repo_id
stringclasses 927
values | file_path
stringlengths 99
214
| content
stringlengths 2
4.15M
|
|---|---|---|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-2115.json
|
{
"schema_version": "1.3.1",
"id": "GO-2023-2115",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2023-45128",
"GHSA-94w9-97p3-p368"
],
"summary": "CSRF token reuse vulnerability in github.com/gofiber/fiber/v2",
"details": "A cross-site request forgery vulnerability in this package can allow an attacker to inject arbitrary values and forge malicious requests on behalf of a user. The attacker may inject arbitrary values without any authentication, or perform various malicious actions on behalf of an authenticated user, potentially compromising the security and integrity of the application.\n\nThe vulnerability is caused by improper validation and enforcement of CSRF tokens within the application. For 'safe' methods, the token is extracted from the cookie and saved to storage without further validation or sanitization. In addition, the CSRF token is validated against tokens in storage but not associated with a session, nor by using a Double Submit Cookie Method, allowing for token reuse.",
"affected": [
{
"package": {
"name": "github.com/gofiber/fiber/v2",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "2.50.0"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/gofiber/fiber/v2/middleware/csrf",
"symbols": [
"CsrfFromCookie",
"CsrfFromForm",
"CsrfFromHeader",
"CsrfFromParam",
"CsrfFromQuery",
"New",
"configDefault",
"manager.getRaw",
"manager.setRaw",
"newManager"
]
}
]
}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/gofiber/fiber/security/advisories/GHSA-94w9-97p3-p368"
},
{
"type": "FIX",
"url": "https://github.com/gofiber/fiber/commit/8c3916dbf4ad2ed427d02c6eb63ae8b2fa8f019a"
},
{
"type": "FIX",
"url": "https://github.com/gofiber/fiber/commit/b50d91d58ecdff2a330bf07950244b6c4caf65b1"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2023-2115",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-1040.json
|
{
"schema_version": "1.3.1",
"id": "GO-2022-1040",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2021-21303",
"GHSA-c38g-469g-cmgx"
],
"summary": "Insufficient sanitization of data files in helm.sh/helm/v3",
"details": "Helm does not sanitize all fields read from repository data files. A maliciously crafted data file may contain strings containing arbitrary data. If printed to a terminal, a malicious string could obscure or alter data on the screen.",
"affected": [
{
"package": {
"name": "helm.sh/helm/v3",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "3.0.0"
},
{
"fixed": "3.5.2"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "helm.sh/helm/v3/pkg/chart",
"symbols": [
"Chart.Validate",
"Metadata.Validate"
]
},
{
"path": "helm.sh/helm/v3/pkg/plugin",
"symbols": [
"FindPlugins",
"LoadAll",
"LoadDir",
"validatePluginData"
]
},
{
"path": "helm.sh/helm/v3/pkg/repo",
"symbols": [
"ChartRepository.DownloadIndexFile",
"ChartRepository.Index",
"ChartRepository.Load",
"FindChartInAuthAndTLSRepoURL",
"FindChartInAuthRepoURL",
"FindChartInRepoURL",
"IndexDirectory",
"IndexFile.Add",
"LoadIndexFile",
"loadIndex"
]
}
]
}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/advisories/GHSA-c38g-469g-cmgx"
},
{
"type": "FIX",
"url": "https://github.com/helm/helm/commit/6ce9ba60b73013857e2e7c73d3f86ed70bc1ac9a"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2022-1040",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2906.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2906",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2024-5138"
],
"summary": "CVE-2024-5138 in github.com/snapcore/snapd",
"details": "CVE-2024-5138 in github.com/snapcore/snapd",
"affected": [
{
"package": {
"name": "github.com/snapcore/snapd",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5138"
},
{
"type": "FIX",
"url": "https://github.com/snapcore/snapd/commit/68ee9c6aa916ab87dbfd9a26030690f2cabf1e14"
},
{
"type": "REPORT",
"url": "https://bugs.launchpad.net/snapd/+bug/2065077"
}
],
"credits": [
{
"name": "Rory McNamara from Snyk Security Labs"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2906",
"review_status": "UNREVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1568.json
|
{
"schema_version": "1.3.1",
"id": "GO-2023-1568",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2022-41722"
],
"summary": "Path traversal on Windows in path/filepath",
"details": "A path traversal vulnerability exists in filepath.Clean on Windows.\n\nOn Windows, the filepath.Clean function could transform an invalid path such as \"a/../c:/b\" into the valid path \"c:\\b\". This transformation of a relative (if invalid) path into an absolute path could enable a directory traversal attack.\n\nAfter fix, the filepath.Clean function transforms this path into the relative (but still invalid) path \".\\c:\\b\".",
"affected": [
{
"package": {
"name": "stdlib",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.19.6"
},
{
"introduced": "1.20.0-0"
},
{
"fixed": "1.20.1"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "path/filepath",
"goos": [
"windows"
],
"symbols": [
"Abs",
"Clean",
"Dir",
"EvalSymlinks",
"Glob",
"IsLocal",
"Join",
"Rel",
"Walk",
"WalkDir"
]
}
]
}
}
],
"references": [
{
"type": "REPORT",
"url": "https://go.dev/issue/57274"
},
{
"type": "FIX",
"url": "https://go.dev/cl/468123"
},
{
"type": "WEB",
"url": "https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E"
}
],
"credits": [
{
"name": "RyotaK (https://ryotak.net)"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2023-1568",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2948.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2948",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2024-6257",
"GHSA-xfhp-jf8p-mh5w"
],
"summary": "Code Execution on Git update in github.com/hashicorp/go-getter",
"details": "A crafted request can execute Git update on an existing maliciously modified Git Configuration. This can potentially lead to arbitrary code execution. When performing a Git operation, the library will try to clone the given repository to a specified destination. Cloning initializes a git config in the provided destination. An attacker may alter the Git config after the cloning step to set an arbitrary Git configuration to achieve code execution.",
"affected": [
{
"package": {
"name": "github.com/hashicorp/go-getter",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.7.5"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/hashicorp/go-getter",
"symbols": [
"Client.ChecksumFromFile",
"Client.Get",
"FolderStorage.Get",
"Get",
"GetAny",
"GetFile",
"GitGetter.Get",
"GitGetter.GetFile",
"GitGetter.clone",
"HttpGetter.Get",
"findRemoteDefaultBranch"
]
}
]
}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/advisories/GHSA-xfhp-jf8p-mh5w"
},
{
"type": "FIX",
"url": "https://github.com/hashicorp/go-getter/commit/268c11cae8cf0d9374783e06572679796abe9ce9"
},
{
"type": "WEB",
"url": "https://discuss.hashicorp.com/t/hcsec-2024-13-hashicorp-go-getter-vulnerable-to-code-execution-on-git-update-via-git-config-manipulation/68081"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2948",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2647.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2647",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"GHSA-4jhj-3gv3-c3gr"
],
"summary": "CLI for Vela Insecure Variable Substitution in github.com/go-vela/cli",
"details": "CLI for Vela Insecure Variable Substitution in github.com/go-vela/cli",
"affected": [
{
"package": {
"name": "github.com/go-vela/cli",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.23.2"
}
]
}
],
"ecosystem_specific": {}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/go-vela/cli/security/advisories/GHSA-4jhj-3gv3-c3gr"
},
{
"type": "FIX",
"url": "https://github.com/go-vela/cli/commit/0349a2060c35722e341bf65a4215592c6c4bc5b4"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2647",
"review_status": "UNREVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2468.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2468",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2022-3328",
"GHSA-cjqf-877p-7m3f"
],
"summary": "snapd Race Condition vulnerability in github.com/snapcore/snapd",
"details": "snapd Race Condition vulnerability in github.com/snapcore/snapd.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/snapcore/snapd before v2.57.6.",
"affected": [
{
"package": {
"name": "github.com/snapcore/snapd",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {
"custom_ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0"
},
{
"fixed": "2.57.6"
}
]
}
]
}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3328"
},
{
"type": "ADVISORY",
"url": "https://github.com/advisories/GHSA-cjqf-877p-7m3f"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3328"
},
{
"type": "FIX",
"url": "https://github.com/snapcore/snapd/commit/21ebc51f00b8a1417888faa2e83a372fd29d0f5e"
},
{
"type": "FIX",
"url": "https://github.com/snapcore/snapd/commit/6226cdc57052f4b7057d92f2e549aa169e35cd2d"
},
{
"type": "FIX",
"url": "https://github.com/snapcore/snapd/pull/12380"
},
{
"type": "WEB",
"url": "https://ubuntu.com/security/notices/USN-5753-1"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2468",
"review_status": "UNREVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2727.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2727",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"GHSA-g8fc-vrcg-8vjg"
],
"summary": "Constellation has pods exposed to peers in VPC in github.com/edgelesssys/constellation",
"details": "Constellation has pods exposed to peers in VPC in github.com/edgelesssys/constellation",
"affected": [
{
"package": {
"name": "github.com/edgelesssys/constellation",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/edgelesssys/constellation/v2",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "2.16.3"
}
]
}
],
"ecosystem_specific": {}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/edgelesssys/constellation/security/advisories/GHSA-g8fc-vrcg-8vjg"
},
{
"type": "WEB",
"url": "https://github.com/cilium/cilium/issues/25626"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2727",
"review_status": "UNREVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0213.json
|
{
"schema_version": "1.3.1",
"id": "GO-2022-0213",
"modified": "0001-01-01T00:00:00Z",
"published": "2022-05-24T20:14:11Z",
"aliases": [
"CVE-2019-17596"
],
"summary": "Panic on invalid DSA public keys in crypto/dsa",
"details": "Invalid DSA public keys can cause a panic in dsa.Verify. In particular, using crypto/x509.Verify on a crafted X.509 certificate chain can lead to a panic, even if the certificates don't chain to a trusted root. The chain can be delivered via a crypto/tls connection to a client, or to a server that accepts and verifies client certificates. net/http clients can be made to crash by an HTTPS server, while net/http servers that accept client certificates will recover the panic and are unaffected.\n\nMoreover, an application might crash invoking crypto/x509.(*CertificateRequest).CheckSignature on an X.509 certificate request, parsing a golang.org/x/crypto/openpgp Entity, or during a golang.org/x/crypto/otr conversation. Finally, a golang.org/x/crypto/ssh client can panic due to a malformed host key, while a server could panic if either PublicKeyCallback accepts a malformed public key, or if IsUserAuthority accepts a certificate with a malformed public key.",
"affected": [
{
"package": {
"name": "stdlib",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.12.11"
},
{
"introduced": "1.13.0-0"
},
{
"fixed": "1.13.2"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "crypto/dsa",
"symbols": [
"Verify"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://go.dev/cl/205441"
},
{
"type": "FIX",
"url": "https://go.googlesource.com/go/+/552987fdbf4c2bc9641016fd323c3ae5d3a0d9a3"
},
{
"type": "REPORT",
"url": "https://go.dev/issue/34960"
},
{
"type": "WEB",
"url": "https://groups.google.com/g/golang-announce/c/lVEm7llp0w0/m/VbafyRkgCgAJ"
}
],
"credits": [
{
"name": "Daniel M"
},
{
"name": "ragona"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2022-0213",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2582.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2582",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2024-27093",
"GHSA-q6h8-4j2v-pjg4"
],
"summary": "Minder trusts client-provided mapping from repo name to upstream ID in github.com/stacklok/minder",
"details": "Minder trusts client-provided mapping from repo name to upstream ID in github.com/stacklok/minder.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/stacklok/minder before v0.20240226.1425.",
"affected": [
{
"package": {
"name": "github.com/stacklok/minder",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {
"custom_ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.20240226.1425"
}
]
}
]
}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/stacklok/minder/security/advisories/GHSA-q6h8-4j2v-pjg4"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27093"
},
{
"type": "FIX",
"url": "https://github.com/stacklok/minder/commit/53868a878e93f29c43437f96dbc990b548e48d1d"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2582",
