x before 19.03.1 linked against the GNU C Library (aka glibc), code injection can occur when the nsswitch facility dynamically loads a library inside a chroot that contains the contents of the container.", "affected": [ { "package": { "name": "github.com/docker/docker", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "20.10.0-beta1+incompatible" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/docker/docker/pkg/chrootarchive" } ], "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "19.03.0" }, { "fixed": "19.03.1" } ] } ] } }, { "package": { "name": "github.com/moby/moby", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "20.10.0-beta1+incompatible" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/moby/moby/pkg/chrootarchive" } ], "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "19.03.0" }, { "fixed": "19.03.1" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-v2cv-wwxq-qq97" }, { "type": "FIX", "url": "https://github.com/moby/moby/commit/11e48badcb67554b3d795241855028f28d244545" }, { "type": "FIX", "url": "https://github.com/moby/moby/commit/fa8dd90ceb7bcb9d554d27e0b9087ab83e54bd2b" }, { "type": "FIX", "url": "https://github.com/moby/moby/pull/39612" }, { "type": "REPORT", "url": "https://github.com/moby/moby/issues/39449" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2521", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2655.json
{ "schema_version": "1.3.1", "id": "GO-2024-2655", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-28855", "GHSA-hfrg-4jwr-jfpj" ], "summary": "XSS in github.com/zitadel/zitadel", "details": "The Login UI did not sanitize input parameters. An attacker could create a malicious link, where injected code would be rendered as part of the login screen.", "affected": [ { "package": { "name": "github.com/zitadel/zitadel", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.80.0-v2.20.0.20240312162750-5908b97e7c22" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/zitadel/zitadel/internal/renderer" } ], "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "2.41.15" }, { "introduced": "2.42.0" }, { "fixed": "2.42.15" }, { "introduced": "2.43.0" }, { "fixed": "2.43.9" }, { "introduced": "2.44.0" }, { "fixed": "2.44.3" }, { "introduced": "2.45.0" }, { "fixed": "2.45.1" }, { "introduced": "2.46.0" }, { "fixed": "2.46.1" }, { "introduced": "2.47.0" }, { "fixed": "2.47.4" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/zitadel/zitadel/security/advisories/GHSA-hfrg-4jwr-jfpj" }, { "type": "FIX", "url": "https://github.com/zitadel/zitadel/commit/07ec2efa9dc62f7a6c3a58c112b2879d24bc3e3c" } ], "credits": [ { "name": "Daniel Philipp (OWT) and Thomas Wickham (Synopsis)" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2655", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-2096.json
{ "schema_version": "1.3.1", "id": "GO-2023-2096", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-44273", "GHSA-9xfq-8j3r-xp5g" ], "summary": "Signature malleability in github.com/consensys/gnark-crypto", "details": "Signature malleability in github.com/consensys/gnark-crypto", "affected": [ { "package": { "name": "github.com/consensys/gnark-crypto", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.12.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/consensys/gnark-crypto/ecc/bls12-377/ecdsa", "symbols": [ "PublicKey.Verify", "Signature.SetBytes" ] }, { "path": "github.com/consensys/gnark-crypto/ecc/bls12-377/twistededwards", "symbols": [ "Signature.SetBytes" ] }, { "path": "github.com/consensys/gnark-crypto/ecc/bls12-378/ecdsa", "symbols": [ "PublicKey.Verify", "Signature.SetBytes" ] }, { "path": "github.com/consensys/gnark-crypto/ecc/bls12-378/twistededwards/eddsa", "symbols": [ "PublicKey.Verify", "Signature.SetBytes" ] }, { "path": "github.com/consensys/gnark-crypto/ecc/bls12-381/bandersnatch/eddsa", "symbols": [ "PublicKey.Verify", "Signature.SetBytes" ] }, { "path": "github.com/consensys/gnark-crypto/ecc/bls12-381/ecdsa", "symbols": [ "PublicKey.Verify", "Signature.SetBytes" ] }, { "path": "github.com/consensys/gnark-crypto/ecc/bls12-381/twistededwards/eddsa", "symbols": [ "PublicKey.Verify", "Signature.SetBytes" ] }, { "path": "github.com/consensys/gnark-crypto/ecc/bls24-315/ecdsa", "symbols": [ "PublicKey.Verify", "Signature.SetBytes" ] }, { "path": "github.com/consensys/gnark-crypto/ecc/bls24-315/twistededwards/eddsa", "symbols": [ "PublicKey.Verify", "Signature.SetBytes" ] }, { "path": "github.com/consensys/gnark-crypto/ecc/bls24-317/ecdsa", "symbols": [ "PublicKey.Verify", "Signature.SetBytes" ] }, { "path": "github.com/consensys/gnark-crypto/ecc/bls24-317/twistededwards/eddsa", "symbols": [ "PublicKey.Verify", "Signature.SetBytes" ] }, { "path": "github.com/consensys/gnark-crypto/ecc/bn254/ecdsa", "symbols": [ "PublicKey.Verify", "Signature.SetBytes" ] }, { "path": "github.com/consensys/gnark-crypto/ecc/bn254/twistededwards/eddsa", "symbols": [ "PublicKey.Verify", "Signature.SetBytes" ] }, { "path": "github.com/consensys/gnark-crypto/ecc/bw6-633/ecdsa", "symbols": [ "PublicKey.Verify", "Signature.SetBytes" ] }, { "path": "github.com/consensys/gnark-crypto/ecc/bw6-633/twistededwards/eddsa", "symbols": [ "PublicKey.Verify", "Signature.SetBytes" ] }, { "path": "github.com/consensys/gnark-crypto/ecc/bw6-756/ecdsa", "symbols": [ "PublicKey.Verify", "Signature.SetBytes" ] }, { "path": "github.com/consensys/gnark-crypto/ecc/bw6-756/twistededwards/eddsa", "symbols": [ "PublicKey.Verify", "Signature.SetBytes" ] }, { "path": "github.com/consensys/gnark-crypto/ecc/bw6-761/ecdsa", "symbols": [ "PublicKey.Verify", "Signature.SetBytes" ] }, { "path": "github.com/consensys/gnark-crypto/ecc/bw6-761/twistededwards/eddsa", "symbols": [ "PublicKey.Verify", "Signature.SetBytes" ] }, { "path": "github.com/consensys/gnark-crypto/ecc/secp256k1/ecdsa", "symbols": [ "PublicKey.Verify", "Signature.SetBytes" ] }, { "path": "github.com/consensys/gnark-crypto/ecc/stark-curve/ecdsa", "symbols": [ "PublicKey.Verify", "Signature.SetBytes" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/Consensys/gnark-crypto/pull/449" }, { "type": "WEB", "url": "https://verichains.io" }, { "type": "WEB", "url": "https://github.com/Consensys/gnark-crypto/releases/tag/v0.12.0" }, { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-9xfq-8j3r-xp5g" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-2096", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2454.json
{ "schema_version": "1.3.1", "id": "GO-2024-2454", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-21664", "GHSA-pvcr-v8j8-j5q3" ], "summary": "Panic due to nil pointer dereference in github.com/lestrrat-go/jwx/v2", "details": "Panic due to nil pointer dereference in github.com/lestrrat-go/jwx/v2", "affected": [ { "package": { "name": "github.com/lestrrat-go/jwx", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "1.0.8" }, { "fixed": "1.2.28" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/lestrrat-go/jwx/jws", "symbols": [ "Message.UnmarshalJSON" ] } ] } }, { "package": { "name": "github.com/lestrrat-go/jwx/v2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "2.0.19" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/lestrrat-go/jwx/v2/jws", "symbols": [ "Message.UnmarshalJSON" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21664" }, { "type": "FIX", "url": "https://github.com/lestrrat-go/jwx/commit/0e8802ce6842625845d651456493e7c87625601f" }, { "type": "FIX", "url": "https://github.com/lestrrat-go/jwx/commit/d69a721931a5c48b9850a42404f18e143704adcd" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2454", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2496.json
{ "schema_version": "1.3.1", "id": "GO-2024-2496", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-44312", "GHSA-r8xp-52mq-rmm8" ], "summary": "Apache ServiceComb Service-Center Exposure of Sensitive Information to an Unauthorized Actor vulnerability in github.com/apache/servicecomb-service-center", "details": "Apache ServiceComb Service-Center Exposure of Sensitive Information to an Unauthorized Actor vulnerability in github.com/apache/servicecomb-service-center.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/apache/servicecomb-service-center before v2.2.0.", "affected": [ { "package": { "name": "github.com/apache/servicecomb-service-center", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "2.2.0" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-r8xp-52mq-rmm8" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-44312" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2024/01/31/5" }, { "type": "WEB", "url": "https://lists.apache.org/thread/dkvlgnrmc17qzjdy9k0cr60wpzcssk1s" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2496", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0294.json
{ "schema_version": "1.3.1", "id": "GO-2022-0294", "modified": "0001-01-01T00:00:00Z", "published": "2022-07-15T23:27:21Z", "aliases": [ "CVE-2022-0317", "GHSA-99cg-575x-774p" ], "summary": "Improper input validation in github.com/google/go-attestation", "details": "A local attacker can defeat remotely-attested measured boot.\n\nImproper input validation in AKPublic.Verify can cause it to succeed when provided with a maliciously-formed Quote over no/some PCRs. Subsequent use of the same set of PCR values in Eventlog.Verify lacks the authentication performed by quote verification, meaning a local attacker can couple this vulnerability with a maliciously-formed TCG log in Eventlog.Verify to spoof events in the TCG log, defeating remotely-attested measured-boot.", "affected": [ { "package": { "name": "github.com/google/go-attestation", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.4.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/google/go-attestation/attest", "symbols": [ "AKPublic.Verify", "AKPublic.validate12Quote", "AKPublic.validate20Quote", "TPM.AttestPlatform" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/google/go-attestation/commit/82f2c9c2c76e1d3691d17ee78116d1d93a123788" } ], "credits": [ { "name": "Nikki VonHollen" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0294", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1859.json
