repo_id
stringclasses
927 values
file_path
stringlengths
99
214
content
stringlengths
2
4.15M
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-2115.json
{ "schema_version": "1.3.1", "id": "GO-2023-2115", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-45128", "GHSA-94w9-97p3-p368" ], "summary": "CSRF token reuse vulnerability in github.com/gofiber/fiber/v2", "details": "A cross-site request forgery vulnerability in this package can allow an attacker to inject arbitrary values and forge malicious requests on behalf of a user. The attacker may inject arbitrary values without any authentication, or perform various malicious actions on behalf of an authenticated user, potentially compromising the security and integrity of the application.\n\nThe vulnerability is caused by improper validation and enforcement of CSRF tokens within the application. For 'safe' methods, the token is extracted from the cookie and saved to storage without further validation or sanitization. In addition, the CSRF token is validated against tokens in storage but not associated with a session, nor by using a Double Submit Cookie Method, allowing for token reuse.", "affected": [ { "package": { "name": "github.com/gofiber/fiber/v2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "2.50.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/gofiber/fiber/v2/middleware/csrf", "symbols": [ "CsrfFromCookie", "CsrfFromForm", "CsrfFromHeader", "CsrfFromParam", "CsrfFromQuery", "New", "configDefault", "manager.getRaw", "manager.setRaw", "newManager" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/gofiber/fiber/security/advisories/GHSA-94w9-97p3-p368" }, { "type": "FIX", "url": "https://github.com/gofiber/fiber/commit/8c3916dbf4ad2ed427d02c6eb63ae8b2fa8f019a" }, { "type": "FIX", "url": "https://github.com/gofiber/fiber/commit/b50d91d58ecdff2a330bf07950244b6c4caf65b1" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-2115", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-1040.json
{ "schema_version": "1.3.1", "id": "GO-2022-1040", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2021-21303", "GHSA-c38g-469g-cmgx" ], "summary": "Insufficient sanitization of data files in helm.sh/helm/v3", "details": "Helm does not sanitize all fields read from repository data files. A maliciously crafted data file may contain strings containing arbitrary data. If printed to a terminal, a malicious string could obscure or alter data on the screen.", "affected": [ { "package": { "name": "helm.sh/helm/v3", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "3.0.0" }, { "fixed": "3.5.2" } ] } ], "ecosystem_specific": { "imports": [ { "path": "helm.sh/helm/v3/pkg/chart", "symbols": [ "Chart.Validate", "Metadata.Validate" ] }, { "path": "helm.sh/helm/v3/pkg/plugin", "symbols": [ "FindPlugins", "LoadAll", "LoadDir", "validatePluginData" ] }, { "path": "helm.sh/helm/v3/pkg/repo", "symbols": [ "ChartRepository.DownloadIndexFile", "ChartRepository.Index", "ChartRepository.Load", "FindChartInAuthAndTLSRepoURL", "FindChartInAuthRepoURL", "FindChartInRepoURL", "IndexDirectory", "IndexFile.Add", "LoadIndexFile", "loadIndex" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-c38g-469g-cmgx" }, { "type": "FIX", "url": "https://github.com/helm/helm/commit/6ce9ba60b73013857e2e7c73d3f86ed70bc1ac9a" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-1040", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2906.json
{ "schema_version": "1.3.1", "id": "GO-2024-2906", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-5138" ], "summary": "CVE-2024-5138 in github.com/snapcore/snapd", "details": "CVE-2024-5138 in github.com/snapcore/snapd", "affected": [ { "package": { "name": "github.com/snapcore/snapd", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://www.cve.org/CVERecord?id=CVE-2024-5138" }, { "type": "FIX", "url": "https://github.com/snapcore/snapd/commit/68ee9c6aa916ab87dbfd9a26030690f2cabf1e14" }, { "type": "REPORT", "url": "https://bugs.launchpad.net/snapd/+bug/2065077" } ], "credits": [ { "name": "Rory McNamara from Snyk Security Labs" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2906", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1568.json
{ "schema_version": "1.3.1", "id": "GO-2023-1568", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2022-41722" ], "summary": "Path traversal on Windows in path/filepath", "details": "A path traversal vulnerability exists in filepath.Clean on Windows.\n\nOn Windows, the filepath.Clean function could transform an invalid path such as \"a/../c:/b\" into the valid path \"c:\\b\". This transformation of a relative (if invalid) path into an absolute path could enable a directory traversal attack.\n\nAfter fix, the filepath.Clean function transforms this path into the relative (but still invalid) path \".\\c:\\b\".", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.19.6" }, { "introduced": "1.20.0-0" }, { "fixed": "1.20.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "path/filepath", "goos": [ "windows" ], "symbols": [ "Abs", "Clean", "Dir", "EvalSymlinks", "Glob", "IsLocal", "Join", "Rel", "Walk", "WalkDir" ] } ] } } ], "references": [ { "type": "REPORT", "url": "https://go.dev/issue/57274" }, { "type": "FIX", "url": "https://go.dev/cl/468123" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E" } ], "credits": [ { "name": "RyotaK (https://ryotak.net)" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-1568", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2948.json
{ "schema_version": "1.3.1", "id": "GO-2024-2948", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-6257", "GHSA-xfhp-jf8p-mh5w" ], "summary": "Code Execution on Git update in github.com/hashicorp/go-getter", "details": "A crafted request can execute Git update on an existing maliciously modified Git Configuration. This can potentially lead to arbitrary code execution. When performing a Git operation, the library will try to clone the given repository to a specified destination. Cloning initializes a git config in the provided destination. An attacker may alter the Git config after the cloning step to set an arbitrary Git configuration to achieve code execution.", "affected": [ { "package": { "name": "github.com/hashicorp/go-getter", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.7.5" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/hashicorp/go-getter", "symbols": [ "Client.ChecksumFromFile", "Client.Get", "FolderStorage.Get", "Get", "GetAny", "GetFile", "GitGetter.Get", "GitGetter.GetFile", "GitGetter.clone", "HttpGetter.Get", "findRemoteDefaultBranch" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-xfhp-jf8p-mh5w" }, { "type": "FIX", "url": "https://github.com/hashicorp/go-getter/commit/268c11cae8cf0d9374783e06572679796abe9ce9" }, { "type": "WEB", "url": "https://discuss.hashicorp.com/t/hcsec-2024-13-hashicorp-go-getter-vulnerable-to-code-execution-on-git-update-via-git-config-manipulation/68081" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2948", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2647.json
{ "schema_version": "1.3.1", "id": "GO-2024-2647", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "GHSA-4jhj-3gv3-c3gr" ], "summary": "CLI for Vela Insecure Variable Substitution in github.com/go-vela/cli", "details": "CLI for Vela Insecure Variable Substitution in github.com/go-vela/cli", "affected": [ { "package": { "name": "github.com/go-vela/cli", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.23.2" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/go-vela/cli/security/advisories/GHSA-4jhj-3gv3-c3gr" }, { "type": "FIX", "url": "https://github.com/go-vela/cli/commit/0349a2060c35722e341bf65a4215592c6c4bc5b4" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2647", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2468.json
{ "schema_version": "1.3.1", "id": "GO-2024-2468", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2022-3328", "GHSA-cjqf-877p-7m3f" ], "summary": "snapd Race Condition vulnerability in github.com/snapcore/snapd", "details": "snapd Race Condition vulnerability in github.com/snapcore/snapd.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/snapcore/snapd before v2.57.6.", "affected": [ { "package": { "name": "github.com/snapcore/snapd", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "2.57.6" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3328" }, { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-cjqf-877p-7m3f" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3328" }, { "type": "FIX", "url": "https://github.com/snapcore/snapd/commit/21ebc51f00b8a1417888faa2e83a372fd29d0f5e" }, { "type": "FIX", "url": "https://github.com/snapcore/snapd/commit/6226cdc57052f4b7057d92f2e549aa169e35cd2d" }, { "type": "FIX", "url": "https://github.com/snapcore/snapd/pull/12380" }, { "type": "WEB", "url": "https://ubuntu.com/security/notices/USN-5753-1" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2468", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2727.json
{ "schema_version": "1.3.1", "id": "GO-2024-2727", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "GHSA-g8fc-vrcg-8vjg" ], "summary": "Constellation has pods exposed to peers in VPC in github.com/edgelesssys/constellation", "details": "Constellation has pods exposed to peers in VPC in github.com/edgelesssys/constellation", "affected": [ { "package": { "name": "github.com/edgelesssys/constellation", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/edgelesssys/constellation/v2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "2.16.3" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/edgelesssys/constellation/security/advisories/GHSA-g8fc-vrcg-8vjg" }, { "type": "WEB", "url": "https://github.com/cilium/cilium/issues/25626" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2727", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0213.json
{ "schema_version": "1.3.1", "id": "GO-2022-0213", "modified": "0001-01-01T00:00:00Z", "published": "2022-05-24T20:14:11Z", "aliases": [ "CVE-2019-17596" ], "summary": "Panic on invalid DSA public keys in crypto/dsa", "details": "Invalid DSA public keys can cause a panic in dsa.Verify. In particular, using crypto/x509.Verify on a crafted X.509 certificate chain can lead to a panic, even if the certificates don't chain to a trusted root. The chain can be delivered via a crypto/tls connection to a client, or to a server that accepts and verifies client certificates. net/http clients can be made to crash by an HTTPS server, while net/http servers that accept client certificates will recover the panic and are unaffected.\n\nMoreover, an application might crash invoking crypto/x509.(*CertificateRequest).CheckSignature on an X.509 certificate request, parsing a golang.org/x/crypto/openpgp Entity, or during a golang.org/x/crypto/otr conversation. Finally, a golang.org/x/crypto/ssh client can panic due to a malformed host key, while a server could panic if either PublicKeyCallback accepts a malformed public key, or if IsUserAuthority accepts a certificate with a malformed public key.", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.12.11" }, { "introduced": "1.13.0-0" }, { "fixed": "1.13.2" } ] } ], "ecosystem_specific": { "imports": [ { "path": "crypto/dsa", "symbols": [ "Verify" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/205441" }, { "type": "FIX", "url": "https://go.googlesource.com/go/+/552987fdbf4c2bc9641016fd323c3ae5d3a0d9a3" }, { "type": "REPORT", "url": "https://go.dev/issue/34960" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/lVEm7llp0w0/m/VbafyRkgCgAJ" } ], "credits": [ { "name": "Daniel M" }, { "name": "ragona" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0213", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2582.json
{ "schema_version": "1.3.1", "id": "GO-2024-2582", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-27093", "GHSA-q6h8-4j2v-pjg4" ], "summary": "Minder trusts client-provided mapping from repo name to upstream ID in github.com/stacklok/minder", "details": "Minder trusts client-provided mapping from repo name to upstream ID in github.com/stacklok/minder.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/stacklok/minder before v0.20240226.1425.", "affected": [ { "package": { "name": "github.com/stacklok/minder", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "0.20240226.1425" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/stacklok/minder/security/advisories/GHSA-q6h8-4j2v-pjg4" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27093" }, { "type": "FIX", "url": "https://github.com/stacklok/minder/commit/53868a878e93f29c43437f96dbc990b548e48d1d" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2582", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2813.json
{ "schema_version": "1.3.1", "id": "GO-2024-2813", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "GHSA-vhxv-fg4m-p2w8" ], "related": [ "GHSA-v84h-653v-4pq9" ], "summary": "Some CORS middleware allow untrusted origins in github.com/jub0bs/cors", "details": "Some CORS middleware (more specifically those created by specifying two or more origin patterns whose hosts share a proper suffix) incorrectly allow some untrusted origins, thereby opening the door to cross-origin attacks from the untrusted origins in question.\n\nFor example, specifying origin patterns \"https://foo.com\" and \"https://bar.com\" (in that order) would yield a middleware that would incorrectly allow untrusted origin \"https://barfoo.com\".", "affected": [ { "package": { "name": "github.com/jub0bs/cors", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.1.3" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/jub0bs/cors/internal/origins/radix", "symbols": [ "Tree.Contains", "Tree.Insert" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/jub0bs/cors/security/advisories/GHSA-vhxv-fg4m-p2w8" }, { "type": "FIX", "url": "https://github.com/jub0bs/cors/commit/63900fa1776237095fa0ed47ff85791e21f3a7d7" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2813", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2860.json
{ "schema_version": "1.3.1", "id": "GO-2024-2860", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "GHSA-f6mm-5fc7-3g3c" ], "summary": "goreleaser shows environment by default in github.com/goreleaser/goreleaser", "details": "goreleaser shows environment by default in github.com/goreleaser/goreleaser", "affected": [ { "package": { "name": "github.com/goreleaser/goreleaser", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "1.26.0" }, { "fixed": "1.26.1" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/goreleaser/goreleaser/security/advisories/GHSA-f6mm-5fc7-3g3c" }, { "type": "FIX", "url": "https://github.com/goreleaser/goreleaser/commit/22f734e41f7a5111a031a3a4eb714c1b6aa6456b" }, { "type": "FIX", "url": "https://github.com/goreleaser/goreleaser/pull/4787" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2860", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2515.json
{ "schema_version": "1.3.1", "id": "GO-2024-2515", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2020-13430", "GHSA-7m2x-qhrq-rp8h" ], "summary": "Grafana XSS via the OpenTSDB datasource in github.com/grafana/grafana", "details": "Grafana XSS via the OpenTSDB datasource in github.com/grafana/grafana.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/grafana/grafana before v7.0.0.", "affected": [ { "package": { "name": "github.com/grafana/grafana", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "7.0.0" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-7m2x-qhrq-rp8h" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13430" }, { "type": "FIX", "url": "https://github.com/grafana/grafana/pull/24539" }, { "type": "WEB", "url": "https://github.com/grafana/grafana/releases/tag/v7.0.0" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20200528-0003" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2515", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2801.json
