repo_id
stringclasses
927 values
file_path
stringlengths
99
214
content
stringlengths
2
4.15M
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2020-0036.json
{ "schema_version": "1.3.1", "id": "GO-2020-0036", "modified": "0001-01-01T00:00:00Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2019-11254", "GHSA-wxc4-f4m6-wwqv" ], "summary": "Excessive resource consumption in YAML parsing in gopkg.in/yaml.v2", "details": "Due to unbounded aliasing, a crafted YAML file can cause consumption of significant system resources. If parsing user supplied input, this may be used as a denial of service vector.", "affected": [ { "package": { "name": "gopkg.in/yaml.v2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "2.2.8" } ] } ], "ecosystem_specific": { "imports": [ { "path": "gopkg.in/yaml.v2", "symbols": [ "Decoder.Decode", "Unmarshal", "UnmarshalStrict", "yaml_parser_decrease_flow_level", "yaml_parser_fetch_more_tokens", "yaml_parser_fetch_stream_start", "yaml_parser_fetch_value", "yaml_parser_remove_simple_key", "yaml_parser_save_simple_key" ] } ] } }, { "package": { "name": "github.com/go-yaml/yaml", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/go-yaml/yaml", "symbols": [ "Decoder.Decode", "Unmarshal", "UnmarshalStrict", "yaml_parser_decrease_flow_level", "yaml_parser_fetch_more_tokens", "yaml_parser_fetch_stream_start", "yaml_parser_fetch_value", "yaml_parser_remove_simple_key", "yaml_parser_save_simple_key" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/go-yaml/yaml/pull/555" }, { "type": "FIX", "url": "https://github.com/go-yaml/yaml/commit/53403b58ad1b561927d19068c655246f2db79d48" }, { "type": "WEB", "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18496" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2020-0036", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2668.json
{ "schema_version": "1.3.1", "id": "GO-2024-2668", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-28232", "GHSA-hcw2-2r9c-gc6p" ], "summary": "Login username enumeration in github.com/IceWhaleTech/CasaOS-UserService", "details": "The Casa OS Login page has a username enumeration vulnerability in the login page that was patched in Casa OS v0.4.7. The issue exists because the application response differs depending on whether the username or password is incorrect, allowing an attacker to enumerate usernames by observing the application response. For example, if the username is incorrect, the application returns \"User does not exist\" with return code \"10006\", while if the password is incorrect, it returns \"User does not exist or password is invalid\" with return code \"10013\". This allows an attacker to determine if a username exists without knowing the password.", "affected": [ { "package": { "name": "github.com/IceWhaleTech/CasaOS-UserService", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.4.8" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/IceWhaleTech/CasaOS-UserService/route/v1", "symbols": [ "PostUserLogin" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/IceWhaleTech/CasaOS-UserService/commit/dd927fe1c805e53790f73cfe10c7a4ded3bc5bdb" } ], "credits": [ { "name": "DrDark1999" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2668", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-2046.json
{ "schema_version": "1.3.1", "id": "GO-2023-2046", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-40591", "GHSA-ppjg-v974-84cm" ], "summary": "Unbounded memory consumption in github.com/ethereum/go-ethereum", "details": "Unbounded memory consumption in github.com/ethereum/go-ethereum", "affected": [ { "package": { "name": "github.com/ethereum/go-ethereum", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.12.1" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/ethereum/go-ethereum/security/advisories/GHSA-ppjg-v974-84cm" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-2046", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2939.json
{ "schema_version": "1.3.1", "id": "GO-2024-2939", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-38361", "GHSA-grjv-gjgr-66g2" ], "summary": "SpiceDB exclusions can result in no permission returned when permission expected in github.com/authzed/spicedb", "details": "SpiceDB exclusions can result in no permission returned when permission expected in github.com/authzed/spicedb", "affected": [ { "package": { "name": "github.com/authzed/spicedb", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.33.1" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/authzed/spicedb/security/advisories/GHSA-grjv-gjgr-66g2" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38361" }, { "type": "FIX", "url": "https://github.com/authzed/spicedb/commit/ecef31d2b266fde17eb2c3415e2ec4ceff96fbeb" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2939", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2849.json
{ "schema_version": "1.3.1", "id": "GO-2024-2849", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2020-26312", "GHSA-hf54-fq2m-p9v6" ], "summary": "dotmesh arbitrary file read and/or write in github.com/dotmesh-io/dotmesh", "details": "dotmesh arbitrary file read and/or write in github.com/dotmesh-io/dotmesh", "affected": [ { "package": { "name": "github.com/dotmesh-io/dotmesh", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-hf54-fq2m-p9v6" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26312" }, { "type": "ADVISORY", "url": "https://securitylab.github.com/advisories/GHSL-2020-254-zipslip-dotmesh" }, { "type": "WEB", "url": "https://github.com/dotmesh-io/dotmesh/blob/master/pkg/archiver/tar.go#L255" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2849", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2815.json
{ "schema_version": "1.3.1", "id": "GO-2024-2815", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-34068", "GHSA-qq22-jj8x-4wwv" ], "related": [ "GHSA-6rg3-8h8x-5xfv" ], "summary": "Pterodactyl Wings vulnerable to Server-Side Request Forgery during remote file pull in github.com/pterodactyl/wings", "details": "Pterodactyl Wings vulnerable to Server-Side Request Forgery during remote file pull in github.com/pterodactyl/wings", "affected": [ { "package": { "name": "github.com/pterodactyl/wings", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.11.12" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/pterodactyl/wings/security/advisories/GHSA-qq22-jj8x-4wwv" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-34068" }, { "type": "FIX", "url": "https://github.com/pterodactyl/wings/commit/c152e36101aba45d8868a9a0eeb890995e8934b8" }, { "type": "WEB", "url": "https://github.com/pterodactyl/wings/security/advisories/GHSA-6rg3-8h8x-5xfv" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2815", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0534.json
{ "schema_version": "1.3.1", "id": "GO-2022-0534", "modified": "0001-01-01T00:00:00Z", "published": "2022-08-11T20:54:51Z", "aliases": [ "CVE-2022-24912", "GHSA-jxqv-jcvh-7gr4" ], "summary": "Timing attack in github.com/runatlantis/atlantis", "details": "Validation of Gitlab requests can leak secrets.\n\nThe package github.com/runatlantis/atlantis/server/controllers/events uses a non-constant time comparison for secrets while validating a Gitlab request. This allows for a timing attack where an attacker can recover a secret and then forge the request.", "affected": [ { "package": { "name": "github.com/runatlantis/atlantis", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.19.7" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/runatlantis/atlantis/server/controllers/events", "symbols": [ "DefaultGitlabRequestParserValidator.ParseAndValidate" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/runatlantis/atlantis/pull/2392" }, { "type": "FIX", "url": "https://github.com/runatlantis/atlantis/commit/48870911974adddaa4c99c8089e79b7d787fa820" }, { "type": "WEB", "url": "https://github.com/runatlantis/atlantis/issues/2391" }, { "type": "WEB", "url": "https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMRUNATLANTISATLANTISSERVERCONTROLLERSEVENTS-2950851" } ], "credits": [ { "name": "cedws" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0534", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1557.json
{ "schema_version": "1.3.1", "id": "GO-2023-1557", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-23625", "GHSA-q264-w97q-q778" ], "summary": "Denial of service via HAMT decoding panic in github.com/ipfs/go-unixfs", "details": "Trying to read malformed HAMT sharded directories can cause panics and virtual memory leaks. If you are reading untrusted user input, an attacker can then trigger a panic.\n\nThis is caused by bogus \"fanout\" parameter in the HAMT directory nodes. A workaround is to not feed untrusted user data to the decoding functions.", "affected": [ { "package": { "name": "github.com/ipfs/go-unixfs", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.4.3" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/ipfs/go-unixfs/hamt", "symbols": [ "NewHamtFromDag", "NewShard", "NewShardValue", "Shard.EnumLinks", "Shard.EnumLinksAsync", "Shard.Find", "Shard.ForEachLink", "Shard.Remove", "Shard.Set", "Shard.SetLink", "Shard.Swap", "Shard.Take", "makeShard", "newChilder" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-q264-w97q-q778" }, { "type": "FIX", "url": "https://github.com/ipfs/go-unixfs/commit/467d139a640ecee4f2e74643dafcc58bb3b54175" } ], "credits": [ { "name": "Jorropo" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-1557", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0166.json
{ "schema_version": "1.3.1", "id": "GO-2022-0166", "modified": "0001-01-01T00:00:00Z", "published": "2022-05-24T22:06:33Z", "aliases": [ "CVE-2016-3959" ], "summary": "Denial of service due to unchecked parameters in crypto/dsa", "details": "The Verify function in crypto/dsa passed certain parameters unchecked to the underlying big integer library, possibly leading to extremely long-running computations, which in turn makes Go programs vulnerable to remote denial of service attacks. Programs using HTTPS client certificates or the Go SSH server libraries are both exposed to this vulnerability.", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.5.4" }, { "introduced": "1.6.0-0" }, { "fixed": "1.6.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "crypto/dsa", "symbols": [ "Verify" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/21533" }, { "type": "FIX", "url": "https://go.googlesource.com/go/+/eb876dd83cb8413335d64e50aae5d38337d1ebb4" }, { "type": "REPORT", "url": "https://go.dev/issue/15184" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/9eqIHqaWvck" } ], "credits": [ { "name": "David Wong" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0166", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2761.json
{ "schema_version": "1.3.1", "id": "GO-2024-2761", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2019-11881", "GHSA-2p4g-jrmx-r34m" ], "summary": "Rancher Login Parameter Can Be Edited in github.com/rancher/rancher", "details": "Rancher Login Parameter Can Be Edited in github.com/rancher/rancher", "affected": [ { "package": { "name": "github.com/rancher/rancher", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-2p4g-jrmx-r34m" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11881" }, { "type": "REPORT", "url": "https://github.com/rancher/rancher/issues/20216" }, { "type": "WEB", "url": "https://github.com/MauroEldritch/VanCleef" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2761", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2947.json
{ "schema_version": "1.3.1", "id": "GO-2024-2947", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-6104", "GHSA-v6v8-xj6m-xwqh" ], "summary": "Leak of sensitive information to log files in github.com/hashicorp/go-retryablehttp", "details": "URLs were not sanitized when writing them to log files. This could lead to writing sensitive HTTP basic auth credentials to the log file.", "affected": [ { "package": { "name": "github.com/hashicorp/go-retryablehttp", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.7.7" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/hashicorp/go-retryablehttp", "symbols": [ "Client.Do", "Client.Get", "Client.Head", "Client.Post", "Client.PostForm", "Get", "Head", "Post", "PostForm", "RoundTripper.RoundTrip" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-v6v8-xj6m-xwqh" }, { "type": "FIX", "url": "https://github.com/hashicorp/go-retryablehttp/commit/a99f07beb3c5faaa0a283617e6eb6bcf25f5049a" }, { "type": "WEB", "url": "https://discuss.hashicorp.com/t/hcsec-2024-12-go-retryablehttp-can-leak-basic-auth-credentials-to-log-files/68027" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2947", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2580.json
{ "schema_version": "1.3.1", "id": "GO-2024-2580", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-26578", "GHSA-9q24-hwmc-797x" ], "summary": "Apache Answer Race Condition vulnerability in github.com/apache/incubator-answer", "details": "Apache Answer Race Condition vulnerability in github.com/apache/incubator-answer", "affected": [ { "package": { "name": "github.com/apache/incubator-answer", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.2.5" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-9q24-hwmc-797x" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26578" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2024/02/22/3" }, { "type": "WEB", "url": "https://lists.apache.org/thread/ko0ksnznt2484lxt0zts2ygr82ldkhcb" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2580", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2616.json
{ "schema_version": "1.3.1", "id": "GO-2024-2616", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-24765", "GHSA-h5gf-cmm8-cg7c" ], "summary": "Path traversal and user privilege escalation in github.com/IceWhaleTech/CasaOS-UserService", "details": "The UserService API contains a path traversal vulnerability that allows an attacker to obtain any file on the system, including the user database and system configuration. This can lead to privilege escalation and compromise of the system.", "affected": [ { "package": { "name": "github.com/IceWhaleTech/CasaOS-UserService", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.4.7" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/IceWhaleTech/CasaOS-UserService/route/v1", "symbols": [ "GetUserImage" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/IceWhaleTech/CasaOS-UserService/security/advisories/GHSA-h5gf-cmm8-cg7c" }, { "type": "FIX", "url": "https://github.com/IceWhaleTech/CasaOS-UserService/commit/3f4558e23c0a9958f9a0e20aabc64aa8fd51840e" }, { "type": "WEB", "url": "https://github.com/IceWhaleTech/CasaOS-UserService/releases/tag/v0.4.7" } ], "credits": [ { "name": "Cp0204" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2616", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-1031.json
{ "schema_version": "1.3.1", "id": "GO-2022-1031", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2022-40083", "GHSA-crxj-hrmp-4rwf" ], "summary": "Open redirect in github.com/labstack/echo/v4", "details": "Labstack Echo contains an open redirect vulnerability via the Static Handler component. This vulnerability can be leveraged by attackers to cause a Server-Side Request Forgery (SSRF).", "affected": [ { "package": { "name": "github.com/labstack/echo/v4", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "4.9.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/labstack/echo/v4", "symbols": [ "Echo.Static", "Echo.StaticFS", "Group.Static", "Group.StaticFS", "StaticDirectoryHandler" ] } ] } } ], "references": [ { "type": "REPORT", "url": "https://github.com/labstack/echo/issues/2259" }, { "type": "FIX", "url": "https://github.com/labstack/echo/pull/2260" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-1031", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-2331.json