{ "schema_version": "1.3.1", "id": "GO-2023-1859", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "GHSA-rm8v-mxj3-5rmq" ], "summary": "Padding oracle vulnerability in github.com/lestrrat-go/jwx", "details": "AES-CBC decryption is vulnerable to a timing attack which may permit an attacker to recover the plaintext of JWE data.", "affected": [ { "package": { "name": "github.com/lestrrat-go/jwx", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.2.26" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/lestrrat-go/jwx/jwe/internal/aescbc", "symbols": [ "Hmac.Open", "unpad" ] } ] } }, { "package": { "name": "github.com/lestrrat-go/jwx/v2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "2.0.11-0.20230614080639-c8b6bec919a1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/lestrrat-go/jwx/v2/jwe/internal/aescbc", "symbols": [ "Hmac.Open", "unpad" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/lestrrat-go/jwx/commit/6c41e3822485fc7e11dd70b4b0524b075d66b103" }, { "type": "FIX", "url": "https://github.com/lestrrat-go/jwx/commit/d9ddbc8e5009cfdd8c28413390b67afa7f576dd6" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-1859", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2609.json
{ "schema_version": "1.3.1", "id": "GO-2024-2609", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-24784" ], "summary": "Comments in display names are incorrectly handled in net/mail", "details": "The ParseAddressList function incorrectly handles comments (text within parentheses) within display names. Since this is a misalignment with conforming address parsers, it can result in different trust decisions being made by programs using different parsers.", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.21.8" }, { "introduced": "1.22.0-0" }, { "fixed": "1.22.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "net/mail", "symbols": [ "Address.String", "AddressParser.Parse", "AddressParser.ParseList", "Header.AddressList", "ParseAddress", "ParseAddressList", "addrParser.consumeGroupList", "addrParser.consumePhrase", "isAtext" ] } ] } } ], "references": [ { "type": "REPORT", "url": "https://go.dev/issue/65083" }, { "type": "FIX", "url": "https://go.dev/cl/555596" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/5pwGVUPoMbg" } ], "credits": [ { "name": "Juho Nurminen of Mattermost" }, { "name": "Slonser (https://github.com/Slonser)" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2609", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1792.json
{ "schema_version": "1.3.1", "id": "GO-2023-1792", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2018-20744", "GHSA-927h-x4qj-r242" ], "summary": "Insecure wildcard CORS policy in github.com/rs/cors", "details": "The CORS handler actively converts a wildcard CORS policy into reflecting an arbitrary Origin header value, which is incompatible with the CORS security design, and could lead to CORS misconfiguration security problems.", "affected": [ { "package": { "name": "github.com/rs/cors", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.5.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/rs/cors", "symbols": [ "AllowAll", "Cors.HandlerFunc", "Cors.ServeHTTP", "Cors.handlePreflight", "Default", "New" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/rs/cors/pull/57" }, { "type": "REPORT", "url": "https://github.com/rs/cors/issues/55" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-1792", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0226.json
{ "schema_version": "1.3.1", "id": "GO-2021-0226", "modified": "0001-01-01T00:00:00Z", "published": "2022-01-13T03:44:58Z", "aliases": [ "CVE-2020-24553" ], "summary": "Cross-site scripting in net/http/cgi and net/http/fcgi", "details": "When a Handler does not explicitly set the Content-Type header, the the package would default to “text/html”, which could cause a Cross-Site Scripting vulnerability if an attacker can control any part of the contents of a response.\n\nThe Content-Type header is now set based on the contents of the first Write using http.DetectContentType, which is consistent with the behavior of the net/http package.\n\nAlthough this protects some applications that validate the contents of uploaded files, not setting the Content-Type header explicitly on any attacker-controlled file is unsafe and should be avoided.", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.14.8" }, { "introduced": "1.15.0-0" }, { "fixed": "1.15.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "net/http/cgi", "symbols": [ "response.Write", "response.WriteHeader", "response.writeCGIHeader" ] }, { "path": "net/http/fcgi", "symbols": [ "response.Write", "response.WriteHeader", "response.writeCGIHeader" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/252179" }, { "type": "FIX", "url": "https://go.googlesource.com/go/+/4f5cd0c0331943c7ec72df3b827d972584f77833" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/8wqlSbkLdPs" }, { "type": "REPORT", "url": "https://go.dev/issue/40928" } ], "credits": [ { "name": "RedTeam Pentesting GmbH" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0226", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2531.json