"review_status": "UNREVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2813.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2813",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"GHSA-vhxv-fg4m-p2w8"
],
"related": [
"GHSA-v84h-653v-4pq9"
],
"summary": "Some CORS middleware allow untrusted origins in github.com/jub0bs/cors",
"details": "Some CORS middleware (more specifically those created by specifying two or more origin patterns whose hosts share a proper suffix) incorrectly allow some untrusted origins, thereby opening the door to cross-origin attacks from the untrusted origins in question.\n\nFor example, specifying origin patterns \"https://foo.com\" and \"https://bar.com\" (in that order) would yield a middleware that would incorrectly allow untrusted origin \"https://barfoo.com\".",
"affected": [
{
"package": {
"name": "github.com/jub0bs/cors",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.1.3"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/jub0bs/cors/internal/origins/radix",
"symbols": [
"Tree.Contains",
"Tree.Insert"
]
}
]
}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/jub0bs/cors/security/advisories/GHSA-vhxv-fg4m-p2w8"
},
{
"type": "FIX",
"url": "https://github.com/jub0bs/cors/commit/63900fa1776237095fa0ed47ff85791e21f3a7d7"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2813",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2860.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2860",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"GHSA-f6mm-5fc7-3g3c"
],
"summary": "goreleaser shows environment by default in github.com/goreleaser/goreleaser",
"details": "goreleaser shows environment by default in github.com/goreleaser/goreleaser",
"affected": [
{
"package": {
"name": "github.com/goreleaser/goreleaser",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "1.26.0"
},
{
"fixed": "1.26.1"
}
]
}
],
"ecosystem_specific": {}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/goreleaser/goreleaser/security/advisories/GHSA-f6mm-5fc7-3g3c"
},
{
"type": "FIX",
"url": "https://github.com/goreleaser/goreleaser/commit/22f734e41f7a5111a031a3a4eb714c1b6aa6456b"
},
{
"type": "FIX",
"url": "https://github.com/goreleaser/goreleaser/pull/4787"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2860",
"review_status": "UNREVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2515.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2515",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2020-13430",
"GHSA-7m2x-qhrq-rp8h"
],
"summary": "Grafana XSS via the OpenTSDB datasource in github.com/grafana/grafana",
"details": "Grafana XSS via the OpenTSDB datasource in github.com/grafana/grafana.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/grafana/grafana before v7.0.0.",
"affected": [
{
"package": {
"name": "github.com/grafana/grafana",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {
"custom_ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0"
},
{
"fixed": "7.0.0"
}
]
}
]
}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/advisories/GHSA-7m2x-qhrq-rp8h"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13430"
},
{
"type": "FIX",
"url": "https://github.com/grafana/grafana/pull/24539"
},
{
"type": "WEB",
"url": "https://github.com/grafana/grafana/releases/tag/v7.0.0"
},
{
"type": "WEB",
"url": "https://security.netapp.com/advisory/ntap-20200528-0003"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2515",
"review_status": "UNREVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2801.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2801",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2024-33522",
"GHSA-6362-gv4m-53ww"
],
"summary": "Calico privilege escalation vulnerability in github.com/projectcalico/calico",
"details": "Calico privilege escalation vulnerability in github.com/projectcalico/calico.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/projectcalico/calico before v3.26.5, from v3.27.0 before v3.27.3.",
"affected": [
{
"package": {
"name": "github.com/projectcalico/calico",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {
"custom_ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0"
},
{
"fixed": "3.26.5"
},
{
"introduced": "3.27.0"
},
{
"fixed": "3.27.3"
}
]
}
]
}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/advisories/GHSA-6362-gv4m-53ww"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-33522"
},
{
"type": "FIX",
"url": "https://github.com/projectcalico/calico/pull/8447"
},
{
"type": "FIX",
"url": "https://github.com/projectcalico/calico/pull/8517"
},
{
"type": "REPORT",
"url": "https://github.com/projectcalico/calico/issues/7981"
},
{
"type": "WEB",
"url": "https://www.tigera.io/security-bulletins-tta-2024-001"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2801",
"review_status": "UNREVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2589.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2589",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2024-24988",
"GHSA-6mx3-9qfh-77gj"
],
"summary": "Mattermost denial of service through long emoji value in github.com/mattermost/mattermost-server",
"details": "Mattermost denial of service through long emoji value in github.com/mattermost/mattermost-server.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/mattermost/mattermost/server/v8 before v8.1.9.",
"affected": [
{
"package": {
"name": "github.com/mattermost/mattermost-server",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "9.2.0+incompatible"
},
{
"fixed": "9.2.5+incompatible"
},
{
"introduced": "9.3.0+incompatible"
},
{
"fixed": "9.3.1+incompatible"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/mattermost/mattermost-server/v5",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/mattermost/mattermost-server/v6",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/mattermost/mattermost/server/v8",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {
"custom_ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0"
},
{
"fixed": "8.1.9"
}
]
}
]
}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/advisories/GHSA-6mx3-9qfh-77gj"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-24988"
},
{
"type": "WEB",
"url": "https://mattermost.com/security-updates"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2589",
"review_status": "UNREVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2933.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2933",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2024-5899"
],
"summary": "Improper trust check in Bazel Build intellij plugin in github.com/bazelbuild/intellij",
"details": "Improper trust check in Bazel Build intellij plugin in github.com/bazelbuild/intellij",
"affected": [
{
"package": {
"name": "github.com/bazelbuild/intellij",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-5899"
},
{
"type": "WEB",
"url": "https://github.com/bazelbuild/intellij/releases/tag/v2024.06.04-aswb-stable"
},
{
"type": "WEB",
"url": "https://github.com/bazelbuild/intellij/security/advisories/GHSA-hh9f-wmhw-46vg"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2933",
"review_status": "UNREVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-2400.json
|
{
"schema_version": "1.3.1",
"id": "GO-2023-2400",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2023-50424",
"GHSA-92cg-ghq6-9587",
"GHSA-m8rw-rcpq-2vp2"
],
"summary": "Escalation of privileges in github.com/sap/cloud-security-client-go",
"details": "An unauthenticated attacker can obtain arbitrary permissions within the application under certain conditions.",
"affected": [
{
"package": {
"name": "github.com/sap/cloud-security-client-go",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.17.0"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/sap/cloud-security-client-go/auth",
"symbols": [
"Middleware.Authenticate",
"Middleware.AuthenticateWithProofOfPossession",
"matchesDomain"
]
},
{
"path": "github.com/sap/cloud-security-client-go/oidcclient",
"symbols": [
"NewOIDCTenant",
"OIDCTenant.GetJWKs",
"OIDCTenant.getJWKsFromServer",
"OIDCTenant.performDiscovery"
]
},
{
"path": "github.com/sap/cloud-security-client-go/tokenclient",
"symbols": [
"TokenFlows.ClientCredentials"
]
}
]
}
}
],
"references": [
{
"type": "WEB",
"url": "https://me.sap.com/notes/3411067"
},
{
"type": "WEB",
"url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"
},
{
"type": "WEB",
"url": "https://blogs.sap.com/2023/12/12/unveiling-critical-security-updates-sap-btp-security-note-3411067/"
},
{
"type": "ADVISORY",
"url": "https://github.com/SAP/cloud-security-services-integration-library/security/advisories/GHSA-59c9-pxq8-9c73"
},
{
"type": "FIX",
"url": "https://github.com/SAP/cloud-security-client-go/commit/2e3bd63e152e09f267316a1071034eb5d4b7f498"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2023-2400",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0110.json
|
{
"schema_version": "1.3.1",
"id": "GO-2021-0110",
"modified": "0001-01-01T00:00:00Z",
"published": "2021-07-28T18:08:05Z",
"aliases": [
"CVE-2020-15222",
"GHSA-v3q9-2p3m-7g43"
],
"summary": "Token reuse in github.com/ory/fosite",
"details": "Uniqueness of JWT IDs (jti) are not checked, allowing the JWT to be replayed.",
"affected": [
{
"package": {
"name": "github.com/ory/fosite",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.31.0"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/ory/fosite",
"symbols": [
"Fosite.AuthenticateClient",
"Fosite.NewAccessRequest",
"Fosite.NewRevocationRequest"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://github.com/ory/fosite/commit/0c9e0f6d654913ad57c507dd9a36631e1858a3e9"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2021-0110",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2508.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2508",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2020-35177",
"GHSA-rpgp-9hmg-j25x"
],
"summary": "Enumeration of users in HashiCorp Vault in github.com/hashicorp/vault",
"details": "Enumeration of users in HashiCorp Vault in github.com/hashicorp/vault",
"affected": [
{
"package": {
"name": "github.com/hashicorp/vault",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "1.5.0"
},
{
"fixed": "1.5.6"
},
{
"introduced": "1.6.0"
},
{
"fixed": "1.6.1"
}
]
}
],
"ecosystem_specific": {}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/advisories/GHSA-rpgp-9hmg-j25x"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-35177"
},
{
"type": "FIX",
"url": "https://github.com/hashicorp/vault/pull/10537"
},
{
"type": "WEB",
"url": "https://discuss.hashicorp.com/t/hcsec-2020-25-vault-s-ldap-auth-method-allows-user-enumeration/18984"
},
{
"type": "WEB",
"url": "https://github.com/hashicorp/vault/blob/master/CHANGELOG.md#161"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2508",
"review_status": "UNREVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2432.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2432",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2023-46739",
"GHSA-8579-7p32-f398"
],
"summary": "CubeFS timing attack can leak user passwords in github.com/cubefs/cubefs",
"details": "CubeFS timing attack can leak user passwords in github.com/cubefs/cubefs.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/cubefs/cubefs before v3.3.1.",
"affected": [
{
"package": {
"name": "github.com/cubefs/cubefs",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {
"custom_ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0"
},
{
"fixed": "3.3.1"
}
]
}
]
}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cubefs/cubefs/security/advisories/GHSA-8579-7p32-f398"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-46739"
},
{
"type": "FIX",
"url": "https://github.com/cubefs/cubefs/commit/6a0d5fa45a77ff20c752fa9e44738bf5d86c84bd"
},
{
"type": "FIX",
"url": "https://github.com/cubefs/cubefs/commit/c21d034d2fcd051ffd64afeafc68cbcb39d26551"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2432",
"review_status": "UNREVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2646.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2646",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2024-28175",
"GHSA-jwv5-8mqv-g387"
],
"summary": "Cross-site scripting on application summary component in github.com/argoproj/argo-cd/v2",
"details": "Due to the improper URL protocols filtering of links specified in the link.argocd.argoproj.io annotations in the application summary component, an attacker can achieve cross-site scripting with elevated permissions. A malicious user to inject a javascript: link in the UI. When clicked by a victim user, the script will execute with the victim's permissions (up to and including admin). This vulnerability allows an attacker to perform arbitrary actions on behalf of the victim via the API, such as creating, modifying, and deleting Kubernetes resources.",
"affected": [
{
"package": {
"name": "github.com/argoproj/argo-cd",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "1.0.0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/argoproj/argo-cd/v2",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "2.0.0"
},
{
"fixed": "2.8.12"
},
{
"introduced": "2.9.0"
},
{
"fixed": "2.9.8"
},
{