{ "schema_version": "1.3.1", "id": "GO-2024-2801", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-33522", "GHSA-6362-gv4m-53ww" ], "summary": "Calico privilege escalation vulnerability in github.com/projectcalico/calico", "details": "Calico privilege escalation vulnerability in github.com/projectcalico/calico.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/projectcalico/calico before v3.26.5, from v3.27.0 before v3.27.3.", "affected": [ { "package": { "name": "github.com/projectcalico/calico", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "3.26.5" }, { "introduced": "3.27.0" }, { "fixed": "3.27.3" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-6362-gv4m-53ww" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-33522" }, { "type": "FIX", "url": "https://github.com/projectcalico/calico/pull/8447" }, { "type": "FIX", "url": "https://github.com/projectcalico/calico/pull/8517" }, { "type": "REPORT", "url": "https://github.com/projectcalico/calico/issues/7981" }, { "type": "WEB", "url": "https://www.tigera.io/security-bulletins-tta-2024-001" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2801", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2589.json
{ "schema_version": "1.3.1", "id": "GO-2024-2589", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-24988", "GHSA-6mx3-9qfh-77gj" ], "summary": "Mattermost denial of service through long emoji value in github.com/mattermost/mattermost-server", "details": "Mattermost denial of service through long emoji value in github.com/mattermost/mattermost-server.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/mattermost/mattermost/server/v8 before v8.1.9.", "affected": [ { "package": { "name": "github.com/mattermost/mattermost-server", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "9.2.0+incompatible" }, { "fixed": "9.2.5+incompatible" }, { "introduced": "9.3.0+incompatible" }, { "fixed": "9.3.1+incompatible" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/mattermost/mattermost-server/v5", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/mattermost/mattermost-server/v6", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/mattermost/mattermost/server/v8", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "8.1.9" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-6mx3-9qfh-77gj" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-24988" }, { "type": "WEB", "url": "https://mattermost.com/security-updates" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2589", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2933.json
{ "schema_version": "1.3.1", "id": "GO-2024-2933", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-5899" ], "summary": "Improper trust check in Bazel Build intellij plugin in github.com/bazelbuild/intellij", "details": "Improper trust check in Bazel Build intellij plugin in github.com/bazelbuild/intellij", "affected": [ { "package": { "name": "github.com/bazelbuild/intellij", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-5899" }, { "type": "WEB", "url": "https://github.com/bazelbuild/intellij/releases/tag/v2024.06.04-aswb-stable" }, { "type": "WEB", "url": "https://github.com/bazelbuild/intellij/security/advisories/GHSA-hh9f-wmhw-46vg" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2933", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-2400.json
{ "schema_version": "1.3.1", "id": "GO-2023-2400", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-50424", "GHSA-92cg-ghq6-9587", "GHSA-m8rw-rcpq-2vp2" ], "summary": "Escalation of privileges in github.com/sap/cloud-security-client-go", "details": "An unauthenticated attacker can obtain arbitrary permissions within the application under certain conditions.", "affected": [ { "package": { "name": "github.com/sap/cloud-security-client-go", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.17.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/sap/cloud-security-client-go/auth", "symbols": [ "Middleware.Authenticate", "Middleware.AuthenticateWithProofOfPossession", "matchesDomain" ] }, { "path": "github.com/sap/cloud-security-client-go/oidcclient", "symbols": [ "NewOIDCTenant", "OIDCTenant.GetJWKs", "OIDCTenant.getJWKsFromServer", "OIDCTenant.performDiscovery" ] }, { "path": "github.com/sap/cloud-security-client-go/tokenclient", "symbols": [ "TokenFlows.ClientCredentials" ] } ] } } ], "references": [ { "type": "WEB", "url": "https://me.sap.com/notes/3411067" }, { "type": "WEB", "url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html" }, { "type": "WEB", "url": "https://blogs.sap.com/2023/12/12/unveiling-critical-security-updates-sap-btp-security-note-3411067/" }, { "type": "ADVISORY", "url": "https://github.com/SAP/cloud-security-services-integration-library/security/advisories/GHSA-59c9-pxq8-9c73" }, { "type": "FIX", "url": "https://github.com/SAP/cloud-security-client-go/commit/2e3bd63e152e09f267316a1071034eb5d4b7f498" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-2400", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0110.json
{ "schema_version": "1.3.1", "id": "GO-2021-0110", "modified": "0001-01-01T00:00:00Z", "published": "2021-07-28T18:08:05Z", "aliases": [ "CVE-2020-15222", "GHSA-v3q9-2p3m-7g43" ], "summary": "Token reuse in github.com/ory/fosite", "details": "Uniqueness of JWT IDs (jti) are not checked, allowing the JWT to be replayed.", "affected": [ { "package": { "name": "github.com/ory/fosite", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.31.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/ory/fosite", "symbols": [ "Fosite.AuthenticateClient", "Fosite.NewAccessRequest", "Fosite.NewRevocationRequest" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/ory/fosite/commit/0c9e0f6d654913ad57c507dd9a36631e1858a3e9" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0110", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2508.json
{ "schema_version": "1.3.1", "id": "GO-2024-2508", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2020-35177", "GHSA-rpgp-9hmg-j25x" ], "summary": "Enumeration of users in HashiCorp Vault in github.com/hashicorp/vault", "details": "Enumeration of users in HashiCorp Vault in github.com/hashicorp/vault", "affected": [ { "package": { "name": "github.com/hashicorp/vault", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "1.5.0" }, { "fixed": "1.5.6" }, { "introduced": "1.6.0" }, { "fixed": "1.6.1" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-rpgp-9hmg-j25x" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-35177" }, { "type": "FIX", "url": "https://github.com/hashicorp/vault/pull/10537" }, { "type": "WEB", "url": "https://discuss.hashicorp.com/t/hcsec-2020-25-vault-s-ldap-auth-method-allows-user-enumeration/18984" }, { "type": "WEB", "url": "https://github.com/hashicorp/vault/blob/master/CHANGELOG.md#161" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2508", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2432.json
{ "schema_version": "1.3.1", "id": "GO-2024-2432", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-46739", "GHSA-8579-7p32-f398" ], "summary": "CubeFS timing attack can leak user passwords in github.com/cubefs/cubefs", "details": "CubeFS timing attack can leak user passwords in github.com/cubefs/cubefs.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/cubefs/cubefs before v3.3.1.", "affected": [ { "package": { "name": "github.com/cubefs/cubefs", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "3.3.1" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/cubefs/cubefs/security/advisories/GHSA-8579-7p32-f398" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-46739" }, { "type": "FIX", "url": "https://github.com/cubefs/cubefs/commit/6a0d5fa45a77ff20c752fa9e44738bf5d86c84bd" }, { "type": "FIX", "url": "https://github.com/cubefs/cubefs/commit/c21d034d2fcd051ffd64afeafc68cbcb39d26551" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2432", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2646.json
{ "schema_version": "1.3.1", "id": "GO-2024-2646", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-28175", "GHSA-jwv5-8mqv-g387" ], "summary": "Cross-site scripting on application summary component in github.com/argoproj/argo-cd/v2", "details": "Due to the improper URL protocols filtering of links specified in the link.argocd.argoproj.io annotations in the application summary component, an attacker can achieve cross-site scripting with elevated permissions. A malicious user to inject a javascript: link in the UI. When clicked by a victim user, the script will execute with the victim's permissions (up to and including admin). This vulnerability allows an attacker to perform arbitrary actions on behalf of the victim via the API, such as creating, modifying, and deleting Kubernetes resources.", "affected": [ { "package": { "name": "github.com/argoproj/argo-cd", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "1.0.0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/argoproj/argo-cd/v2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "2.0.0" }, { "fixed": "2.8.12" }, { "introduced": "2.9.0" }, { "fixed": "2.9.8" }, { "introduced": "2.10.0" }, { "fixed": "2.10.3" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-jwv5-8mqv-g387" }, { "type": "FIX", "url": "https://github.com/argoproj/argo-cd/commit/479b5544b57dc9ef767d49f7003f39602c480b71" } ], "credits": [ { "name": "@Ry0taK, @agaudreault, and @crenshaw-dev" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2646", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2020-0008.json
{ "schema_version": "1.3.1", "id": "GO-2020-0008", "modified": "0001-01-01T00:00:00Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2019-19794", "GHSA-44r7-7p62-q3fr" ], "summary": "Insecure generation of random numbers in github.com/miekg/dns", "details": "DNS message transaction IDs are generated using math/rand which makes them relatively predictable. This reduces the complexity of response spoofing attacks against DNS clients.", "affected": [ { "package": { "name": "github.com/miekg/dns", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.1.25-0.20191211073109-8ebf2e419df7" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/miekg/dns", "symbols": [ "Msg.SetAxfr", "Msg.SetIxfr", "Msg.SetNotify", "Msg.SetQuestion", "Msg.SetUpdate", "id" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/miekg/dns/pull/1044" }, { "type": "FIX", "url": "https://github.com/miekg/dns/commit/8ebf2e419df7857ac8919baa05248789a8ffbf33" }, { "type": "WEB", "url": "https://github.com/miekg/dns/issues/1037" }, { "type": "WEB", "url": "https://github.com/miekg/dns/issues/1043" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2020-0008", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2704.json
{ "schema_version": "1.3.1", "id": "GO-2024-2704", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-3518", "GHSA-9rhf-q362-77mx" ], "summary": "Consul JWT Auth in L7 Intentions Allow for Mismatched Service Identity and JWT Providers in github.com/hashicorp/consul", "details": "Consul JWT Auth in L7 Intentions Allow for Mismatched Service Identity and JWT Providers in github.com/hashicorp/consul", "affected": [ { "package": { "name": "github.com/hashicorp/consul", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "1.16.0" }, { "fixed": "1.16.1" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-9rhf-q362-77mx" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-3518" }, { "type": "WEB", "url": "https://discuss.hashicorp.com/t/hcsec-2023-25-consul-jwt-auth-in-l7-intentions-allow-for-mismatched-service-identity-and-jwt-providers/57004" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2704", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-2375.json
{ "schema_version": "1.3.1", "id": "GO-2023-2375", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-45287" ], "summary": "Before Go 1.20, the RSA based key exchange methods in crypto/tls may exhibit a timing side channel", "details": "Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits.\n\nIn Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels.", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.20.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "crypto/tls", "symbols": [ "Conn.Handshake", "Conn.HandshakeContext", "Conn.Read", "Conn.Write", "Dial", "DialWithDialer", "Dialer.Dial", "Dialer.DialContext", "rsaKeyAgreement.generateClientKeyExchange", "rsaKeyAgreement.processClientKeyExchange" ] } ] } } ], "references": [ { "type": "REPORT", "url": "https://go.dev/issue/20654" }, { "type": "FIX", "url": "https://go.dev/cl/326012/26" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/QMK8IQALDvA" }, { "type": "ARTICLE", "url": "https://people.redhat.com/~hkario/marvin/" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-2375", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2963.json
{ "schema_version": "1.3.1", "id": "GO-2024-2963", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-24791" ], "summary": "Denial of service due to improper 100-continue handling in net/http", "details": "The net/http HTTP/1.1 client mishandled the case where a server responds to a request with an \"Expect: 100-continue\" header with a non-informational (200 or higher) status. This mishandling could leave a client connection in an invalid state, where the next request sent on the connection will fail.\n\nAn attacker sending a request to a net/http/httputil.ReverseProxy proxy can exploit this mishandling to cause a denial of service by sending \"Expect: 100-continue\" requests which elicit a non-informational response from the backend. Each such request leaves the proxy with an invalid connection, and causes one subsequent request using that connection to fail.", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.21.12" }, { "introduced": "1.22.0-0" }, { "fixed": "1.22.5" } ] } ], "ecosystem_specific": { "imports": [ { "path": "net/http", "symbols": [ "Client.CloseIdleConnections", "Client.Do", "Client.Get", "Client.Head", "Client.Post", "Client.PostForm", "Get", "Head", "Post", "PostForm", "Transport.CancelRequest", "Transport.CloseIdleConnections", "Transport.RoundTrip", "persistConn.readResponse" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/591255" }, { "type": "REPORT", "url": "https://go.dev/issue/67555" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-dev/c/t0rK-qHBqzY/m/6MMoAZkMAgAJ" } ], "credits": [ { "name": "Geoff Franks" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2963", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2877.json
{ "schema_version": "1.3.1", "id": "GO-2024-2877", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-31989", "GHSA-9766-5277-j5hr" ], "summary": "ArgoCD Vulnerable to Use of Risky or Missing Cryptographic Algorithms in Redis Cache in github.com/argoproj/argo-cd", "details": "ArgoCD Vulnerable to Use of Risky or Missing Cryptographic Algorithms in Redis Cache in github.com/argoproj/argo-cd", "affected": [ { "package": { "name": "github.com/argoproj/argo-cd", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/argoproj/argo-cd/v2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "2.8.19" }, { "introduced": "2.9.0-rc1" }, { "fixed": "2.9.15" }, { "introduced": "2.10.0-rc1" }, { "fixed": "2.10.10" }, { "introduced": "2.11.0-rc1" }, { "fixed": "2.11.1" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-9766-5277-j5hr" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31989" }, { "type": "FIX", "url": "https://github.com/argoproj/argo-cd/commit/2de0ceade243039c120c28374016c04ff9590d1d" }, { "type": "FIX", "url": "https://github.com/argoproj/argo-cd/commit/35a7d6c7fa1534aceba763d6a68697f36c12e678" }, { "type": "FIX", "url": "https://github.com/argoproj/argo-cd/commit/4e2fe302c3352a0012ecbe7f03476b0e07f7fc6c" }, { "type": "FIX", "url": "https://github.com/argoproj/argo-cd/commit/53570cbd143bced49d4376d6e31bd9c7bd2659ff" }, { "type": "FIX", "url": "https://github.com/argoproj/argo-cd/commit/6ef7b62a0f67e74b4aac2aee31c98ae49dd95d12" }, { "type": "FIX", "url": "https://github.com/argoproj/argo-cd/commit/9552034a80070a93a161bfa330359585f3b85f07" }, { "type": "FIX", "url": "https://github.com/argoproj/argo-cd/commit/bdd889d43969ba738ddd15e1f674d27964048994" }, { "type": "FIX", "url": "https://github.com/argoproj/argo-cd/commit/f1a449e83ee73f8f14d441563b6a31b504f8d8b0" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2877", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2458.json