{ "schema_version": "1.3.1", "id": "GO-2024-2531", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-24768", "GHSA-9xfw-jjq2-7v8h" ], "summary": "1Panel set-cookie is missing the Secure keyword in github.com/1Panel-dev/1Panel", "details": "1Panel set-cookie is missing the Secure keyword in github.com/1Panel-dev/1Panel", "affected": [ { "package": { "name": "github.com/1Panel-dev/1Panel", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.9.6" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-9xfw-jjq2-7v8h" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-24768" }, { "type": "FIX", "url": "https://github.com/1Panel-dev/1Panel/commit/1169648162c4b9b48e0b4aa508f9dea4d6bc50d5" }, { "type": "FIX", "url": "https://github.com/1Panel-dev/1Panel/pull/3817" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2531", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2732.json
{ "schema_version": "1.3.1", "id": "GO-2024-2732", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "GHSA-v6rw-hhgg-wc4x" ], "summary": "Evmos vulnerable to DOS and transaction fee expropriation through Authz exploit in github.com/evmos/evmos", "details": "Evmos vulnerable to DOS and transaction fee expropriation through Authz exploit in github.com/evmos/evmos", "affected": [ { "package": { "name": "github.com/evmos/evmos", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v3", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v4", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v5", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v6", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v7", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v8", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v9", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v10", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v11", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v12", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "12.0.0" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/evmos/evmos/security/advisories/GHSA-v6rw-hhgg-wc4x" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2732", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2563.json
{ "schema_version": "1.3.1", "id": "GO-2024-2563", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-21500", "GHSA-vfph-hjfv-cpv2" ], "summary": "Improper Restriction of Excessive Authentication Attempts in github.com/greenpau/caddy-security", "details": "Improper Restriction of Excessive Authentication Attempts in github.com/greenpau/caddy-security", "affected": [ { "package": { "name": "github.com/greenpau/caddy-security", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-vfph-hjfv-cpv2" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21500" }, { "type": "REPORT", "url": "https://github.com/greenpau/caddy-security/issues/271" }, { "type": "WEB", "url": "https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy" }, { "type": "WEB", "url": "https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-6249864" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2563", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0962.json
{ "schema_version": "1.3.1", "id": "GO-2022-0962", "modified": "0001-01-01T00:00:00Z", "published": "2022-09-02T15:19:52Z", "aliases": [ "CVE-2022-36055", "GHSA-7hfp-qfw3-5jxh" ], "related": [ "CVE-2022-36049", "GHSA-p2g7-xwvr-rrw3" ], "summary": "Denial of service through string value parsing in helm.sh/helm/v3", "details": "Applications that use the strvals package in the Helm SDK to parse user supplied input can suffer a Denial of Service when that input causes a panic that cannot be recovered from.\n\nThe strvals package contains a parser that turns strings into Go structures. For example, the Helm client has command line flags like --set, --set-string, and others that enable the user to pass in strings that are merged into the values. The strvals package converts these strings into structures Go can work with. Some string inputs can cause array data structures to be created causing an out of memory panic.\n\nThe Helm Client will panic with input to --set, --set-string, and other value setting flags that causes an out of memory panic. Helm is not a long running service so the panic will not affect future uses of the Helm client.", "affected": [ { "package": { "name": "helm.sh/helm/v3", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "3.9.4" } ] } ], "ecosystem_specific": { "imports": [ { "path": "helm.sh/helm/v3/pkg/strvals", "symbols": [ "Parse", "ParseFile", "ParseInto", "ParseIntoFile", "ParseIntoString", "ParseString", "ToYAML", "setIndex" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/helm/helm/security/advisories/GHSA-7hfp-qfw3-5jxh" }, { "type": "FIX", "url": "https://github.com/helm/helm/commit/10466e3e179cc8cad4b0bb451108d3c442c69fbc" }, { "type": "WEB", "url": "https://github.com/helm/helm/releases/tag/v3.9.4" } ], "credits": [ { "name": "Ada Logics in a fuzzing audit sponsored by CNCF" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0962", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1566.json