{ "schema_version": "1.3.1", "id": "GO-2023-2331", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-47108", "GHSA-8pgv-569h-w5rw" ], "summary": "Denial of service in go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc", "details": "The grpc Unary Server Interceptor created by the otelgrpc package added the labels net.peer.sock.addr and net.peer.sock.port with unbounded cardinality. This can lead to the server's potential memory exhaustion when many malicious requests are sent. This leads to a denial-of-service.", "affected": [ { "package": { "name": "go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.46.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc", "symbols": [ "StreamClientInterceptor", "StreamServerInterceptor", "UnaryClientInterceptor", "UnaryServerInterceptor", "spanInfo" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/open-telemetry/opentelemetry-go-contrib/security/advisories/GHSA-8pgv-569h-w5rw" }, { "type": "FIX", "url": "https://github.com/open-telemetry/opentelemetry-go-contrib/commit/b44dfc9092b157625a5815cb437583cee663333b" }, { "type": "FIX", "url": "https://github.com/open-telemetry/opentelemetry-go-contrib/pull/4322" }, { "type": "WEB", "url": "https://pkg.go.dev/go.opentelemetry.io/otel/metric/noop#NewMeterProvider" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-2331", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1702.json
{ "schema_version": "1.3.1", "id": "GO-2023-1702", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-24537" ], "summary": "Infinite loop in parsing in go/scanner", "details": "Calling any of the Parse functions on Go source code which contains //line directives with very large line numbers can cause an infinite loop due to integer overflow.", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.19.8" }, { "introduced": "1.20.0-0" }, { "fixed": "1.20.3" } ] } ], "ecosystem_specific": { "imports": [ { "path": "go/scanner", "symbols": [ "Scanner.Scan", "Scanner.updateLineInfo" ] } ] } } ], "references": [ { "type": "REPORT", "url": "https://go.dev/issue/59180" }, { "type": "FIX", "url": "https://go.dev/cl/482078" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8" } ], "credits": [ { "name": "Philippe Antoine (Catena cyber)" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-1702", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0274.json
{ "schema_version": "1.3.1", "id": "GO-2022-0274", "modified": "0001-01-01T00:00:00Z", "published": "2022-07-15T23:08:20Z", "aliases": [ "CVE-2021-43784", "GHSA-v95c-p5hm-xq8f" ], "summary": "Namespace restriction bypass in github.com/opencontainers/runc", "details": "An attacker with partial control over the bind mount sources of a new container can bypass namespace restrictions.", "affected": [ { "package": { "name": "github.com/opencontainers/runc", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "1.0.1-0.20211012131345-9c444070ec7b" }, { "fixed": "1.1.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/opencontainers/runc/libcontainer", "symbols": [ "Bytemsg.Serialize", "LinuxFactory.StartInitialization", "linuxContainer.Run", "linuxContainer.Start", "linuxStandardInit.Init" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/opencontainers/runc/commit/f50369af4b571e358f20b139eea52d612eb55eed" }, { "type": "WEB", "url": "https://github.com/opencontainers/runc/commit/dde509df4e28cec33b3c99c6cda3d4fd5beafc77" }, { "type": "WEB", "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2241" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0274", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2636.json
{ "schema_version": "1.3.1", "id": "GO-2024-2636", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-2352", "GHSA-x2vg-5wrf-vj6v" ], "summary": "1Panel is vulnerable to command injection in github.com/1Panel-dev/1Panel", "details": "1Panel is vulnerable to command injection in github.com/1Panel-dev/1Panel", "affected": [ { "package": { "name": "github.com/1Panel-dev/1Panel", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.10.1-lts" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-x2vg-5wrf-vj6v" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-2352" }, { "type": "FIX", "url": "https://github.com/1Panel-dev/1Panel/pull/4131" }, { "type": "FIX", "url": "https://github.com/1Panel-dev/1Panel/pull/4131#issue-2176105990" }, { "type": "FIX", "url": "https://github.com/1Panel-dev/1Panel/pull/4131/commits/0edd7a9f6f5100aab98a0ea6e5deedff7700396c" }, { "type": "WEB", "url": "https://vuldb.com/?ctiid.256304" }, { "type": "WEB", "url": "https://vuldb.com/?id.256304" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2636", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2597.json
{ "schema_version": "1.3.1", "id": "GO-2024-2597", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-27101", "GHSA-h3m7-rqc4-7h9p" ], "summary": "Integer overflow in chunking helper causes dispatching to miss elements or panic in github.com/authzed/spicedb", "details": "Integer overflow in chunking helper causes dispatching to miss elements or panic in github.com/authzed/spicedb", "affected": [ { "package": { "name": "github.com/authzed/spicedb", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.29.2" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/authzed/spicedb/security/advisories/GHSA-h3m7-rqc4-7h9p" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27101" }, { "type": "FIX", "url": "https://github.com/authzed/spicedb/commit/ef443c442b96909694390324a99849b0407007fe" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2597", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2795.json
{ "schema_version": "1.3.1", "id": "GO-2024-2795", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-4182", "GHSA-8f99-g2pj-x8w3" ], "summary": "Mattermost crashes web clients via a malformed custom status in github.com/mattermost/mattermost-server", "details": "Mattermost crashes web clients via a malformed custom status in github.com/mattermost/mattermost-server", "affected": [ { "package": { "name": "github.com/mattermost/mattermost-server", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "8.1.0+incompatible" }, { "fixed": "8.1.12+incompatible" }, { "introduced": "9.4.0+incompatible" }, { "fixed": "9.4.5+incompatible" }, { "introduced": "9.5.0+incompatible" }, { "fixed": "9.5.3+incompatible" }, { "introduced": "9.6.0-rc1+incompatible" }, { "fixed": "9.6.1+incompatible" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-8f99-g2pj-x8w3" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4182" }, { "type": "WEB", "url": "https://github.com/mattermost/mattermost/commit/41333a0babf565453d89287549bec1e546e75ce7" }, { "type": "WEB", "url": "https://github.com/mattermost/mattermost/commit/6cbab0f7ece104681f73dd12c75d9f22d567125e" }, { "type": "WEB", "url": "https://github.com/mattermost/mattermost/commit/a99dadd80c57d376185ca06f8f70919a6f135bc6" }, { "type": "WEB", "url": "https://github.com/mattermost/mattermost/commit/f84f8ed65f6a5faba974426424b684635455a527" }, { "type": "WEB", "url": "https://mattermost.com/security-updates" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2795", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-2017.json
{ "schema_version": "1.3.1", "id": "GO-2023-2017", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-38976", "GHSA-8697-479h-5mfp" ], "summary": "Denial of service vulnerability in github.com/weaviate/weaviate", "details": "A type conversion issue in Weaviate may allow a remote attack that would cause a denial of service.", "affected": [ { "package": { "name": "github.com/weaviate/weaviate", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.18.6" }, { "introduced": "1.19.0" }, { "fixed": "1.19.13" }, { "introduced": "1.20.0" }, { "fixed": "1.20.6" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/weaviate/weaviate/adapters/handlers/rest", "symbols": [ "Server.ConfigureAPI", "Server.Serve", "Server.SetAPI", "handleUnbatchedGraphQLRequest" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/weaviate/weaviate/security/advisories/GHSA-8697-479h-5mfp" }, { "type": "REPORT", "url": "https://github.com/weaviate/weaviate/issues/3258" }, { "type": "FIX", "url": "https://github.com/weaviate/weaviate/pull/3431" }, { "type": "FIX", "url": "https://github.com/weaviate/weaviate/commit/2a7b208d9aca07e28969e3be82689c184ccf9118" }, { "type": "WEB", "url": "https://github.com/weaviate/weaviate/releases/tag/v1.18.6" }, { "type": "WEB", "url": "https://github.com/weaviate/weaviate/releases/tag/v1.19.13" }, { "type": "WEB", "url": "https://github.com/weaviate/weaviate/releases/tag/v1.20.6" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-2017", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2509.json
{ "schema_version": "1.3.1", "id": "GO-2024-2509", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2021-3282", "GHSA-rq95-xf66-j689" ], "summary": "Improper Authentication in HashiCorp Vault in github.com/hashicorp/vault", "details": "Improper Authentication in HashiCorp Vault in github.com/hashicorp/vault", "affected": [ { "package": { "name": "github.com/hashicorp/vault", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "1.6.0" }, { "fixed": "1.6.2" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-rq95-xf66-j689" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3282" }, { "type": "FIX", "url": "https://github.com/hashicorp/vault/commit/09f9068e22f762da123160233518b440e00bdb3b" }, { "type": "WEB", "url": "https://discuss.hashicorp.com/t/hcsec-2021-04-vault-enterprise-s-dr-secondaries-allowed-raft-peer-removal-without-authentication/20337" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/202207-01" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2509", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2479.json
{ "schema_version": "1.3.1", "id": "GO-2024-2479", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-23647", "GHSA-mrx3-gxjx-hjqj" ], "summary": "Authentik vulnerable to PKCE downgrade attack in goauthentik.io", "details": "Authentik vulnerable to PKCE downgrade attack in goauthentik.io.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: goauthentik.io before v2023.8.7, from v2023.10.0 before v2023.10.7.", "affected": [ { "package": { "name": "goauthentik.io", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "2023.8.7" }, { "introduced": "2023.10.0" }, { "fixed": "2023.10.7" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/goauthentik/authentik/security/advisories/GHSA-mrx3-gxjx-hjqj" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23647" }, { "type": "WEB", "url": "https://github.com/goauthentik/authentik/commit/38e04ae12720e5d81b4f7ac77997eb8d1275d31a" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2479", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2020-0032.json
{ "schema_version": "1.3.1", "id": "GO-2020-0032", "modified": "0001-01-01T00:00:00Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2019-25073", "GHSA-fjgq-224f-fq37" ], "summary": "Path traversal in github.com/goadesign/goa", "details": "Due to improper sanitization of user input, Controller.FileHandler allows for directory traversal, allowing an attacker to read files outside of the target directory that the server has permission to read.", "affected": [ { "package": { "name": "github.com/goadesign/goa", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.4.3" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/goadesign/goa", "symbols": [ "Controller.FileHandler", "Service.ListenAndServe", "Service.ListenAndServeTLS", "Service.Serve", "mux.ServeHTTP" ] } ] } }, { "package": { "name": "goa.design/goa", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.4.3" } ] } ], "ecosystem_specific": { "imports": [ { "path": "goa.design/goa", "symbols": [ "Controller.FileHandler" ] } ] } }, { "package": { "name": "goa.design/goa/v3", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "3.0.9" } ] } ], "ecosystem_specific": { "imports": [ { "path": "goa.design/goa/v3", "symbols": [ "Controller.FileHandler" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/goadesign/goa/pull/2388" }, { "type": "FIX", "url": "https://github.com/goadesign/goa/commit/70b5a199d0f813d74423993832c424e1fc73fb39" } ], "credits": [ { "name": "@christi3k" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2020-0032", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2770.json
{ "schema_version": "1.3.1", "id": "GO-2024-2770", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2022-3802", "GHSA-g23g-mw97-65c8" ], "summary": "IBAX go-ibax vulnerable to SQL injection in github.com/IBAX-io/go-ibax", "details": "IBAX go-ibax vulnerable to SQL injection in github.com/IBAX-io/go-ibax", "affected": [ { "package": { "name": "github.com/IBAX-io/go-ibax", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.4.2" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-g23g-mw97-65c8" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3802" }, { "type": "FIX", "url": "https://github.com/IBAX-io/go-ibax/commit/b0183d8e550836dc50282ee74ff421ee41b25a37" }, { "type": "REPORT", "url": "https://github.com/IBAX-io/go-ibax/issues/2063" }, { "type": "WEB", "url": "https://vuldb.com/?id.212638" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2770", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0527.json
{ "schema_version": "1.3.1", "id": "GO-2022-0527", "modified": "0001-01-01T00:00:00Z", "published": "2022-07-20T20:52:22Z", "aliases": [ "CVE-2022-30630" ], "summary": "Stack exhaustion in Glob on certain paths in io/fs", "details": "Calling Glob on a path which contains a large number of path separators can cause a panic due to stack exhaustion.", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.17.12" }, { "introduced": "1.18.0-0" }, { "fixed": "1.18.4" } ] } ], "ecosystem_specific": { "imports": [ { "path": "io/fs", "symbols": [ "Glob" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/417065" }, { "type": "FIX", "url": "https://go.googlesource.com/go/+/fa2d41d0ca736f3ad6b200b2a4e134364e9acc59" }, { "type": "REPORT", "url": "https://go.dev/issue/53415" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0527", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-2137.json
{ "schema_version": "1.3.1", "id": "GO-2023-2137", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-45825", "GHSA-q24m-6h38-5xj8" ], "summary": "Credentials leak in github.com/ydb-platform/ydb-go-sdk/v3", "details": "A custom credentials object that does not implement the fmt.Stringer interface may leak sensitive information (e.g., credentials) via logs.", "affected": [ { "package": { "name": "github.com/ydb-platform/ydb-go-sdk/v3", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "3.48.6" }, { "fixed": "3.53.3" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/ydb-platform/ydb-go-sdk/v3", "symbols": [ "Connector", "Driver.Close", "Driver.Coordination", "Driver.Discovery", "Driver.Ratelimiter", "Driver.Scheme", "Driver.Scripting", "Driver.Table", "Driver.Topic", "Driver.With", "IsTimeoutError", "IsTransportError", "MustConnector", "MustOpen", "New", "Open", "Unwrap", "WithAccessTokenCredentials", "WithAnonymousCredentials", "WithCertificatesFromFile", "WithRequestType", "WithTraceID", "connect", "initOnce.Close", "initOnce.Init", "sqlDriver.OpenConnector" ] }, { "path": "github.com/ydb-platform/ydb-go-sdk/v3/credentials", "symbols": [ "NewAccessTokenCredentials", "NewAnonymousCredentials", "NewStaticCredentials", "WithSourceInfo", "staticCredentialsConfig.Endpoint", "staticCredentialsConfig.GrpcDialOptions" ] }, { "path": "github.com/ydb-platform/ydb-go-sdk/v3/internal/balancer", "symbols": [ "Balancer.Invoke", "Balancer.NewStream", "Balancer.clusterDiscovery", "Balancer.wrapCall", "New" ] }, { "path": "github.com/ydb-platform/ydb-go-sdk/v3/internal/conn", "symbols": [ "WithAfterFunc" ] }, { "path": "github.com/ydb-platform/ydb-go-sdk/v3/internal/credentials", "symbols": [ "AccessToken.String", "Anonymous.String", "NewAccessTokenCredentials", "NewAnonymousCredentials", "NewStaticCredentials", "Static.String", "WithSourceInfo" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/ydb-platform/ydb-go-sdk/security/advisories/GHSA-q24m-6h38-5xj8" }, { "type": "FIX", "url": "https://github.com/ydb-platform/ydb-go-sdk/pull/859" }, { "type": "FIX", "url": "https://github.com/ydb-platform/ydb-go-sdk/commit/a0d92057c4e1bbdc5e85ae8d649edb0232b8fd4c" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-2137", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0090.json