{ "schema_version": "1.3.1", "id": "GO-2024-2458", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-6476", "GHSA-p4rx-7wvg-fwrc" ], "summary": "CRI-O's pods can break out of resource confinement on cgroupv2 in github.com/cri-o/cri-o", "details": "CRI-O's pods can break out of resource confinement on cgroupv2 in github.com/cri-o/cri-o", "affected": [ { "package": { "name": "github.com/cri-o/cri-o", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.27.3" }, { "introduced": "1.28.0" }, { "fixed": "1.28.3" }, { "introduced": "1.29.0" }, { "fixed": "1.29.1" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/cri-o/cri-o/security/advisories/GHSA-p4rx-7wvg-fwrc" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6476" }, { "type": "FIX", "url": "https://github.com/cri-o/cri-o/commit/75effcb1a25851a736e82dba1f7d8cee93ee159e" }, { "type": "FIX", "url": "https://github.com/cri-o/cri-o/pull/4479" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2024:0195" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2024:0207" }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2023-6476" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253994" }, { "type": "WEB", "url": "https://github.com/cri-o/cri-o/blob/main/pkg/config/workloads.go#L103-L107" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2458", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2779.json
{ "schema_version": "1.3.1", "id": "GO-2024-2779", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2020-10937", "GHSA-r23h-3jmw-q7hr" ], "summary": "Access Restriction Bypass in go-ipfs in github.com/ipfs/go-ipfs", "details": "Access Restriction Bypass in go-ipfs in github.com/ipfs/go-ipfs", "affected": [ { "package": { "name": "github.com/ipfs/go-ipfs", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.7.0" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-r23h-3jmw-q7hr" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10937" }, { "type": "WEB", "url": "https://blog.ipfs.io/2020-10-30-dht-hardening" }, { "type": "WEB", "url": "https://graz.pure.elsevier.com/en/publications/total-eclipse-of-the-heart-disrupting-the-interplanetary-file-sys" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2779", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0256.json
{ "schema_version": "1.3.1", "id": "GO-2022-0256", "modified": "0001-01-01T00:00:00Z", "published": "2022-07-15T23:08:03Z", "aliases": [ "CVE-2021-41173", "GHSA-59hh-656j-3p7v" ], "summary": "Panic via maliciously crafted message in github.com/ethereum/go-ethereum", "details": "A maliciously crafted snap/1 protocol message can cause a panic.", "affected": [ { "package": { "name": "github.com/ethereum/go-ethereum", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.10.9" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/ethereum/go-ethereum/eth/protocols/snap", "symbols": [ "handleMessage" ] }, { "path": "github.com/ethereum/go-ethereum/trie", "symbols": [ "SecureTrie.TryGetNode", "Trie.TryGetNode", "Trie.tryGetNode" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/ethereum/go-ethereum/pull/23657/commits/f1fd963a5a965e643e52fcf805a2a02a323c32b8" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0256", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2701.json
{ "schema_version": "1.3.1", "id": "GO-2024-2701", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-31455", "GHSA-ggp5-28x4-xcj9" ], "summary": "Minder GetRepositoryByName data leak in github.com/stacklok/minder", "details": "Minder GetRepositoryByName data leak in github.com/stacklok/minder", "affected": [ { "package": { "name": "github.com/stacklok/minder", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0.0.39" }, { "fixed": "0.0.40" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/stacklok/minder/security/advisories/GHSA-ggp5-28x4-xcj9" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31455" }, { "type": "FIX", "url": "https://github.com/stacklok/minder/commit/11b6573ad62cfdd783a8bb52f3fce461466037f4" }, { "type": "FIX", "url": "https://github.com/stacklok/minder/commit/5c381cfbf3e4b7ce040ed8511a1fae1a78a0014b" }, { "type": "FIX", "url": "https://github.com/stacklok/minder/pull/2941" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2701", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2598.json
{ "schema_version": "1.3.1", "id": "GO-2024-2598", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-24783" ], "summary": "Verify panics on certificates with an unknown public key algorithm in crypto/x509", "details": "Verifying a certificate chain which contains a certificate with an unknown public key algorithm will cause Certificate.Verify to panic.\n\nThis affects all crypto/tls clients, and servers that set Config.ClientAuth to VerifyClientCertIfGiven or RequireAndVerifyClientCert. The default behavior is for TLS servers to not verify client certificates.", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.21.8" }, { "introduced": "1.22.0-0" }, { "fixed": "1.22.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "crypto/x509", "symbols": [ "Certificate.Verify", "Certificate.buildChains" ] } ] } } ], "references": [ { "type": "REPORT", "url": "https://go.dev/issue/65390" }, { "type": "FIX", "url": "https://go.dev/cl/569339" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/5pwGVUPoMbg" } ], "credits": [ { "name": "John Howard (Google)" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2598", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2441.json
{ "schema_version": "1.3.1", "id": "GO-2024-2441", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "GHSA-7xg2-83f8-39mr" ], "summary": "The DES/3DES cipher was used as part of the TLS protocol by installation tools in github.com/karmada-io/karmada", "details": "The DES/3DES cipher was used as part of the TLS protocol by installation tools in github.com/karmada-io/karmada", "affected": [ { "package": { "name": "github.com/karmada-io/karmada", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.8.0" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/karmada-io/karmada/security/advisories/GHSA-7xg2-83f8-39mr" }, { "type": "FIX", "url": "https://github.com/karmada-io/karmada/commit/98e655fc552b2987c3f2d2a061007889ce8be536" }, { "type": "FIX", "url": "https://github.com/karmada-io/karmada/commit/c3c376605403e07ca0ed2dc39c9e0f3c38f8e29d" }, { "type": "REPORT", "url": "https://github.com/karmada-io/karmada/issues/4191" }, { "type": "WEB", "url": "https://go.dev/issue/41476" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2441", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2020-0039.json
{ "schema_version": "1.3.1", "id": "GO-2020-0039", "modified": "0001-01-01T00:00:00Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2020-12666", "GHSA-733f-44f3-3frw" ], "summary": "Open redirect in gopkg.in/macaron.v1", "details": "Due to improper request sanitization, a specifically crafted URL can cause the static file handler to redirect to an attacker chosen URL, allowing for open redirect attacks.", "affected": [ { "package": { "name": "gopkg.in/macaron.v1", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.3.7" } ] } ], "ecosystem_specific": { "imports": [ { "path": "gopkg.in/macaron.v1", "symbols": [ "Context.Next", "LoggerInvoker.Invoke", "Macaron.Run", "Macaron.ServeHTTP", "Router.ServeHTTP", "staticHandler" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/go-macaron/macaron/pull/199" }, { "type": "FIX", "url": "https://github.com/go-macaron/macaron/commit/addc7461c3a90a040e79aa75bfd245107a210245" }, { "type": "WEB", "url": "https://github.com/go-macaron/macaron/issues/198" } ], "credits": [ { "name": "@ev0A" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2020-0039", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1569.json
{ "schema_version": "1.3.1", "id": "GO-2023-1569", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2022-41725" ], "summary": "Excessive resource consumption in mime/multipart", "details": "A denial of service is possible from excessive resource consumption in net/http and mime/multipart.\n\nMultipart form parsing with mime/multipart.Reader.ReadForm can consume largely unlimited amounts of memory and disk files. This also affects form parsing in the net/http package with the Request methods FormFile, FormValue, ParseMultipartForm, and PostFormValue.\n\nReadForm takes a maxMemory parameter, and is documented as storing \"up to maxMemory bytes +10MB (reserved for non-file parts) in memory\". File parts which cannot be stored in memory are stored on disk in temporary files. The unconfigurable 10MB reserved for non-file parts is excessively large and can potentially open a denial of service vector on its own. However, ReadForm did not properly account for all memory consumed by a parsed form, such as map entry overhead, part names, and MIME headers, permitting a maliciously crafted form to consume well over 10MB. In addition, ReadForm contained no limit on the number of disk files created, permitting a relatively small request body to create a large number of disk temporary files.\n\nWith fix, ReadForm now properly accounts for various forms of memory overhead, and should now stay within its documented limit of 10MB + maxMemory bytes of memory consumption. Users should still be aware that this limit is high and may still be hazardous.\n\nIn addition, ReadForm now creates at most one on-disk temporary file, combining multiple form parts into a single temporary file. The mime/multipart.File interface type's documentation states, \"If stored on disk, the File's underlying concrete type will be an *os.File.\". This is no longer the case when a form contains more than one file part, due to this coalescing of parts into a single file. The previous behavior of using distinct files for each form part may be reenabled with the environment variable GODEBUG=multipartfiles=distinct.\n\nUsers should be aware that multipart.ReadForm and the http.Request methods that call it do not limit the amount of disk consumed by temporary files. Callers can limit the size of form data with http.MaxBytesReader.", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.19.6" }, { "introduced": "1.20.0-0" }, { "fixed": "1.20.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "mime/multipart", "symbols": [ "Reader.ReadForm" ] } ] } } ], "references": [ { "type": "REPORT", "url": "https://go.dev/issue/58006" }, { "type": "FIX", "url": "https://go.dev/cl/468124" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E" } ], "credits": [ { "name": "Arpad Ryszka" }, { "name": "Jakob Ackermann (@das7pad)" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-1569", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2501.json
{ "schema_version": "1.3.1", "id": "GO-2024-2501", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2020-25201", "GHSA-496g-fr33-whrf" ], "summary": "Denial of service in HashiCorp Consul in github.com/hashicorp/consul", "details": "Denial of service in HashiCorp Consul in github.com/hashicorp/consul", "affected": [ { "package": { "name": "github.com/hashicorp/consul", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "1.7.0" }, { "fixed": "1.7.9" }, { "introduced": "1.8.0" }, { "fixed": "1.8.5" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-496g-fr33-whrf" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25201" }, { "type": "FIX", "url": "https://github.com/hashicorp/consul/pull/9024" }, { "type": "WEB", "url": "https://github.com/hashicorp/consul/blob/master/CHANGELOG.md#185-october-23-2020" }, { "type": "WEB", "url": "https://github.com/hashicorp/consul/releases/tag/v1.8.5" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/202208-09" }, { "type": "WEB", "url": "https://www.hashicorp.com/blog/category/consul" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2501", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1930.json
{ "schema_version": "1.3.1", "id": "GO-2023-1930", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-37475", "GHSA-9x44-9pgq-cf45" ], "summary": "Unrestricted memory consumption in github.com/hamba/avro", "details": "Unrestricted memory consumption in github.com/hamba/avro", "affected": [ { "package": { "name": "github.com/hamba/avro/v2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "2.13.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/hamba/avro/v2", "symbols": [ "Decoder.Decode", "Reader.ReadArrayCB", "Reader.ReadBytes", "Reader.ReadMapCB", "Reader.ReadNext", "Reader.ReadString", "Reader.ReadVal", "Reader.readBytes", "Unmarshal", "arrayDecoder.Decode", "bytesCodec.Decode", "bytesDecimalCodec.Decode", "bytesDecimalPtrCodec.Decode", "dereferenceDecoder.Decode", "efaceDecoder.Decode", "frozenConfig.Unmarshal", "mapDecoder.Decode", "mapSkipDecoder.Decode", "mapUnionDecoder.Decode", "recordIfaceDecoder.Decode", "recordMapDecoder.Decode", "recordSkipDecoder.Decode", "referenceDecoder.Decode", "sliceSkipDecoder.Decode", "stringCodec.Decode", "structDecoder.Decode", "textMarshalerCodec.Decode", "unionPtrDecoder.Decode", "unionResolvedDecoder.Decode", "unionSkipDecoder.Decode" ] } ] } }, { "package": { "name": "github.com/hamba/avro", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/hamba/avro", "symbols": [ "Decoder.Decode", "Reader.ReadArrayCB", "Reader.ReadBytes", "Reader.ReadMapCB", "Reader.ReadNext", "Reader.ReadString", "Reader.ReadVal", "Unmarshal", "arrayDecoder.Decode", "bytesCodec.Decode", "bytesDecimalCodec.Decode", "bytesDecimalPtrCodec.Decode", "dereferenceDecoder.Decode", "efaceDecoder.Decode", "frozenConfig.Unmarshal", "mapDecoder.Decode", "mapSkipDecoder.Decode", "mapUnionDecoder.Decode", "recordIfaceDecoder.Decode", "recordMapDecoder.Decode", "recordSkipDecoder.Decode", "referenceDecoder.Decode", "sliceSkipDecoder.Decode", "stringCodec.Decode", "structDecoder.Decode", "textMarshalerCodec.Decode", "unionPtrDecoder.Decode", "unionResolvedDecoder.Decode", "unionSkipDecoder.Decode" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/hamba/avro/security/advisories/GHSA-9x44-9pgq-cf45" }, { "type": "FIX", "url": "https://github.com/hamba/avro/pull/273" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-1930", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0503.json
{ "schema_version": "1.3.1", "id": "GO-2022-0503", "modified": "0001-01-01T00:00:00Z", "published": "2022-07-30T03:50:50Z", "aliases": [ "GHSA-9x4h-8wgm-8xfg" ], "summary": "Denial of service via malformed CAR data in github.com/ipld/go-car and go-car/v2", "details": "Decoding malformed CAR data can cause panics or excessive memory usage.", "affected": [ { "package": { "name": "github.com/ipld/go-car", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.4.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/ipld/go-car" }, { "path": "github.com/ipld/go-car/util" } ] } }, { "package": { "name": "github.com/ipld/go-car/v2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "2.0.0" }, { "fixed": "2.4.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/ipld/go-car/v2" }, { "path": "github.com/ipld/go-car/v2/blockstore" }, { "path": "github.com/ipld/go-car/v2/index" } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-9x4h-8wgm-8xfg" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0503", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2659.json