{ "schema_version": "1.3.1", "id": "GO-2023-1566", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2022-25978", "GHSA-9w8x-5hv5-r6gw" ], "summary": "Cross site scripting in github.com/usememos/memos", "details": "A malicious actor can introduce links starting with a \"javascript:\" scheme due to insufficient checks on external resources. This can be used as a part of Cross-site Scripting (XSS) attack.", "affected": [ { "package": { "name": "github.com/usememos/memos", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.10.4-0.20230211093429-b11d2130a084" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/usememos/memos/server", "symbols": [ "NewServer", "Server.registerResourcePublicRoutes", "Server.registerResourceRoutes" ] } ] } } ], "references": [ { "type": "WEB", "url": "https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMUSEMEMOSMEMOSSERVER-3319070" }, { "type": "FIX", "url": "https://github.com/usememos/memos/commit/b11d2130a084385eb65c3761a3c841ebe9f81ae8" }, { "type": "REPORT", "url": "https://github.com/usememos/memos/issues/1026" } ], "credits": [ { "name": "Kahla" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-1566", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1867.json
{ "schema_version": "1.3.1", "id": "GO-2023-1867", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2022-47930" ], "summary": "Replay attacks involving proofs in github.com/bnb-chain/tss-lib", "details": "Replay attacks involving proofs in github.com/bnb-chain/tss-lib.", "affected": [ { "package": { "name": "github.com/bnb-chain/tss-lib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/bnb-chain/tss-lib/common" } ] } }, { "package": { "name": "github.com/binance-chain/tss-lib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/binance-chain/tss-lib/common" } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://medium.com/@iofinnet/security-disclosure-for-ecdsa-and-eddsa-threshold-signature-schemes-4e969af7155b" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-1867", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-1038.json
{ "schema_version": "1.3.1", "id": "GO-2022-1038", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2022-2880" ], "summary": "Incorrect sanitization of forwarded query parameters in net/http/httputil", "details": "Requests forwarded by ReverseProxy include the raw query parameters from the inbound request, including unparsable parameters rejected by net/http. This could permit query parameter smuggling when a Go proxy forwards a parameter with an unparsable value.\n\nAfter fix, ReverseProxy sanitizes the query parameters in the forwarded query when the outbound request's Form field is set after the ReverseProxy. Director function returns, indicating that the proxy has parsed the query parameters. Proxies which do not parse query parameters continue to forward the original query parameters unchanged.", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.18.7" }, { "introduced": "1.19.0-0" }, { "fixed": "1.19.2" } ] } ], "ecosystem_specific": { "imports": [ { "path": "net/http/httputil", "symbols": [ "ReverseProxy.ServeHTTP" ] } ] } } ], "references": [ { "type": "REPORT", "url": "https://go.dev/issue/54663" }, { "type": "FIX", "url": "https://go.dev/cl/432976" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU" } ], "credits": [ { "name": "Gal Goldstein (Security Researcher, Oxeye)" }, { "name": "Daniel Abeles (Head of Research, Oxeye)" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-1038", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0247.json
{ "schema_version": "1.3.1", "id": "GO-2022-0247", "modified": "0001-01-01T00:00:00Z", "published": "2022-05-24T20:14:28Z", "aliases": [ "CVE-2021-38297" ], "summary": "Buffer overflow in WASM modules in misc/wasm and cmd/link", "details": "When invoking functions from WASM modules, built using GOARCH=wasm GOOS=js, passing very large arguments can cause portions of the module to be overwritten with data from the arguments due to a buffer overflow error.\n\nIf using wasm_exec.js to execute WASM modules, users will need to replace their copy (as described in https://golang.org/wiki/WebAssembly#getting-started) after rebuilding any modules.", "affected": [ { "package": { "name": "toolchain", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.16.9" }, { "introduced": "1.17.0-0" }, { "fixed": "1.17.2" } ] } ], "ecosystem_specific": { "imports": [ { "path": "cmd/link", "goos": [ "js" ], "goarch": [ "wasm" ], "symbols": [ "Link.address" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/354571" }, { "type": "FIX", "url": "https://go.googlesource.com/go/+/77f2750f4398990eed972186706f160631d7dae4" }, { "type": "REPORT", "url": "https://go.dev/issue/48797" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/AEBu9j7yj5A" } ], "credits": [ { "name": "Ben Lubar" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0247", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2924.json
{ "schema_version": "1.3.1", "id": "GO-2024-2924", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-36586", "GHSA-7jp9-vgmq-c8r5" ], "summary": "AdGuardHome privilege escalation vulnerability in github.com/AdguardTeam/AdGuardHome", "details": "AdGuardHome privilege escalation vulnerability in github.com/AdguardTeam/AdGuardHome.", "affected": [ { "package": { "name": "github.com/AdguardTeam/AdGuardHome", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0.93.0" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-7jp9-vgmq-c8r5" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-36586" }, { "type": "WEB", "url": "https://github.com/go-compile/security-advisories/blob/master/vulns/CVE-2024-36586.md" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2924", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-1037.json