{ "schema_version": "1.3.1", "id": "GO-2021-0090", "modified": "0001-01-01T00:00:00Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2020-15091", "GHSA-6jqj-f58p-mrw3" ], "summary": "Denial of service in github.com/tendermint/tendermint", "details": "Proposed commits may contain signatures for blocks not contained within the commit. Instead of skipping these signatures, they cause failure during verification. A malicious proposer can use this to force consensus failures.", "affected": [ { "package": { "name": "github.com/tendermint/tendermint", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0.33.0" }, { "fixed": "0.34.0-dev1.0.20200702134149-480b995a3172" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/tendermint/tendermint/types", "symbols": [ "MakeCommit", "VoteSet.MakeCommit" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/tendermint/tendermint/pull/5426" }, { "type": "FIX", "url": "https://github.com/tendermint/tendermint/commit/480b995a31727593f58b361af979054d17d84340" }, { "type": "WEB", "url": "https://github.com/tendermint/tendermint/issues/4926" } ], "credits": [ { "name": "Neeraj Murarka" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0090", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0988.json
{ "schema_version": "1.3.1", "id": "GO-2022-0988", "modified": "0001-01-01T00:00:00Z", "published": "2022-09-12T20:23:15Z", "aliases": [ "CVE-2022-32190" ], "summary": "Failure to strip relative path components in net/url", "details": "JoinPath and URL.JoinPath do not remove ../ path elements appended to a relative path. For example, JoinPath(\"https://go.dev\", \"../go\") returns the URL \"https://go.dev/../go\", despite the JoinPath documentation stating that ../ path elements are removed from the result.", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "1.19.0-0" }, { "fixed": "1.19.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "net/url", "symbols": [ "JoinPath", "URL.JoinPath" ] } ] } } ], "references": [ { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s" }, { "type": "REPORT", "url": "https://go.dev/issue/54385" }, { "type": "FIX", "url": "https://go.dev/cl/423514" } ], "credits": [ { "name": "@q0jt" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0988", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-1144.json
{ "schema_version": "1.3.1", "id": "GO-2022-1144", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2022-41717", "GHSA-xrjj-mj9h-534m" ], "summary": "Excessive memory growth in net/http and golang.org/x/net/http2", "details": "An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests.\n\nHTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection.", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.18.9" }, { "introduced": "1.19.0-0" }, { "fixed": "1.19.4" } ] } ], "ecosystem_specific": { "imports": [ { "path": "net/http", "symbols": [ "ListenAndServe", "ListenAndServeTLS", "Serve", "ServeTLS", "Server.ListenAndServe", "Server.ListenAndServeTLS", "Server.Serve", "Server.ServeTLS", "http2Server.ServeConn", "http2serverConn.canonicalHeader" ] } ] } }, { "package": { "name": "golang.org/x/net", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.4.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "golang.org/x/net/http2", "symbols": [ "Server.ServeConn", "serverConn.canonicalHeader" ] } ] } } ], "references": [ { "type": "REPORT", "url": "https://go.dev/issue/56350" }, { "type": "FIX", "url": "https://go.dev/cl/455717" }, { "type": "FIX", "url": "https://go.dev/cl/455635" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/L_3rmdT0BMU/m/yZDrXjIiBQAJ" } ], "credits": [ { "name": "Josselin Costanzi" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-1144", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0646.json
{ "schema_version": "1.3.1", "id": "GO-2022-0646", "modified": "0001-01-01T00:00:00Z", "published": "2022-02-11T23:26:26Z", "aliases": [ "CVE-2020-8911", "CVE-2020-8912", "GHSA-7f33-f4f5-xwgw", "GHSA-f5pg-7wfw-84q9" ], "summary": "Use of risky cryptographic algorithm in github.com/aws/aws-sdk-go", "details": "The Go AWS S3 Crypto SDK contains vulnerabilities that can permit an attacker with write access to a bucket to decrypt files in that bucket.\n\nFiles encrypted by the V1 EncryptionClient using either the AES-CBC content cipher or the KMS key wrap algorithm are vulnerable. Users should migrate to the V1 EncryptionClientV2 API, which will not create vulnerable files. Old files will remain vulnerable until re-encrypted with the new client.", "affected": [ { "package": { "name": "github.com/aws/aws-sdk-go", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/aws/aws-sdk-go/service/s3/s3crypto", "symbols": [ "NewDecryptionClient", "NewEncryptionClient" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://aws.amazon.com/blogs/developer/updates-to-the-amazon-s3-encryption-client/?s=09" }, { "type": "FIX", "url": "https://github.com/aws/aws-sdk-go/pull/3403" }, { "type": "FIX", "url": "https://github.com/aws/aws-sdk-go/commit/ae9b9fd92af132cfd8d879809d8611825ba135f4" } ], "credits": [ { "name": "Sophie Schmieg from the Google ISE team" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0646", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0067.json
{ "schema_version": "1.3.1", "id": "GO-2021-0067", "modified": "0001-01-01T00:00:00Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2021-27919" ], "summary": "Panic when opening archives in archive/zip", "details": "Using Reader.Open on an archive containing a file with a path prefixed by \"../\" will cause a panic due to a stack overflow. If parsing user supplied archives, this may be used as a denial of service vector.", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "1.16.0-0" }, { "fixed": "1.16.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "archive/zip", "symbols": [ "toValidName" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/300489" }, { "type": "FIX", "url": "https://go.googlesource.com/go/+/cd3b4ca9f20fd14187ed4cdfdee1a02ea87e5cd8" }, { "type": "REPORT", "url": "https://go.dev/issue/44916" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw/m/zzhWj5jPAQAJ" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0067", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-2133.json
{ "schema_version": "1.3.1", "id": "GO-2023-2133", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-47090", "GHSA-fr2g-9hjm-wr23" ], "summary": "Authorization bypass in github.com/nats-io/nats-server/v2", "details": "Without any authorization rules in the nats-server, users can connect without authentication.\n\nBefore nats-server 2.2.0, all authentication and authorization rules for a nats-server lived in an \"authorization\" block, defining users. With nats-server 2.2.0 all users live inside accounts. When using the authorization block, whose syntax predates this, those users will be placed into the implicit global account, \"$G\". Users inside accounts go into the newer \"accounts\" block.\n\nIf an \"accounts\" block is defined, in simple deployment scenarios this is often used only to enable client access to the system account. When the only account added is the system account \"$SYS\", the nats-server would create an implicit user in \"$G\" and set it as the \"no_auth_user\" account, enabling the same \"without authentication\" logic as without any rules.\n\nThis preserved the ability to connect simply, and then add one authenticated login for system access.\n\nBut with an \"authorization\" block, this is wrong. Users exist in the global account, with login rules. And in simple testing, they might still connect fine without administrators seeing that authentication has been disabled.\n\nIn the fixed versions, using an \"authorization\" block will inhibit the implicit creation of a \"$G\" user and setting it as the \"no_auth_user\" target. In unfixed versions, just creating a second account, with no users, will also inhibit this behavior.", "affected": [ { "package": { "name": "github.com/nats-io/nats-server/v2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "2.2.0" }, { "fixed": "2.9.23" }, { "introduced": "2.10.0" }, { "fixed": "2.10.2" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/nats-io/nats-server/v2/server", "symbols": [ "ConfigureOptions", "New", "NewServer", "Options.ProcessConfigFile", "Options.processConfigFileLine", "ProcessConfigFile", "Run", "Server.EnableJetStream", "Server.Reload", "Server.ReloadOptions", "Server.SetDefaultSystemAccount", "Server.SetSystemAccount", "Server.Start", "Server.configureAccounts" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/nats-io/nats-server/pull/4605" }, { "type": "FIX", "url": "https://github.com/nats-io/nats-server/commit/fa5b7afcb64e7e887e49afdd032358802b5c4478" }, { "type": "ADVISORY", "url": "https://advisories.nats.io/CVE/secnote-2023-01.txt" }, { "type": "REPORT", "url": "https://github.com/nats-io/nats-server/discussions/4535" }, { "type": "WEB", "url": "https://github.com/nats-io/nats-server/releases/tag/v2.10.2" }, { "type": "WEB", "url": "https://github.com/nats-io/nats-server/releases/tag/v2.9.23" } ], "credits": [ { "name": "Alex Herrington" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-2133", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0059.json
{ "schema_version": "1.3.1", "id": "GO-2021-0059", "modified": "0001-01-01T00:00:00Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2020-35380", "GHSA-w942-gw6m-p62c" ], "summary": "Panic due to improper input validation in Get in github.com/tidwall/gjson", "details": "Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.", "affected": [ { "package": { "name": "github.com/tidwall/gjson", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.6.4" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/tidwall/gjson", "symbols": [ "Get", "GetBytes", "GetMany", "GetManyBytes", "Result.Array", "Result.Get", "Result.Map", "Result.Value", "squash" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc" }, { "type": "WEB", "url": "https://github.com/tidwall/gjson/issues/192" } ], "credits": [ { "name": "@toptotu" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0059", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2535.json
{ "schema_version": "1.3.1", "id": "GO-2024-2535", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-32194", "GHSA-c85r-fwc7-45vc" ], "summary": "Rancher permissions on 'namespaces' in any API group grants 'edit' permissions on namespaces in 'core' in github.com/rancher/rancher", "details": "Rancher permissions on 'namespaces' in any API group grants 'edit' permissions on namespaces in 'core' in github.com/rancher/rancher.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/rancher/rancher from v2.6.0 before v2.6.14, from v2.7.0 before v2.7.10, from v2.8.0 before v2.8.2.", "affected": [ { "package": { "name": "github.com/rancher/rancher", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "2.6.0" }, { "fixed": "2.6.14" }, { "introduced": "2.7.0" }, { "fixed": "2.7.10" }, { "introduced": "2.8.0" }, { "fixed": "2.8.2" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/rancher/rancher/security/advisories/GHSA-c85r-fwc7-45vc" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2535", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2757.json
{ "schema_version": "1.3.1", "id": "GO-2024-2757", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2021-3382", "GHSA-9f8c-pfvv-p4gm" ], "summary": "Buffer Overflow in gitea in code.gitea.io/gitea", "details": "Buffer Overflow in gitea in code.gitea.io/gitea", "affected": [ { "package": { "name": "code.gitea.io/gitea", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "1.9.0" }, { "fixed": "1.13.2" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-9f8c-pfvv-p4gm" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3382" }, { "type": "WEB", "url": "https://github.com/go-gitea/gitea/pull/14390" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2757", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2584.json
{ "schema_version": "1.3.1", "id": "GO-2024-2584", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "GHSA-86h5-xcpx-cfqc" ], "summary": "Slashing evasion in github.com/cosmos/cosmos-sdk", "details": "Slashing evasion in github.com/cosmos/cosmos-sdk", "affected": [ { "package": { "name": "github.com/cosmos/cosmos-sdk", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.47.10" }, { "introduced": "0.50.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/cosmos/cosmos-sdk/x/auth/vesting", "symbols": [ "msgServer.CreatePeriodicVestingAccount" ] }, { "path": "github.com/cosmos/cosmos-sdk/x/staking/keeper", "symbols": [ "Keeper.Slash", "Keeper.SlashRedelegation", "Keeper.SlashWithInfractionReason" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/cosmos/cosmos-sdk/security/advisories/GHSA-86h5-xcpx-cfqc" }, { "type": "FIX", "url": "https://github.com/cosmos/cosmos-sdk/commit/7dbed2fc0c3ed7c285645e21cb1037d8810372ae" }, { "type": "FIX", "url": "https://github.com/cosmos/cosmos-sdk/commit/d1b5b0c5ae2c51206cc1849e09e4d59986742cc3" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2584", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0078.json
{ "schema_version": "1.3.1", "id": "GO-2021-0078", "modified": "0001-01-01T00:00:00Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2018-17075", "GHSA-5p4h-3377-7w67" ], "summary": "Panic when parsing malformed HTML in golang.org/x/net/html", "details": "The HTML parser does not properly handle \"in frameset\" insertion mode, and can be made to panic when operating on malformed HTML that contains \u003ctemplate\u003e tags. If operating on user input, this may be a vector for a denial of service attack.", "affected": [ { "package": { "name": "golang.org/x/net", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.0.0-20180816102801-aaf60122140d" } ] } ], "ecosystem_specific": { "imports": [ { "path": "golang.org/x/net/html", "symbols": [ "Parse", "ParseFragment", "inBodyIM", "inFramesetIM" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/123776" }, { "type": "FIX", "url": "https://go.googlesource.com/net/+/aaf60122140d3fcf75376d319f0554393160eb50" }, { "type": "REPORT", "url": "https://go.dev/issue/27016" }, { "type": "WEB", "url": "https://bugs.chromium.org/p/chromium/issues/detail?id=829668" }, { "type": "WEB", "url": "https://go-review.googlesource.com/c/net/+/94838/9/html/parse.go#1906" } ], "credits": [ { "name": "Kunpei Sakai" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0078", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0235.json
{ "schema_version": "1.3.1", "id": "GO-2021-0235", "modified": "0001-01-01T00:00:00Z", "published": "2022-02-17T17:34:14Z", "aliases": [ "CVE-2021-3114" ], "summary": "Incorrect operations on the P-224 curve in crypto/elliptic", "details": "The P224() Curve implementation can in rare circumstances generate incorrect outputs, including returning invalid points from ScalarMult.", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.14.14" }, { "introduced": "1.15.0-0" }, { "fixed": "1.15.7" } ] } ], "ecosystem_specific": { "imports": [ { "path": "crypto/elliptic", "symbols": [ "p224Contract" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/284779" }, { "type": "FIX", "url": "https://go.googlesource.com/go/+/d95ca9138026cbe40e0857d76a81a16d03230871" }, { "type": "REPORT", "url": "https://go.dev/issue/43786" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/mperVMGa98w" } ], "credits": [ { "name": "The elliptic-curve-differential-fuzzer project running on OSS-Fuzz" }, { "name": "Philippe Antoine (Catena cyber)" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0235", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0086.json