"introduced": "2.10.0"
},
{
"fixed": "2.10.3"
}
]
}
],
"ecosystem_specific": {}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-jwv5-8mqv-g387"
},
{
"type": "FIX",
"url": "https://github.com/argoproj/argo-cd/commit/479b5544b57dc9ef767d49f7003f39602c480b71"
}
],
"credits": [
{
"name": "@Ry0taK, @agaudreault, and @crenshaw-dev"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2646",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2020-0008.json
|
{
"schema_version": "1.3.1",
"id": "GO-2020-0008",
"modified": "0001-01-01T00:00:00Z",
"published": "2021-04-14T20:04:52Z",
"aliases": [
"CVE-2019-19794",
"GHSA-44r7-7p62-q3fr"
],
"summary": "Insecure generation of random numbers in github.com/miekg/dns",
"details": "DNS message transaction IDs are generated using math/rand which makes them relatively predictable. This reduces the complexity of response spoofing attacks against DNS clients.",
"affected": [
{
"package": {
"name": "github.com/miekg/dns",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.1.25-0.20191211073109-8ebf2e419df7"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/miekg/dns",
"symbols": [
"Msg.SetAxfr",
"Msg.SetIxfr",
"Msg.SetNotify",
"Msg.SetQuestion",
"Msg.SetUpdate",
"id"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://github.com/miekg/dns/pull/1044"
},
{
"type": "FIX",
"url": "https://github.com/miekg/dns/commit/8ebf2e419df7857ac8919baa05248789a8ffbf33"
},
{
"type": "WEB",
"url": "https://github.com/miekg/dns/issues/1037"
},
{
"type": "WEB",
"url": "https://github.com/miekg/dns/issues/1043"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2020-0008",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2704.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2704",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2023-3518",
"GHSA-9rhf-q362-77mx"
],
"summary": "Consul JWT Auth in L7 Intentions Allow for Mismatched Service Identity and JWT Providers in github.com/hashicorp/consul",
"details": "Consul JWT Auth in L7 Intentions Allow for Mismatched Service Identity and JWT Providers in github.com/hashicorp/consul",
"affected": [
{
"package": {
"name": "github.com/hashicorp/consul",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "1.16.0"
},
{
"fixed": "1.16.1"
}
]
}
],
"ecosystem_specific": {}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/advisories/GHSA-9rhf-q362-77mx"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-3518"
},
{
"type": "WEB",
"url": "https://discuss.hashicorp.com/t/hcsec-2023-25-consul-jwt-auth-in-l7-intentions-allow-for-mismatched-service-identity-and-jwt-providers/57004"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2704",
"review_status": "UNREVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-2375.json
|
{
"schema_version": "1.3.1",
"id": "GO-2023-2375",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2023-45287"
],
"summary": "Before Go 1.20, the RSA based key exchange methods in crypto/tls may exhibit a timing side channel",
"details": "Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits.\n\nIn Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels.",
"affected": [
{
"package": {
"name": "stdlib",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.20.0"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "crypto/tls",
"symbols": [
"Conn.Handshake",
"Conn.HandshakeContext",
"Conn.Read",
"Conn.Write",
"Dial",
"DialWithDialer",
"Dialer.Dial",
"Dialer.DialContext",
"rsaKeyAgreement.generateClientKeyExchange",
"rsaKeyAgreement.processClientKeyExchange"
]
}
]
}
}
],
"references": [
{
"type": "REPORT",
"url": "https://go.dev/issue/20654"
},
{
"type": "FIX",
"url": "https://go.dev/cl/326012/26"
},
{
"type": "WEB",
"url": "https://groups.google.com/g/golang-announce/c/QMK8IQALDvA"
},
{
"type": "ARTICLE",
"url": "https://people.redhat.com/~hkario/marvin/"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2023-2375",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2963.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2963",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2024-24791"
],
"summary": "Denial of service due to improper 100-continue handling in net/http",
"details": "The net/http HTTP/1.1 client mishandled the case where a server responds to a request with an \"Expect: 100-continue\" header with a non-informational (200 or higher) status. This mishandling could leave a client connection in an invalid state, where the next request sent on the connection will fail.\n\nAn attacker sending a request to a net/http/httputil.ReverseProxy proxy can exploit this mishandling to cause a denial of service by sending \"Expect: 100-continue\" requests which elicit a non-informational response from the backend. Each such request leaves the proxy with an invalid connection, and causes one subsequent request using that connection to fail.",
"affected": [
{
"package": {
"name": "stdlib",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.21.12"
},
{
"introduced": "1.22.0-0"
},
{
"fixed": "1.22.5"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "net/http",
"symbols": [
"Client.CloseIdleConnections",
"Client.Do",
"Client.Get",
"Client.Head",
"Client.Post",
"Client.PostForm",
"Get",
"Head",
"Post",
"PostForm",
"Transport.CancelRequest",
"Transport.CloseIdleConnections",
"Transport.RoundTrip",
"persistConn.readResponse"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://go.dev/cl/591255"
},
{
"type": "REPORT",
"url": "https://go.dev/issue/67555"
},
{
"type": "WEB",
"url": "https://groups.google.com/g/golang-dev/c/t0rK-qHBqzY/m/6MMoAZkMAgAJ"
}
],
"credits": [
{
"name": "Geoff Franks"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2963",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2877.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2877",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2024-31989",
"GHSA-9766-5277-j5hr"
],
"summary": "ArgoCD Vulnerable to Use of Risky or Missing Cryptographic Algorithms in Redis Cache in github.com/argoproj/argo-cd",
"details": "ArgoCD Vulnerable to Use of Risky or Missing Cryptographic Algorithms in Redis Cache in github.com/argoproj/argo-cd",
"affected": [
{
"package": {
"name": "github.com/argoproj/argo-cd",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/argoproj/argo-cd/v2",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "2.8.19"
},
{
"introduced": "2.9.0-rc1"
},
{
"fixed": "2.9.15"
},
{
"introduced": "2.10.0-rc1"
},
{
"fixed": "2.10.10"
},
{
"introduced": "2.11.0-rc1"
},
{
"fixed": "2.11.1"
}
]
}
],
"ecosystem_specific": {}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-9766-5277-j5hr"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31989"
},
{
"type": "FIX",
"url": "https://github.com/argoproj/argo-cd/commit/2de0ceade243039c120c28374016c04ff9590d1d"
},
{
"type": "FIX",
"url": "https://github.com/argoproj/argo-cd/commit/35a7d6c7fa1534aceba763d6a68697f36c12e678"
},
{
"type": "FIX",
"url": "https://github.com/argoproj/argo-cd/commit/4e2fe302c3352a0012ecbe7f03476b0e07f7fc6c"
},
{
"type": "FIX",
"url": "https://github.com/argoproj/argo-cd/commit/53570cbd143bced49d4376d6e31bd9c7bd2659ff"
},
{
"type": "FIX",
"url": "https://github.com/argoproj/argo-cd/commit/6ef7b62a0f67e74b4aac2aee31c98ae49dd95d12"
},
{
"type": "FIX",
"url": "https://github.com/argoproj/argo-cd/commit/9552034a80070a93a161bfa330359585f3b85f07"
},
{
"type": "FIX",
"url": "https://github.com/argoproj/argo-cd/commit/bdd889d43969ba738ddd15e1f674d27964048994"
},
{
"type": "FIX",
"url": "https://github.com/argoproj/argo-cd/commit/f1a449e83ee73f8f14d441563b6a31b504f8d8b0"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2877",
"review_status": "UNREVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2458.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2458",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2023-6476",
"GHSA-p4rx-7wvg-fwrc"
],
"summary": "CRI-O's pods can break out of resource confinement on cgroupv2 in github.com/cri-o/cri-o",
"details": "CRI-O's pods can break out of resource confinement on cgroupv2 in github.com/cri-o/cri-o",
"affected": [
{
"package": {
"name": "github.com/cri-o/cri-o",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.27.3"
},
{
"introduced": "1.28.0"
},
{
"fixed": "1.28.3"
},
{
"introduced": "1.29.0"
},
{
"fixed": "1.29.1"
}
]
}
],
"ecosystem_specific": {}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cri-o/cri-o/security/advisories/GHSA-p4rx-7wvg-fwrc"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6476"
},
{
"type": "FIX",
"url": "https://github.com/cri-o/cri-o/commit/75effcb1a25851a736e82dba1f7d8cee93ee159e"
},
{
"type": "FIX",
"url": "https://github.com/cri-o/cri-o/pull/4479"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2024:0195"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2024:0207"
},
{
"type": "WEB",
"url": "https://access.redhat.com/security/cve/CVE-2023-6476"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253994"
},
{
"type": "WEB",
"url": "https://github.com/cri-o/cri-o/blob/main/pkg/config/workloads.go#L103-L107"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2458",
"review_status": "UNREVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2779.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2779",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2020-10937",
"GHSA-r23h-3jmw-q7hr"
],
"summary": "Access Restriction Bypass in go-ipfs in github.com/ipfs/go-ipfs",
"details": "Access Restriction Bypass in go-ipfs in github.com/ipfs/go-ipfs",
"affected": [
{
"package": {
"name": "github.com/ipfs/go-ipfs",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.7.0"
}
]
}
],
"ecosystem_specific": {}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/advisories/GHSA-r23h-3jmw-q7hr"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10937"
},
{
"type": "WEB",
"url": "https://blog.ipfs.io/2020-10-30-dht-hardening"
},
{
"type": "WEB",
"url": "https://graz.pure.elsevier.com/en/publications/total-eclipse-of-the-heart-disrupting-the-interplanetary-file-sys"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2779",
"review_status": "UNREVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0256.json
|
{
"schema_version": "1.3.1",
"id": "GO-2022-0256",
"modified": "0001-01-01T00:00:00Z",
"published": "2022-07-15T23:08:03Z",
"aliases": [
"CVE-2021-41173",
"GHSA-59hh-656j-3p7v"
],
"summary": "Panic via maliciously crafted message in github.com/ethereum/go-ethereum",
"details": "A maliciously crafted snap/1 protocol message can cause a panic.",
"affected": [
{
"package": {
"name": "github.com/ethereum/go-ethereum",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.10.9"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/ethereum/go-ethereum/eth/protocols/snap",
"symbols": [
"handleMessage"
]
},
{
"path": "github.com/ethereum/go-ethereum/trie",
"symbols": [
"SecureTrie.TryGetNode",
"Trie.TryGetNode",
"Trie.tryGetNode"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://github.com/ethereum/go-ethereum/pull/23657/commits/f1fd963a5a965e643e52fcf805a2a02a323c32b8"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2022-0256",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2701.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2701",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2024-31455",
"GHSA-ggp5-28x4-xcj9"
],
"summary": "Minder GetRepositoryByName data leak in github.com/stacklok/minder",
"details": "Minder GetRepositoryByName data leak in github.com/stacklok/minder",
"affected": [
{
"package": {
"name": "github.com/stacklok/minder",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0.0.39"
},
{
"fixed": "0.0.40"
}
]
}
],
"ecosystem_specific": {}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/stacklok/minder/security/advisories/GHSA-ggp5-28x4-xcj9"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31455"
},
{
"type": "FIX",
"url": "https://github.com/stacklok/minder/commit/11b6573ad62cfdd783a8bb52f3fce461466037f4"
},
{
"type": "FIX",
"url": "https://github.com/stacklok/minder/commit/5c381cfbf3e4b7ce040ed8511a1fae1a78a0014b"
},
{
"type": "FIX",
"url": "https://github.com/stacklok/minder/pull/2941"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2701",
"review_status": "UNREVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2598.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2598",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2024-24783"
],
"summary": "Verify panics on certificates with an unknown public key algorithm in crypto/x509",
"details": "Verifying a certificate chain which contains a certificate with an unknown public key algorithm will cause Certificate.Verify to panic.\n\nThis affects all crypto/tls clients, and servers that set Config.ClientAuth to VerifyClientCertIfGiven or RequireAndVerifyClientCert. The default behavior is for TLS servers to not verify client certificates.",
"affected": [
{
"package": {
"name": "stdlib",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.21.8"
},
{
"introduced": "1.22.0-0"
},
{
"fixed": "1.22.1"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "crypto/x509",
"symbols": [
"Certificate.Verify",
"Certificate.buildChains"
]
}
]
}
}
],
"references": [
{
"type": "REPORT",
"url": "https://go.dev/issue/65390"
},
{
"type": "FIX",
"url": "https://go.dev/cl/569339"