{ "schema_version": "1.3.1", "id": "GO-2024-2659", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-29018", "GHSA-mq39-4gv4-mvpx" ], "summary": "Data exfiltration from internal networks in github.com/docker/docker", "details": "dockerd forwards DNS requests to the host loopback device, bypassing the container network namespace's normal routing semantics, networks marked as 'internal' can unexpectedly forward DNS requests to an external nameserver. By registering a domain for which they control the authoritative nameservers, an attacker could arrange for a compromised container to exfiltrate data by encoding it in DNS queries that will eventually be answered by their nameservers.", "affected": [ { "package": { "name": "github.com/docker/docker", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "25.0.0+incompatible" }, { "fixed": "25.0.5+incompatible" }, { "introduced": "26.0.0-rc1+incompatible" }, { "fixed": "26.0.0-rc3+incompatible" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/moby/moby/security/advisories/GHSA-mq39-4gv4-mvpx" }, { "type": "WEB", "url": "https://github.com/moby/moby/pull/46609" } ], "credits": [ { "name": "@robmry" }, { "name": "@akerouanton" }, { "name": "@neersighted" }, { "name": "@gabriellavengeo" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2659", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0968.json
{ "schema_version": "1.3.1", "id": "GO-2022-0968", "modified": "0001-01-01T00:00:00Z", "published": "2022-09-13T03:32:38Z", "aliases": [ "CVE-2021-43565", "GHSA-gwc9-m7rh-j2ww" ], "summary": "Panic on malformed packets in golang.org/x/crypto/ssh", "details": "Unauthenticated clients can cause a panic in SSH servers.\n\nWhen using AES-GCM or ChaCha20Poly1305, consuming a malformed packet which contains an empty plaintext causes a panic.", "affected": [ { "package": { "name": "golang.org/x/crypto", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.0.0-20211202192323-5770296d904e" } ] } ], "ecosystem_specific": { "imports": [ { "path": "golang.org/x/crypto/ssh", "symbols": [ "Dial", "NewClientConn", "NewServerConn", "chacha20Poly1305Cipher.readCipherPacket", "curve25519sha256.Client", "curve25519sha256.Server", "dhGEXSHA.Client", "dhGEXSHA.Server", "dhGroup.Client", "dhGroup.Server", "ecdh.Client", "ecdh.Server", "gcmCipher.readCipherPacket" ] } ] } } ], "references": [ { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/2AR1sKiM-Qs" }, { "type": "REPORT", "url": "https://go.dev/issues/49932" }, { "type": "FIX", "url": "https://go.dev/cl/368814/" } ], "credits": [ { "name": "Rod Hynes (Psiphon Inc)" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0968", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2020-0023.json
{ "schema_version": "1.3.1", "id": "GO-2020-0023", "modified": "0001-01-01T00:00:00Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2015-10004", "GHSA-5vw4-v588-pgv8" ], "summary": "Timing side-channel in github.com/robbert229/jwt", "details": "Token validation methods are susceptible to a timing side-channel during HMAC comparison. With a large enough number of requests over a low latency connection, an attacker may use this to determine the expected HMAC.", "affected": [ { "package": { "name": "github.com/robbert229/jwt", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.0.0-20170426191122-ca1404ee6e83" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/robbert229/jwt", "symbols": [ "Algorithm.Validate", "Algorithm.validateSignature" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/robbert229/jwt/commit/ca1404ee6e83fcbafb66b09ed0d543850a15b654" }, { "type": "WEB", "url": "https://github.com/robbert229/jwt/issues/12" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2020-0023", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2771.json
{ "schema_version": "1.3.1", "id": "GO-2024-2771", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2021-36776", "GHSA-gvh9-xgrq-r8hw" ], "summary": "Rancher's Steve API Component Improper authorization check allows privilege escalation in github.com/rancher/rancher", "details": "Rancher's Steve API Component Improper authorization check allows privilege escalation in github.com/rancher/rancher.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/rancher/rancher from v2.5.0 before v2.5.10.", "affected": [ { "package": { "name": "github.com/rancher/rancher", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "2.5.0" }, { "fixed": "2.5.10" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-gvh9-xgrq-r8hw" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-36776" }, { "type": "WEB", "url": "https://bugzilla.suse.com/show_bug.cgi?id=1189413" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2771", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-1184.json
{ "schema_version": "1.3.1", "id": "GO-2022-1184", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2022-4643", "GHSA-6m4h-hfpp-x8cx" ], "summary": "OS command injection vulnerability in code.sajari.com/docconv", "details": "The manipulation of the argument path to docconv.{ConvertPDF,PDFHasImage} leads to os command injection.", "affected": [ { "package": { "name": "code.sajari.com/docconv", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "1.1.0" }, { "fixed": "1.3.5" } ] } ], "ecosystem_specific": { "imports": [ { "path": "code.sajari.com/docconv", "symbols": [ "Convert", "ConvertPDF", "ConvertPages", "ConvertPath", "ConvertPathReadability", "PDFHasImage" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/sajari/docconv/pull/110" }, { "type": "WEB", "url": "https://github.com/sajari/docconv/releases/tag/v1.3.5" }, { "type": "FIX", "url": "https://github.com/sajari/docconv/commit/b19021ade3d0b71c89d35cb00eb9e589a121faa5" }, { "type": "WEB", "url": "https://vuldb.com/?id.216502" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-1184", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0242.json
{ "schema_version": "1.3.1", "id": "GO-2021-0242", "modified": "0001-01-01T00:00:00Z", "published": "2022-02-17T17:33:07Z", "aliases": [ "CVE-2021-33198" ], "summary": "Panic on inputs with large exponents in math/big", "details": "Rat.SetString and Rat.UnmarshalText may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents.", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.15.13" }, { "introduced": "1.16.0-0" }, { "fixed": "1.16.5" } ] } ], "ecosystem_specific": { "imports": [ { "path": "math/big", "symbols": [ "Rat.SetString" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/316149" }, { "type": "FIX", "url": "https://go.googlesource.com/go/+/6c591f79b0b5327549bd4e94970f7a279efb4ab0" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI" }, { "type": "REPORT", "url": "https://go.dev/issue/45910" } ], "credits": [ { "name": "The OSS-Fuzz project (discovery)" }, { "name": "Emmanuel Odeke (reporter)" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0242", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0192.json
{ "schema_version": "1.3.1", "id": "GO-2022-0192", "modified": "0001-01-01T00:00:00Z", "published": "2022-07-01T20:11:34Z", "aliases": [ "CVE-2018-17142", "GHSA-2wp2-chmh-r934" ], "summary": "Incorrect parsing of nested templates in golang.org/x/net/html", "details": "The Parse function can panic on some invalid inputs.\n\nFor example, the Parse function panics on the input \"\u003cmath\u003e\u003ctemplate\u003e\u003cmo\u003e\u003ctemplate\u003e\".", "affected": [ { "package": { "name": "golang.org/x/net", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.0.0-20180925071336-cf3bd585ca2a" } ] } ], "ecosystem_specific": { "imports": [ { "path": "golang.org/x/net/html", "symbols": [ "Parse", "ParseFragment", "parser.resetInsertionMode" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/136875" }, { "type": "FIX", "url": "https://go.googlesource.com/net/+/cf3bd585ca2a5a21b057abd8be7eea2204af89d0" }, { "type": "REPORT", "url": "https://go.dev/issue/27702" } ], "credits": [ { "name": "@tr3ee" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0192", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2929.json
{ "schema_version": "1.3.1", "id": "GO-2024-2929", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-32196", "GHSA-64jq-m7rq-768h" ], "summary": "Rancher's External RoleTemplates can lead to privilege escalation in github.com/rancher/rancher", "details": "Rancher's External RoleTemplates can lead to privilege escalation in github.com/rancher/rancher.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/rancher/rancher from v2.7.0 before v2.7.14, from v2.8.0 before v2.8.5.", "affected": [ { "package": { "name": "github.com/rancher/rancher", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "2.7.0" }, { "fixed": "2.7.14" }, { "introduced": "2.8.0" }, { "fixed": "2.8.5" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/rancher/rancher/security/advisories/GHSA-64jq-m7rq-768h" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2929", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1988.json
{ "schema_version": "1.3.1", "id": "GO-2023-1988", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-3978", "GHSA-2wrh-6pvc-2jm9" ], "summary": "Improper rendering of text nodes in golang.org/x/net/html", "details": "Text nodes not in the HTML namespace are incorrectly literally rendered, causing text which should be escaped to not be. This could lead to an XSS attack.", "affected": [ { "package": { "name": "golang.org/x/net", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.13.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "golang.org/x/net/html", "symbols": [ "Render", "render1" ] } ] } } ], "references": [ { "type": "REPORT", "url": "https://go.dev/issue/61615" }, { "type": "FIX", "url": "https://go.dev/cl/514896" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-1988", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2768.json
{ "schema_version": "1.3.1", "id": "GO-2024-2768", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2021-25318", "GHSA-f9xf-jq4j-vqw4" ], "summary": "Rancher does not properly specify ApiGroup when creating Kubernetes RBAC resources in github.com/rancher/rancher", "details": "Rancher does not properly specify ApiGroup when creating Kubernetes RBAC resources in github.com/rancher/rancher.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/rancher/rancher before v2.4.16, from v2.5.0 before v2.5.9.", "affected": [ { "package": { "name": "github.com/rancher/rancher", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "2.0.0+incompatible" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "2.4.16" }, { "introduced": "2.5.0" }, { "fixed": "2.5.9" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-f9xf-jq4j-vqw4" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-25318" }, { "type": "REPORT", "url": "https://github.com/rancher/rancher/issues/33590" }, { "type": "WEB", "url": "https://bugzilla.suse.com/show_bug.cgi?id=1184913" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2768", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-2043.json
{ "schema_version": "1.3.1", "id": "GO-2023-2043", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-39319" ], "summary": "Improper handling of special tags within script contexts in html/template", "details": "The html/template package does not apply the proper rules for handling occurrences of \"\u003cscript\", \"\u003c!--\", and \"\u003c/script\" within JS literals in \u003cscript\u003e contexts. This may cause the template parser to improperly consider script contexts to be terminated early, causing actions to be improperly escaped. This could be leveraged to perform an XSS attack.", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.20.8" }, { "introduced": "1.21.0-0" }, { "fixed": "1.21.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "html/template", "symbols": [ "Template.Execute", "Template.ExecuteTemplate", "escaper.escapeText", "indexTagEnd", "tSpecialTagEnd" ] } ] } } ], "references": [ { "type": "REPORT", "url": "https://go.dev/issue/62197" }, { "type": "FIX", "url": "https://go.dev/cl/526157" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ" } ], "credits": [ { "name": "Takeshi Kaneko (GMO Cybersecurity by Ierae, Inc.)" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-2043", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2516.json
{ "schema_version": "1.3.1", "id": "GO-2024-2516", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2018-18624", "GHSA-9hv8-4frf-cprf" ], "summary": "Grafana XSS via a column style in github.com/grafana/grafana", "details": "Grafana XSS via a column style in github.com/grafana/grafana.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/grafana/grafana before v7.0.0.", "affected": [ { "package": { "name": "github.com/grafana/grafana", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "7.0.0" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-9hv8-4frf-cprf" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-18624" }, { "type": "FIX", "url": "https://github.com/grafana/grafana/commit/0284747c88eb9435899006d26ffaf65f89dec88e" }, { "type": "FIX", "url": "https://github.com/grafana/grafana/pull/11813" }, { "type": "FIX", "url": "https://github.com/grafana/grafana/pull/23816" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20200608-0008" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2516", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2904.json
{ "schema_version": "1.3.1", "id": "GO-2024-2904", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-37154", "GHSA-7hrh-v6wp-53vw" ], "summary": "Evmos allows unvested token delegations in github.com/evmos/evmos", "details": "Evmos allows unvested token delegations in github.com/evmos/evmos", "affected": [ { "package": { "name": "github.com/evmos/evmos", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v3", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v4", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v5", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v6", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v7", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v8", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v9", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v10", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v11", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v12", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v13", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v14", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v15", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v16", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v17", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v18", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/evmos/evmos/security/advisories/GHSA-7hrh-v6wp-53vw" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-37154" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2904", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1589.json
{ "schema_version": "1.3.1", "id": "GO-2023-1589", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-25656", "GHSA-87x9-7grx-m28v" ], "summary": "Denial of service from memory exhaustion in github.com/notaryproject/notation-go", "details": "Parsing PKIX distinguished names containing the string \"=#\" can cause excessive memory consumption.", "affected": [ { "package": { "name": "github.com/notaryproject/notation-go", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.0.0-rc.3" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/notaryproject/notation-go/internal/pkix", "symbols": [ "ParseDistinguishedName" ] }, { "path": "github.com/notaryproject/notation-go/verifier", "symbols": [ "New", "NewFromConfig", "verifier.Verify", "verifyX509TrustedIdentities" ] }, { "path": "github.com/notaryproject/notation-go/verifier/trustpolicy", "symbols": [ "Document.Validate", "validateTrustedIdentities" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/notaryproject/notation-go/pull/275" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-1589", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2936.json