{ "schema_version": "1.3.1", "id": "GO-2021-0086", "modified": "0001-01-01T00:00:00Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2019-19619", "GHSA-wmwp-pggc-h4mj" ], "summary": "Cross-site scripting in github.com/documize/community", "details": "HTML content in markdown is not sanitized during rendering, possibly allowing XSS if used to render untrusted user input.", "affected": [ { "package": { "name": "github.com/documize/community", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.76.3-0.20191119114751-a4384210d4d0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/documize/community/domain/section/markdown", "symbols": [ "Provider.Render" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/documize/community/commit/a4384210d4d0d6b18e6fdb7e155de96d4a1cf9f3" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0086", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2690.json
{ "schema_version": "1.3.1", "id": "GO-2024-2690", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-2660", "GHSA-j2rp-gmqv-frhv" ], "summary": "HashiCorpVault does not correctly validate OCSP responses in github.com/hashicorp/vault", "details": "HashiCorpVault does not correctly validate OCSP responses in github.com/hashicorp/vault", "affected": [ { "package": { "name": "github.com/hashicorp/vault", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.16.0" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-j2rp-gmqv-frhv" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-2660" }, { "type": "WEB", "url": "https://discuss.hashicorp.com/t/hcsec-2024-07-vault-tls-cert-auth-method-did-not-correctly-validate-ocsp-responses/64573" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20240524-0007" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2690", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2444.json
{ "schema_version": "1.3.1", "id": "GO-2024-2444", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-50333", "GHSA-9w97-9rqx-8v4j" ], "summary": "Mattermost allows demoted guests to change group names in github.com/mattermost/mattermost-server", "details": "Mattermost allows demoted guests to change group names in github.com/mattermost/mattermost-server.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/mattermost/mattermost/server/v8 before v8.1.7.", "affected": [ { "package": { "name": "github.com/mattermost/mattermost-server", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/mattermost/mattermost-server/v5", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/mattermost/mattermost-server/v6", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/mattermost/mattermost/server/v8", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "8.1.7" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-9w97-9rqx-8v4j" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-50333" }, { "type": "WEB", "url": "https://github.com/mattermost/mattermost/commit/61dd452fb2fcd3ac6f7b2e050f7f0a93a92d95fc" }, { "type": "WEB", "url": "https://mattermost.com/security-updates" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2444", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2756.json
{ "schema_version": "1.3.1", "id": "GO-2024-2756", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2020-14316", "GHSA-828r-r2c8-rfw3" ], "summary": "Privilege Escalation in kubevirt in kubevirt.io/kubevirt", "details": "Privilege Escalation in kubevirt in kubevirt.io/kubevirt", "affected": [ { "package": { "name": "kubevirt.io/kubevirt", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.30.0" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-828r-r2c8-rfw3" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14316" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848951" }, { "type": "WEB", "url": "https://github.com/kubevirt/kubevirt/pull/3686" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2756", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0246.json
{ "schema_version": "1.3.1", "id": "GO-2022-0246", "modified": "0001-01-01T00:00:00Z", "published": "2022-07-15T23:06:38Z", "aliases": [ "CVE-2021-3761", "GHSA-c8xp-8mf3-62h9" ], "summary": "Insufficient validation in github.com/cloudflare/cfrpki", "details": "The ROAEntry.Validate function fails to perform bounds checks on the MaxLength field, allowing invalid values to pass validation.", "affected": [ { "package": { "name": "github.com/cloudflare/cfrpki", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.3.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/cloudflare/cfrpki/validator/lib", "symbols": [ "ROAEntry.Validate", "RPKIROA.ValidateEntries" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/cloudflare/cfrpki/pull/90" }, { "type": "FIX", "url": "https://github.com/cloudflare/cfrpki/commit/a8db4e009ef217484598ba1fd1c595b54e0f6422" } ], "credits": [ { "name": "Job Snijders" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0246", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1573.json
{ "schema_version": "1.3.1", "id": "GO-2023-1573", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-25153", "GHSA-259w-8hf6-59c2" ], "summary": "Memory exhaustion via OCI image importer in github.com/containerd/containerd", "details": "When importing an OCI image, there was no limit on the number of bytes read from the io.Reader passed into ImportIndex. A large number of bytes could be read from this and could cause a denial of service.", "affected": [ { "package": { "name": "github.com/containerd/containerd", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "1.6.0" }, { "fixed": "1.6.18" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/containerd/containerd/images/archive", "symbols": [ "ImportIndex", "onUntarJSON" ] } ] } }, { "package": { "name": "github.com/containerd/containerd", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.5.18" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/containerd/containerd/images/archive", "symbols": [ "ImportIndex", "onUntarJSON" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/containerd/containerd/security/advisories/GHSA-259w-8hf6-59c2" }, { "type": "FIX", "url": "https://github.com/containerd/containerd/commit/0c314901076a74a7b797a545d2f462285fdbb8c4" }, { "type": "WEB", "url": "https://github.com/containerd/containerd/releases/tag/v1.5.18" }, { "type": "WEB", "url": "https://github.com/containerd/containerd/releases/tag/v1.6.18" } ], "credits": [ { "name": "@AdamKorcz" }, { "name": "@DavidKorczynski" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-1573", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-1175.json
{ "schema_version": "1.3.1", "id": "GO-2022-1175", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2022-23536", "GHSA-cq2g-pw6q-hf7j" ], "summary": "Exposure of local files in github.com/cortexproject/cortex", "details": "A malicious actor could remotely read local files by submitting to the Alertmanager Set Configuration API maliciously crafted inputs. Only users of the Alertmanager service where \"-experimental.alertmanager.enable-api\" or \"enable_api: true\" is configured are affected.", "affected": [ { "package": { "name": "github.com/cortexproject/cortex", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "1.13.0" }, { "fixed": "1.13.2" }, { "introduced": "1.14.0" }, { "fixed": "1.14.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/cortexproject/cortex/pkg/alertmanager", "symbols": [ "validateAlertmanagerConfig", "validateGlobalConfig" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/cortexproject/cortex/security/advisories/GHSA-cq2g-pw6q-hf7j" }, { "type": "FIX", "url": "https://github.com/cortexproject/cortex/commit/03e023d8b012887b31cc268d0d011b01e1e65506" }, { "type": "WEB", "url": "https://cortexmetrics.io/docs/api/#set-alertmanager-configuration" } ], "credits": [ { "name": "Austin Robertson with Amazon Web Services" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-1175", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2851.json
{ "schema_version": "1.3.1", "id": "GO-2024-2851", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2022-31130", "GHSA-jv32-5578-pxjc" ], "summary": "Grafana Data source and plugin proxy endpoints leaking authentication tokens to some destination plugins in github.com/grafana/grafana", "details": "Grafana Data source and plugin proxy endpoints leaking authentication tokens to some destination plugins in github.com/grafana/grafana.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/grafana/grafana from v7.0.0 before v8.5.14, from v9.0.0 before v9.1.8.", "affected": [ { "package": { "name": "github.com/grafana/grafana", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "7.0.0" }, { "fixed": "8.5.14" }, { "introduced": "9.0.0" }, { "fixed": "9.1.8" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/grafana/grafana/security/advisories/GHSA-jv32-5578-pxjc" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31130" }, { "type": "FIX", "url": "https://github.com/grafana/grafana/commit/4dd56e4dabce10007bf4ba1059bf54178c35b177" }, { "type": "FIX", "url": "https://github.com/grafana/grafana/commit/9da278c044ba605eb5a1886c48df9a2cb0d3885f" }, { "type": "WEB", "url": "https://github.com/grafana/grafana/releases/tag/v9.1.8" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2851", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0524.json
{ "schema_version": "1.3.1", "id": "GO-2022-0524", "modified": "0001-01-01T00:00:00Z", "published": "2022-07-20T20:52:11Z", "aliases": [ "CVE-2022-30631" ], "summary": "Stack exhaustion when reading certain archives in compress/gzip", "details": "Calling Reader.Read on an archive containing a large number of concatenated 0-length compressed files can cause a panic due to stack exhaustion.", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.17.12" }, { "introduced": "1.18.0-0" }, { "fixed": "1.18.4" } ] } ], "ecosystem_specific": { "imports": [ { "path": "compress/gzip", "symbols": [ "Reader.Read" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/417067" }, { "type": "FIX", "url": "https://go.googlesource.com/go/+/b2b8872c876201eac2d0707276c6999ff3eb185e" }, { "type": "REPORT", "url": "https://go.dev/issue/53168" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0524", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2020-0025.json
{ "schema_version": "1.3.1", "id": "GO-2020-0025", "modified": "0001-01-01T00:00:00Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2018-25046", "GHSA-32qh-8vg6-9g43" ], "summary": "Path traversal in code.cloudfoundry.org/archiver", "details": "Due to improper path sanitization, archives containing relative file paths can cause files to be written (or overwritten) outside of the target directory.", "affected": [ { "package": { "name": "code.cloudfoundry.org/archiver", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.0.0-20180523222229-09b5706aa936" } ] } ], "ecosystem_specific": { "imports": [ { "path": "code.cloudfoundry.org/archiver/extractor", "symbols": [ "detectableExtractor.Extract", "extractTarArchiveFile", "extractZipArchiveFile", "tarExtractor.Extract", "tgzExtractor.Extract", "zipExtractor.Extract" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/cloudfoundry/archiver/commit/09b5706aa9367972c09144a450bb4523049ee840" }, { "type": "WEB", "url": "https://snyk.io/research/zip-slip-vulnerability" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2020-0025", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2748.json
{ "schema_version": "1.3.1", "id": "GO-2024-2748", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2020-8559", "GHSA-33c5-9fx5-fvjm" ], "summary": "Privilege Escalation in Kubernetes in k8s.io/apimachinery", "details": "The Kubernetes kube-apiserver is vulnerable to an unvalidated redirect on proxied upgrade requests that could allow an attacker to escalate privileges from a node compromise to a full cluster compromise.", "affected": [ { "package": { "name": "k8s.io/apimachinery", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.16.13" }, { "introduced": "0.17.0" }, { "fixed": "0.17.9" }, { "introduced": "0.18.0" }, { "fixed": "0.18.7-rc.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "k8s.io/apimachinery/pkg/util/net", "symbols": [ "ConnectWithRedirects" ] }, { "path": "k8s.io/apimachinery/pkg/util/proxy", "symbols": [ "UpgradeAwareHandler.ServeHTTP", "UpgradeAwareHandler.tryUpgrade" ] } ] } }, { "package": { "name": "k8s.io/kubernetes", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.16.13" }, { "introduced": "1.17.0" }, { "fixed": "1.17.9" }, { "introduced": "1.18.0" }, { "fixed": "1.18.7" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-33c5-9fx5-fvjm" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1851422" }, { "type": "WEB", "url": "https://github.com/kubernetes/kubernetes/issues/92914" }, { "type": "WEB", "url": "https://github.com/kubernetes/kubernetes/pull/92941" }, { "type": "WEB", "url": "https://github.com/tdwyer/CVE-2020-8559" }, { "type": "WEB", "url": "https://groups.google.com/d/msg/kubernetes-security-announce/JAIGG5yNROs/19nHQ5wkBwAJ" }, { "type": "WEB", "url": "https://groups.google.com/g/kubernetes-security-announce/c/JAIGG5yNROs" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20200810-0004" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2748", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2882.json
{ "schema_version": "1.3.1", "id": "GO-2024-2882", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-35232", "GHSA-3f65-m234-9mxr" ], "summary": "github.com/huandu/facebook may expose access_token in error message.", "details": "github.com/huandu/facebook may expose access_token in error message.", "affected": [ { "package": { "name": "github.com/huandu/facebook", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/huandu/facebook/v2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "2.7.2" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/huandu/facebook/security/advisories/GHSA-3f65-m234-9mxr" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-35232" }, { "type": "FIX", "url": "https://github.com/huandu/facebook/commit/8b34431b91b32903c8821b1d7621bf81a029d8e4" }, { "type": "WEB", "url": "https://cs.opensource.google/go/go/+/refs/tags/go1.22.3:src/net/http/client.go;l=629-633" }, { "type": "WEB", "url": "https://cs.opensource.google/go/go/+/refs/tags/go1.22.3:src/net/url/url.go;l=30" }, { "type": "WEB", "url": "https://github.com/huandu/facebook/blob/1591be276561bbdb019c0279f1d33cb18a650e1b/session.go#L558-L567" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2882", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2683.json
{ "schema_version": "1.3.1", "id": "GO-2024-2683", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2021-41803", "GHSA-hr3v-8cp3-68rf" ], "summary": "Improper handling of node names in JWT claims assertions in github.com/hashicorp/consul", "details": "HashiCorp Consul does not properly validate the node or segment names prior to interpolation and usage in JWT claim assertions with the auto config RPC.", "affected": [ { "package": { "name": "github.com/hashicorp/consul", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "1.8.1" }, { "fixed": "1.11.9" }, { "introduced": "1.12.0" }, { "fixed": "1.12.5" }, { "introduced": "1.13.0" }, { "fixed": "1.13.2" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/hashicorp/consul/agent/consul", "symbols": [ "AutoConfig.InitialConfiguration", "jwtAuthorizer.Authorize" ] } ] } } ], "references": [ { "type": "WEB", "url": "https://discuss.hashicorp.com/t/hcsec-2022-19-consul-auto-config-jwt-authorization-missing-input-validation/44627" }, { "type": "FIX", "url": "https://github.com/hashicorp/consul/pull/14577/commits/2c881259ce10e308ff03afc968c4165998fd7fee" } ], "credits": [ { "name": "anonymous4ACL24" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2683", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-1155.json