{ "schema_version": "1.3.1", "id": "GO-2022-1037", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2022-2879" ], "summary": "Unbounded memory consumption when reading headers in archive/tar", "details": "Reader.Read does not set a limit on the maximum size of file headers. A maliciously crafted archive could cause Read to allocate unbounded amounts of memory, potentially causing resource exhaustion or panics. After fix, Reader.Read limits the maximum size of header blocks to 1 MiB.", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.18.7" }, { "introduced": "1.19.0-0" }, { "fixed": "1.19.2" } ] } ], "ecosystem_specific": { "imports": [ { "path": "archive/tar", "symbols": [ "Reader.Next", "Reader.next", "Writer.WriteHeader", "Writer.writePAXHeader", "parsePAX" ] } ] } } ], "references": [ { "type": "REPORT", "url": "https://go.dev/issue/54853" }, { "type": "FIX", "url": "https://go.dev/cl/439355" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU" } ], "credits": [ { "name": "Adam Korczynski (ADA Logics)" }, { "name": "OSS-Fuzz" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-1037", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-2119.json
{ "schema_version": "1.3.1", "id": "GO-2023-2119", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "GHSA-7p92-x423-vwj6" ], "summary": "Proof forgery due to insufficient randomness in github.com/consensys/gnark", "details": "A a third party may derive a valid proof from a valid initial tuple {proof, public_inputs}, corresponding to the same public inputs as the initial proof. This vulnerability is due to randomness being generated using a small part of the scratch memory describing the state, allowing for degrees of freedom in the transcript. Note that the impact is limited to the PlonK verifier smart contract.", "affected": [ { "package": { "name": "github.com/consensys/gnark", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.9.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/consensys/gnark/backend/plonk/bls12-377", "symbols": [ "Prove", "Verify" ] }, { "path": "github.com/consensys/gnark/backend/plonk/bls12-381", "symbols": [ "Prove", "Verify" ] }, { "path": "github.com/consensys/gnark/backend/plonk/bls24-315", "symbols": [ "Prove", "Verify" ] }, { "path": "github.com/consensys/gnark/backend/plonk/bls24-317", "symbols": [ "Prove", "Verify" ] }, { "path": "github.com/consensys/gnark/backend/plonk/bn254", "symbols": [ "Prove", "Verify" ] }, { "path": "github.com/consensys/gnark/backend/plonk/bw6-633", "symbols": [ "Prove", "Verify" ] }, { "path": "github.com/consensys/gnark/backend/plonk/bw6-761", "symbols": [ "Prove", "Verify" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/Consensys/gnark/security/advisories/GHSA-7p92-x423-vwj6" }, { "type": "FIX", "url": "https://github.com/Consensys/gnark/commit/3421eaa7d544286abf3de8c46282b8d4da6d5da0" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-2119", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2020-0049.json
{ "schema_version": "1.3.1", "id": "GO-2020-0049", "modified": "0001-01-01T00:00:00Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2020-36564", "GHSA-5x84-q523-vvwr" ], "summary": "Improper input validation in github.com/justinas/nosurf", "details": "Due to improper validation of caller input, validation is silently disabled if the provided expected token is malformed, causing any user supplied token to be considered valid.", "affected": [ { "package": { "name": "github.com/justinas/nosurf", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.1.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/justinas/nosurf", "symbols": [ "CSRFHandler.ServeHTTP", "VerifyToken", "verifyToken" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/justinas/nosurf/pull/60" }, { "type": "FIX", "url": "https://github.com/justinas/nosurf/commit/4d86df7a4affa1fa50ab39fb09aac56c3ce9c314" } ], "credits": [ { "name": "@aeneasr" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2020-0049", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0101.json
{ "schema_version": "1.3.1", "id": "GO-2021-0101", "modified": "0001-01-01T00:00:00Z", "published": "2021-07-28T18:08:05Z", "aliases": [ "CVE-2019-0210", "GHSA-jq7p-26h5-w78r" ], "summary": "Panic due to out-of-bounds read in github.com/apache/thrift", "details": "Due to an improper bounds check, parsing maliciously crafted messages can cause panics. If this package is used to parse untrusted input, this may be used as a vector for a denial of service attack.", "affected": [ { "package": { "name": "github.com/apache/thrift", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0.0.0-20151001171628-53dd39833a08" }, { "fixed": "0.13.