},
{
"type": "WEB",
"url": "https://groups.google.com/g/golang-announce/c/5pwGVUPoMbg"
}
],
"credits": [
{
"name": "John Howard (Google)"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2598",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2441.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2441",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"GHSA-7xg2-83f8-39mr"
],
"summary": "The DES/3DES cipher was used as part of the TLS protocol by installation tools in github.com/karmada-io/karmada",
"details": "The DES/3DES cipher was used as part of the TLS protocol by installation tools in github.com/karmada-io/karmada",
"affected": [
{
"package": {
"name": "github.com/karmada-io/karmada",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.8.0"
}
]
}
],
"ecosystem_specific": {}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/karmada-io/karmada/security/advisories/GHSA-7xg2-83f8-39mr"
},
{
"type": "FIX",
"url": "https://github.com/karmada-io/karmada/commit/98e655fc552b2987c3f2d2a061007889ce8be536"
},
{
"type": "FIX",
"url": "https://github.com/karmada-io/karmada/commit/c3c376605403e07ca0ed2dc39c9e0f3c38f8e29d"
},
{
"type": "REPORT",
"url": "https://github.com/karmada-io/karmada/issues/4191"
},
{
"type": "WEB",
"url": "https://go.dev/issue/41476"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2441",
"review_status": "UNREVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2020-0039.json
|
{
"schema_version": "1.3.1",
"id": "GO-2020-0039",
"modified": "0001-01-01T00:00:00Z",
"published": "2021-04-14T20:04:52Z",
"aliases": [
"CVE-2020-12666",
"GHSA-733f-44f3-3frw"
],
"summary": "Open redirect in gopkg.in/macaron.v1",
"details": "Due to improper request sanitization, a specifically crafted URL can cause the static file handler to redirect to an attacker chosen URL, allowing for open redirect attacks.",
"affected": [
{
"package": {
"name": "gopkg.in/macaron.v1",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.3.7"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "gopkg.in/macaron.v1",
"symbols": [
"Context.Next",
"LoggerInvoker.Invoke",
"Macaron.Run",
"Macaron.ServeHTTP",
"Router.ServeHTTP",
"staticHandler"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://github.com/go-macaron/macaron/pull/199"
},
{
"type": "FIX",
"url": "https://github.com/go-macaron/macaron/commit/addc7461c3a90a040e79aa75bfd245107a210245"
},
{
"type": "WEB",
"url": "https://github.com/go-macaron/macaron/issues/198"
}
],
"credits": [
{
"name": "@ev0A"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2020-0039",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1569.json
|
{
"schema_version": "1.3.1",
"id": "GO-2023-1569",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2022-41725"
],
"summary": "Excessive resource consumption in mime/multipart",
"details": "A denial of service is possible from excessive resource consumption in net/http and mime/multipart.\n\nMultipart form parsing with mime/multipart.Reader.ReadForm can consume largely unlimited amounts of memory and disk files. This also affects form parsing in the net/http package with the Request methods FormFile, FormValue, ParseMultipartForm, and PostFormValue.\n\nReadForm takes a maxMemory parameter, and is documented as storing \"up to maxMemory bytes +10MB (reserved for non-file parts) in memory\". File parts which cannot be stored in memory are stored on disk in temporary files. The unconfigurable 10MB reserved for non-file parts is excessively large and can potentially open a denial of service vector on its own. However, ReadForm did not properly account for all memory consumed by a parsed form, such as map entry overhead, part names, and MIME headers, permitting a maliciously crafted form to consume well over 10MB. In addition, ReadForm contained no limit on the number of disk files created, permitting a relatively small request body to create a large number of disk temporary files.\n\nWith fix, ReadForm now properly accounts for various forms of memory overhead, and should now stay within its documented limit of 10MB + maxMemory bytes of memory consumption. Users should still be aware that this limit is high and may still be hazardous.\n\nIn addition, ReadForm now creates at most one on-disk temporary file, combining multiple form parts into a single temporary file. The mime/multipart.File interface type's documentation states, \"If stored on disk, the File's underlying concrete type will be an *os.File.\". This is no longer the case when a form contains more than one file part, due to this coalescing of parts into a single file. The previous behavior of using distinct files for each form part may be reenabled with the environment variable GODEBUG=multipartfiles=distinct.\n\nUsers should be aware that multipart.ReadForm and the http.Request methods that call it do not limit the amount of disk consumed by temporary files. Callers can limit the size of form data with http.MaxBytesReader.",
"affected": [
{
"package": {
"name": "stdlib",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.19.6"
},
{
"introduced": "1.20.0-0"
},
{
"fixed": "1.20.1"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "mime/multipart",
"symbols": [
"Reader.ReadForm"
]
}
]
}
}
],
"references": [
{
"type": "REPORT",
"url": "https://go.dev/issue/58006"
},
{
"type": "FIX",
"url": "https://go.dev/cl/468124"
},
{
"type": "WEB",
"url": "https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E"
}
],
"credits": [
{
"name": "Arpad Ryszka"
},
{
"name": "Jakob Ackermann (@das7pad)"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2023-1569",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2501.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2501",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2020-25201",
"GHSA-496g-fr33-whrf"
],
"summary": "Denial of service in HashiCorp Consul in github.com/hashicorp/consul",
"details": "Denial of service in HashiCorp Consul in github.com/hashicorp/consul",
"affected": [
{
"package": {
"name": "github.com/hashicorp/consul",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "1.7.0"
},
{
"fixed": "1.7.9"
},
{
"introduced": "1.8.0"
},
{
"fixed": "1.8.5"
}
]
}
],
"ecosystem_specific": {}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/advisories/GHSA-496g-fr33-whrf"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25201"
},
{
"type": "FIX",
"url": "https://github.com/hashicorp/consul/pull/9024"
},
{
"type": "WEB",
"url": "https://github.com/hashicorp/consul/blob/master/CHANGELOG.md#185-october-23-2020"
},
{
"type": "WEB",
"url": "https://github.com/hashicorp/consul/releases/tag/v1.8.5"
},
{
"type": "WEB",
"url": "https://security.gentoo.org/glsa/202208-09"
},
{
"type": "WEB",
"url": "https://www.hashicorp.com/blog/category/consul"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2501",
"review_status": "UNREVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1930.json
|
{
"schema_version": "1.3.1",
"id": "GO-2023-1930",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2023-37475",
"GHSA-9x44-9pgq-cf45"
],
"summary": "Unrestricted memory consumption in github.com/hamba/avro",
"details": "Unrestricted memory consumption in github.com/hamba/avro",
"affected": [
{
"package": {
"name": "github.com/hamba/avro/v2",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "2.13.0"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/hamba/avro/v2",
"symbols": [
"Decoder.Decode",
"Reader.ReadArrayCB",
"Reader.ReadBytes",
"Reader.ReadMapCB",
"Reader.ReadNext",
"Reader.ReadString",
"Reader.ReadVal",
"Reader.readBytes",
"Unmarshal",
"arrayDecoder.Decode",
"bytesCodec.Decode",
"bytesDecimalCodec.Decode",
"bytesDecimalPtrCodec.Decode",
"dereferenceDecoder.Decode",
"efaceDecoder.Decode",
"frozenConfig.Unmarshal",
"mapDecoder.Decode",
"mapSkipDecoder.Decode",
"mapUnionDecoder.Decode",
"recordIfaceDecoder.Decode",
"recordMapDecoder.Decode",
"recordSkipDecoder.Decode",
"referenceDecoder.Decode",
"sliceSkipDecoder.Decode",
"stringCodec.Decode",
"structDecoder.Decode",
"textMarshalerCodec.Decode",
"unionPtrDecoder.Decode",
"unionResolvedDecoder.Decode",
"unionSkipDecoder.Decode"
]
}
]
}
},
{
"package": {
"name": "github.com/hamba/avro",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/hamba/avro",
"symbols": [
"Decoder.Decode",
"Reader.ReadArrayCB",
"Reader.ReadBytes",
"Reader.ReadMapCB",
"Reader.ReadNext",
"Reader.ReadString",
"Reader.ReadVal",
"Unmarshal",
"arrayDecoder.Decode",
"bytesCodec.Decode",
"bytesDecimalCodec.Decode",
"bytesDecimalPtrCodec.Decode",
"dereferenceDecoder.Decode",
"efaceDecoder.Decode",
"frozenConfig.Unmarshal",
"mapDecoder.Decode",
"mapSkipDecoder.Decode",
"mapUnionDecoder.Decode",
"recordIfaceDecoder.Decode",
"recordMapDecoder.Decode",
"recordSkipDecoder.Decode",
"referenceDecoder.Decode",
"sliceSkipDecoder.Decode",
"stringCodec.Decode",
"structDecoder.Decode",
"textMarshalerCodec.Decode",
"unionPtrDecoder.Decode",
"unionResolvedDecoder.Decode",
"unionSkipDecoder.Decode"
]
}
]
}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/hamba/avro/security/advisories/GHSA-9x44-9pgq-cf45"
},
{
"type": "FIX",
"url": "https://github.com/hamba/avro/pull/273"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2023-1930",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0503.json
|
{
"schema_version": "1.3.1",
"id": "GO-2022-0503",
"modified": "0001-01-01T00:00:00Z",
"published": "2022-07-30T03:50:50Z",
"aliases": [
"GHSA-9x4h-8wgm-8xfg"
],
"summary": "Denial of service via malformed CAR data in github.com/ipld/go-car and go-car/v2",
"details": "Decoding malformed CAR data can cause panics or excessive memory usage.",
"affected": [
{
"package": {
"name": "github.com/ipld/go-car",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.4.0"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/ipld/go-car"
},
{
"path": "github.com/ipld/go-car/util"
}
]
}
},
{
"package": {
"name": "github.com/ipld/go-car/v2",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "2.0.0"
},
{
"fixed": "2.4.0"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/ipld/go-car/v2"
},
{
"path": "github.com/ipld/go-car/v2/blockstore"
},
{
"path": "github.com/ipld/go-car/v2/index"
}
]
}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/advisories/GHSA-9x4h-8wgm-8xfg"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2022-0503",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2659.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2659",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2024-29018",
"GHSA-mq39-4gv4-mvpx"
],
"summary": "Data exfiltration from internal networks in github.com/docker/docker",
"details": "dockerd forwards DNS requests to the host loopback device, bypassing the container network namespace's normal routing semantics, networks marked as 'internal' can unexpectedly forward DNS requests to an external nameserver. By registering a domain for which they control the authoritative nameservers, an attacker could arrange for a compromised container to exfiltrate data by encoding it in DNS queries that will eventually be answered by their nameservers.",
"affected": [
{
"package": {
"name": "github.com/docker/docker",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "25.0.0+incompatible"
},
{
"fixed": "25.0.5+incompatible"
},
{
"introduced": "26.0.0-rc1+incompatible"
},
{
"fixed": "26.0.0-rc3+incompatible"
}
]
}
],
"ecosystem_specific": {}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/moby/moby/security/advisories/GHSA-mq39-4gv4-mvpx"
},
{
"type": "WEB",
"url": "https://github.com/moby/moby/pull/46609"
}
],
"credits": [
{
"name": "@robmry"
},
{
"name": "@akerouanton"
},
{
"name": "@neersighted"
},
{
"name": "@gabriellavengeo"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2659",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0968.json
|
{
"schema_version": "1.3.1",
"id": "GO-2022-0968",
"modified": "0001-01-01T00:00:00Z",
"published": "2022-09-13T03:32:38Z",
"aliases": [
"CVE-2021-43565",
"GHSA-gwc9-m7rh-j2ww"
],
"summary": "Panic on malformed packets in golang.org/x/crypto/ssh",
"details": "Unauthenticated clients can cause a panic in SSH servers.\n\nWhen using AES-GCM or ChaCha20Poly1305, consuming a malformed packet which contains an empty plaintext causes a panic.",
"affected": [
{
"package": {
"name": "golang.org/x/crypto",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.0.0-20211202192323-5770296d904e"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "golang.org/x/crypto/ssh",
"symbols": [
"Dial",
"NewClientConn",
"NewServerConn",
"chacha20Poly1305Cipher.readCipherPacket",
"curve25519sha256.Client",
"curve25519sha256.Server",
"dhGEXSHA.Client",
"dhGEXSHA.Server",
"dhGroup.Client",
"dhGroup.Server",
"ecdh.Client",
"ecdh.Server",
"gcmCipher.readCipherPacket"
]
}
]
}
}
],
"references": [
{
"type": "WEB",
"url": "https://groups.google.com/g/golang-announce/c/2AR1sKiM-Qs"
},
{
"type": "REPORT",
"url": "https://go.dev/issues/49932"
},
{
"type": "FIX",
"url": "https://go.dev/cl/368814/"
}
],
"credits": [
{
"name": "Rod Hynes (Psiphon Inc)"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2022-0968",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2020-0023.json
|
{
"schema_version": "1.3.1",
"id": "GO-2020-0023",
"modified": "0001-01-01T00:00:00Z",