{ "schema_version": "1.3.1", "id": "GO-2024-2936", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-38351", "GHSA-m93w-4fxv-r35v" ], "summary": "PocketBase performs password auth and OAuth2 unverified email linking in github.com/pocketbase/pocketbase", "details": "PocketBase performs password auth and OAuth2 unverified email linking in github.com/pocketbase/pocketbase", "affected": [ { "package": { "name": "github.com/pocketbase/pocketbase", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.22.14" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/pocketbase/pocketbase/apis", "symbols": [ "EnrichRecord", "EnrichRecords", "RecordAuthResponse", "Serve", "recordAuthApi.authWithOAuth2", "recordAuthApi.authWithPassword" ] }, { "path": "github.com/pocketbase/pocketbase/models", "symbols": [ "NewRecordFromNullStringMap", "NewRecordsFromNullStringMaps", "Record.CleanCopy", "Record.ColumnValueMap", "Record.Email", "Record.EmailVisibility", "Record.FindFileFieldByFile", "Record.Get", "Record.GetBool", "Record.GetDateTime", "Record.GetFloat", "Record.GetInt", "Record.GetString", "Record.GetStringSlice", "Record.GetTime", "Record.LastResetSentAt", "Record.LastVerificationSentAt", "Record.Load", "Record.MarshalJSON", "Record.OriginalCopy", "Record.PasswordHash", "Record.PublicExport", "Record.RefreshTokenKey", "Record.ReplaceModifers", "Record.Set", "Record.SetEmail", "Record.SetEmailVisibility", "Record.SetLastResetSentAt", "Record.SetLastVerificationSentAt", "Record.SetPassword", "Record.SetTokenKey", "Record.SetUsername", "Record.SetVerified", "Record.TokenKey", "Record.UnknownData", "Record.UnmarshalJSON", "Record.UnmarshalJSONField", "Record.Username", "Record.ValidatePassword", "Record.Verified", "Record.getNormalizeDataValueForDB" ] }, { "path": "github.com/pocketbase/pocketbase/models/schema", "symbols": [ "AuthFieldNames" ] }, { "path": "github.com/pocketbase/pocketbase/daos", "symbols": [ "Dao.CanAccessRecord", "Dao.CreateViewSchema", "Dao.Delete", "Dao.DeleteAdmin", "Dao.DeleteCollection", "Dao.DeleteExternalAuth", "Dao.DeleteOldLogs", "Dao.DeleteParam", "Dao.DeleteRecord", "Dao.DeleteTable", "Dao.DeleteView", "Dao.ExpandRecord", "Dao.ExpandRecords", "Dao.FindAdminByEmail", "Dao.FindAdminById", "Dao.FindAdminByToken", "Dao.FindAllExternalAuthsByRecord", "Dao.FindAuthRecordByEmail", "Dao.FindAuthRecordByToken", "Dao.FindAuthRecordByUsername", "Dao.FindById", "Dao.FindCollectionByNameOrId", "Dao.FindCollectionReferences", "Dao.FindCollectionsByType", "Dao.FindExternalAuthByRecordAndProvider", "Dao.FindFirstExternalAuthByExpr", "Dao.FindFirstRecordByData", "Dao.FindFirstRecordByFilter", "Dao.FindLogById", "Dao.FindParamByKey", "Dao.FindRecordById", "Dao.FindRecordByViewFile", "Dao.FindRecordsByExpr", "Dao.FindRecordsByFilter", "Dao.FindRecordsByIds", "Dao.FindSettings", "Dao.HasTable", "Dao.ImportCollections", "Dao.IsAdminEmailUnique", "Dao.IsCollectionNameUnique", "Dao.IsRecordValueUnique", "Dao.LogsStats", "Dao.RecordQuery", "Dao.RunInTransaction", "Dao.Save", "Dao.SaveAdmin", "Dao.SaveCollection", "Dao.SaveExternalAuth", "Dao.SaveLog", "Dao.SaveParam", "Dao.SaveRecord", "Dao.SaveSettings", "Dao.SaveView", "Dao.SuggestUniqueAuthRecordUsername", "Dao.SyncRecordTableSchema", "Dao.TableColumns", "Dao.TableIndexes", "Dao.TableInfo", "Dao.TotalAdmins", "Dao.Vacuum" ] }, { "path": "github.com/pocketbase/pocketbase/forms", "symbols": [ "AdminLogin.Submit", "AdminLogin.Validate", "AdminPasswordResetConfirm.Submit", "AdminPasswordResetConfirm.Validate", "AdminPasswordResetRequest.Submit", "AdminPasswordResetRequest.Validate", "AdminUpsert.Submit", "AdminUpsert.Validate", "AppleClientSecretCreate.Submit", "AppleClientSecretCreate.Validate", "BackupCreate.Submit", "BackupCreate.Validate", "BackupUpload.Submit", "BackupUpload.Validate", "CollectionUpsert.Submit", "CollectionUpsert.Validate", "CollectionsImport.Submit", "CollectionsImport.Validate", "NewRecordUpsert", "RealtimeSubscribe.Validate", "RecordEmailChangeConfirm.Submit", "RecordEmailChangeConfirm.Validate", "RecordEmailChangeRequest.Submit", "RecordEmailChangeRequest.Validate", "RecordOAuth2Login.Submit", "RecordOAuth2Login.Validate", "RecordOAuth2Login.submit", "RecordPasswordLogin.Submit", "RecordPasswordLogin.Validate", "RecordPasswordResetConfirm.Submit", "RecordPasswordResetConfirm.Validate", "RecordPasswordResetRequest.Submit", "RecordPasswordResetRequest.Validate", "RecordUpsert.DrySubmit", "RecordUpsert.LoadData", "RecordUpsert.LoadRequest", "RecordUpsert.Submit", "RecordUpsert.Validate", "RecordUpsert.ValidateAndFill", "RecordVerificationConfirm.Submit", "RecordVerificationConfirm.Validate", "RecordVerificationRequest.Submit", "RecordVerificationRequest.Validate", "SettingsUpsert.Submit", "SettingsUpsert.Validate", "TestEmailSend.Submit", "TestEmailSend.Validate", "TestS3Filesystem.Submit", "TestS3Filesystem.Validate" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/pocketbase/pocketbase/security/advisories/GHSA-m93w-4fxv-r35v" }, { "type": "FIX", "url": "https://github.com/pocketbase/pocketbase/commit/58ace5d5e7b9b979490019cf8d1b88491e5daec5" }, { "type": "WEB", "url": "https://github.com/pocketbase/pocketbase/discussions/4355" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2936", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0532.json
{ "schema_version": "1.3.1", "id": "GO-2022-0532", "modified": "0001-01-01T00:00:00Z", "published": "2022-07-26T21:41:20Z", "aliases": [ "CVE-2022-30580" ], "summary": "Empty Cmd.Path can trigger unintended binary in os/exec on Windows", "details": "On Windows, executing Cmd.Run, Cmd.Start, Cmd.Output, or Cmd.CombinedOutput when Cmd.Path is unset will unintentionally trigger execution of any binaries in the working directory named either \"..com\" or \"..exe\".", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.17.11" }, { "introduced": "1.18.0-0" }, { "fixed": "1.18.3" } ] } ], "ecosystem_specific": { "imports": [ { "path": "os/exec", "goos": [ "windows" ], "symbols": [ "Cmd.Start" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/403759" }, { "type": "FIX", "url": "https://go.googlesource.com/go/+/960ffa98ce73ef2c2060c84c7ac28d37a83f345e" }, { "type": "REPORT", "url": "https://go.dev/issue/52574" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg/m/IWz5T6x7AAAJ" } ], "credits": [ { "name": "Chris Darroch (chrisd8088@github.com)" }, { "name": "brian m. carlson (bk2204@github.com)" }, { "name": "Mikhail Shcherbakov (https://twitter.com/yu5k3)" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0532", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2476.json
{ "schema_version": "1.3.1", "id": "GO-2024-2476", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-23656", "GHSA-gr79-9v6v-gc9r" ], "summary": "Dex discarding TLSconfig and always serves deprecated TLS 1.0/1.1 and insecure ciphers in github.com/dexidp/dex", "details": "Dex discarding TLSconfig and always serves deprecated TLS 1.0/1.1 and insecure ciphers in github.com/dexidp/dex.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/dexidp/dex from v2.37.0 before v2.38.0.", "affected": [ { "package": { "name": "github.com/dexidp/dex", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "2.37.0" }, { "fixed": "2.38.0" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/dexidp/dex/security/advisories/GHSA-gr79-9v6v-gc9r" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23656" }, { "type": "FIX", "url": "https://github.com/dexidp/dex/commit/5bbdb4420254ba73b9c4df4775fe7bdacf233b17" }, { "type": "FIX", "url": "https://github.com/dexidp/dex/pull/2964" }, { "type": "REPORT", "url": "https://github.com/dexidp/dex/issues/2848" }, { "type": "WEB", "url": "https://github.com/dexidp/dex/blob/70d7a2c7c1bb2646b1a540e49616cbc39622fb83/cmd/dex/serve.go#L425" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2476", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1534.json
{ "schema_version": "1.3.1", "id": "GO-2023-1534", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "GHSA-4xgv-j62q-h3rj" ], "summary": "Panic during unmarshal of Hello Verify Request in github.com/pion/dtls/v2", "details": "Unmarshalling a Hello Verify request can panic, which could allow a denial of service.", "affected": [ { "package": { "name": "github.com/pion/dtls/v2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "2.2.4" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/pion/dtls/v2/pkg/protocol/handshake", "symbols": [ "Handshake.Unmarshal", "MessageHelloVerifyRequest.Unmarshal" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/pion/dtls/commit/a50d26c5e4eed2ca87509494ffef2d2ebd22b1eb" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-1534", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1709.json
{ "schema_version": "1.3.1", "id": "GO-2023-1709", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-25000", "GHSA-vq4h-9ghm-qmrr" ], "summary": "Cache-timing attacks in Shamir's secret sharing in github.com/hashicorp/vault", "details": "HashiCorp Vault's implementation of Shamir's secret sharing uses precomputed table lookups, and is vulnerable to cache-timing attacks.\n\nAn attacker with access to, and the ability to observe a large number of unseal operations on the host through a side channel may reduce the search space of a brute force effort to recover the Shamir shares.", "affected": [ { "package": { "name": "github.com/hashicorp/vault", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.11.9" }, { "introduced": "1.12.0" }, { "fixed": "1.12.5" }, { "introduced": "1.13.0" }, { "fixed": "1.13.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/hashicorp/vault/shamir", "symbols": [ "Combine", "Split", "div", "mult" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/hashicorp/vault/pull/19495" }, { "type": "WEB", "url": "https://discuss.hashicorp.com/t/hcsec-2023-10-vault-vulnerable-to-cache-timing-attacks-during-seal-and-unseal-operations/52078" } ], "credits": [ { "name": "Giuseppe Cocomazzi" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-1709", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2775.json
{ "schema_version": "1.3.1", "id": "GO-2024-2775", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2022-3801", "GHSA-m738-584h-26p6" ], "summary": "IBAX go-ibax vulnerable to SQL injection in github.com/IBAX-io/go-ibax", "details": "IBAX go-ibax vulnerable to SQL injection in github.com/IBAX-io/go-ibax", "affected": [ { "package": { "name": "github.com/IBAX-io/go-ibax", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.4.2" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-m738-584h-26p6" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3801" }, { "type": "FIX", "url": "https://github.com/IBAX-io/go-ibax/commit/b0183d8e550836dc50282ee74ff421ee41b25a37" }, { "type": "REPORT", "url": "https://github.com/IBAX-io/go-ibax/issues/2062" }, { "type": "WEB", "url": "https://vuldb.com/?id.212637" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2775", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0978.json
{ "schema_version": "1.3.1", "id": "GO-2022-0978", "modified": "0001-01-01T00:00:00Z", "published": "2022-09-13T17:40:16Z", "aliases": [ "CVE-2022-36085", "GHSA-f524-rf33-2jjr" ], "summary": "Protection bypass in github.com/open-policy-agent/opa", "details": "Open Policy Agent (OPA) is an open source, general-purpose policy engine. The Rego compiler provides a (deprecated) WithUnsafeBuiltins function, which allows users to provide a set of built-in functions that should be deemed unsafe and rejected by the compiler if encountered in the policy compilation stage.\n\nA bypass of this protection is possible when using the \"with\" keyword to mock a built-in function that isn't taken into account by WithUnsafeBuiltins.", "affected": [ { "package": { "name": "github.com/open-policy-agent/opa", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0.40.0" }, { "fixed": "0.44.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/open-policy-agent/opa/ast", "symbols": [ "Args.Copy", "Args.Vars", "Array.Copy", "Array.Foreach", "Array.Iter", "Array.Until", "ArrayComprehension.Copy", "BeforeAfterVisitor.Walk", "Body.Copy", "Body.Vars", "Call.Copy", "CompileModules", "CompileModulesWithOpt", "Compiler.Compile", "Compiler.GetRulesDynamic", "Compiler.GetRulesDynamicWithOpts", "Compiler.PassesTypeCheck", "Compiler.rewriteWithModifiers", "ContainsClosures", "ContainsComprehensions", "ContainsRefs", "Copy", "Every.Copy", "Every.KeyValueVars", "Expr.Copy", "Expr.CopyWithoutTerms", "Expr.Vars", "GenericTransformer.Transform", "GenericVisitor.Walk", "Head.Copy", "Head.Vars", "Import.Copy", "IsConstant", "JSON", "JSONWithOpt", "Module.Copy", "Module.UnmarshalJSON", "MustCompileModules", "MustCompileModulesWithOpts", "MustJSON", "MustParseBody", "MustParseBodyWithOpts", "MustParseExpr", "MustParseImports", "MustParseModule", "MustParseModuleWithOpts", "MustParsePackage", "MustParseRef", "MustParseRule", "MustParseStatement", "MustParseStatements", "MustParseTerm", "NewGraph", "ObjectComprehension.Copy", "OutputVarsFromBody", "OutputVarsFromExpr", "Package.Copy", "ParseBody", "ParseBodyWithOpts", "ParseExpr", "ParseImports", "ParseModule", "ParseModuleWithOpts", "ParsePackage", "ParseRef", "ParseRule", "ParseStatement", "ParseStatements", "ParseStatementsWithOpts", "ParseTerm", "Parser.Parse", "Pretty", "QueryContext.Copy", "Ref.ConstantPrefix", "Ref.Copy", "Ref.Dynamic", "Ref.Extend", "Ref.OutputVars", "Rule.Copy", "SetComprehension.Copy", "SomeDecl.Copy", "Term.Copy", "Term.Vars", "Transform", "TransformComprehensions", "TransformRefs", "TransformVars", "TreeNode.DepthFirst", "TypeEnv.Get", "Unify", "ValueMap.Copy", "ValueMap.Equal", "ValueMap.Hash", "ValueMap.Iter", "ValueMap.MarshalJSON", "ValueMap.String", "ValueToInterface", "VarVisitor.Walk", "Walk", "WalkBeforeAndAfter", "WalkBodies", "WalkClosures", "WalkExprs", "WalkNodes", "WalkRefs", "WalkRules", "WalkTerms", "WalkVars", "WalkWiths", "With.Copy", "baseDocEqIndex.AllRules", "baseDocEqIndex.Build", "baseDocEqIndex.Lookup", "bodySafetyTransformer.Visit", "comprehensionIndexNestedCandidateVisitor.Walk", "comprehensionIndexRegressionCheckVisitor.Walk", "isBuiltinRefOrVar", "metadataParser.Parse", "object.Copy", "object.Diff", "object.Filter", "object.Foreach", "object.Intersect", "object.Iter", "object.Map", "object.Merge", "object.MergeWith", "object.Until", "queryCompiler.Compile", "queryCompiler.checkDeprecatedBuiltins", "queryCompiler.checkUnsafeBuiltins", "refChecker.Visit", "refindices.Sorted", "refindices.Update", "rewriteNestedHeadVarLocalTransform.Visit", "rewriteWithModifier", "rewriteWithModifiersInBody", "ruleArgLocalRewriter.Visit", "ruleWalker.Do", "set.Copy", "set.Diff", "set.Foreach", "set.Intersect", "set.Iter", "set.Map", "set.Reduce", "set.Union", "set.Until", "trieNode.Do", "trieNode.Traverse", "trieTraversalResult.Add", "typeChecker.CheckBody", "typeChecker.CheckTypes", "validateWith", "validateWithFunctionValue" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/open-policy-agent/opa/security/advisories/GHSA-f524-rf33-2jjr" }, { "type": "FIX", "url": "https://github.com/open-policy-agent/opa/pull/4540" }, { "type": "FIX", "url": "https://github.com/open-policy-agent/opa/pull/4616" }, { "type": "FIX", "url": "https://github.com/open-policy-agent/opa/commit/25a597bc3f4985162e7f65f9c36599f4f8f55823" }, { "type": "FIX", "url": "https://github.com/open-policy-agent/opa/commit/3e8c754ed007b22393cf65e48751ad9f6457fee8" }, { "type": "WEB", "url": "https://github.com/open-policy-agent/opa/releases/tag/v0.43.1" } ], "credits": [ { "name": "anderseknert@" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0978", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2514.json
{ "schema_version": "1.3.1", "id": "GO-2024-2514", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2020-25816", "GHSA-57gg-cj55-q5g2" ], "summary": "Token leases could outlive their TTL in HashiCorp Vault in github.com/hashicorp/vault", "details": "Token leases could outlive their TTL in HashiCorp Vault in github.com/hashicorp/vault", "affected": [ { "package": { "name": "github.com/hashicorp/vault", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "1.0.0" }, { "fixed": "1.5.4" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-57gg-cj55-q5g2" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25816" }, { "type": "FIX", "url": "https://github.com/hashicorp/vault/pull/10020/commits/f192878110fe93eb13da914b2bee28caa7866a29" }, { "type": "WEB", "url": "https://github.com/hashicorp/vault/blob/master/CHANGELOG.md#147" }, { "type": "WEB", "url": "https://github.com/hashicorp/vault/blob/master/CHANGELOG.md#154" }, { "type": "WEB", "url": "https://www.hashicorp.com/blog/category/vault" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2514", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2559.json