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/apache/thrift/lib/go/thrift", "symbols": [ "Skip", "SkipDefaultDepth", "TBinaryProtocol.Skip", "TCompactProtocol.Skip", "TJSONProtocol.ParseElemListBegin", "TJSONProtocol.ReadBool", "TJSONProtocol.ReadByte", "TJSONProtocol.ReadDouble", "TJSONProtocol.ReadFieldBegin", "TJSONProtocol.ReadFieldEnd", "TJSONProtocol.ReadI16", "TJSONProtocol.ReadI32", "TJSONProtocol.ReadI64", "TJSONProtocol.ReadListBegin", "TJSONProtocol.ReadListEnd", "TJSONProtocol.ReadMapBegin", "TJSONProtocol.ReadMapEnd", "TJSONProtocol.ReadMessageBegin", "TJSONProtocol.ReadMessageEnd", "TJSONProtocol.ReadSetBegin", "TJSONProtocol.ReadSetEnd", "TJSONProtocol.ReadStructBegin", "TJSONProtocol.ReadStructEnd", "TJSONProtocol.Skip", "TSimpleJSONProtocol.ParseElemListBegin", "TSimpleJSONProtocol.ParseF64", "TSimpleJSONProtocol.ParseI64", "TSimpleJSONProtocol.ParseListBegin", "TSimpleJSONProtocol.ParseListEnd", "TSimpleJSONProtocol.ParseObjectEnd", "TSimpleJSONProtocol.ParseObjectStart", "TSimpleJSONProtocol.ReadByte", "TSimpleJSONProtocol.ReadDouble", "TSimpleJSONProtocol.ReadI16", "TSimpleJSONProtocol.ReadI32", "TSimpleJSONProtocol.ReadI64", "TSimpleJSONProtocol.ReadListBegin", "TSimpleJSONProtocol.ReadListEnd", "TSimpleJSONProtocol.ReadMapBegin", "TSimpleJSONProtocol.ReadMapEnd", "TSimpleJSONProtocol.ReadMessageBegin", "TSimpleJSONProtocol.ReadMessageEnd", "TSimpleJSONProtocol.ReadSetBegin", "TSimpleJSONProtocol.ReadSetEnd", "TSimpleJSONProtocol.ReadStructBegin", "TSimpleJSONProtocol.ReadStructEnd", "TSimpleJSONProtocol.Skip", "TSimpleJSONProtocol.safePeekContains", "TStandardClient.Call", "TStandardClient.Recv", "tApplicationException.Read" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/apache/thrift/commit/264a3f318ed3e9e51573f67f963c8509786bcec2" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0101", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2510.json
{ "schema_version": "1.3.1", "id": "GO-2024-2510", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2018-12099", "GHSA-v5gq-qvjq-8p53" ], "summary": "Grafana Cross-site Scripting (XSS) in github.com/grafana/grafana", "details": "Grafana Cross-site Scripting (XSS) in github.com/grafana/grafana", "affected": [ { "package": { "name": "github.com/grafana/grafana", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "5.2.0-beta1+incompatible" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-v5gq-qvjq-8p53" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12099" }, { "type": "FIX", "url": "https://github.com/grafana/grafana/pull/11813" }, { "type": "WEB", "url": "https://github.com/grafana/grafana/releases/tag/v5.2.0-beta1" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20190416-0004" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2510", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0569.json
{ "schema_version": "1.3.1", "id": "GO-2022-0569", "modified": "0001-01-01T00:00:00Z", "published": "2022-08-23T13:24:17Z", "aliases": [ "CVE-2022-31836", "GHSA-95f9-94vc-665h" ], "summary": "Path traversal in github.com/beego/beego and beego/v2", "details": "The leafInfo.match() function uses path.join() to deal with wildcard values which can lead to cross directory risk.", "affected": [ { "package": { "name": "github.com/astaxie/beego", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/astaxie/beego", "symbols": [ "App.Run", "ControllerRegister.FindPolicy", "ControllerRegister.FindRouter", "ControllerRegister.ServeHTTP", "FilterRouter.ValidRouter", "InitBeegoBeforeTest", "Run", "RunWithMiddleWares", "TestBeegoInit", "Tree.Match", "adminApp.Run" ] } ] } }, { "package": { "name": "github.com/beego/beego", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.12.11" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/beego/beego", "symbols": [ "App.Run", "ControllerRegister.FindPolicy", "ControllerRegister.FindRouter", "ControllerRegister.ServeHTTP", "FilterRouter.ValidRouter", "InitBeegoBeforeTest", "Run", "RunWithMiddleWares", "TestBeegoInit", "Tree.Match", "adminApp.Run" ] } ] } }, { "package": { "name": "github.com/beego/beego/v2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "2.0.0" }, { "fixed": "2.0.4" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/beego/beego/v2/server/web", "symbols": [ "AddNamespace", "AddViewPath", "Any", "AutoPrefix", "AutoRouter", "BuildTemplate", "Compare", "CompareNot", "Controller.Abort", "Controller.Bind", "Controller.BindForm", "Controller.BindJSON", "Controller.BindProtobuf", "Controller.BindXML", "Controller.BindYAML", "Controller.CheckXSRFCookie", "Controller.CustomAbort", "Controller.Delete", "Controller.DestroySession", "Controller.Get", "Controller.GetBool", "Controller.GetFile", "Controller.GetFloat", "Controller.GetInt", "Controller.GetInt16", "Controller.GetInt32", "Controller.GetInt64", "Controller.GetInt8", "Controller.GetSecureCookie", "Controller.GetString", "Controller.GetStrings", "Controller.GetUint16", "Controller.GetUint32", "Controller.GetUint64", "Controller.GetUint8", "Controller.Head", "Controller.Input", "Controller.IsAjax", "Controller.JSONResp", "Controller.Options", "Controller.ParseForm", "Controller.Patch", "Controller.Post", "Controller.Put", "Controller.Redirect", "Controller.Render", "Controller.RenderBytes", "Controller.RenderString", "Controller.Resp", "Controller.SaveToFile", "Controller.SaveToFileWithBuffer", "Controller.ServeFormatted", "Controller.ServeJSON", "Controller.ServeJSONP", "Controller.ServeXML", "Controller.ServeYAML", "Controller.SessionRegenerateID", "Controller.SetData", "Controller.SetSecureCookie", "Controller.Trace", "Controller.URLFor", "Controller.XMLResp", "Controller.XSRFFormHTML", "Controller.XSRFToken", "Controller.YamlResp", "ControllerRegister.Add", "ControllerRegister.AddAuto", "ControllerRegister.AddAutoPrefix", "ControllerRegister.AddMethod", "ControllerRegister.AddRouterMethod", "ControllerRegister.Any", "ControllerRegister.CtrlAny", "ControllerRegister.CtrlDelete", "ControllerRegister.CtrlGet", "ControllerRegister.CtrlHead", "ControllerRegister.CtrlOptions", "ControllerRegister.CtrlPatch", "ControllerRegister.CtrlPost", "ControllerRegister.CtrlPut", "ControllerRegister.Delete", "ControllerRegister.FindPolicy", "ControllerRegister.FindRouter", "ControllerRegister.Get", "ControllerRegister.GetContext", "ControllerRegister.Handler", "ControllerRegister.Head", "ControllerRegister.Include", "ControllerRegister.Init", "ControllerRegister.InsertFilter", "ControllerRegister.Options", "ControllerRegister.Patch", "ControllerRegister.Post", "ControllerRegister.Put", "ControllerRegister.ServeHTTP", "ControllerRegister.URLFor", "CtrlAny", "CtrlDelete", "CtrlGet", "CtrlHead", "CtrlOptions", "CtrlPatch", "CtrlPost", "CtrlPut", "Date", "DateFormat", "DateParse", "Delete", "Exception", "ExecuteTemplate", "ExecuteViewPathTemplate", "FileSystem.Open", "FilterRouter.ValidRouter", "FlashData.Error", "FlashData.Notice", "FlashData.Set", "FlashData.Store", "FlashData.Success", "FlashData.Warning", "Get", "GetConfig", "HTML2str", "Handler", "Head", "Htmlquote", "Htmlunquote", "HttpServer.Any", "HttpServer.AutoPrefix", "HttpServer.AutoRouter", "HttpServer.CtrlAny", "HttpServer.CtrlDelete", "HttpServer.CtrlGet", "HttpServer.CtrlHead", "HttpServer.CtrlOptions", "HttpServer.CtrlPatch", "HttpServer.CtrlPost", "HttpServer.CtrlPut", "HttpServer.Delete", "HttpServer.Get", "HttpServer.Handler", "HttpServer.Head", "HttpServer.Include", "HttpServer.InsertFilter", "HttpServer.LogAccess", "HttpServer.Options", "HttpServer.Patch", "HttpServer.Post", "HttpServer.PrintTree", "HttpServer.Put", "HttpServer.RESTRouter", "HttpServer.Router", "HttpServer.RouterWithOpts", "HttpServer.Run", "Include", "InitBeegoBeforeTest", "InsertFilter", "LoadAppConfig", "LogAccess", "MapGet", "Namespace.Any", "Namespace.AutoPrefix", "Namespace.AutoRouter", "Namespace.Cond", "Namespace.CtrlAny", "Namespace.CtrlDelete", "Namespace.CtrlGet", "Namespace.CtrlHead", "Namespace.CtrlOptions", "Namespace.CtrlPatch", "Namespace.CtrlPost", "Namespace.CtrlPut", "Namespace.Delete", "Namespace.Filter", "Namespace.Get", "Namespace.Handler", "Namespace.Head", "Namespace.Include", "Namespace.Namespace", "Namespace.Options", "Namespace.Patch", "Namespace.Post", "Namespace.Put", "Namespace.Router", "NewControllerRegister", "NewControllerRegisterWithCfg", "NewHttpServerWithCfg", "NewHttpSever", "NewNamespace", "NotNil", "Options", "ParseForm", "Patch", "Policy", "Post", "PrintTree", "Put", "RESTRouter", "ReadFromRequest", "RenderForm", "Router", "RouterWithOpts", "Run", "RunWithMiddleWares", "TestBeegoInit", "Tree.AddRouter", "Tree.AddTree", "Tree.Match", "URLFor", "URLMap.GetMap", "URLMap.GetMapData", "Walk", "adminApp.Run", "adminController.AdminIndex", "adminController.Healthcheck", "adminController.ListConf", "adminController.ProfIndex", "adminController.PrometheusMetrics", "adminController.QpsIndex", "adminController.TaskStatus", "beegoAppConfig.Bool", "beegoAppConfig.DefaultBool", "beegoAppConfig.SaveConfigFile", "beegoAppConfig.Unmarshaler" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/beego/beego/pull/5025" }, { "type": "FIX", "url": "https://github.com/beego/beego/pull/5025/commits/ea5ae58d40589d249cf577a053e490509de2bf57" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0569", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0082.json
{ "schema_version": "1.3.1", "id": "GO-2021-0082", "modified": "0001-01-01T00:00:00Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2019-11939", "GHSA-w3r9-r9w7-8h48" ], "summary": "Denial of service via malicious message size declaration in github.com/facebook/fbthrift", "details": "Thrift Servers preallocate memory for the declared size of messages before checking the actual size of the message. This allows a malicious user to send messages that declare that they are significantly larger than they actually are, allowing them to force the server to allocate significant amounts of memory. This can be used as a denial of service vector.", "affected": [ { "package": { "name": "github.com/facebook/fbthrift", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.31.1-0.20200311080807-483ed864d69f" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/facebook/fbthrift/thrift/lib/go/thrift" } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/facebook/fbthrift/commit/483ed864d69f307e9e3b9dadec048216100c0757" }, { "type": "WEB", "url": "https://www.facebook.com/security/advisories/cve-2019-11939" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0082", "review_status": "REVIEWED" } }