"published": "2021-04-14T20:04:52Z",
"aliases": [
"CVE-2015-10004",
"GHSA-5vw4-v588-pgv8"
],
"summary": "Timing side-channel in github.com/robbert229/jwt",
"details": "Token validation methods are susceptible to a timing side-channel during HMAC comparison. With a large enough number of requests over a low latency connection, an attacker may use this to determine the expected HMAC.",
"affected": [
{
"package": {
"name": "github.com/robbert229/jwt",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.0.0-20170426191122-ca1404ee6e83"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/robbert229/jwt",
"symbols": [
"Algorithm.Validate",
"Algorithm.validateSignature"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://github.com/robbert229/jwt/commit/ca1404ee6e83fcbafb66b09ed0d543850a15b654"
},
{
"type": "WEB",
"url": "https://github.com/robbert229/jwt/issues/12"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2020-0023",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2771.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2771",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2021-36776",
"GHSA-gvh9-xgrq-r8hw"
],
"summary": "Rancher's Steve API Component Improper authorization check allows privilege escalation in github.com/rancher/rancher",
"details": "Rancher's Steve API Component Improper authorization check allows privilege escalation in github.com/rancher/rancher.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/rancher/rancher from v2.5.0 before v2.5.10.",
"affected": [
{
"package": {
"name": "github.com/rancher/rancher",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {
"custom_ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "2.5.0"
},
{
"fixed": "2.5.10"
}
]
}
]
}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/advisories/GHSA-gvh9-xgrq-r8hw"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-36776"
},
{
"type": "WEB",
"url": "https://bugzilla.suse.com/show_bug.cgi?id=1189413"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2771",
"review_status": "UNREVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-1184.json
|
{
"schema_version": "1.3.1",
"id": "GO-2022-1184",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2022-4643",
"GHSA-6m4h-hfpp-x8cx"
],
"summary": "OS command injection vulnerability in code.sajari.com/docconv",
"details": "The manipulation of the argument path to docconv.{ConvertPDF,PDFHasImage} leads to os command injection.",
"affected": [
{
"package": {
"name": "code.sajari.com/docconv",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "1.1.0"
},
{
"fixed": "1.3.5"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "code.sajari.com/docconv",
"symbols": [
"Convert",
"ConvertPDF",
"ConvertPages",
"ConvertPath",
"ConvertPathReadability",
"PDFHasImage"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://github.com/sajari/docconv/pull/110"
},
{
"type": "WEB",
"url": "https://github.com/sajari/docconv/releases/tag/v1.3.5"
},
{
"type": "FIX",
"url": "https://github.com/sajari/docconv/commit/b19021ade3d0b71c89d35cb00eb9e589a121faa5"
},
{
"type": "WEB",
"url": "https://vuldb.com/?id.216502"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2022-1184",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0242.json
|
{
"schema_version": "1.3.1",
"id": "GO-2021-0242",
"modified": "0001-01-01T00:00:00Z",
"published": "2022-02-17T17:33:07Z",
"aliases": [
"CVE-2021-33198"
],
"summary": "Panic on inputs with large exponents in math/big",
"details": "Rat.SetString and Rat.UnmarshalText may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents.",
"affected": [
{
"package": {
"name": "stdlib",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.15.13"
},
{
"introduced": "1.16.0-0"
},
{
"fixed": "1.16.5"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "math/big",
"symbols": [
"Rat.SetString"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://go.dev/cl/316149"
},
{
"type": "FIX",
"url": "https://go.googlesource.com/go/+/6c591f79b0b5327549bd4e94970f7a279efb4ab0"
},
{
"type": "WEB",
"url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI"
},
{
"type": "REPORT",
"url": "https://go.dev/issue/45910"
}
],
"credits": [
{
"name": "The OSS-Fuzz project (discovery)"
},
{
"name": "Emmanuel Odeke (reporter)"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2021-0242",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0192.json
|
{
"schema_version": "1.3.1",
"id": "GO-2022-0192",
"modified": "0001-01-01T00:00:00Z",
"published": "2022-07-01T20:11:34Z",
"aliases": [
"CVE-2018-17142",
"GHSA-2wp2-chmh-r934"
],
"summary": "Incorrect parsing of nested templates in golang.org/x/net/html",
"details": "The Parse function can panic on some invalid inputs.\n\nFor example, the Parse function panics on the input \"\u003cmath\u003e\u003ctemplate\u003e\u003cmo\u003e\u003ctemplate\u003e\".",
"affected": [
{
"package": {
"name": "golang.org/x/net",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.0.0-20180925071336-cf3bd585ca2a"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "golang.org/x/net/html",
"symbols": [
"Parse",
"ParseFragment",
"parser.resetInsertionMode"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://go.dev/cl/136875"
},
{
"type": "FIX",
"url": "https://go.googlesource.com/net/+/cf3bd585ca2a5a21b057abd8be7eea2204af89d0"
},
{
"type": "REPORT",
"url": "https://go.dev/issue/27702"
}
],
"credits": [
{
"name": "@tr3ee"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2022-0192",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2929.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2929",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2023-32196",
"GHSA-64jq-m7rq-768h"
],
"summary": "Rancher's External RoleTemplates can lead to privilege escalation in github.com/rancher/rancher",
"details": "Rancher's External RoleTemplates can lead to privilege escalation in github.com/rancher/rancher.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/rancher/rancher from v2.7.0 before v2.7.14, from v2.8.0 before v2.8.5.",
"affected": [
{
"package": {
"name": "github.com/rancher/rancher",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {
"custom_ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "2.7.0"
},
{
"fixed": "2.7.14"
},
{
"introduced": "2.8.0"
},
{
"fixed": "2.8.5"
}
]
}
]
}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/rancher/rancher/security/advisories/GHSA-64jq-m7rq-768h"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2929",
"review_status": "UNREVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1988.json
|
{
"schema_version": "1.3.1",
"id": "GO-2023-1988",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2023-3978",
"GHSA-2wrh-6pvc-2jm9"
],
"summary": "Improper rendering of text nodes in golang.org/x/net/html",
"details": "Text nodes not in the HTML namespace are incorrectly literally rendered, causing text which should be escaped to not be. This could lead to an XSS attack.",
"affected": [
{
"package": {
"name": "golang.org/x/net",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.13.0"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "golang.org/x/net/html",
"symbols": [
"Render",
"render1"
]
}
]
}
}
],
"references": [
{
"type": "REPORT",
"url": "https://go.dev/issue/61615"
},
{
"type": "FIX",
"url": "https://go.dev/cl/514896"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2023-1988",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2768.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2768",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2021-25318",
"GHSA-f9xf-jq4j-vqw4"
],
"summary": "Rancher does not properly specify ApiGroup when creating Kubernetes RBAC resources in github.com/rancher/rancher",
"details": "Rancher does not properly specify ApiGroup when creating Kubernetes RBAC resources in github.com/rancher/rancher.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/rancher/rancher before v2.4.16, from v2.5.0 before v2.5.9.",
"affected": [
{
"package": {
"name": "github.com/rancher/rancher",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "2.0.0+incompatible"
}
]
}
],
"ecosystem_specific": {
"custom_ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0"
},
{
"fixed": "2.4.16"
},
{
"introduced": "2.5.0"
},
{
"fixed": "2.5.9"
}
]
}
]
}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/advisories/GHSA-f9xf-jq4j-vqw4"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-25318"
},
{
"type": "REPORT",
"url": "https://github.com/rancher/rancher/issues/33590"
},
{
"type": "WEB",
"url": "https://bugzilla.suse.com/show_bug.cgi?id=1184913"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2768",
"review_status": "UNREVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-2043.json
|
{
"schema_version": "1.3.1",
"id": "GO-2023-2043",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2023-39319"
],
"summary": "Improper handling of special tags within script contexts in html/template",
"details": "The html/template package does not apply the proper rules for handling occurrences of \"\u003cscript\", \"\u003c!--\", and \"\u003c/script\" within JS literals in \u003cscript\u003e contexts. This may cause the template parser to improperly consider script contexts to be terminated early, causing actions to be improperly escaped. This could be leveraged to perform an XSS attack.",
"affected": [
{
"package": {
"name": "stdlib",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.20.8"
},
{
"introduced": "1.21.0-0"
},
{
"fixed": "1.21.1"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "html/template",
"symbols": [
"Template.Execute",
"Template.ExecuteTemplate",
"escaper.escapeText",
"indexTagEnd",
"tSpecialTagEnd"
]
}
]
}
}
],
"references": [
{
"type": "REPORT",
"url": "https://go.dev/issue/62197"
},
{
"type": "FIX",
"url": "https://go.dev/cl/526157"
},
{
"type": "WEB",
"url": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ"
}
],
"credits": [
{
"name": "Takeshi Kaneko (GMO Cybersecurity by Ierae, Inc.)"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2023-2043",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2516.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2516",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2018-18624",
"GHSA-9hv8-4frf-cprf"
],
"summary": "Grafana XSS via a column style in github.com/grafana/grafana",
"details": "Grafana XSS via a column style in github.com/grafana/grafana.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/grafana/grafana before v7.0.0.",
"affected": [
{
"package": {
"name": "github.com/grafana/grafana",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {
"custom_ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0"
},
{
"fixed": "7.0.0"
}
]
}
]
}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/advisories/GHSA-9hv8-4frf-cprf"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-18624"
},
{
"type": "FIX",
"url": "https://github.com/grafana/grafana/commit/0284747c88eb9435899006d26ffaf65f89dec88e"
},
{
"type": "FIX",
"url": "https://github.com/grafana/grafana/pull/11813"
},
{
"type": "FIX",
"url": "https://github.com/grafana/grafana/pull/23816"
},
{
"type": "WEB",
"url": "https://security.netapp.com/advisory/ntap-20200608-0008"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2516",
"review_status": "UNREVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2904.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2904",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2024-37154",
"GHSA-7hrh-v6wp-53vw"
],
"summary": "Evmos allows unvested token delegations in github.com/evmos/evmos",
"details": "Evmos allows unvested token delegations in github.com/evmos/evmos",
"affected": [
{
"package": {
"name": "github.com/evmos/evmos",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/evmos/evmos/v2",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/evmos/evmos/v3",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/evmos/evmos/v4",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/evmos/evmos/v5",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/evmos/evmos/v6",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/evmos/evmos/v7",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/evmos/evmos/v8",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/evmos/evmos/v9",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/evmos/evmos/v10",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/evmos/evmos/v11",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/evmos/evmos/v12",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/evmos/evmos/v13",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/evmos/evmos/v14",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/evmos/evmos/v15",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/evmos/evmos/v16",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/evmos/evmos/v17",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/evmos/evmos/v18",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/evmos/evmos/security/advisories/GHSA-7hrh-v6wp-53vw"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-37154"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2904",
"review_status": "UNREVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1589.json
|
{
"schema_version": "1.3.1",