{ "schema_version": "1.3.1", "id": "GO-2024-2559", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-21496", "GHSA-ff72-ff42-c3gw" ], "summary": "Cross-site Scripting in github.com/greenpau/caddy-security", "details": "Cross-site Scripting in github.com/greenpau/caddy-security", "affected": [ { "package": { "name": "github.com/greenpau/caddy-security", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-ff72-ff42-c3gw" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21496" }, { "type": "REPORT", "url": "https://github.com/greenpau/caddy-security/issues/267" }, { "type": "WEB", "url": "https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy" }, { "type": "WEB", "url": "https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-6249860" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2559", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0106.json
{ "schema_version": "1.3.1", "id": "GO-2021-0106", "modified": "0001-01-01T00:00:00Z", "published": "2021-07-28T18:08:05Z", "aliases": [ "CVE-2020-36566", "GHSA-jpf8-h7h7-3ppm" ], "summary": "Path traversal in github.com/whyrusleeping/tar-utils", "details": "Due to improper path sanitization, archives containing relative file paths can cause files to be written (or overwritten) outside of the target directory.", "affected": [ { "package": { "name": "github.com/whyrusleeping/tar-utils", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.0.0-20201201191210-20a61371de5b" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/whyrusleeping/tar-utils", "symbols": [ "Extractor.Extract", "Extractor.outputPath" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/whyrusleeping/tar-utils/commit/20a61371de5b51380bbdb0c7935b30b0625ac227" }, { "type": "WEB", "url": "https://snyk.io/research/zip-slip-vulnerability" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0106", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2532.json
{ "schema_version": "1.3.1", "id": "GO-2024-2532", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-1052", "GHSA-vh73-q3rw-qx7w" ], "summary": "Boundary vulnerable to session hijacking through TLS certificate tampering in github.com/hashicorp/boundary", "details": "Boundary vulnerable to session hijacking through TLS certificate tampering in github.com/hashicorp/boundary", "affected": [ { "package": { "name": "github.com/hashicorp/boundary", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0.8.0" }, { "fixed": "0.15.0" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-vh73-q3rw-qx7w" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-1052" }, { "type": "WEB", "url": "https://discuss.hashicorp.com/t/hcsec-2024-02-boundary-vulnerable-to-session-hijacking-through-tls-certificate-tampering/62458" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2532", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2715.json
{ "schema_version": "1.3.1", "id": "GO-2024-2715", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-32644", "GHSA-3fp5-2xwh-fxm6" ], "summary": "Evmos transaction execution not accounting for all state transition after interaction with precompiles in github.com/evmos/evmos", "details": "Evmos transaction execution not accounting for all state transition after interaction with precompiles in github.com/evmos/evmos", "affected": [ { "package": { "name": "github.com/evmos/evmos", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v3", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v4", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v5", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v6", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v7", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v8", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v9", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v10", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v11", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v12", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v13", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v14", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v15", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v16", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/evmos/evmos/v17", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "17.0.0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/tharsis/evmos", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/tharsis/evmos/v2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/tharsis/evmos/v3", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/tharsis/evmos/v4", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/tharsis/evmos/v5", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/evmos/evmos/security/advisories/GHSA-3fp5-2xwh-fxm6" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-32644" }, { "type": "FIX", "url": "https://github.com/evmos/evmos/commit/08982b5ee726b97bc50eaf58d1914829648b6a5f" }, { "type": "WEB", "url": "https://github.com/evmos/evmos/blob/b196a522ba4951890b40992e9f97aa610f8b5f9c/x/evm/statedb/state_object.go#L53-L68" }, { "type": "WEB", "url": "https://github.com/evmos/evmos/blob/b196a522ba4951890b40992e9f97aa610f8b5f9c/x/evm/statedb/statedb.go#L33-L55" }, { "type": "WEB", "url": "https://github.com/evmos/evmos/blob/b196a522ba4951890b40992e9f97aa610f8b5f9c/x/evm/statedb/statedb.go#L460-L465" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2715", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0159.json
{ "schema_version": "1.3.1", "id": "GO-2021-0159", "modified": "0001-01-01T00:00:00Z", "published": "2022-01-05T21:39:14Z", "aliases": [ "CVE-2015-5739", "CVE-2015-5740", "CVE-2015-5741" ], "summary": "Request smuggling due to improper header parsing in net/http", "details": "HTTP headers were not properly parsed, which allows remote attackers to conduct HTTP request smuggling attacks via a request that contains Content-Length and Transfer-Encoding header fields.", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.4.3" } ] } ], "ecosystem_specific": { "imports": [ { "path": "net/http", "symbols": [ "CanonicalMIMEHeaderKey", "body.readLocked", "canonicalMIMEHeaderKey", "chunkWriter.writeHeader", "fixLength", "fixTransferEncoding", "readTransfer", "transferWriter.shouldSendContentLength", "validHeaderFieldByte" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/13148" }, { "type": "FIX", "url": "https://go.googlesource.com/go/+/26049f6f9171d1190f3bbe05ec304845cfe6399f" }, { "type": "FIX", "url": "https://go.dev/cl/11772" }, { "type": "FIX", "url": "https://go.dev/cl/11810" }, { "type": "FIX", "url": "https://go.dev/cl/12865" }, { "type": "FIX", "url": "https://go.googlesource.com/go/+/117ddcb83d7f42d6aa72241240af99ded81118e9" }, { "type": "FIX", "url": "https://go.googlesource.com/go/+/300d9a21583e7cf0149a778a0611e76ff7c6680f" }, { "type": "FIX", "url": "https://go.googlesource.com/go/+/c2db5f4ccc61ba7df96a747e268a277b802cbb87" }, { "type": "REPORT", "url": "https://go.dev/issue/12027" }, { "type": "REPORT", "url": "https://go.dev/issue/11930" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/iSIyW4lM4hY/m/ADuQR4DiDwAJ" } ], "credits": [ { "name": "Jed Denlea" }, { "name": "Régis Leroy" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0159", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2769.json
{ "schema_version": "1.3.1", "id": "GO-2024-2769", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2022-38183", "GHSA-fhv8-m4j4-cww2" ], "summary": "Gitea allowed assignment of private issues in code.gitea.io/gitea", "details": "Gitea allowed assignment of private issues in code.gitea.io/gitea", "affected": [ { "package": { "name": "code.gitea.io/gitea", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.16.9" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-fhv8-m4j4-cww2" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-38183" }, { "type": "WEB", "url": "https://blog.gitea.io/2022/07/gitea-1.16.9-is-released" }, { "type": "WEB", "url": "https://github.com/go-gitea/gitea/pull/20133" }, { "type": "WEB", "url": "https://github.com/go-gitea/gitea/pull/20196" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2769", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2874.json
{ "schema_version": "1.3.1", "id": "GO-2024-2874", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "GHSA-qjcv-rx3v-7mvj" ], "summary": "Inter-Blockchain Communication (IBC) protocol \"Huckleberry\" vulnerability in github.com/cosmos/ibc-go", "details": "The ibc-go module is affected by the Inter-Blockchain Communication (IBC) protocol \"Huckleberry\" vulnerability. The vulnerability allowed an attacker to send arbitrary transactions onto target chains and trigger arbitrary state transitions, including but not limited to, theft of funds. It was possible to exploit this vulnerability in specific situations involving relaying packets in which the source chain is also the final destination chain. Affected networks are those that allow for fee grant capabilities and use a native Relayer (e.g., Osmosis and Juno).", "affected": [ { "package": { "name": "github.com/cosmos/ibc-go", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/cosmos/ibc-go/v2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/cosmos/ibc-go/v3", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/cosmos/ibc-go/v4", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/cosmos/ibc-go/v5", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/cosmos/ibc-go/v6", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} }, { "package": { "name": "github.com/cosmos/ibc-go/v7", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "7.0.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/cosmos/ibc-go/v7/modules/core/04-channel/keeper", "symbols": [ "Keeper.UnreceivedPackets" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/cosmos/ibc-go/commit/c77f80f812940fe3b93980d13a5cdd6980e907cc" }, { "type": "REPORT", "url": "https://github.com/cosmos/ibc-go/issues/1532" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2874", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0085.json
{ "schema_version": "1.3.1", "id": "GO-2021-0085", "modified": "0001-01-01T00:00:00Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2019-16884", "GHSA-fgv8-vj5c-2ppq" ], "summary": "Authorization bypass in github.com/opencontainers/runc", "details": "AppArmor restrictions may be bypassed due to improper validation of mount targets, allowing a malicious image to mount volumes over e.g. /proc.", "affected": [ { "package": { "name": "github.com/opencontainers/runc", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.0.0-rc8.0.20190930145003-cad42f6e0932" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/opencontainers/runc/libcontainer/apparmor", "symbols": [ "ApplyProfile" ] }, { "path": "github.com/opencontainers/runc/libcontainer/utils", "symbols": [ "CloseExecFrom" ] } ] } }, { "package": { "name": "github.com/opencontainers/selinux", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.3.1-0.20190929122143-5215b1806f52" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/opencontainers/selinux/go-selinux", "symbols": [ "readCon", "writeCon" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/opencontainers/runc/pull/2130" }, { "type": "FIX", "url": "https://github.com/opencontainers/runc/commit/cad42f6e0932db0ce08c3a3d9e89e6063ec283e4" }, { "type": "FIX", "url": "https://github.com/opencontainers/selinux/commit/03b517dc4fd57245b1cf506e8ba7b817b6d309da" }, { "type": "WEB", "url": "https://github.com/opencontainers/runc/issues/2128" } ], "credits": [ { "name": "Leopold Schabel" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0085", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0058.json
{ "schema_version": "1.3.1", "id": "GO-2021-0058", "modified": "0001-01-01T00:00:00Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2020-27846", "GHSA-4hq8-gmxx-h6w9" ], "summary": "Signature validation bypass due to XML processing error in github.com/crewjam/saml", "details": "Due to the behavior of encoding/xml, a crafted XML document may cause XML Digital Signature validation to be entirely bypassed, causing an unsigned document to appear signed.", "affected": [ { "package": { "name": "github.com/crewjam/saml", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.4.3" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/crewjam/saml", "symbols": [ "IdentityProvider.ServeSSO", "IdpAuthnRequest.Validate", "ServiceProvider.ParseResponse", "ServiceProvider.ParseXMLResponse", "ServiceProvider.ValidateLogoutResponseForm", "ServiceProvider.ValidateLogoutResponseRedirect", "ServiceProvider.ValidateLogoutResponseRequest" ] }, { "path": "github.com/crewjam/saml/samlidp", "symbols": [ "Server.HandlePutService", "getSPMetadata" ] }, { "path": "github.com/crewjam/saml/samlsp", "symbols": [ "FetchMetadata", "Middleware.ServeHTTP", "New", "ParseMetadata" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/crewjam/saml/commit/da4f1a0612c0a8dd0452cf8b3c7a6518f6b4d053" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0058", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1546.json
{ "schema_version": "1.3.1", "id": "GO-2023-1546", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-25151", "GHSA-5r5m-65gx-7vrh" ], "related": [ "CVE-2022-21698", "CVE-2023-45142", "GHSA-cg3q-j54f-5p7p", "GHSA-rcjv-mgp8-qvmr" ], "summary": "Denial of service in go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp", "details": "The otelhttp package of opentelemetry-go-contrib is vulnerable to a denial-of-service attack.\n\nThe otelhttp package uses the httpconv.ServerRequest function to annotate metric measurements for the http.server.request_content_length, http.server.response_content_length, and http.server.duration instruments. The ServerRequest function sets the http.target attribute value to be the whole request URI (including the query string). The metric instruments do not \"forget\" previous measurement attributes when \"cumulative\" temporality is used, meaning that the cardinality of the measurements allocated is directly correlated with the unique URIs handled. If the query string is constantly random, this will result in a constant increase in memory allocation that can be used in a denial-of-service attack.", "affected": [ { "package": { "name": "go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0.38.0" }, { "fixed": "0.39.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp", "symbols": [ "Handler.ServeHTTP" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/open-telemetry/opentelemetry-go-contrib/security/advisories/GHSA-5r5m-65gx-7vrh" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2023-1546", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2599.json
{ "schema_version": "1.3.1", "id": "GO-2024-2599", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2023-45290" ], "summary": "Memory exhaustion in multipart form parsing in net/textproto and net/http", "details": "When parsing a multipart form (either explicitly with Request.ParseMultipartForm or implicitly with Request.FormValue, Request.PostFormValue, or Request.FormFile), limits on the total size of the parsed form were not applied to the memory consumed while reading a single form line. This permits a maliciously crafted input containing very long lines to cause allocation of arbitrarily large amounts of memory, potentially leading to memory exhaustion.\n\nWith fix, the ParseMultipartForm function now correctly limits the maximum size of form lines.", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.21.8" }, { "introduced": "1.22.0-0" }, { "fixed": "1.22.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "net/textproto", "symbols": [ "Reader.ReadCodeLine", "Reader.ReadContinuedLine", "Reader.ReadContinuedLineBytes", "Reader.ReadDotLines", "Reader.ReadLine", "Reader.ReadLineBytes", "Reader.ReadMIMEHeader", "Reader.ReadResponse", "Reader.readContinuedLineSlice", "Reader.readLineSlice" ] } ] } } ], "references": [ { "type": "REPORT", "url": "https://go.dev/issue/65383" }, { "type": "FIX", "url": "https://go.dev/cl/569341" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/5pwGVUPoMbg" } ], "credits": [ { "name": "Bartek Nowotarski" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2599", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2911.json