{ "schema_version": "1.3.1", "id": "GO-2022-1155", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2022-23495", "GHSA-x39j-h85h-3f46" ], "summary": "Panic in github.com/ipfs/go-merkledag", "details": "A ProtoNode may be modified in such a way as to cause various encode errors which will trigger a panic on common method calls that don't allow for error returns.\n\nAdditionally, use of the ProtoNode.SetCidBuilder() method to set non-functioning CidBuilder (such as one that refers to a multihash where an implementation of that hash function is not available) may cause the same methods to panic as a new CID is required but cannot be created.", "affected": [ { "package": { "name": "github.com/ipfs/go-merkledag", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0.4.0" }, { "fixed": "0.8.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/ipfs/go-merkledag", "symbols": [ "ProtoNode.AddNodeLink", "ProtoNode.AddRawLink", "ProtoNode.AsBool", "ProtoNode.AsBytes", "ProtoNode.AsFloat", "ProtoNode.AsInt", "ProtoNode.AsLink", "ProtoNode.AsString", "ProtoNode.Cid", "ProtoNode.EncodeProtobuf", "ProtoNode.IsAbsent", "ProtoNode.IsNull", "ProtoNode.Kind", "ProtoNode.Length", "ProtoNode.ListIterator", "ProtoNode.Loggable", "ProtoNode.LookupByIndex", "ProtoNode.LookupByNode", "ProtoNode.LookupBySegment", "ProtoNode.LookupByString", "ProtoNode.MapIterator", "ProtoNode.Marshal", "ProtoNode.Multihash", "ProtoNode.RawData", "ProtoNode.SetCidBuilder", "ProtoNode.SetLinks", "ProtoNode.Size", "ProtoNode.Stat", "ProtoNode.String", "ProtoNode.UnmarshalJSON", "ProtoNode.UpdateNodeLink", "ProtoNode.marshalImmutable" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/ipfs/go-merkledag/security/advisories/GHSA-x39j-h85h-3f46" }, { "type": "REPORT", "url": "https://github.com/ipfs/kubo/issues/9297" }, { "type": "REPORT", "url": "https://github.com/ipfs/go-merkledag/issues/90" }, { "type": "FIX", "url": "https://github.com/ipfs/go-merkledag/pull/91" }, { "type": "FIX", "url": "https://github.com/ipfs/go-merkledag/pull/92" }, { "type": "FIX", "url": "https://github.com/ipfs/go-merkledag/pull/93" } ], "credits": [ { "name": "@mrd0ll4r (https://github.com/mrd0ll4r)" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-1155", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2456.json
{ "schema_version": "1.3.1", "id": "GO-2024-2456", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-49569", "GHSA-449p-3h89-pw88" ], "summary": "Path traversal and RCE in github.com/go-git/go-git/v5 and gopkg.in/src-d/go-git.v4", "details": "Path traversal and RCE in github.com/go-git/go-git/v5 and gopkg.in/src-d/go-git.v4", "affected": [ { "package": { "name": "gopkg.in/src-d/go-git.v4", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "4.7.1" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/go-git/go-git/v5", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "5.0.0" }, { "fixed": "5.11.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/go-git/go-git/v5", "symbols": [ "AddOptions.Validate", "Blame", "BlameResult.String", "Clone", "CloneContext", "CommitOptions.Validate", "CreateTagOptions.Validate", "GrepOptions.Validate", "GrepResult.String", "Init", "InitWithOptions", "NoMatchingRefSpecError.Error", "Open", "PlainClone", "PlainCloneContext", "PlainInit", "PlainInitWithOptions", "PlainOpen", "PlainOpenWithOptions", "Remote.Fetch", "Remote.FetchContext", "Remote.List", "Remote.ListContext", "Remote.Push", "Remote.PushContext", "Remote.String", "Repository.BlobObject", "Repository.BlobObjects", "Repository.Branch", "Repository.Branches", "Repository.CommitObject", "Repository.CommitObjects", "Repository.Config", "Repository.ConfigScoped", "Repository.CreateBranch", "Repository.CreateRemote", "Repository.CreateRemoteAnonymous", "Repository.CreateTag", "Repository.DeleteBranch", "Repository.DeleteObject", "Repository.DeleteRemote", "Repository.DeleteTag", "Repository.Fetch", "Repository.FetchContext", "Repository.Grep", "Repository.Head", "Repository.Log", "Repository.Notes", "Repository.Object", "Repository.Objects", "Repository.Prune", "Repository.Push", "Repository.PushContext", "Repository.Reference", "Repository.References", "Repository.Remote", "Repository.Remotes", "Repository.RepackObjects", "Repository.ResolveRevision", "Repository.SetConfig", "Repository.Tag", "Repository.TagObject", "Repository.TagObjects", "Repository.Tags", "Repository.TreeObject", "Repository.TreeObjects", "ResetOptions.Validate", "Status.String", "Submodule.Init", "Submodule.Repository", "Submodule.Status", "Submodule.Update", "Submodule.UpdateContext", "SubmoduleStatus.String", "Submodules.Init", "Submodules.Status", "Submodules.Update", "Submodules.UpdateContext", "SubmodulesStatus.String", "Worktree.Add", "Worktree.AddGlob", "Worktree.AddWithOptions", "Worktree.Checkout", "Worktree.Clean", "Worktree.Commit", "Worktree.Grep", "Worktree.Move", "Worktree.Pull", "Worktree.PullContext", "Worktree.Remove", "Worktree.RemoveGlob", "Worktree.Reset", "Worktree.ResetSparsely", "Worktree.Status", "Worktree.Submodule", "Worktree.Submodules", "Worktree.checkoutFileSymlink", "Worktree.createBranch", "buildTreeHelper.BuildTree", "checkFastForwardUpdate", "isFastForward" ] }, { "path": "github.com/go-git/go-git/v5/config", "symbols": [ "Branch.Validate", "Config.Unmarshal", "Config.Validate", "LoadConfig", "ReadConfig", "RemoteConfig.Validate" ] }, { "path": "github.com/go-git/go-git/v5/plumbing/object", "symbols": [ "Commit.Stats", "Commit.StatsContext", "Patch.Stats", "getFileStatsFromFilePatches" ] }, { "path": "github.com/go-git/go-git/v5/storage/filesystem", "symbols": [ "ConfigStorage.Config", "ConfigStorage.SetConfig", "ModuleStorage.Module", "NewStorage", "NewStorageWithOptions", "ObjectStorage.EncodedObject" ] }, { "path": "github.com/go-git/go-git/v5/storage/filesystem/dotgit", "symbols": [ "DotGit.Alternates" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-49569" } ], "credits": [ { "name": "Ionut Lalu" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2456", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1882.json
{ "schema_version": "1.3.1", "id": "GO-2023-1882", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-34450", "GHSA-mvj3-qrqh-cjvr" ], "summary": "Deadlock in github.com/cometbft/cometbft/consensus", "details": "An internal modification to the way PeerState is serialized to JSON introduced a deadlock when the new function MarshalJSON is called.\n\nThis function can be called in two ways. The first is via logs, by setting the consensus logging module to \"debug\" level (which should not happen in production), and setting the log output format to JSON. The second is via RPC dump_consensus_state.", "affected": [ { "package": { "name": "github.com/cometbft/cometbft", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0.37.1" }, { "fixed": "0.37.2" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/cometbft/cometbft/consensus", "symbols": [ "PeerState.MarshalJSON" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/cometbft/cometbft/security/advisories/GHSA-mvj3-qrqh-cjvr" }, { "type": "FIX", "url": "https://github.com/cometbft/cometbft/pull/524" }, { "type": "FIX", "url": "https://github.com/cometbft/cometbft/pull/863" }, { "type": "FIX", "url": "https://github.com/cometbft/cometbft/pull/865" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-1882", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2587.json
{ "schema_version": "1.3.1", "id": "GO-2024-2587", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2022-45786", "GHSA-6p5q-h963-pwwf" ], "summary": "SQL injection in github.com/apache/age/drivers/golang", "details": "SQL injection in github.com/apache/age/drivers/golang", "affected": [ { "package": { "name": "github.com/apache/age/drivers/golang", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/apache/age/drivers/golang/age", "symbols": [ "AgeTx.ExecCypher", "AgeTx.ExecCypherMap", "ExecCypher", "ExecCypherMap" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-45786" }, { "type": "WEB", "url": "https://lists.apache.org/thread/of8x0gt5d2vfrm5ksxw55bwn2849ck1w" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2587", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2797.json
{ "schema_version": "1.3.1", "id": "GO-2024-2797", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-32046", "GHSA-vx97-8q8q-qgq5" ], "summary": "Mattermost's detailed error messages reveal the full file path in github.com/mattermost/mattermost-server", "details": "Mattermost's detailed error messages reveal the full file path in github.com/mattermost/mattermost-server", "affected": [ { "package": { "name": "github.com/mattermost/mattermost-server", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "8.1.0+incompatible" }, { "fixed": "8.1.12+incompatible" }, { "introduced": "9.4.0+incompatible" }, { "fixed": "9.4.5+incompatible" }, { "introduced": "9.5.0+incompatible" }, { "fixed": "9.5.3+incompatible" }, { "introduced": "9.6.0-rc1+incompatible" }, { "fixed": "9.6.1+incompatible" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-vx97-8q8q-qgq5" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-32046" }, { "type": "WEB", "url": "https://github.com/mattermost/mattermost/commit/2a48b5b3428cae494452125401e4f72780543ac8" }, { "type": "WEB", "url": "https://github.com/mattermost/mattermost/commit/93738756ff79777c6e340c8de63a7b4b0f881d27" }, { "type": "WEB", "url": "https://github.com/mattermost/mattermost/commit/aa222c66b799c12e32eeb8eae6f555bf6140375b" }, { "type": "WEB", "url": "https://github.com/mattermost/mattermost/commit/c84c25b20c8b8726a2f126ae9370a72498096172" }, { "type": "WEB", "url": "https://mattermost.com/security-updates" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2797", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2821.json
{ "schema_version": "1.3.1", "id": "GO-2024-2821", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-34084", "GHSA-9c5w-9q3f-3hv7" ], "summary": "Denial of Service from untrusted requests in github.com/stacklok/minder", "details": "HandleGithubWebhook is susceptible to a denial of service attack from an untrusted HTTP request. An untrusted request can cause the server to allocate large amounts of memory resulting in a denial of service.", "affected": [ { "package": { "name": "github.com/stacklok/minder", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.0.48" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/stacklok/minder/internal/controlplane", "symbols": [ "Server.HandleGitHubWebHook", "Server.StartHTTPServer" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/stacklok/minder/security/advisories/GHSA-9c5w-9q3f-3hv7" }, { "type": "FIX", "url": "https://github.com/stacklok/minder/commit/3e5a527d2f1b535159206161d1d519602c75bd0d" }, { "type": "WEB", "url": "https://github.com/stacklok/minder/blob/ee66f6c0763212503c898cfefb65ce1450c7f5ac/internal/controlplane/handlers_githubwebhooks.go#L213-L218" }, { "type": "WEB", "url": "https://github.com/stacklok/minder/blob/ee66f6c0763212503c898cfefb65ce1450c7f5ac/internal/controlplane/handlers_githubwebhooks.go#L337-L342" }, { "type": "WEB", "url": "https://github.com/stacklok/minder/blob/ee66f6c0763212503c898cfefb65ce1450c7f5ac/internal/controlplane/handlers_githubwebhooks.go#L367-L377" }, { "type": "WEB", "url": "https://github.com/stacklok/minder/blob/ee66f6c0763212503c898cfefb65ce1450c7f5ac/internal/controlplane/handlers_githubwebhooks_test.go#L278-L283" } ], "credits": [ { "name": "@AdamKorcz and @DavidKorczynski" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2821", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0942.json
{ "schema_version": "1.3.1", "id": "GO-2022-0942", "modified": "0001-01-01T00:00:00Z", "published": "2022-08-23T13:19:13Z", "aliases": [ "CVE-2022-37315", "GHSA-h3qm-jrrf-cgj3" ], "summary": "Infinite recursion in parser in github.com/graphql-go/graphql", "details": "graphql-go (aka GraphQL for Go) has infinite recursion in the type definition parser.", "affected": [ { "package": { "name": "github.com/graphql-go/graphql", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.8.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/graphql-go/graphql/language/parser", "symbols": [ "Parse" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/graphql-go/graphql/pull/642" }, { "type": "FIX", "url": "https://github.com/graphql-go/graphql/pull/642/commits/4188bd5b3877f7badb951b421cf66e0af2eacb22" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0942", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2527.json
{ "schema_version": "1.3.1", "id": "GO-2024-2527", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "GHSA-5x4g-q5rc-36jp" ], "summary": "Insecure ciphers are allowed by default in go.etcd.io/etcd", "details": "The TLS ciphers list supported by etcd contains insecure cipher suites. Users may specify that an insecure cipher is used via “--cipher-suites” flag. A list of secure suites is used by default.", "affected": [ { "package": { "name": "go.etcd.io/etcd", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.5.0-alpha.5.0.20221102000833-1f054980bc27" } ] } ], "ecosystem_specific": { "imports": [ { "path": "go.etcd.io/etcd/pkg/tlsutil" } ], "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "3.2.22" }, { "fixed": "3.4.22" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/etcd-io/etcd/security/advisories/GHSA-5x4g-q5rc-36jp" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2527", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-2045.json
{ "schema_version": "1.3.1", "id": "GO-2023-2045", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-39322" ], "summary": "Memory exhaustion in QUIC connection handling in crypto/tls", "details": "QUIC connections do not set an upper bound on the amount of data buffered when reading post-handshake messages, allowing a malicious QUIC connection to cause unbounded memory growth.\n\nWith fix, connections now consistently reject messages larger than 65KiB in size.", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "1.21.0-0" }, { "fixed": "1.21.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "crypto/tls", "symbols": [ "QUICConn.HandleData" ] } ] } } ], "references": [ { "type": "REPORT", "url": "https://go.dev/issue/62266" }, { "type": "FIX", "url": "https://go.dev/cl/523039" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ" } ], "credits": [ { "name": "Marten Seemann" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-2045", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2695.json
{ "schema_version": "1.3.1", "id": "GO-2024-2695", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-28949", "GHSA-mcw6-3256-64gg" ], "summary": "Mattermost Server doesn't limit the number of user preferences in github.com/mattermost/mattermost-server", "details": "Mattermost Server doesn't limit the number of user preferences in github.com/mattermost/mattermost-server.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/mattermost/mattermost/server/v8 from v8.1.0 before v8.1.11.", "affected": [ { "package": { "name": "github.com/mattermost/mattermost-server", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "9.3.0+incompatible" }, { "fixed": "9.3.3+incompatible" }, { "introduced": "9.4.0+incompatible" }, { "fixed": "9.4.4+incompatible" }, { "introduced": "9.5.0+incompatible" }, { "fixed": "9.5.2+incompatible" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/mattermost/mattermost-server/v5", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/mattermost/mattermost-server/v6", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/mattermost/mattermost/server/v8", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "8.1.0" }, { "fixed": "8.1.11" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-mcw6-3256-64gg" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-28949" }, { "type": "WEB", "url": "https://github.com/mattermost/mattermost/commit/11a21f4da352a472a09de3b8e125514750a6619a" }, { "type": "WEB", "url": "https://github.com/mattermost/mattermost/commit/362b7d29d35c00fe80721d3d47442a4f3168eb2b" }, { "type": "WEB", "url": "https://github.com/mattermost/mattermost/commit/5632d6b4ff6d019a21bb8ddd037d4a931cd85ae2" }, { "type": "WEB", "url": "https://github.com/mattermost/mattermost/commit/88f9285173dc4cb35fa19a8b8604e098a567f704" }, { "type": "WEB", "url": "https://mattermost.com/security-updates" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2695", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2500.json