"id": "GO-2023-1589",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2023-25656",
"GHSA-87x9-7grx-m28v"
],
"summary": "Denial of service from memory exhaustion in github.com/notaryproject/notation-go",
"details": "Parsing PKIX distinguished names containing the string \"=#\" can cause excessive memory consumption.",
"affected": [
{
"package": {
"name": "github.com/notaryproject/notation-go",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.0.0-rc.3"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/notaryproject/notation-go/internal/pkix",
"symbols": [
"ParseDistinguishedName"
]
},
{
"path": "github.com/notaryproject/notation-go/verifier",
"symbols": [
"New",
"NewFromConfig",
"verifier.Verify",
"verifyX509TrustedIdentities"
]
},
{
"path": "github.com/notaryproject/notation-go/verifier/trustpolicy",
"symbols": [
"Document.Validate",
"validateTrustedIdentities"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://github.com/notaryproject/notation-go/pull/275"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2023-1589",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2936.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2936",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2024-38351",
"GHSA-m93w-4fxv-r35v"
],
"summary": "PocketBase performs password auth and OAuth2 unverified email linking in github.com/pocketbase/pocketbase",
"details": "PocketBase performs password auth and OAuth2 unverified email linking in github.com/pocketbase/pocketbase",
"affected": [
{
"package": {
"name": "github.com/pocketbase/pocketbase",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.22.14"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/pocketbase/pocketbase/apis",
"symbols": [
"EnrichRecord",
"EnrichRecords",
"RecordAuthResponse",
"Serve",
"recordAuthApi.authWithOAuth2",
"recordAuthApi.authWithPassword"
]
},
{
"path": "github.com/pocketbase/pocketbase/models",
"symbols": [
"NewRecordFromNullStringMap",
"NewRecordsFromNullStringMaps",
"Record.CleanCopy",
"Record.ColumnValueMap",
"Record.Email",
"Record.EmailVisibility",
"Record.FindFileFieldByFile",
"Record.Get",
"Record.GetBool",
"Record.GetDateTime",
"Record.GetFloat",
"Record.GetInt",
"Record.GetString",
"Record.GetStringSlice",
"Record.GetTime",
"Record.LastResetSentAt",
"Record.LastVerificationSentAt",
"Record.Load",
"Record.MarshalJSON",
"Record.OriginalCopy",
"Record.PasswordHash",
"Record.PublicExport",
"Record.RefreshTokenKey",
"Record.ReplaceModifers",
"Record.Set",
"Record.SetEmail",
"Record.SetEmailVisibility",
"Record.SetLastResetSentAt",
"Record.SetLastVerificationSentAt",
"Record.SetPassword",
"Record.SetTokenKey",
"Record.SetUsername",
"Record.SetVerified",
"Record.TokenKey",
"Record.UnknownData",
"Record.UnmarshalJSON",
"Record.UnmarshalJSONField",
"Record.Username",
"Record.ValidatePassword",
"Record.Verified",
"Record.getNormalizeDataValueForDB"
]
},
{
"path": "github.com/pocketbase/pocketbase/models/schema",
"symbols": [
"AuthFieldNames"
]
},
{
"path": "github.com/pocketbase/pocketbase/daos",
"symbols": [
"Dao.CanAccessRecord",
"Dao.CreateViewSchema",
"Dao.Delete",
"Dao.DeleteAdmin",
"Dao.DeleteCollection",
"Dao.DeleteExternalAuth",
"Dao.DeleteOldLogs",
"Dao.DeleteParam",
"Dao.DeleteRecord",
"Dao.DeleteTable",
"Dao.DeleteView",
"Dao.ExpandRecord",
"Dao.ExpandRecords",
"Dao.FindAdminByEmail",
"Dao.FindAdminById",
"Dao.FindAdminByToken",
"Dao.FindAllExternalAuthsByRecord",
"Dao.FindAuthRecordByEmail",
"Dao.FindAuthRecordByToken",
"Dao.FindAuthRecordByUsername",
"Dao.FindById",
"Dao.FindCollectionByNameOrId",
"Dao.FindCollectionReferences",
"Dao.FindCollectionsByType",
"Dao.FindExternalAuthByRecordAndProvider",
"Dao.FindFirstExternalAuthByExpr",
"Dao.FindFirstRecordByData",
"Dao.FindFirstRecordByFilter",
"Dao.FindLogById",
"Dao.FindParamByKey",
"Dao.FindRecordById",
"Dao.FindRecordByViewFile",
"Dao.FindRecordsByExpr",
"Dao.FindRecordsByFilter",
"Dao.FindRecordsByIds",
"Dao.FindSettings",
"Dao.HasTable",
"Dao.ImportCollections",
"Dao.IsAdminEmailUnique",
"Dao.IsCollectionNameUnique",
"Dao.IsRecordValueUnique",
"Dao.LogsStats",
"Dao.RecordQuery",
"Dao.RunInTransaction",
"Dao.Save",
"Dao.SaveAdmin",
"Dao.SaveCollection",
"Dao.SaveExternalAuth",
"Dao.SaveLog",
"Dao.SaveParam",
"Dao.SaveRecord",
"Dao.SaveSettings",
"Dao.SaveView",
"Dao.SuggestUniqueAuthRecordUsername",
"Dao.SyncRecordTableSchema",
"Dao.TableColumns",
"Dao.TableIndexes",
"Dao.TableInfo",
"Dao.TotalAdmins",
"Dao.Vacuum"
]
},
{
"path": "github.com/pocketbase/pocketbase/forms",
"symbols": [
"AdminLogin.Submit",
"AdminLogin.Validate",
"AdminPasswordResetConfirm.Submit",
"AdminPasswordResetConfirm.Validate",
"AdminPasswordResetRequest.Submit",
"AdminPasswordResetRequest.Validate",
"AdminUpsert.Submit",
"AdminUpsert.Validate",
"AppleClientSecretCreate.Submit",
"AppleClientSecretCreate.Validate",
"BackupCreate.Submit",
"BackupCreate.Validate",
"BackupUpload.Submit",
"BackupUpload.Validate",
"CollectionUpsert.Submit",
"CollectionUpsert.Validate",
"CollectionsImport.Submit",
"CollectionsImport.Validate",
"NewRecordUpsert",
"RealtimeSubscribe.Validate",
"RecordEmailChangeConfirm.Submit",
"RecordEmailChangeConfirm.Validate",
"RecordEmailChangeRequest.Submit",
"RecordEmailChangeRequest.Validate",
"RecordOAuth2Login.Submit",
"RecordOAuth2Login.Validate",
"RecordOAuth2Login.submit",
"RecordPasswordLogin.Submit",
"RecordPasswordLogin.Validate",
"RecordPasswordResetConfirm.Submit",
"RecordPasswordResetConfirm.Validate",
"RecordPasswordResetRequest.Submit",
"RecordPasswordResetRequest.Validate",
"RecordUpsert.DrySubmit",
"RecordUpsert.LoadData",
"RecordUpsert.LoadRequest",
"RecordUpsert.Submit",
"RecordUpsert.Validate",
"RecordUpsert.ValidateAndFill",
"RecordVerificationConfirm.Submit",
"RecordVerificationConfirm.Validate",
"RecordVerificationRequest.Submit",
"RecordVerificationRequest.Validate",
"SettingsUpsert.Submit",
"SettingsUpsert.Validate",
"TestEmailSend.Submit",
"TestEmailSend.Validate",
"TestS3Filesystem.Submit",
"TestS3Filesystem.Validate"
]
}
]
}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/pocketbase/pocketbase/security/advisories/GHSA-m93w-4fxv-r35v"
},
{
"type": "FIX",
"url": "https://github.com/pocketbase/pocketbase/commit/58ace5d5e7b9b979490019cf8d1b88491e5daec5"
},
{
"type": "WEB",
"url": "https://github.com/pocketbase/pocketbase/discussions/4355"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2936",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0532.json
|
{
"schema_version": "1.3.1",
"id": "GO-2022-0532",
"modified": "0001-01-01T00:00:00Z",
"published": "2022-07-26T21:41:20Z",
"aliases": [
"CVE-2022-30580"
],
"summary": "Empty Cmd.Path can trigger unintended binary in os/exec on Windows",
"details": "On Windows, executing Cmd.Run, Cmd.Start, Cmd.Output, or Cmd.CombinedOutput when Cmd.Path is unset will unintentionally trigger execution of any binaries in the working directory named either \"..com\" or \"..exe\".",
"affected": [
{
"package": {
"name": "stdlib",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.17.11"
},
{
"introduced": "1.18.0-0"
},
{
"fixed": "1.18.3"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "os/exec",
"goos": [
"windows"
],
"symbols": [
"Cmd.Start"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://go.dev/cl/403759"
},
{
"type": "FIX",
"url": "https://go.googlesource.com/go/+/960ffa98ce73ef2c2060c84c7ac28d37a83f345e"
},
{
"type": "REPORT",
"url": "https://go.dev/issue/52574"
},
{
"type": "WEB",
"url": "https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg/m/IWz5T6x7AAAJ"
}
],
"credits": [
{
"name": "Chris Darroch (chrisd8088@github.com)"
},
{
"name": "brian m. carlson (bk2204@github.com)"
},
{
"name": "Mikhail Shcherbakov (https://twitter.com/yu5k3)"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2022-0532",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2476.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2476",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2024-23656",
"GHSA-gr79-9v6v-gc9r"
],
"summary": "Dex discarding TLSconfig and always serves deprecated TLS 1.0/1.1 and insecure ciphers in github.com/dexidp/dex",
"details": "Dex discarding TLSconfig and always serves deprecated TLS 1.0/1.1 and insecure ciphers in github.com/dexidp/dex.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/dexidp/dex from v2.37.0 before v2.38.0.",
"affected": [
{
"package": {
"name": "github.com/dexidp/dex",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {
"custom_ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "2.37.0"
},
{
"fixed": "2.38.0"
}
]
}
]
}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/dexidp/dex/security/advisories/GHSA-gr79-9v6v-gc9r"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23656"
},
{
"type": "FIX",
"url": "https://github.com/dexidp/dex/commit/5bbdb4420254ba73b9c4df4775fe7bdacf233b17"
},
{
"type": "FIX",
"url": "https://github.com/dexidp/dex/pull/2964"
},
{
"type": "REPORT",
"url": "https://github.com/dexidp/dex/issues/2848"
},
{
"type": "WEB",
"url": "https://github.com/dexidp/dex/blob/70d7a2c7c1bb2646b1a540e49616cbc39622fb83/cmd/dex/serve.go#L425"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2476",
"review_status": "UNREVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1534.json
|
{
"schema_version": "1.3.1",
"id": "GO-2023-1534",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"GHSA-4xgv-j62q-h3rj"
],
"summary": "Panic during unmarshal of Hello Verify Request in github.com/pion/dtls/v2",
"details": "Unmarshalling a Hello Verify request can panic, which could allow a denial of service.",
"affected": [
{
"package": {
"name": "github.com/pion/dtls/v2",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "2.2.4"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/pion/dtls/v2/pkg/protocol/handshake",
"symbols": [
"Handshake.Unmarshal",
"MessageHelloVerifyRequest.Unmarshal"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://github.com/pion/dtls/commit/a50d26c5e4eed2ca87509494ffef2d2ebd22b1eb"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2023-1534",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1709.json
|
{
"schema_version": "1.3.1",
"id": "GO-2023-1709",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2023-25000",
"GHSA-vq4h-9ghm-qmrr"
],
"summary": "Cache-timing attacks in Shamir's secret sharing in github.com/hashicorp/vault",
"details": "HashiCorp Vault's implementation of Shamir's secret sharing uses precomputed table lookups, and is vulnerable to cache-timing attacks.\n\nAn attacker with access to, and the ability to observe a large number of unseal operations on the host through a side channel may reduce the search space of a brute force effort to recover the Shamir shares.",
"affected": [
{
"package": {
"name": "github.com/hashicorp/vault",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.11.9"
},
{
"introduced": "1.12.0"
},
{
"fixed": "1.12.5"
},
{
"introduced": "1.13.0"
},
{
"fixed": "1.13.1"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/hashicorp/vault/shamir",
"symbols": [
"Combine",
"Split",
"div",
"mult"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://github.com/hashicorp/vault/pull/19495"
},
{
"type": "WEB",
"url": "https://discuss.hashicorp.com/t/hcsec-2023-10-vault-vulnerable-to-cache-timing-attacks-during-seal-and-unseal-operations/52078"
}
],
"credits": [
{
"name": "Giuseppe Cocomazzi"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2023-1709",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2775.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2775",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2022-3801",
"GHSA-m738-584h-26p6"
],
"summary": "IBAX go-ibax vulnerable to SQL injection in github.com/IBAX-io/go-ibax",
"details": "IBAX go-ibax vulnerable to SQL injection in github.com/IBAX-io/go-ibax",
"affected": [
{
"package": {
"name": "github.com/IBAX-io/go-ibax",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.4.2"
}
]
}
],
"ecosystem_specific": {}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/advisories/GHSA-m738-584h-26p6"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3801"
},
{
"type": "FIX",
"url": "https://github.com/IBAX-io/go-ibax/commit/b0183d8e550836dc50282ee74ff421ee41b25a37"
},
{
"type": "REPORT",
"url": "https://github.com/IBAX-io/go-ibax/issues/2062"
},
{
"type": "WEB",
"url": "https://vuldb.com/?id.212637"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2775",
"review_status": "UNREVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0978.json
|
{
"schema_version": "1.3.1",
"id": "GO-2022-0978",
"modified": "0001-01-01T00:00:00Z",
"published": "2022-09-13T17:40:16Z",
"aliases": [
"CVE-2022-36085",
"GHSA-f524-rf33-2jjr"
],
"summary": "Protection bypass in github.com/open-policy-agent/opa",
"details": "Open Policy Agent (OPA) is an open source, general-purpose policy engine. The Rego compiler provides a (deprecated) WithUnsafeBuiltins function, which allows users to provide a set of built-in functions that should be deemed unsafe and rejected by the compiler if encountered in the policy compilation stage.\n\nA bypass of this protection is possible when using the \"with\" keyword to mock a built-in function that isn't taken into account by WithUnsafeBuiltins.",
"affected": [
{
"package": {