{ "schema_version": "1.3.1", "id": "GO-2024-2911", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "GHSA-87m9-rv8p-rgmg" ], "summary": "go-grpc-compression has a zstd decompression bombing vulnerability in github.com/mostynb/go-grpc-compression", "details": "go-grpc-compression has a zstd decompression bombing vulnerability in github.com/mostynb/go-grpc-compression", "affected": [ { "package": { "name": "github.com/mostynb/go-grpc-compression", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "1.1.4" }, { "fixed": "1.2.3" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/mostynb/go-grpc-compression/security/advisories/GHSA-87m9-rv8p-rgmg" }, { "type": "FIX", "url": "https://github.com/mostynb/go-grpc-compression/commit/629c44d3acb9624993cc7de629f47d72109e2ce5" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2911", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0233.json
{ "schema_version": "1.3.1", "id": "GO-2022-0233", "modified": "0001-01-01T00:00:00Z", "published": "2022-07-01T20:18:04Z", "aliases": [ "CVE-2021-23409", "GHSA-xcf7-q56x-78gh" ], "summary": "Resource exhaustion in github.com/pires/go-proxyproto", "details": "The PROXY protocol server does not impose a timeout on reading the header from new connections, allowing a malicious client to cause resource exhaustion and a denial of service by opening many connections and sending no data on them.\n\nv0.6.0 of the proxyproto package adds support for a user-defined header timeout. v0.6.1 adds a default timeout of 200ms and v0.6.2 increases the default timeout to 10s.", "affected": [ { "package": { "name": "github.com/pires/go-proxyproto", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.6.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/pires/go-proxyproto", "symbols": [ "Listener.Accept" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/pires/go-proxyproto/pull/74" }, { "type": "FIX", "url": "https://github.com/pires/go-proxyproto/pull/74/commits/cdc63867da24fc609b727231f682670d0d1cd346" }, { "type": "WEB", "url": "https://github.com/pires/go-proxyproto/issues/65" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0233", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2970.json
{ "schema_version": "1.3.1", "id": "GO-2024-2970", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-39931", "GHSA-2vgj-3pvg-xh4w" ], "summary": "Gogs allows deletion of internal files in github.com/gogs/gogs", "details": "Gogs allows deletion of internal files in github.com/gogs/gogs", "affected": [ { "package": { "name": "github.com/gogs/gogs", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": {} } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-2vgj-3pvg-xh4w" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-39931" }, { "type": "WEB", "url": "https://github.com/gogs/gogs/releases" }, { "type": "WEB", "url": "https://www.sonarsource.com/blog/securing-developer-tools-unpatched-code-vulnerabilities-in-gogs-1" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2970", "review_status": "UNREVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-1118.json
{ "schema_version": "1.3.1", "id": "GO-2022-1118", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2022-39199", "GHSA-6cqj-6969-p57x" ], "summary": "Improper validation of UUIDs in github.com/codenotary/immudb", "details": "A malicious server can trick a client into treating it as a different server by changing the reported UUID.\n\nimmudb client SDKs use the server's UUID to distinguish between different server instance so that the client can connect to different immudb instances and keep the state for multiple servers. The SDK does not validate this UUID and accepts any value reported by the server. A malicious server can therefore change the reported UUID and trick the client into treating it as a different server.", "affected": [ { "package": { "name": "github.com/codenotary/immudb", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.4.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/codenotary/immudb/pkg/client", "symbols": [ "DefaultOptions", "NewClient", "NewImmuClient", "immuClient.OpenSession" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/codenotary/immudb/security/advisories/GHSA-6cqj-6969-p57x" }, { "type": "FIX", "url": "https://github.com/codenotary/immudb/commit/cade04756ff3f0a3b9e8d24149062744574adf5d" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-1118", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0318.json
{ "schema_version": "1.3.1", "id": "GO-2022-0318", "modified": "0001-01-01T00:00:00Z", "published": "2022-08-01T22:20:42Z", "aliases": [ "CVE-2022-23773" ], "summary": "Incorrect access control in the go command in cmd/go/internal/modfetch", "details": "Incorrect access control is possible in the go command.\n\nThe go command can misinterpret branch names that falsely appear to be version tags. This can lead to incorrect access control if an actor is authorized to create branches but not tags.", "affected": [ { "package": { "name": "toolchain", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "1.16.14" }, { "introduced": "1.17.0-0" }, { "fixed": "1.17.7" } ] } ], "ecosystem_specific": { "imports": [ { "path": "cmd/go/internal/modfetch", "symbols": [ "codeRepo.convert", "codeRepo.validatePseudoVersion" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/378400" }, { "type": "FIX", "url": "https://go.googlesource.com/go/+/fa4d9b8e2bc2612960c80474fca83a4c85a974eb" }, { "type": "REPORT", "url": "https://go.dev/issue/35671" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0318", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0316.json
{ "schema_version": "1.3.1", "id": "GO-2022-0316", "modified": "0001-01-01T00:00:00Z", "published": "2022-07-27T20:27:33Z", "aliases": [ "CVE-2022-23628", "GHSA-hcw3-j74m-qc58" ], "summary": "Incorrect calculation in github.com/open-policy-agent/opa", "details": "Pretty-printing an AST that contains synthetic nodes can change the logic of some statements by reordering array literals.", "affected": [ { "package": { "name": "github.com/open-policy-agent/opa", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0.33.1" }, { "fixed": "0.37.2" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/open-policy-agent/opa/format", "symbols": [ "Ast", "MustAst", "Source", "groupIterable" ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/open-policy-agent/opa/security/advisories/GHSA-hcw3-j74m-qc58" }, { "type": "FIX", "url": "https://github.com/open-policy-agent/opa/commit/932e4ffc37a590ace79e9b75ca4340288c220239" }, { "type": "WEB", "url": "https://github.com/open-policy-agent/opa/commit/2bd8edab9e10e2dc9cf76ae8335ced0c224f3055" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0316", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0470.json
{ "schema_version": "1.3.1", "id": "GO-2022-0470", "modified": "0001-01-01T00:00:00Z", "published": "2022-07-15T23:29:55Z", "aliases": [ "CVE-2022-31022", "GHSA-9w9f-6mg8-jp7w" ], "summary": "No access control in github.com/blevesearch/bleve and bleve/v2", "details": "HTTP handlers provide unauthenticated access to the local filesystem.\n\nThe Bleve http package is intended for demonstration purposes and contains no authentication, authorization, or validation of user inputs. Exposing handlers from this package can permit attackers to create files and delete directories.", "affected": [ { "package": { "name": "github.com/blevesearch/bleve", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/blevesearch/bleve/http", "symbols": [ "AliasHandler.ServeHTTP", "CreateIndexHandler.ServeHTTP", "DebugDocumentHandler.ServeHTTP", "DeleteIndexHandler.ServeHTTP", "DocCountHandler.ServeHTTP", "DocDeleteHandler.ServeHTTP", "DocGetHandler.ServeHTTP", "DocIndexHandler.ServeHTTP", "GetIndexHandler.ServeHTTP", "ListFieldsHandler.ServeHTTP", "SearchHandler.ServeHTTP" ] } ] } }, { "package": { "name": "github.com/blevesearch/bleve/v2", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/blevesearch/bleve/v2/http", "symbols": [ "AliasHandler.ServeHTTP", "CreateIndexHandler.ServeHTTP", "DebugDocumentHandler.ServeHTTP", "DeleteIndexHandler.ServeHTTP", "DocCountHandler.ServeHTTP", "DocDeleteHandler.ServeHTTP", "DocGetHandler.ServeHTTP", "DocIndexHandler.ServeHTTP", "GetIndexHandler.ServeHTTP", "ListFieldsHandler.ServeHTTP", "SearchHandler.ServeHTTP" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/blevesearch/bleve/commit/1c7509d6a17d36f265c90b4e8f4e3a3182fe79ff" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0470", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2020-0022.json
{ "schema_version": "1.3.1", "id": "GO-2020-0022", "modified": "0001-01-01T00:00:00Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2014-125026", "GHSA-4wp2-8rm2-jgmh" ], "summary": "Out-of-bounds write in github.com/cloudflare/golz4", "details": "LZ4 bindings use a deprecated C API that is vulnerable to memory corruption, which could lead to arbitrary code execution if called with untrusted user input.", "affected": [ { "package": { "name": "github.com/cloudflare/golz4", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.0.0-20140711154735-199f5f787806" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/cloudflare/golz4", "symbols": [ "Uncompress" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/cloudflare/golz4/commit/199f5f7878062ca17a98e079f2dbe1205e2ed898" }, { "type": "WEB", "url": "https://github.com/cloudflare/golz4/issues/5" } ], "credits": [ { "name": "Yann Collet" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2020-0022", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0154.json
{ "schema_version": "1.3.1", "id": "GO-2021-0154", "modified": "0001-01-01T00:00:00Z", "published": "2022-05-25T21:11:41Z", "aliases": [ "CVE-2014-7189" ], "summary": "Man-in-the-middle attack with SessionTicketsDisabled in crypto/tls", "details": "When SessionTicketsDisabled is enabled, crypto/tls allowed man-in-the-middle attackers to spoof clients via unspecified vectors.\n\nIf the server enables TLS client authentication using certificates (this is rare) and explicitly sets SessionTicketsDisabled to true in the tls.Config, then a malicious client can falsely assert ownership of any client certificate it wishes.", "affected": [ { "package": { "name": "stdlib", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "1.1.0-0" }, { "fixed": "1.3.2" } ] } ], "ecosystem_specific": { "imports": [ { "path": "crypto/tls", "symbols": [ "checkForResumption", "decryptTicket" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://go.dev/cl/148080043" }, { "type": "REPORT", "url": "https://go.dev/issue/53085" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-nuts/c/eeOHNw_shwU/m/OHALUmroA5kJ" } ], "credits": [ { "name": "Go Team" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0154", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0065.json
{ "schema_version": "1.3.1", "id": "GO-2021-0065", "modified": "0001-01-01T00:00:00Z", "published": "2021-04-14T20:04:52Z", "aliases": [ "CVE-2019-11250", "GHSA-jmrx-5g74-6v2f" ], "summary": "Unauthorized credential disclosure in k8s.io/kubernetes and k8s.io/client-go", "details": "Authorization tokens may be inappropriately logged if the verbosity level is set to a debug level.", "affected": [ { "package": { "name": "k8s.io/client-go", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.17.0" } ] } ], "ecosystem_specific": { "imports": [ { "path": "k8s.io/client-go/transport", "symbols": [ "basicAuthRoundTripper.RoundTrip", "bearerAuthRoundTripper.RoundTrip", "debuggingRoundTripper.RoundTrip", "impersonatingRoundTripper.RoundTrip", "userAgentRoundTripper.RoundTrip" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/kubernetes/kubernetes/pull/81330" }, { "type": "FIX", "url": "https://github.com/kubernetes/kubernetes/commit/4441f1d9c3e94d9a3d93b4f184a591cab02a5245" }, { "type": "WEB", "url": "https://github.com/kubernetes/kubernetes/issues/81114" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2021-0065", "review_status": "REVIEWED" } }
osv
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0230.json
{ "schema_version": "1.3.1", "id": "GO-2022-0230", "modified": "0001-01-01T00:00:00Z", "published": "2022-07-01T20:17:57Z", "aliases": [ "CVE-2021-20206", "GHSA-xjqr-g762-pxwp" ], "summary": "Improper limitation of path name in github.com/containernetworking/cni", "details": "The FindInPath function is vulnerable to directory traversal attacks, potentially permitting attackers to execute arbitrary binaries.\n\nThis function does not sanitize its plugin parameter, so parameter names containing \"../\" or other such elements may reference arbitrary locations on the filesystem.", "affected": [ { "package": { "name": "github.com/containernetworking/cni", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" }, { "fixed": "0.8.1" } ] } ], "ecosystem_specific": { "imports": [ { "path": "github.com/containernetworking/cni/pkg/invoke", "symbols": [ "DelegateAdd", "DelegateCheck", "DelegateDel", "FindInPath", "RawExec.FindInPath" ] } ] } } ], "references": [ { "type": "FIX", "url": "https://github.com/containernetworking/cni/pull/808" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919391" }, { "type": "WEB", "url": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMCONTAINERNETWORKINGCNIPKGINVOKE-1070549" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2022-0230", "review_status": "REVIEWED" } }
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2609.yaml
id: GO-2024-2609 modules: - module: std versions: - fixed: 1.21.8 - introduced: 1.22.0-0 - fixed: 1.22.1 vulnerable_at: 1.22.0 packages: - package: net/mail symbols: - addrParser.consumeGroupList - addrParser.consumePhrase - isAtext derived_symbols: - Address.String - AddressParser.Parse - AddressParser.ParseList - Header.AddressList - ParseAddress - ParseAddressList summary: Comments in display names are incorrectly handled in net/mail description: |- The ParseAddressList function incorrectly handles comments (text within parentheses) within display names. Since this is a misalignment with conforming address parsers, it can result in different trust decisions being made by programs using different parsers. credits: - Juho Nurminen of Mattermost - Slonser (https://github.com/Slonser) references: - report: https://go.dev/issue/65083 - fix: https://go.dev/cl/555596 - web: https://groups.google.com/g/golang-announce/c/5pwGVUPoMbg cve_metadata: id: CVE-2024-24784 cwe: 'CWE-150: Improper Neutralization of Escape, Meta, or Control Sequences' references: - https://security.netapp.com/advisory/ntap-20240329-0007/ - http://www.openwall.com/lists/oss-security/2024/03/08/4 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1187.yaml
id: GO-2022-1187 modules: - module: github.com/go-macaron/i18n versions: - fixed: 0.5.0 vulnerable_at: 0.0.0-20200216154541-326bc77d7eb1 packages: - package: github.com/go-macaron/i18n symbols: - I18n summary: Open redirect vulnerability in github.com/go-macaron/i18n description: A user controlled string could lead to open redirect. cves: - CVE-2020-36627 ghsas: - GHSA-jwrv-x6rx-8vfm references: - web: https://vuldb.com/?id.216745 - fix: https://github.com/go-macaron/i18n/commit/329b0c4844cc16a5a253c011b55180598e707735 - web: https://github.com/go-macaron/i18n/releases/tag/v0.5.0 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2701.yaml