{ "schema_version": "1.3.1", "id": "GO-2024-2500", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2021-41091", "GHSA-3fwx-pjgw-3558" ], "summary": "Moby (Docker Engine) Insufficiently restricted permissions on data directory in github.com/docker/docker", "details": "Moby (Docker Engine) Insufficiently restricted permissions on data directory in github.com/docker/docker", "affected": [ { "package": { "name": "github.com/docker/docker", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "20.10.9+incompatible" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/docker/docker/daemon", "symbols": [ "Daemon.create", "Daemon.setupContainerMountsRoot", "NewDaemon", "setupDaemonRoot" ] }, { "path": "github.com/docker/docker/daemon/graphdriver/aufs", "symbols": [ "Init" ] }, { "path": "github.com/docker/docker/daemon/graphdriver/btrfs", "symbols": [ "Driver.Create", "Init" ] }, { "path": "github.com/docker/docker/daemon/graphdriver/fuse-overlayfs", "symbols": [ "Driver.create", "Init" ] }, { "path": "github.com/docker/docker/daemon/graphdriver/overlay", "symbols": [ "Driver.Create", "Init" ] }, { "path": "github.com/docker/docker/daemon/graphdriver/overlay2", "symbols": [ "Driver.create", "Init" ] }, { "path": "github.com/docker/docker/daemon/graphdriver/vfs", "symbols": [ "Driver.Create", "Init" ] }, { "path": "github.com/docker/docker/daemon/graphdriver/zfs", "symbols": [ "Init" ] } ] } }, { "package": { "name": "github.com/moby/moby", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "20.10.9+incompatible" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/moby/moby/daemon", "symbols": [ "Daemon.create", "Daemon.setupContainerMountsRoot", "NewDaemon", "setupDaemonRoot" ] }, { "path": "github.com/moby/moby/daemon/graphdriver/aufs", "symbols": [ "Init" ] }, { "path": "github.com/moby/moby/daemon/graphdriver/btrfs", "symbols": [ "Driver.Create", "Init" ] }, { "path": "github.com/moby/moby/daemon/graphdriver/fuse-overlayfs", "symbols": [ "Driver.create", "Init" ] }, { "path": "github.com/moby/moby/daemon/graphdriver/overlay", "symbols": [ "Driver.Create", "Init" ] }, { "path": "github.com/moby/moby/daemon/graphdriver/overlay2", "symbols": [ "Driver.create", "Init" ] }, { "path": "github.com/moby/moby/daemon/graphdriver/vfs", "symbols": [ "Driver.Create", "Init" ] }, { "path": "github.com/moby/moby/daemon/graphdriver/zfs", "symbols": [ "Init" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/moby/moby/security/advisories/GHSA-3fwx-pjgw-3558" }, { "type": "FIX", "url": "https://github.com/moby/moby/commit/f0ab919f518c47240ea0e72d0999576bb8008e64" } ], "credits": [ { "name": "Joan Bruguera" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2500", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-2334.json
{ "schema_version": "1.3.1", "id": "GO-2023-2334", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "GHSA-2c7c-3mj9-8fqh" ], "summary": "Denial of service via decryption of malicious PBES2 JWE objects in github.com/go-jose/go-jose/v3", "details": "The go-jose package is subject to a \"billion hashes attack\" causing denial-of-service when decrypting JWE inputs. This occurs when an attacker can provide a PBES2 encrypted JWE blob with a very large p2c value that, when decrypted, produces a denial-of-service.", "affected": [ { "package": { "name": "github.com/go-jose/go-jose/v3", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "3.0.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/go-jose/go-jose/v3", "symbols": [ "JSONWebEncryption.Decrypt", "JSONWebEncryption.DecryptMulti", "symmetricKeyCipher.decryptKey" ] } ] } }, { "package": { "name": "github.com/square/go-jose", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/square/go-jose", "symbols": [ "JSONWebEncryption.Decrypt", "JSONWebEncryption.DecryptMulti", "symmetricKeyCipher.decryptKey" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/go-jose/go-jose/commit/65351c27657d58960c2e6c9fbb2b00f818e50568" }, { "type": "REPORT", "url": "https://github.com/go-jose/go-jose/issues/64" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-2334", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1519.json
{ "schema_version": "1.3.1", "id": "GO-2023-1519", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2022-31249", "GHSA-qrg7-hfx7-95c5" ], "summary": "Command injection in github.com/rancher/wrangler", "details": "A command injection vulnerability exists in the Wrangler Git package. Specially crafted commands can be passed to Wrangler that will change their behavior and cause confusion when executed through Git, resulting in command injection in the underlying host.\n\nA workaround is to sanitize input passed to the Git package to remove potential unsafe and ambiguous characters. Otherwise, the best course of action is to update to a patched Wrangler version.", "affected": [ { "package": { "name": "github.com/rancher/wrangler", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.7.4-security1" }, { "introduced": "0.8.0" }, { "fixed": "0.8.5-security1" }, { "introduced": "0.8.6" }, { "fixed": "0.8.11" }, { "introduced": "1.0.0" }, { "fixed": "1.0.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/rancher/wrangler/pkg/git", "symbols": [ "Git.Clone", "Git.Ensure", "Git.Head", "Git.LsRemote", "Git.Update", "Git.fetchAndReset", "Git.gitCmd", "Git.reset" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-qrg7-hfx7-95c5" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-1519", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-2095.json
{ "schema_version": "1.3.1", "id": "GO-2023-2095", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-39323" ], "summary": "Arbitrary code execution during build via line directives in cmd/go", "details": "Line directives (\"//line\") can be used to bypass the restrictions on \"//go:cgo_\" directives, allowing blocked linker and compiler flags to be passed during compilation. This can result in unexpected execution of arbitrary code when running \"go build\". The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex.", "affected": [ { "package": { "name": "toolchain", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.20.9" }, { "introduced": "1.21.0-0" }, { "fixed": "1.21.2" } ] } ], "ecosystem_specific": { "imports": [ { "path": "cmd/go" } ] } } ], "references": [ { "type": "REPORT", "url": "https://go.dev/issue/63211" }, { "type": "FIX", "url": "https://go.dev/cl/533215" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/XBa1oHDevAo" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-2095", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-2114.json
{ "schema_version": "1.3.1", "id": "GO-2023-2114", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-45683", "GHSA-267v-3v32-g6q5" ], "summary": "Cross-site scripting via missing binding syntax validation in github.com/crewjam/saml", "details": "The package does not validate the ACS Location URI according to the SAML binding being parsed. If abused, this flaw allows attackers to register malicious Service Providers at the IdP and inject Javascript in the ACS endpoint definition, achieving Cross-Site-Scripting (XSS) in the IdP context during the redirection at the end of a SAML SSO Flow. Consequently, an attacker may perform any authenticated action as the victim once the victim's browser loads the SAML IdP initiated SSO link for the malicious service provider.", "affected": [ { "package": { "name": "github.com/crewjam/saml", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.4.14" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/crewjam/saml" } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/crewjam/saml/security/advisories/GHSA-267v-3v32-g6q5" }, { "type": "FIX", "url": "https://github.com/crewjam/saml/commit/b07b16cf83c4171d16da4d85608cb827f183cd79" } ], "credits": [ { "name": "Francesco Lacerenza from Doyensec" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-2114", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0957.json
{ "schema_version": "1.3.1", "id": "GO-2022-0957", "modified": "0001-01-01T00:00:00Z", "published": "2022-08-25T06:28:20Z", "aliases": [ "CVE-2020-36066", "GHSA-wjm3-fq3r-5x46" ], "summary": "Denial of service via maliciously crafted JSON in github.com/tidwall/gjson", "details": "A maliciously crafted JSON input can cause a denial of service attack.", "affected": [ { "package": { "name": "github.com/tidwall/gjson", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.6.5" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/tidwall/gjson", "symbols": [ "Get", "GetBytes", "GetMany", "GetManyBytes", "Result.Get", "parseObject", "queryMatches" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/tidwall/match/commit/c2f534168b739a7ec1821a33839fb2f029f26bbc" }, { "type": "WEB", "url": "https://github.com/tidwall/gjson/commit/9f58baa7a613f89dfdc764c39e47fd3a15606153" }, { "type": "WEB", "url": "https://github.com/tidwall/gjson/issues/195" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0957", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2804.json
{ "schema_version": "1.3.1", "id": "GO-2024-2804", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-32967", "GHSA-q5qj-x2h5-3945" ], "summary": "Zitadel exposing internal database user name and host information in github.com/zitadel/zitadel", "details": "Zitadel exposing internal database user name and host information in github.com/zitadel/zitadel.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/zitadel/zitadel before v2.45.7, from v2.47.0 before v2.47.10, from v2.48.0 before v2.48.5, from v2.49.0 before v2.49.5, from v2.50.0 before v2.50.3.", "affected": [ { "package": { "name": "github.com/zitadel/zitadel", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "2.45.7" }, { "introduced": "2.47.0" }, { "fixed": "2.47.10" }, { "introduced": "2.48.0" }, { "fixed": "2.48.5" }, { "introduced": "2.49.0" }, { "fixed": "2.49.5" }, { "introduced": "2.50.0" }, { "fixed": "2.50.3" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/zitadel/zitadel/security/advisories/GHSA-q5qj-x2h5-3945" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-32967" }, { "type": "FIX", "url": "https://github.com/zitadel/zitadel/commit/b918603b576d156a08b90917c14c2d019c82ffc6" }, { "type": "WEB", "url": "https://github.com/zitadel/zitadel/releases/tag/v2.45.7" }, { "type": "WEB", "url": "https://github.com/zitadel/zitadel/releases/tag/v2.46.7" }, { "type": "WEB", "url": "https://github.com/zitadel/zitadel/releases/tag/v2.47.10" }, { "type": "WEB", "url": "https://github.com/zitadel/zitadel/releases/tag/v2.48.5" }, { "type": "WEB", "url": "https://github.com/zitadel/zitadel/releases/tag/v2.49.5" }, { "type": "WEB", "url": "https://github.com/zitadel/zitadel/releases/tag/v2.50.3" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2804", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2726.json
{ "schema_version": "1.3.1", "id": "GO-2024-2726", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "GHSA-7f4j-64p6-5h5v" ], "summary": "Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik", "details": "Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik", "affected": [ { "package": { "name": "github.com/traefik/traefik", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/traefik/traefik/v2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "2.11.2" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/traefik/traefik/v3", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "3.0.0-rc1" }, { "fixed": "3.0.0-rc5" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/traefik/traefik/security/advisories/GHSA-7f4j-64p6-5h5v" }, { "type": "WEB", "url": "https://github.com/traefik/traefik/releases/tag/v2.11.2" }, { "type": "WEB", "url": "https://github.com/traefik/traefik/releases/tag/v3.0.0-rc5" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2726", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0701.json
{ "schema_version": "1.3.1", "id": "GO-2022-0701", "modified": "0001-01-01T00:00:00Z", "published": "2022-02-15T01:57:18Z", "aliases": [ "CVE-2015-5305", "GHSA-jp32-vmm6-3vf5" ], "summary": "Directory traversal in k8s.io/kubernetes", "details": "Crafted object type names can cause directory traversal in Kubernetes.\n\nObject names are not validated before being passed to etcd. This allows attackers to write arbitrary files via a crafted object name, hence causing directory traversal vulnerability in Kubernetes, as used in Red Hat OpenShift Enterprise 3.0.", "affected": [ { "package": { "name": "k8s.io/kubernetes", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.1.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "k8s.io/kubernetes/pkg/api/rest", "symbols": [ "BeforeCreate" ] }, { "path": "k8s.io/kubernetes/pkg/registry/generic/etcd", "symbols": [ "NamespaceKeyFunc" ] }, { "path": "k8s.io/kubernetes/pkg/api/storage", "symbols": [ "NamespaceKeyFunc", "NoNamespaceKeyFunc" ] }, { "path": "k8s.io/kubernetes/pkg/registry/namespace/etcd", "symbols": [ "NewREST" ] }, { "path": "k8s.io/kubernetes/pkg/registry/node/etcd", "symbols": [ "NewREST" ] }, { "path": "k8s.io/kubernetes/pkg/registry/persistentvolume/etcd", "symbols": [ "NewREST" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/kubernetes/kubernetes/pull/16381" }, { "type": "FIX", "url": "https://github.com/kubernetes/kubernetes/commit/37f730f68c7f06e060f90714439bfb0dbb2df5e7" } ], "credits": [ { "name": "liggitt (Jordan Liggitt)" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0701", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2666.json
{ "schema_version": "1.3.1", "id": "GO-2024-2666", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-28860", "GHSA-pwqm-x5x6-5586" ], "summary": "Insecure IPsec transparent encryption in github.com/cilium/cilium", "details": "Insecure IPsec transparent encryption in github.com/cilium/cilium", "affected": [ { "package": { "name": "github.com/cilium/cilium", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.13.14" }, { "introduced": "1.14.0" }, { "fixed": "1.14.9" }, { "introduced": "1.15.0" }, { "fixed": "1.15.3" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/cilium/cilium/security/advisories/GHSA-pwqm-x5x6-5586" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2666", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-2077.json
{ "schema_version": "1.3.1", "id": "GO-2023-2077", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-43644", "GHSA-r5hm-mp3j-285g" ], "summary": "Authentication bypass in github.com/sagernet/sing", "details": "Authentication bypass in github.com/sagernet/sing", "affected": [ { "package": { "name": "github.com/sagernet/sing", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.2.12-0.20230925092853-5b05b5c147d9" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/sagernet/sing/protocol/socks", "symbols": [ "HandleConnection", "HandleConnection0" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/SagerNet/sing-box/security/advisories/GHSA-r5hm-mp3j-285g" }, { "type": "FIX", "url": "https://github.com/SagerNet/sing/commit/5b05b5c147d9650e8accb4441e216c72a61f4859" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-2077", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0326.json