"name": "github.com/open-policy-agent/opa",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0.40.0"
},
{
"fixed": "0.44.0"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/open-policy-agent/opa/ast",
"symbols": [
"Args.Copy",
"Args.Vars",
"Array.Copy",
"Array.Foreach",
"Array.Iter",
"Array.Until",
"ArrayComprehension.Copy",
"BeforeAfterVisitor.Walk",
"Body.Copy",
"Body.Vars",
"Call.Copy",
"CompileModules",
"CompileModulesWithOpt",
"Compiler.Compile",
"Compiler.GetRulesDynamic",
"Compiler.GetRulesDynamicWithOpts",
"Compiler.PassesTypeCheck",
"Compiler.rewriteWithModifiers",
"ContainsClosures",
"ContainsComprehensions",
"ContainsRefs",
"Copy",
"Every.Copy",
"Every.KeyValueVars",
"Expr.Copy",
"Expr.CopyWithoutTerms",
"Expr.Vars",
"GenericTransformer.Transform",
"GenericVisitor.Walk",
"Head.Copy",
"Head.Vars",
"Import.Copy",
"IsConstant",
"JSON",
"JSONWithOpt",
"Module.Copy",
"Module.UnmarshalJSON",
"MustCompileModules",
"MustCompileModulesWithOpts",
"MustJSON",
"MustParseBody",
"MustParseBodyWithOpts",
"MustParseExpr",
"MustParseImports",
"MustParseModule",
"MustParseModuleWithOpts",
"MustParsePackage",
"MustParseRef",
"MustParseRule",
"MustParseStatement",
"MustParseStatements",
"MustParseTerm",
"NewGraph",
"ObjectComprehension.Copy",
"OutputVarsFromBody",
"OutputVarsFromExpr",
"Package.Copy",
"ParseBody",
"ParseBodyWithOpts",
"ParseExpr",
"ParseImports",
"ParseModule",
"ParseModuleWithOpts",
"ParsePackage",
"ParseRef",
"ParseRule",
"ParseStatement",
"ParseStatements",
"ParseStatementsWithOpts",
"ParseTerm",
"Parser.Parse",
"Pretty",
"QueryContext.Copy",
"Ref.ConstantPrefix",
"Ref.Copy",
"Ref.Dynamic",
"Ref.Extend",
"Ref.OutputVars",
"Rule.Copy",
"SetComprehension.Copy",
"SomeDecl.Copy",
"Term.Copy",
"Term.Vars",
"Transform",
"TransformComprehensions",
"TransformRefs",
"TransformVars",
"TreeNode.DepthFirst",
"TypeEnv.Get",
"Unify",
"ValueMap.Copy",
"ValueMap.Equal",
"ValueMap.Hash",
"ValueMap.Iter",
"ValueMap.MarshalJSON",
"ValueMap.String",
"ValueToInterface",
"VarVisitor.Walk",
"Walk",
"WalkBeforeAndAfter",
"WalkBodies",
"WalkClosures",
"WalkExprs",
"WalkNodes",
"WalkRefs",
"WalkRules",
"WalkTerms",
"WalkVars",
"WalkWiths",
"With.Copy",
"baseDocEqIndex.AllRules",
"baseDocEqIndex.Build",
"baseDocEqIndex.Lookup",
"bodySafetyTransformer.Visit",
"comprehensionIndexNestedCandidateVisitor.Walk",
"comprehensionIndexRegressionCheckVisitor.Walk",
"isBuiltinRefOrVar",
"metadataParser.Parse",
"object.Copy",
"object.Diff",
"object.Filter",
"object.Foreach",
"object.Intersect",
"object.Iter",
"object.Map",
"object.Merge",
"object.MergeWith",
"object.Until",
"queryCompiler.Compile",
"queryCompiler.checkDeprecatedBuiltins",
"queryCompiler.checkUnsafeBuiltins",
"refChecker.Visit",
"refindices.Sorted",
"refindices.Update",
"rewriteNestedHeadVarLocalTransform.Visit",
"rewriteWithModifier",
"rewriteWithModifiersInBody",
"ruleArgLocalRewriter.Visit",
"ruleWalker.Do",
"set.Copy",
"set.Diff",
"set.Foreach",
"set.Intersect",
"set.Iter",
"set.Map",
"set.Reduce",
"set.Union",
"set.Until",
"trieNode.Do",
"trieNode.Traverse",
"trieTraversalResult.Add",
"typeChecker.CheckBody",
"typeChecker.CheckTypes",
"validateWith",
"validateWithFunctionValue"
]
}
]
}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/open-policy-agent/opa/security/advisories/GHSA-f524-rf33-2jjr"
},
{
"type": "FIX",
"url": "https://github.com/open-policy-agent/opa/pull/4540"
},
{
"type": "FIX",
"url": "https://github.com/open-policy-agent/opa/pull/4616"
},
{
"type": "FIX",
"url": "https://github.com/open-policy-agent/opa/commit/25a597bc3f4985162e7f65f9c36599f4f8f55823"
},
{
"type": "FIX",
"url": "https://github.com/open-policy-agent/opa/commit/3e8c754ed007b22393cf65e48751ad9f6457fee8"
},
{
"type": "WEB",
"url": "https://github.com/open-policy-agent/opa/releases/tag/v0.43.1"
}
],
"credits": [
{
"name": "anderseknert@"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2022-0978",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2514.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2514",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2020-25816",
"GHSA-57gg-cj55-q5g2"
],
"summary": "Token leases could outlive their TTL in HashiCorp Vault in github.com/hashicorp/vault",
"details": "Token leases could outlive their TTL in HashiCorp Vault in github.com/hashicorp/vault",
"affected": [
{
"package": {
"name": "github.com/hashicorp/vault",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "1.0.0"
},
{
"fixed": "1.5.4"
}
]
}
],
"ecosystem_specific": {}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/advisories/GHSA-57gg-cj55-q5g2"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25816"
},
{
"type": "FIX",
"url": "https://github.com/hashicorp/vault/pull/10020/commits/f192878110fe93eb13da914b2bee28caa7866a29"
},
{
"type": "WEB",
"url": "https://github.com/hashicorp/vault/blob/master/CHANGELOG.md#147"
},
{
"type": "WEB",
"url": "https://github.com/hashicorp/vault/blob/master/CHANGELOG.md#154"
},
{
"type": "WEB",
"url": "https://www.hashicorp.com/blog/category/vault"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2514",
"review_status": "UNREVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2559.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2559",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2024-21496",
"GHSA-ff72-ff42-c3gw"
],
"summary": "Cross-site Scripting in github.com/greenpau/caddy-security",
"details": "Cross-site Scripting in github.com/greenpau/caddy-security",
"affected": [
{
"package": {
"name": "github.com/greenpau/caddy-security",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/advisories/GHSA-ff72-ff42-c3gw"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21496"
},
{
"type": "REPORT",
"url": "https://github.com/greenpau/caddy-security/issues/267"
},
{
"type": "WEB",
"url": "https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy"
},
{
"type": "WEB",
"url": "https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-6249860"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2559",
"review_status": "UNREVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0106.json
|
{
"schema_version": "1.3.1",
"id": "GO-2021-0106",
"modified": "0001-01-01T00:00:00Z",
"published": "2021-07-28T18:08:05Z",
"aliases": [
"CVE-2020-36566",
"GHSA-jpf8-h7h7-3ppm"
],
"summary": "Path traversal in github.com/whyrusleeping/tar-utils",
"details": "Due to improper path sanitization, archives containing relative file paths can cause files to be written (or overwritten) outside of the target directory.",
"affected": [
{
"package": {
"name": "github.com/whyrusleeping/tar-utils",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.0.0-20201201191210-20a61371de5b"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/whyrusleeping/tar-utils",
"symbols": [
"Extractor.Extract",
"Extractor.outputPath"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://github.com/whyrusleeping/tar-utils/commit/20a61371de5b51380bbdb0c7935b30b0625ac227"
},
{
"type": "WEB",
"url": "https://snyk.io/research/zip-slip-vulnerability"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2021-0106",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2532.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2532",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2024-1052",
"GHSA-vh73-q3rw-qx7w"
],
"summary": "Boundary vulnerable to session hijacking through TLS certificate tampering in github.com/hashicorp/boundary",
"details": "Boundary vulnerable to session hijacking through TLS certificate tampering in github.com/hashicorp/boundary",
"affected": [
{
"package": {
"name": "github.com/hashicorp/boundary",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0.8.0"
},
{
"fixed": "0.15.0"
}
]
}
],
"ecosystem_specific": {}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/advisories/GHSA-vh73-q3rw-qx7w"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-1052"
},
{
"type": "WEB",
"url": "https://discuss.hashicorp.com/t/hcsec-2024-02-boundary-vulnerable-to-session-hijacking-through-tls-certificate-tampering/62458"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2532",
"review_status": "UNREVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2715.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2715",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2024-32644",
"GHSA-3fp5-2xwh-fxm6"
],
"summary": "Evmos transaction execution not accounting for all state transition after interaction with precompiles in github.com/evmos/evmos",
"details": "Evmos transaction execution not accounting for all state transition after interaction with precompiles in github.com/evmos/evmos",
"affected": [
{
"package": {
"name": "github.com/evmos/evmos",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/evmos/evmos/v2",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/evmos/evmos/v3",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/evmos/evmos/v4",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/evmos/evmos/v5",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/evmos/evmos/v6",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/evmos/evmos/v7",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/evmos/evmos/v8",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/evmos/evmos/v9",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/evmos/evmos/v10",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/evmos/evmos/v11",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/evmos/evmos/v12",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/evmos/evmos/v13",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/evmos/evmos/v14",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/evmos/evmos/v15",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/evmos/evmos/v16",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/evmos/evmos/v17",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "17.0.0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/tharsis/evmos",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/tharsis/evmos/v2",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/tharsis/evmos/v3",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/tharsis/evmos/v4",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/tharsis/evmos/v5",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/evmos/evmos/security/advisories/GHSA-3fp5-2xwh-fxm6"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-32644"
},
{
"type": "FIX",
"url": "https://github.com/evmos/evmos/commit/08982b5ee726b97bc50eaf58d1914829648b6a5f"
},
{
"type": "WEB",
"url": "https://github.com/evmos/evmos/blob/b196a522ba4951890b40992e9f97aa610f8b5f9c/x/evm/statedb/state_object.go#L53-L68"
},
{
"type": "WEB",
"url": "https://github.com/evmos/evmos/blob/b196a522ba4951890b40992e9f97aa610f8b5f9c/x/evm/statedb/statedb.go#L33-L55"
},
{
"type": "WEB",
"url": "https://github.com/evmos/evmos/blob/b196a522ba4951890b40992e9f97aa610f8b5f9c/x/evm/statedb/statedb.go#L460-L465"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2715",
"review_status": "UNREVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0159.json
|
{
"schema_version": "1.3.1",
"id": "GO-2021-0159",
"modified": "0001-01-01T00:00:00Z",
"published": "2022-01-05T21:39:14Z",
"aliases": [
"CVE-2015-5739",
"CVE-2015-5740",
"CVE-2015-5741"
],
"summary": "Request smuggling due to improper header parsing in net/http",
"details": "HTTP headers were not properly parsed, which allows remote attackers to conduct HTTP request smuggling attacks via a request that contains Content-Length and Transfer-Encoding header fields.",
"affected": [
{
"package": {
"name": "stdlib",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.4.3"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "net/http",
"symbols": [
"CanonicalMIMEHeaderKey",
"body.readLocked",
"canonicalMIMEHeaderKey",
"chunkWriter.writeHeader",
"fixLength",
"fixTransferEncoding",
"readTransfer",
"transferWriter.shouldSendContentLength",
"validHeaderFieldByte"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://go.dev/cl/13148"
},
{
"type": "FIX",
"url": "https://go.googlesource.com/go/+/26049f6f9171d1190f3bbe05ec304845cfe6399f"
},
{
"type": "FIX",
"url": "https://go.dev/cl/11772"
},
{
"type": "FIX",
"url": "https://go.dev/cl/11810"
},
{
"type": "FIX",
"url": "https://go.dev/cl/12865"
},
{
"type": "FIX",
"url": "https://go.googlesource.com/go/+/117ddcb83d7f42d6aa72241240af99ded81118e9"
},
{
"type": "FIX",
"url": "https://go.googlesource.com/go/+/300d9a21583e7cf0149a778a0611e76ff7c6680f"
},
{
"type": "FIX",
"url": "https://go.googlesource.com/go/+/c2db5f4ccc61ba7df96a747e268a277b802cbb87"
},
{
"type": "REPORT",
"url": "https://go.dev/issue/12027"
},
{
"type": "REPORT",
"url": "https://go.dev/issue/11930"
},
{
"type": "WEB",
"url": "https://groups.google.com/g/golang-announce/c/iSIyW4lM4hY/m/ADuQR4DiDwAJ"
}
],
"credits": [
{
"name": "Jed Denlea"
},
{
"name": "Régis Leroy"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2021-0159",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2769.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2769",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2022-38183",
"GHSA-fhv8-m4j4-cww2"
],
"summary": "Gitea allowed assignment of private issues in code.gitea.io/gitea",
"details": "Gitea allowed assignment of private issues in code.gitea.io/gitea",