id: GO-2024-2701 modules: - module: github.com/stacklok/minder versions: - introduced: 0.0.39 - fixed: 0.0.40 vulnerable_at: 0.0.39 summary: Minder GetRepositoryByName data leak in github.com/stacklok/minder cves: - CVE-2024-31455 ghsas: - GHSA-ggp5-28x4-xcj9 references: - advisory: https://github.com/stacklok/minder/security/advisories/GHSA-ggp5-28x4-xcj9 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-31455 - fix: https://github.com/stacklok/minder/commit/11b6573ad62cfdd783a8bb52f3fce461466037f4 - fix: https://github.com/stacklok/minder/commit/5c381cfbf3e4b7ce040ed8511a1fae1a78a0014b - fix: https://github.com/stacklok/minder/pull/2941 source: id: GHSA-ggp5-28x4-xcj9 created: 2024-05-17T16:13:47.983144-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0049.yaml
id: GO-2020-0049 modules: - module: github.com/justinas/nosurf versions: - fixed: 1.1.1 vulnerable_at: 1.1.0 packages: - package: github.com/justinas/nosurf symbols: - VerifyToken - verifyToken derived_symbols: - CSRFHandler.ServeHTTP summary: Improper input validation in github.com/justinas/nosurf description: |- Due to improper validation of caller input, validation is silently disabled if the provided expected token is malformed, causing any user supplied token to be considered valid. published: 2021-04-14T20:04:52Z ghsas: - GHSA-5x84-q523-vvwr credits: - '@aeneasr' references: - fix: https://github.com/justinas/nosurf/pull/60 - fix: https://github.com/justinas/nosurf/commit/4d86df7a4affa1fa50ab39fb09aac56c3ce9c314 cve_metadata: id: CVE-2020-36564 cwe: 'CWE 345: Insufficient Verification of Data Authenticity' review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0258.yaml
id: GO-2021-0258 modules: - module: github.com/pomerium/pomerium versions: - fixed: 0.15.6 vulnerable_at: 0.15.5 packages: - package: github.com/pomerium/pomerium/internal/identity/manager symbols: - Manager.onUpdateRecords derived_symbols: - Manager.Run - Manager.RunLeased summary: Incorrect authorization in github.com/pomerium/pomerium description: |- Pomerium is an open source identity-aware access proxy. Changes to the OIDC claims of a user after initial login are not reflected in policy evaluation when using allowed_idp_claims as part of policy. If using allowed_idp_claims and a user's claims are changed, Pomerium can make incorrect authorization decisions. For users unable to upgrade clear data on databroker service by clearing redis or restarting the in-memory databroker to force claims to be updated. published: 2022-01-14T17:30:31Z cves: - CVE-2021-41230 ghsas: - GHSA-j6wp-3859-vxfg references: - fix: https://github.com/pomerium/pomerium/pull/2724 - fix: https://github.com/pomerium/pomerium/commit/f20542c4bf2cc691e4c324f7ec79e02e46d95511 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2898.yaml
id: GO-2024-2898 modules: - module: github.com/argoproj/argo-cd versions: - introduced: 0.11.0 vulnerable_at: 1.8.6 - module: github.com/argoproj/argo-cd/v2 versions: - fixed: 2.9.17 - introduced: 2.10.0 - fixed: 2.10.12 - introduced: 2.11.0 - fixed: 2.11.3 vulnerable_at: 2.11.2 summary: Argo-cd authenticated users can enumerate clusters by name in github.com/argoproj/argo-cd cves: - CVE-2024-36106 ghsas: - GHSA-3cqf-953p-h5cp unknown_aliases: - BIT-argo-cd-2024-36106 references: - advisory: https://github.com/argoproj/argo-cd/security/advisories/GHSA-3cqf-953p-h5cp - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-36106 - fix: https://github.com/argoproj/argo-cd/commit/c2647055c261a550e5da075793260f6524e65ad9 source: id: GHSA-3cqf-953p-h5cp created: 2024-06-27T15:55:03.407268-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2813.yaml
id: GO-2024-2813 modules: - module: github.com/jub0bs/cors versions: - fixed: 0.1.3 vulnerable_at: 0.1.2 packages: - package: github.com/jub0bs/cors/internal/origins/radix symbols: - Tree.Contains - Tree.Insert summary: Some CORS middleware allow untrusted origins in github.com/jub0bs/cors description: |- Some CORS middleware (more specifically those created by specifying two or more origin patterns whose hosts share a proper suffix) incorrectly allow some untrusted origins, thereby opening the door to cross-origin attacks from the untrusted origins in question. For example, specifying origin patterns "https://foo.com" and "https://bar.com" (in that order) would yield a middleware that would incorrectly allow untrusted origin "https://barfoo.com". ghsas: - GHSA-vhxv-fg4m-p2w8 related: - GHSA-v84h-653v-4pq9 references: - advisory: https://github.com/jub0bs/cors/security/advisories/GHSA-vhxv-fg4m-p2w8 - fix: https://github.com/jub0bs/cors/commit/63900fa1776237095fa0ed47ff85791e21f3a7d7 source: id: GHSA-vhxv-fg4m-p2w8 created: 2024-05-20T16:46:53.79904-04:00 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2648.yaml
id: GO-2024-2648 modules: - module: github.com/go-vela/server versions: - fixed: 0.23.2 vulnerable_at: 0.23.1 summary: Server/API for Vela Insecure Variable Substitution in github.com/go-vela/server ghsas: - GHSA-69p4-j5v5-x234 references: - advisory: https://github.com/go-vela/server/security/advisories/GHSA-69p4-j5v5-x234 - fix: https://github.com/go-vela/server/commit/a645c822da1d91e1f4159b69685224232683bebb source: id: GHSA-69p4-j5v5-x234 created: 2024-05-17T16:14:32.195885-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0230.yaml
id: GO-2022-0230 modules: - module: github.com/containernetworking/cni versions: - fixed: 0.8.1 vulnerable_at: 0.8.0 packages: - package: github.com/containernetworking/cni/pkg/invoke symbols: - FindInPath derived_symbols: - DelegateAdd - DelegateCheck - DelegateDel - RawExec.FindInPath summary: Improper limitation of path name in github.com/containernetworking/cni description: |- The FindInPath function is vulnerable to directory traversal attacks, potentially permitting attackers to execute arbitrary binaries. This function does not sanitize its plugin parameter, so parameter names containing "../" or other such elements may reference arbitrary locations on the filesystem. published: 2022-07-01T20:17:57Z cves: - CVE-2021-20206 ghsas: - GHSA-xjqr-g762-pxwp references: - fix: https://github.com/containernetworking/cni/pull/808 - web: https://bugzilla.redhat.com/show_bug.cgi?id=1919391 - web: https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMCONTAINERNETWORKINGCNIPKGINVOKE-1070549 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2383.yaml
id: GO-2023-2383 modules: - module: cmd versions: - fixed: 1.20.12 - introduced: 1.21.0-0 - fixed: 1.21.5 vulnerable_at: 1.21.4 packages: - package: cmd/go summary: Command 'go get' may unexpectedly fallback to insecure git in cmd/go description: |- Using go get to fetch a module with the ".git" suffix may unexpectedly fallback to the insecure "git://" protocol if the module is unavailable via the secure "https://" and "git+ssh://" protocols, even if GOINSECURE is not set for said module. This only affects users who are not using the module proxy and are fetching modules directly (i.e. GOPROXY=off). credits: - David Leadbeater references: - web: https://groups.google.com/g/golang-dev/c/6ypN5EjibjM/m/KmLVYH_uAgAJ - report: https://go.dev/issue/63845 - fix: https://go.dev/cl/540257 cve_metadata: id: CVE-2023-45285 cwe: 'CWE-636: Not Failing Securely (''Failing Open'')' references: - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UIU6HOGV6RRIKWM57LOXQA75BGZSIH6G/ review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2947.yaml
id: GO-2024-2947 modules: - module: github.com/hashicorp/go-retryablehttp versions: - fixed: 0.7.7 vulnerable_at: 0.7.6 packages: - package: github.com/hashicorp/go-retryablehttp symbols: - Client.Do derived_symbols: - Client.Get - Client.Head - Client.Post - Client.PostForm - Get - Head - Post - PostForm - RoundTripper.RoundTrip summary: |- Leak of sensitive information to log files in github.com/hashicorp/go-retryablehttp description: |- URLs were not sanitized when writing them to log files. This could lead to writing sensitive HTTP basic auth credentials to the log file. cves: - CVE-2024-6104 ghsas: - GHSA-v6v8-xj6m-xwqh references: - advisory: https://github.com/advisories/GHSA-v6v8-xj6m-xwqh - fix: https://github.com/hashicorp/go-retryablehttp/commit/a99f07beb3c5faaa0a283617e6eb6bcf25f5049a - web: https://discuss.hashicorp.com/t/hcsec-2024-12-go-retryablehttp-can-leak-basic-auth-credentials-to-log-files/68027 source: id: GHSA-v6v8-xj6m-xwqh created: 2024-06-25T10:14:42.391443-07:00 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2659.yaml
id: GO-2024-2659 modules: - module: github.com/docker/docker versions: - introduced: 25.0.0+incompatible - fixed: 25.0.5+incompatible - introduced: 26.0.0-rc1+incompatible - fixed: 26.0.0-rc3+incompatible vulnerable_at: 26.0.0-rc1+incompatible summary: Data exfiltration from internal networks in github.com/docker/docker description: |- dockerd forwards DNS requests to the host loopback device, bypassing the container network namespace's normal routing semantics, networks marked as 'internal' can unexpectedly forward DNS requests to an external nameserver. By registering a domain for which they control the authoritative nameservers, an attacker could arrange for a compromised container to exfiltrate data by encoding it in DNS queries that will eventually be answered by their nameservers. cves: - CVE-2024-29018 ghsas: - GHSA-mq39-4gv4-mvpx credits: - '@robmry' - '@akerouanton' - '@neersighted' - '@gabriellavengeo' references: - advisory: https://github.com/moby/moby/security/advisories/GHSA-mq39-4gv4-mvpx - web: https://github.com/moby/moby/pull/46609 notes: - 23.0.11 is not yet released. It can be added as a fix once it is. review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2955.yaml
id: GO-2024-2955 modules: - module: github.com/gin-contrib/cors versions: - fixed: 1.6.0 vulnerable_at: 1.5.0 packages: - package: github.com/gin-contrib/cors symbols: - Config.parseWildcardRules derived_symbols: - Default - New summary: Gin mishandles a wildcard in the origin string in github.com/gin-contrib/cors description: |- Gin-Gonic CORS middleware mishandles a wildcard at the end of an origin string. Examples: https://example.community/* is accepted by the origin string https://example.com/* and http://localhost.example.com/* is accepted by the origin string http://localhost/* . cves: - CVE-2019-25211 ghsas: - GHSA-869c-j7wc-8jqv credits: - '@maxshine' references: - advisory: https://github.com/advisories/GHSA-869c-j7wc-8jqv - fix: https://github.com/gin-contrib/cors/commit/27b723a473efd80d5a498fa9f5933c80204c850d - fix: https://github.com/gin-contrib/cors/pull/106 - fix: https://github.com/gin-contrib/cors/pull/57 - web: https://github.com/gin-contrib/cors/compare/v1.5.0...v1.6.0 - web: https://github.com/gin-contrib/cors/releases/tag/v1.6.0 source: id: GHSA-869c-j7wc-8jqv created: 2024-07-02T10:00:03.105364-07:00 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2469.yaml
id: GO-2024-2469 modules: - module: github.com/kudelskisecurity/crystals-go versions: - fixed: 0.0.0-20240116172146-2a6ca2d4e64d vulnerable_at: 0.0.0-20240110153620-c06ce985b2b8 packages: - package: github.com/kudelskisecurity/crystals-go/crystals-kyber symbols: - Kyber.Decrypt - Kyber.Encaps - Kyber.Decaps summary: Kyberslash timing attack possible in github.com/kudelskisecurity/crystals-go ghsas: - GHSA-f6jh-hvg2-9525 references: - advisory: https://github.com/kudelskisecurity/crystals-go/security/advisories/GHSA-f6jh-hvg2-9525 - fix: https://github.com/kudelskisecurity/crystals-go/pull/20 - fix: https://github.com/kudelskisecurity/crystals-go/pull/21 - report: https://github.com/kudelskisecurity/crystals-go/issues/19 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2614.yaml
id: GO-2024-2614 modules: - module: github.com/IceWhaleTech/CasaOS-UserService versions: - introduced: 0.4.4-3-alpha1 - fixed: 0.4.7 vulnerable_at: 0.4.6-alpha3 packages: - package: github.com/IceWhaleTech/CasaOS-UserService/route/v1 symbols: - PostUserLogin summary: Password brute force attack in github.com/IceWhaleTech/CasaOS-UserService description: |- The CasaOS web application does not have protection against password brute force attacks. An attacker can use a password brute force attack to find and gain full access to the server. This vulnerability allows attackers to get super user-level access over the server. cves: - CVE-2024-24767 ghsas: - GHSA-c69x-5xmw-v44x credits: - DrDark1999 references: - advisory: https://github.com/IceWhaleTech/CasaOS-UserService/security/advisories/GHSA-c69x-5xmw-v44x - fix: https://github.com/IceWhaleTech/CasaOS-UserService/commit/62006f61b55951048dbace4ebd9e483274838699 - web: https://github.com/IceWhaleTech/CasaOS-UserService/releases/tag/v0.4.7 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2852.yaml
id: GO-2024-2852 modules: - module: github.com/grafana/grafana non_go_versions: - introduced: 5.3.0 - fixed: 8.3.10 - introduced: 8.4.0 - fixed: 8.4.10 - introduced: 8.5.0 - fixed: 8.5.9 - introduced: 9.0.0 - fixed: 9.0.3 vulnerable_at: 5.4.5+incompatible summary: Grafana account takeover via OAuth vulnerability in github.com/grafana/grafana cves: - CVE-2022-31107 ghsas: - GHSA-mx47-6497-3fv2 unknown_aliases: - BIT-grafana-2022-31107 references: - advisory: https://github.com/grafana/grafana/security/advisories/GHSA-mx47-6497-3fv2 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2022-31107 - web: https://grafana.com/docs/grafana/next/release-notes/release-notes-8-4-10 - web: https://grafana.com/docs/grafana/next/release-notes/release-notes-8-5-9 - web: https://grafana.com/docs/grafana/next/release-notes/release-notes-9-0-3 - web: https://security.netapp.com/advisory/ntap-20220901-0010 source: id: GHSA-mx47-6497-3fv2 created: 2024-06-26T14:07:05.767763-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2760.yaml
id: GO-2024-2760 modules: - module: github.com/rancher/rancher non_go_versions: - fixed: 2.4.18 - introduced: 2.5.0 - fixed: 2.5.12 - introduced: 2.6.0 - fixed: 2.6.3 vulnerable_at: 1.6.30 summary: |- Rancher's Failure to delete orphaned role bindings does not revoke project level access from group based authentication in github.com/rancher/rancher cves: - CVE-2021-36775 ghsas: - GHSA-28g7-896h-695v references: - advisory: https://github.com/rancher/rancher/security/advisories/GHSA-28g7-896h-695v - advisory: https://nvd.nist.gov/vuln/detail/CVE-2021-36775 - web: https://bugzilla.suse.com/show_bug.cgi?id=1189120 source: id: GHSA-28g7-896h-695v created: 2024-06-04T15:29:05.58925-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0438.yaml
id: GO-2022-0438 modules: - module: github.com/hashicorp/go-getter versions: - fixed: 1.5.11 vulnerable_at: 1.5.10 packages: - package: github.com/hashicorp/go-getter symbols: - RedactURL derived_symbols: - Client.ChecksumFromFile - Client.Get - FolderStorage.Get - Get - GetAny - GetFile - HttpGetter.Get summary: Exposure of sensitive information via log file in github.com/hashicorp/go-getter description: |- The getter package can write SSH credentials to its logfile, exposing credentials to local users able to read the logfile. published: 2022-07-01T20:07:52Z cves: - CVE-2022-29810 ghsas: - GHSA-27rq-4943-qcwp references: - fix: https://github.com/hashicorp/go-getter/pull/348 - fix: https://github.com/hashicorp/go-getter/commit/36b68b2f68a3ed10ee7ecbb0cb9f6b1dc5da49cc - web: https://github.com/hashicorp/go-getter/releases/tag/v1.5.11 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2722.yaml
id: GO-2024-2722 modules: - module: github.com/traefik/traefik vulnerable_at: 1.7.34 - module: github.com/traefik/traefik/v2 versions: - fixed: 2.11.2 vulnerable_at: 2.11.1 - module: github.com/traefik/traefik/v3 versions: - introduced: 3.0.0-beta3 - fixed: 3.0.0-rc5 vulnerable_at: 3.0.0-rc4 summary: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik cves: - CVE-2024-28869 ghsas: - GHSA-4vwx-54mw-vqfw references: - advisory: https://github.com/traefik/traefik/security/advisories/GHSA-4vwx-54mw-vqfw - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-28869 - fix: https://github.com/traefik/traefik/commit/240b83b77351dfd8cadb91c305b84e9d22e0f9c6 - web: https://doc.traefik.io/traefik/routing/entrypoints/#respondingtimeouts - web: https://github.com/traefik/traefik/releases/tag/v2.11.2 - web: https://github.com/traefik/traefik/releases/tag/v3.0.0-rc5 source: id: GHSA-4vwx-54mw-vqfw created: 2024-06-26T14:00:53.030675-04:00 review_status: UNREVIEWED