{ "schema_version": "1.3.1", "id": "GO-2022-0326", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2022-23649", "GHSA-ccxc-vr6p-4858" ], "summary": "Improper certificate validation in github.com/sigstore/cosign", "details": "Cosign can be manipulated to claim that an entry for a signature in the OCI registry exists in the Rekor transparency log even if it does not. This requires the attacker to have pull and push permissions for the signature in OCI. This can happen with both standard signing with a keypair and \"keyless signing\" with Fulcio certificate authority.", "affected": [ { "package": { "name": "github.com/sigstore/cosign", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.5.2" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/sigstore/cosign/pkg/cosign", "symbols": [ "VerifyBundle", "VerifyImageAttestations", "VerifyImageSignature", "VerifyImageSignatures", "VerifyLocalImageAttestations", "VerifyLocalImageSignatures" ] }, { "path": "github.com/sigstore/cosign/pkg/sget", "symbols": [ "SecureGet.Do" ] }, { "path": "github.com/sigstore/cosign/cmd/cosign/cli/verify", "symbols": [ "PrintVerificationHeader", "VerifyAttestationCommand.Exec", "VerifyCommand.Exec" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/sigstore/cosign/commit/96d410a6580e4e81d24d112a0855c70ca3fb5b49" }, { "type": "WEB", "url": "https://github.com/sigstore/cosign/releases/tag/v1.5.2" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0326", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2905.json
{ "schema_version": "1.3.1", "id": "GO-2024-2905", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-5037" ], "summary": "Openshift/telemeter: iss check during jwt authentication can be bypassed in github.com/openshift/telemeter", "details": "Openshift/telemeter: iss check during jwt authentication can be bypassed in github.com/openshift/telemeter", "affected": [ { "package": { "name": "github.com/openshift/telemeter", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-5037" }, { "type": "FIX", "url": "https://github.com/kubernetes/kubernetes/pull/123540" }, { "type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272339" }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2024-5037" }, { "type": "WEB", "url": "https://github.com/openshift/telemeter/blob/a9417a6062c3a31ed78c06ea3a0613a52f2029b2/pkg/authorize/jwt/client_authorizer.go#L78" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2905", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0171.json
{ "schema_version": "1.3.1", "id": "GO-2022-0171", "modified": "0001-01-01T00:00:00Z", "published": "2022-05-24T20:17:59Z", "aliases": [ "CVE-2017-1000097" ], "summary": "Mishandled trust preferences for root certificates on Darwin in crypto/x509", "details": "On Darwin, user's trust preferences for root certificates were not honored. If the user had a root certificate loaded in their Keychain that was explicitly not trusted, a Go program would still verify a connection using that root certificate.", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.6.4" }, { "introduced": "1.7.0-0" }, { "fixed": "1.7.4" } ] } ], "ecosystem_specific": { "imports": [ { "path": "crypto/x509", "goos": [ "darwin" ], "symbols": [ "FetchPEMRoots", "execSecurityRoots" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.googlesource.com/go/+/7e5b2e0ec144d5f5b2923a7d5db0b9143f79a35a" }, { "type": "REPORT", "url": "https://go.dev/issue/18141" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-dev/c/4NdLzS8sls8/m/uIz8QlnIBQAJ" } ], "credits": [ { "name": "Xy Ziemba" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0171", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2457.json
{ "schema_version": "1.3.1", "id": "GO-2024-2457", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-49619", "GHSA-f899-4mr4-fqpv" ], "summary": "Apache Answer Race Condition vulnerability in github.com/apache/incubator-answer", "details": "Apache Answer Race Condition vulnerability in github.com/apache/incubator-answer", "affected": [ { "package": { "name": "github.com/apache/incubator-answer", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.2.1" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-f899-4mr4-fqpv" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-49619" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2024/01/10/1" }, { "type": "WEB", "url": "https://lists.apache.org/thread/nscrl3c7pn68q4j73y3ottql6n5x3hd4" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2457", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2977.json
{ "schema_version": "1.3.1", "id": "GO-2024-2977", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-6284", "GHSA-qjvf-8748-9w7h" ], "summary": "IP addresses were encoded in the wrong byte order in github.com/google/nftables", "details": "IP addresses were encoded in the wrong byte order, resulting in an nftables configuration which did not work as intended (might block or not block the desired addresses).", "affected": [ { "package": { "name": "github.com/google/nftables", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0.1.0" }, { "fixed": "0.2.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/google/nftables", "symbols": [ "Conn.AddSet" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-qjvf-8748-9w7h" }, { "type": "FIX", "url": "https://github.com/google/nftables/commit/b1f901b05510bed05c232c5049f68d1511b56a19" }, { "type": "REPORT", "url": "https://github.com/google/nftables/issues/225" }, { "type": "WEB", "url": "https://bugs.launchpad.net/ubuntu/+source/crowdsec-firewall-bouncer/+bug/2069596" }, { "type": "WEB", "url": "https://github.com/crowdsecurity/cs-firewall-bouncer/issues/368" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2977", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1737.json
{ "schema_version": "1.3.1", "id": "GO-2023-1737", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-29401", "GHSA-2c4m-59x9-fr2g" ], "summary": "Improper handling of filenames in Content-Disposition HTTP header in github.com/gin-gonic/gin", "details": "The filename parameter of the Context.FileAttachment function is not properly sanitized. A maliciously crafted filename can cause the Content-Disposition header to be sent with an unexpected filename value or otherwise modify the Content-Disposition header. For example, a filename of \"setup.bat\u0026quot;;x=.txt\" will be sent as a file named \"setup.bat\".\n\nIf the FileAttachment function is called with names provided by an untrusted source, this may permit an attacker to cause a file to be served with a name different than provided. Maliciously crafted attachment file name can modify the Content-Disposition header.", "affected": [ { "package": { "name": "github.com/gin-gonic/gin", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "1.3.1-0.20190301021747-ccb9e902956d" }, { "fixed": "1.9.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/gin-gonic/gin", "symbols": [ "Context.FileAttachment" ] } ] } } ], "references": [ { "type": "REPORT", "url": "https://github.com/gin-gonic/gin/issues/3555" }, { "type": "FIX", "url": "https://github.com/gin-gonic/gin/pull/3556" }, { "type": "WEB", "url": "https://github.com/gin-gonic/gin/releases/tag/v1.9.1" } ], "credits": [ { "name": "motoyasu-saburi" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-1737", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-1059.json
{ "schema_version": "1.3.1", "id": "GO-2022-1059", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2022-32149", "GHSA-69ch-w2m2-3vjp" ], "summary": "Denial of service via crafted Accept-Language header in golang.org/x/text/language", "details": "An attacker may cause a denial of service by crafting an Accept-Language header which ParseAcceptLanguage will take significant time to parse.", "affected": [ { "package": { "name": "golang.org/x/text", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.3.8" } ] } ], "ecosystem_specific": { "imports": [ { "path": "golang.org/x/text/language", "symbols": [ "MatchStrings", "ParseAcceptLanguage" ] } ] } } ], "references": [ { "type": "REPORT", "url": "https://go.dev/issue/56152" }, { "type": "FIX", "url": "https://go.dev/cl/442235" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/-hjNw559_tE/m/KlGTfid5CAAJ" } ], "credits": [ { "name": "Adam Korczynski (ADA Logics)" }, { "name": "OSS-Fuzz" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-1059", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2980.json
{ "schema_version": "1.3.1", "id": "GO-2024-2980", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2022-29946", "GHSA-2h2x-8hh2-mfq8" ], "summary": "NATS Server and Streaming Server fails to enforce negative user permissions, may allow denied subjects in github.com/nats-io/nats-server", "details": "NATS Server and Streaming Server fails to enforce negative user permissions, may allow denied subjects in github.com/nats-io/nats-server", "affected": [ { "package": { "name": "github.com/nats-io/nats-server", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/nats-io/nats-server/v2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "2.8.2" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/nats-io/nats-streaming-server", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.24.6" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-2h2x-8hh2-mfq8" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-29946" }, { "type": "WEB", "url": "https://github.com/nats-io/advisories/blob/main/CVE/CVE-2022-29946.txt" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2980", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2523.json
{ "schema_version": "1.3.1", "id": "GO-2024-2523", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2020-11110", "GHSA-xr3x-62qw-vc4w" ], "summary": "Grafana stored XSS in github.com/grafana/grafana", "details": "Grafana stored XSS in github.com/grafana/grafana.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/grafana/grafana before v6.7.2.", "affected": [ { "package": { "name": "github.com/grafana/grafana", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "6.7.2" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-xr3x-62qw-vc4w" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11110" }, { "type": "FIX", "url": "https://github.com/grafana/grafana/commit/fb114a75241aaef4c08581b42509c750738b768a" }, { "type": "FIX", "url": "https://github.com/grafana/grafana/pull/23254" }, { "type": "WEB", "url": "https://github.com/grafana/grafana/blob/master/CHANGELOG.md" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20200810-0002" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2523", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0072.json
{ "schema_version": "1.3.1", "id": "GO-2021-0072", "modified": "0001-01-01T00:00:00Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2017-11468", "GHSA-h62f-wm92-2cmw" ], "summary": "Uncontrolled resource allocation in github.com/docker/distribution", "details": "Various storage methods do not impose limits on how much content is accepted from user requests, allowing a malicious user to force the caller to allocate an arbitrary amount of memory.", "affected": [ { "package": { "name": "github.com/docker/distribution", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "2.7.0-rc.0+incompatible" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/docker/distribution/registry/handlers", "symbols": [ "App.ServeHTTP", "NewApp", "blobUploadHandler.PatchBlobData", "blobUploadHandler.PutBlobUploadComplete", "catalogHandler.GetCatalog", "copyFullPayload", "imageManifestHandler.GetImageManifest", "imageManifestHandler.PutImageManifest" ] }, { "path": "github.com/docker/distribution/registry/storage", "symbols": [ "PurgeUploads", "Walk", "blobStore.Enumerate", "blobStore.Get", "linkedBlobStore.Enumerate", "linkedBlobStore.Get", "manifestStore.Enumerate", "manifestStore.Get", "registry.Enumerate", "registry.Repositories" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/distribution/distribution/pull/2340" }, { "type": "FIX", "url": "https://github.com/distribution/distribution/commit/91c507a39abfce14b5c8541cf284330e22208c0f" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2017:2603" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00047.html" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0072", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2864.json
{ "schema_version": "1.3.1", "id": "GO-2024-2864", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-35185", "GHSA-fjw8-3gp8-4cvx" ], "summary": "Denial of service of Minder Server with attacker-controlled REST endpoint in github.com/stacklok/minder", "details": "Denial of service of Minder Server with attacker-controlled REST endpoint in github.com/stacklok/minder", "affected": [ { "package": { "name": "github.com/stacklok/minder", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.0.49" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/stacklok/minder/security/advisories/GHSA-fjw8-3gp8-4cvx" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-35185" }, { "type": "FIX", "url": "https://github.com/stacklok/minder/commit/065049336aac0621ee00a0bb2211f8051d47c14b" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2864", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-1187.json
{ "schema_version": "1.3.1", "id": "GO-2022-1187", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2020-36627", "GHSA-jwrv-x6rx-8vfm" ], "summary": "Open redirect vulnerability in github.com/go-macaron/i18n", "details": "A user controlled string could lead to open redirect.", "affected": [ { "package": { "name": "github.com/go-macaron/i18n", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.5.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/go-macaron/i18n", "symbols": [ "I18n" ] } ] } } ], "references": [ { "type": "WEB", "url": "https://vuldb.com/?id.216745" }, { "type": "FIX", "url": "https://github.com/go-macaron/i18n/commit/329b0c4844cc16a5a253c011b55180598e707735" }, { "type": "WEB", "url": "https://github.com/go-macaron/i18n/releases/tag/v0.5.0" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-1187", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2020-0042.json
{ "schema_version": "1.3.1", "id": "GO-2020-0042", "modified": "0001-01-01T00:00:00Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2020-7667", "GHSA-9423-6c93-gpp8" ], "summary": "Arbitrary File Write via Archive Extraction (Zip Slip) in github.com/sassoftware/go-rpmutils", "details": "Due to improper path sanitization, RPMs containing relative file paths can cause files to be written (or overwritten) outside of the target directory.", "affected": [ { "package": { "name": "github.com/sassoftware/go-rpmutils", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.1.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/sassoftware/go-rpmutils/cpio", "symbols": [ "Extract" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/sassoftware/go-rpmutils/commit/a64058cf21b8aada501bba923c9aab66fb6febf0" }, { "type": "WEB", "url": "https://snyk.io/research/zip-slip-vulnerability" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2020-0042", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2799.json
{ "schema_version": "1.3.1", "id": "GO-2024-2799", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-32883" ], "summary": "MCUboot Injection attack of unprotected TLV values in github.com/mcu-tools/mcuboot", "details": "MCUboot Injection attack of unprotected TLV values in github.com/mcu-tools/mcuboot", "affected": [ { "package": { "name": "github.com/mcu-tools/mcuboot", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-32883" }, { "type": "WEB", "url": "https://github.com/mcu-tools/mcuboot/security/advisories/GHSA-m59c-q9gq-rh2j" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2799", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0356.json
{ "schema_version": "1.3.1", "id": "GO-2021-0356", "modified": "0001-01-01T00:00:00Z", "published": "2022-04-25T20:38:40Z", "aliases": [ "CVE-2022-27191", "GHSA-8c26-wmh5-6g9v" ], "summary": "Denial of service via crafted Signer in golang.org/x/crypto/ssh", "details": "Attackers can cause a crash in SSH servers when the server has been configured by passing a Signer to ServerConfig.AddHostKey such that\n1) the Signer passed to AddHostKey does not implement AlgorithmSigner, and\n2) the Signer passed to AddHostKey returns a key of type “ssh-rsa” from its PublicKey method.\n\nServers that only use Signer implementations provided by the ssh package are unaffected.", "affected": [ { "package": { "name": "golang.org/x/crypto", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.0.0-20220314234659-1baeb1ce4c0b" } ] } ], "ecosystem_specific": { "imports": [ { "path": "golang.org/x/crypto/ssh", "symbols": [ "ServerConfig.AddHostKey" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/392355" }, { "type": "FIX", "url": "https://go.googlesource.com/crypto/+/1baeb1ce4c0b006eff0f294c47cb7617598dfb3d" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/-cp44ypCT5s" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0356", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2793.json
{ "schema_version": "1.3.1", "id": "GO-2024-2793", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-4195", "GHSA-5fh7-7mw7-mmx5" ], "summary": "Mattermost allows team admins to promote guests to team admins in github.com/mattermost/mattermost-server", "details": "Mattermost allows team admins to promote guests to team admins in github.com/mattermost/mattermost-server", "affected": [ { "package": { "name": "github.com/mattermost/mattermost-server", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "8.1.0+incompatible" }, { "fixed": "8.1.12+incompatible" }, { "introduced": "9.5.0+incompatible" }, { "fixed": "9.5.3+incompatible" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-5fh7-7mw7-mmx5" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4195" }, { "type": "WEB", "url": "https://github.com/mattermost/mattermost/commit/1e3497e0595bb4f9908c94dd9d4685d48556b7e8" }, { "type": "WEB", "url": "https://github.com/mattermost/mattermost/commit/f0872dd4e4ba34f061aa6982a71c7c29532aac2e" }, { "type": "WEB", "url": "https://mattermost.com/security-updates" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2793", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2517.json
{ "schema_version": "1.3.1", "id": "GO-2024-2517", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2020-12245", "GHSA-ccmg-w4xm-p28v" ], "summary": "Grafana XSS in header column rename in github.com/grafana/grafana", "details": "Grafana XSS in header column rename in github.com/grafana/grafana.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/grafana/grafana before v6.7.3.", "affected": [ { "package": { "name": "github.com/grafana/grafana", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "6.7.3" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-ccmg-w4xm-p28v" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12245" }, { "type": "FIX", "url": "https://github.com/grafana/grafana/commit/0284747c88eb9435899006d26ffaf65f89dec88e" }, { "type": "FIX", "url": "https://github.com/grafana/grafana/pull/23816" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00060.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00083.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00009.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00017.html" }, { "type": "WEB", "url": "https://community.grafana.com/t/release-notes-v6-7-x/27119" }, { "type": "WEB", "url": "https://github.com/grafana/grafana/blob/master/CHANGELOG.md#673-2020-04-23" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20200511-0001" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2517", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1664.json
{ "schema_version": "1.3.1", "id": "GO-2023-1664", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-28119", "GHSA-5mqj-xc49-246p" ], "summary": "Denial of service via deflate compression bomb in github.com/crewjam/saml", "details": "Denial of service via deflate compression bomb in github.com/crewjam/saml", "affected": [ { "package": { "name": "github.com/crewjam/saml", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.4.13" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/crewjam/saml", "symbols": [ "IdentityProvider.ServeSSO", "NewIdpAuthnRequest", "ServiceProvider.ValidateLogoutResponseRedirect", "ServiceProvider.ValidateLogoutResponseRequest" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/crewjam/saml/security/advisories/GHSA-5mqj-xc49-246p" }, { "type": "FIX", "url": "https://github.com/crewjam/saml/commit/8e9236867d176ad6338c870a84e2039aef8a5021" } ], "credits": [ { "name": "@nszetei" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-1664", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2602.json
{ "schema_version": "1.3.1", "id": "GO-2024-2602", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-27918", "GHSA-7cc2-r658-7xpf" ], "summary": "Incorrect email domain verification in github.com/coder/coder", "details": "A vulnerability in Coder's OIDC authentication could allow an attacker to bypass the CODER_OIDC_EMAIL_DOMAIN verification and create an account with an email not in the allowlist. Deployments are only affected if the OIDC provider allows users to create accounts on the provider (such as public providers like google.com). During OIDC registration, the user's email was improperly validated against the allowed CODER_OIDC_EMAIL_DOMAINs.", "affected": [ { "package": { "name": "github.com/coder/coder", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/coder/coder/coderd", "symbols": [ "API.New", "Api.userOIDC" ] } ] } }, { "package": { "name": "github.com/coder/coder/v2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "2.6.1" }, { "introduced": "2.7.0" }, { "fixed": "2.7.3" }, { "introduced": "2.8.0" }, { "fixed": "2.8.4" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/coder/coder/v2/coderd", "symbols": [ "Api.New", "Api.userOIDC" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/coder/coder/security/advisories/GHSA-7cc2-r658-7xpf" }, { "type": "FIX", "url": "https://github.com/coder/coder/commit/1171ce7add017481d28441575024209ac160ecb0" }, { "type": "FIX", "url": "https://github.com/coder/coder/commit/2ba84911f8b02605e5958d5e4a2fe3979ec50b31" }, { "type": "FIX", "url": "https://github.com/coder/coder/commit/2d37eb42e7db656e343fe1f36de5ab1a1a62f4fb" }, { "type": "FIX", "url": "https://github.com/coder/coder/commit/4439a920e454a82565e445e4376c669e3b89591c" } ], "credits": [ { "name": "arcz" }, { "name": "maxammann" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2602", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2843.json
{ "schema_version": "1.3.1", "id": "GO-2024-2843", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2022-39306", "GHSA-2x6g-h2hg-rq84" ], "summary": "Grafana Email addresses and usernames can not be trusted in github.com/grafana/grafana", "details": "Grafana Email addresses and usernames can not be trusted in github.com/grafana/grafana.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/grafana/grafana from v8.0.0 before v8.5.15, from v9.0.0 before v9.2.4.", "affected": [ { "package": { "name": "github.com/grafana/grafana", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "8.0.0" }, { "fixed": "8.5.15" }, { "introduced": "9.0.0" }, { "fixed": "9.2.4" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/grafana/grafana/security/advisories/GHSA-2x6g-h2hg-rq84" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-39306" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20221215-0004" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2843", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2971.json
{ "schema_version": "1.3.1", "id": "GO-2024-2971", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-39932", "GHSA-hf29-9hfh-w63j" ], "summary": "Gogs allows argument injection during the previewing of changes in github.com/gogs/gogs", "details": "Gogs allows argument injection during the previewing of changes in github.com/gogs/gogs", "affected": [ { "package": { "name": "github.com/gogs/gogs", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-hf29-9hfh-w63j" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-39932" }, { "type": "WEB", "url": "https://github.com/gogs/gogs/releases" }, { "type": "WEB", "url": "https://www.sonarsource.com/blog/securing-developer-tools-unpatched-code-vulnerabilities-in-gogs-1" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2971", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2020-0040.json
{ "schema_version": "1.3.1", "id": "GO-2020-0040", "modified": "0001-01-01T00:00:00Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2020-36562", "GHSA-p6fg-723f-hgpw" ], "summary": "Uncontrolled Resource Consumption in github.com/shiyanhui/dht", "details": "Due to unchecked type assertions, maliciously crafted messages can cause panics, which may be used as a denial of service vector.", "affected": [ { "package": { "name": "github.com/shiyanhui/dht", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/shiyanhui/dht" } ] } } ], "references": [ { "type": "WEB", "url": "https://github.com/shiyanhui/dht/issues/57" } ], "credits": [ { "name": "@hMihaiDavid" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2020-0040", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2461.json
{ "schema_version": "1.3.1", "id": "GO-2024-2461", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-22199", "GHSA-4mq2-gc4j-cmw6" ], "summary": "Cross-site scripting in github.com/gofiber/template/django/v3", "details": "Cross-site scripting in github.com/gofiber/template/django/v3", "affected": [ { "package": { "name": "github.com/gofiber/template/django/v3", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "3.1.9" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/gofiber/template/django/v3", "symbols": [ "Engine.Load", "Engine.Render", "New", "NewFileSystem", "NewPathForwardingFileSystem" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22199" }, { "type": "FIX", "url": "https://github.com/gofiber/template/commit/28cff3ac4d4c117ab25b5396954676d624b6cb46" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2461", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1623.json
{ "schema_version": "1.3.1", "id": "GO-2023-1623", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-27483", "GHSA-vfvj-3m3g-m532" ], "summary": "Out-of-memory panic in github.com/crossplane/crossplane-runtime", "details": "An out of memory panic vulnerability exists in the crossplane-runtime libraries.\n\nApplications that use the Paved type's SetValue method with user-provided input that is not properly validated might use excessive amounts of memory and cause an out of memory panic.\n\nIn the fieldpath package, the Paved.SetValue method sets a value on the Paved object according to the provided path, without any validation. This allows setting values in slices at any provided index, which grows the target array up to the requested index. The index is currently capped at max uint32 (4294967295), a large value. If callers do not validate paths' indexes on their own, this could allow users to consume arbitrary amounts of memory.\n\nApplications that do not use the Paved type's SetValue method are not affected.\n\nUsers unable to upgrade can work around this issue by parsing and validating the path before passing it to the SetValue method of the Paved type, constraining the index size as deemed appropriate.", "affected": [ { "package": { "name": "github.com/crossplane/crossplane-runtime", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0.6.0" }, { "fixed": "0.16.1" }, { "introduced": "0.17.0" }, { "fixed": "0.19.2" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/crossplane/crossplane-runtime/pkg/fieldpath", "symbols": [ "Paved.MergeValue", "Paved.SetBool", "Paved.SetNumber", "Paved.SetString", "Paved.SetValue" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/crossplane/crossplane-runtime/security/advisories/GHSA-vfvj-3m3g-m532" }, { "type": "FIX", "url": "https://github.com/crossplane/crossplane-runtime/commit/53508a9f4374604db140dd8ab2fa52276441e738" } ], "credits": [ { "name": "Disclosed by Ada Logics in a fuzzing audit sponsored by CNCF." } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-1623", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2982.json
{ "schema_version": "1.3.1", "id": "GO-2024-2982", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-6468", "GHSA-2qmw-pvf7-4mw6" ], "summary": "Hashicorp Vault vulnerable to Improper Check or Handling of Exceptional Conditions in github.com/hashicorp/vault", "details": "Hashicorp Vault vulnerable to Improper Check or Handling of Exceptional Conditions in github.com/hashicorp/vault.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/hashicorp/vault before v1.15.12.", "affected": [ { "package": { "name": "github.com/hashicorp/vault", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "1.16.0-rc1" }, { "fixed": "1.16.3" }, { "introduced": "1.17.0-rc1" }, { "fixed": "1.17.2" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "1.15.12" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-2qmw-pvf7-4mw6" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6468" }, { "type": "WEB", "url": "https://discuss.hashicorp.com/t/hcsec-2024-14-vault-vulnerable-to-denial-of-service-when-setting-a-proxy-protocol-behavior/68518" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2982", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2549.json
{ "schema_version": "1.3.1", "id": "GO-2024-2549", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-52430", "GHSA-xwmv-cx7p-fqfc" ], "summary": "caddy-security plugin for Caddy vulnerable to reflected Cross-site Scripting in github.com/greenpau/caddy-security", "details": "caddy-security plugin for Caddy vulnerable to reflected Cross-site Scripting in github.com/greenpau/caddy-security", "affected": [ { "package": { "name": "github.com/greenpau/caddy-security", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-xwmv-cx7p-fqfc" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52430" }, { "type": "REPORT", "url": "https://github.com/greenpau/caddy-security/issues/264" }, { "type": "WEB", "url": "https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2549", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2492.json
{ "schema_version": "1.3.1", "id": "GO-2024-2492", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-23650", "GHSA-9p26-698r-w4hx" ], "summary": "Panic in github.com/moby/buildkit", "details": "A malicious BuildKit client or frontend could craft a request that could lead to a BuildKit daemon crashing with a panic.", "affected": [ { "package": { "name": "github.com/moby/buildkit", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.12.5" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/moby/buildkit/solver/llbsolver", "symbols": [ "Solver.Solve", "llbBridge.loadResult", "loadSourcePolicy" ] }, { "path": "github.com/moby/buildkit/sourcepolicy", "symbols": [ "match" ] }, { "path": "github.com/moby/buildkit/control", "symbols": [ "Controller.Solve" ] }, { "path": "github.com/moby/buildkit/frontend/gateway/client", "symbols": [ "AttestationFromPB" ] }, { "path": "github.com/moby/buildkit/frontend/gateway", "symbols": [ "llbBridgeForwarder.Solve", "llbBridgeForwarder.Warn" ] }, { "path": "github.com/moby/buildkit/util/tracing/transform", "symbols": [ "Attributes", "Spans", "arrayValues", "boolArray", "doubleArray", "intArray", "links", "spanEvents", "statusCode", "stringArray" ] }, { "path": "github.com/moby/buildkit/exporter/containerimage/exptypes", "symbols": [ "ParsePlatforms" ] }, { "path": "github.com/moby/buildkit/exporter/containerimage", "symbols": [ "patchImageConfig" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/moby/buildkit/pull/4601" }, { "type": "FIX", "url": "https://github.com/moby/buildkit/commit/e1924dc32da35bfb0bfdbb9d0fc7bca25e552330" }, { "type": "FIX", "url": "https://github.com/moby/buildkit/commit/7718bd5c3dc8fc5cd246a30cc41766e7a53c043c" }, { "type": "FIX", "url": "https://github.com/moby/buildkit/commit/96663dd35bf3787d7efb1ee7fd9ac7fe533582ae" }, { "type": "FIX", "url": "https://github.com/moby/buildkit/commit/481d9c45f473c58537f39694a38d7995cc656987" }, { "type": "FIX", "url": "https://github.com/moby/buildkit/commit/83edaef59d545b93e2750f1f85675a3764593fee" }, { "type": "WEB", "url": "https://github.com/moby/buildkit/releases/tag/v0.12.5" } ], "credits": [ { "name": "@cpuguy83" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2492", "review_status": "REVIEWED" } }