"affected": [
{
"package": {
"name": "code.gitea.io/gitea",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.16.9"
}
]
}
],
"ecosystem_specific": {}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/advisories/GHSA-fhv8-m4j4-cww2"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-38183"
},
{
"type": "WEB",
"url": "https://blog.gitea.io/2022/07/gitea-1.16.9-is-released"
},
{
"type": "WEB",
"url": "https://github.com/go-gitea/gitea/pull/20133"
},
{
"type": "WEB",
"url": "https://github.com/go-gitea/gitea/pull/20196"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2769",
"review_status": "UNREVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2874.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2874",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"GHSA-qjcv-rx3v-7mvj"
],
"summary": "Inter-Blockchain Communication (IBC) protocol \"Huckleberry\" vulnerability in github.com/cosmos/ibc-go",
"details": "The ibc-go module is affected by the Inter-Blockchain Communication (IBC) protocol \"Huckleberry\" vulnerability. The vulnerability allowed an attacker to send arbitrary transactions onto target chains and trigger arbitrary state transitions, including but not limited to, theft of funds. It was possible to exploit this vulnerability in specific situations involving relaying packets in which the source chain is also the final destination chain. Affected networks are those that allow for fee grant capabilities and use a native Relayer (e.g., Osmosis and Juno).",
"affected": [
{
"package": {
"name": "github.com/cosmos/ibc-go",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/cosmos/ibc-go/v2",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/cosmos/ibc-go/v3",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/cosmos/ibc-go/v4",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/cosmos/ibc-go/v5",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/cosmos/ibc-go/v6",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
},
{
"package": {
"name": "github.com/cosmos/ibc-go/v7",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "7.0.1"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/cosmos/ibc-go/v7/modules/core/04-channel/keeper",
"symbols": [
"Keeper.UnreceivedPackets"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://github.com/cosmos/ibc-go/commit/c77f80f812940fe3b93980d13a5cdd6980e907cc"
},
{
"type": "REPORT",
"url": "https://github.com/cosmos/ibc-go/issues/1532"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2874",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0085.json
|
{
"schema_version": "1.3.1",
"id": "GO-2021-0085",
"modified": "0001-01-01T00:00:00Z",
"published": "2021-04-14T20:04:52Z",
"aliases": [
"CVE-2019-16884",
"GHSA-fgv8-vj5c-2ppq"
],
"summary": "Authorization bypass in github.com/opencontainers/runc",
"details": "AppArmor restrictions may be bypassed due to improper validation of mount targets, allowing a malicious image to mount volumes over e.g. /proc.",
"affected": [
{
"package": {
"name": "github.com/opencontainers/runc",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.0.0-rc8.0.20190930145003-cad42f6e0932"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/opencontainers/runc/libcontainer/apparmor",
"symbols": [
"ApplyProfile"
]
},
{
"path": "github.com/opencontainers/runc/libcontainer/utils",
"symbols": [
"CloseExecFrom"
]
}
]
}
},
{
"package": {
"name": "github.com/opencontainers/selinux",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.3.1-0.20190929122143-5215b1806f52"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/opencontainers/selinux/go-selinux",
"symbols": [
"readCon",
"writeCon"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://github.com/opencontainers/runc/pull/2130"
},
{
"type": "FIX",
"url": "https://github.com/opencontainers/runc/commit/cad42f6e0932db0ce08c3a3d9e89e6063ec283e4"
},
{
"type": "FIX",
"url": "https://github.com/opencontainers/selinux/commit/03b517dc4fd57245b1cf506e8ba7b817b6d309da"
},
{
"type": "WEB",
"url": "https://github.com/opencontainers/runc/issues/2128"
}
],
"credits": [
{
"name": "Leopold Schabel"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2021-0085",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0058.json
|
{
"schema_version": "1.3.1",
"id": "GO-2021-0058",
"modified": "0001-01-01T00:00:00Z",
"published": "2021-04-14T20:04:52Z",
"aliases": [
"CVE-2020-27846",
"GHSA-4hq8-gmxx-h6w9"
],
"summary": "Signature validation bypass due to XML processing error in github.com/crewjam/saml",
"details": "Due to the behavior of encoding/xml, a crafted XML document may cause XML Digital Signature validation to be entirely bypassed, causing an unsigned document to appear signed.",
"affected": [
{
"package": {
"name": "github.com/crewjam/saml",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.4.3"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/crewjam/saml",
"symbols": [
"IdentityProvider.ServeSSO",
"IdpAuthnRequest.Validate",
"ServiceProvider.ParseResponse",
"ServiceProvider.ParseXMLResponse",
"ServiceProvider.ValidateLogoutResponseForm",
"ServiceProvider.ValidateLogoutResponseRedirect",
"ServiceProvider.ValidateLogoutResponseRequest"
]
},
{
"path": "github.com/crewjam/saml/samlidp",
"symbols": [
"Server.HandlePutService",
"getSPMetadata"
]
},
{
"path": "github.com/crewjam/saml/samlsp",
"symbols": [
"FetchMetadata",
"Middleware.ServeHTTP",
"New",
"ParseMetadata"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://github.com/crewjam/saml/commit/da4f1a0612c0a8dd0452cf8b3c7a6518f6b4d053"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2021-0058",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2023-1546.json
|
{
"schema_version": "1.3.1",
"id": "GO-2023-1546",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2023-25151",
"GHSA-5r5m-65gx-7vrh"
],
"related": [
"CVE-2022-21698",
"CVE-2023-45142",
"GHSA-cg3q-j54f-5p7p",
"GHSA-rcjv-mgp8-qvmr"
],
"summary": "Denial of service in go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp",
"details": "The otelhttp package of opentelemetry-go-contrib is vulnerable to a denial-of-service attack.\n\nThe otelhttp package uses the httpconv.ServerRequest function to annotate metric measurements for the http.server.request_content_length, http.server.response_content_length, and http.server.duration instruments. The ServerRequest function sets the http.target attribute value to be the whole request URI (including the query string). The metric instruments do not \"forget\" previous measurement attributes when \"cumulative\" temporality is used, meaning that the cardinality of the measurements allocated is directly correlated with the unique URIs handled. If the query string is constantly random, this will result in a constant increase in memory allocation that can be used in a denial-of-service attack.",
"affected": [
{
"package": {
"name": "go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0.38.0"
},
{
"fixed": "0.39.0"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp",
"symbols": [
"Handler.ServeHTTP"
]
}
]
}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/open-telemetry/opentelemetry-go-contrib/security/advisories/GHSA-5r5m-65gx-7vrh"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2023-1546",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2599.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2599",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2023-45290"
],
"summary": "Memory exhaustion in multipart form parsing in net/textproto and net/http",
"details": "When parsing a multipart form (either explicitly with Request.ParseMultipartForm or implicitly with Request.FormValue, Request.PostFormValue, or Request.FormFile), limits on the total size of the parsed form were not applied to the memory consumed while reading a single form line. This permits a maliciously crafted input containing very long lines to cause allocation of arbitrarily large amounts of memory, potentially leading to memory exhaustion.\n\nWith fix, the ParseMultipartForm function now correctly limits the maximum size of form lines.",
"affected": [
{
"package": {
"name": "stdlib",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.21.8"
},
{
"introduced": "1.22.0-0"
},
{
"fixed": "1.22.1"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "net/textproto",
"symbols": [
"Reader.ReadCodeLine",
"Reader.ReadContinuedLine",
"Reader.ReadContinuedLineBytes",
"Reader.ReadDotLines",
"Reader.ReadLine",
"Reader.ReadLineBytes",
"Reader.ReadMIMEHeader",
"Reader.ReadResponse",
"Reader.readContinuedLineSlice",
"Reader.readLineSlice"
]
}
]
}
}
],
"references": [
{
"type": "REPORT",
"url": "https://go.dev/issue/65383"
},
{
"type": "FIX",
"url": "https://go.dev/cl/569341"
},
{
"type": "WEB",
"url": "https://groups.google.com/g/golang-announce/c/5pwGVUPoMbg"
}
],
"credits": [
{
"name": "Bartek Nowotarski"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2599",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2911.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2911",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"GHSA-87m9-rv8p-rgmg"
],
"summary": "go-grpc-compression has a zstd decompression bombing vulnerability in github.com/mostynb/go-grpc-compression",
"details": "go-grpc-compression has a zstd decompression bombing vulnerability in github.com/mostynb/go-grpc-compression",
"affected": [
{
"package": {
"name": "github.com/mostynb/go-grpc-compression",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "1.1.4"
},
{
"fixed": "1.2.3"
}
]
}
],
"ecosystem_specific": {}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/mostynb/go-grpc-compression/security/advisories/GHSA-87m9-rv8p-rgmg"
},
{
"type": "FIX",
"url": "https://github.com/mostynb/go-grpc-compression/commit/629c44d3acb9624993cc7de629f47d72109e2ce5"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2911",
"review_status": "UNREVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0233.json
|
{
"schema_version": "1.3.1",
"id": "GO-2022-0233",
"modified": "0001-01-01T00:00:00Z",
"published": "2022-07-01T20:18:04Z",
"aliases": [
"CVE-2021-23409",
"GHSA-xcf7-q56x-78gh"
],
"summary": "Resource exhaustion in github.com/pires/go-proxyproto",
"details": "The PROXY protocol server does not impose a timeout on reading the header from new connections, allowing a malicious client to cause resource exhaustion and a denial of service by opening many connections and sending no data on them.\n\nv0.6.0 of the proxyproto package adds support for a user-defined header timeout. v0.6.1 adds a default timeout of 200ms and v0.6.2 increases the default timeout to 10s.",
"affected": [
{
"package": {
"name": "github.com/pires/go-proxyproto",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.6.1"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/pires/go-proxyproto",
"symbols": [
"Listener.Accept"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://github.com/pires/go-proxyproto/pull/74"
},
{
"type": "FIX",
"url": "https://github.com/pires/go-proxyproto/pull/74/commits/cdc63867da24fc609b727231f682670d0d1cd346"
},
{
"type": "WEB",
"url": "https://github.com/pires/go-proxyproto/issues/65"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2022-0233",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2024-2970.json
|
{
"schema_version": "1.3.1",
"id": "GO-2024-2970",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2024-39931",
"GHSA-2vgj-3pvg-xh4w"
],
"summary": "Gogs allows deletion of internal files in github.com/gogs/gogs",
"details": "Gogs allows deletion of internal files in github.com/gogs/gogs",
"affected": [
{
"package": {
"name": "github.com/gogs/gogs",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/advisories/GHSA-2vgj-3pvg-xh4w"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-39931"
},
{
"type": "WEB",
"url": "https://github.com/gogs/gogs/releases"
},
{
"type": "WEB",
"url": "https://www.sonarsource.com/blog/securing-developer-tools-unpatched-code-vulnerabilities-in-gogs-1"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2970",
"review_status": "UNREVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-1118.json
|
{
"schema_version": "1.3.1",
"id": "GO-2022-1118",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2022-39199",
"GHSA-6cqj-6969-p57x"
],
"summary": "Improper validation of UUIDs in github.com/codenotary/immudb",
"details": "A malicious server can trick a client into treating it as a different server by changing the reported UUID.\n\nimmudb client SDKs use the server's UUID to distinguish between different server instance so that the client can connect to different immudb instances and keep the state for multiple servers. The SDK does not validate this UUID and accepts any value reported by the server. A malicious server can therefore change the reported UUID and trick the client into treating it as a different server.",
"affected": [
{
"package": {
"name": "github.com/codenotary/immudb",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.4.1"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/codenotary/immudb/pkg/client",
"symbols": [
"DefaultOptions",
"NewClient",
"NewImmuClient",
"immuClient.OpenSession"
]
}
]
}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/codenotary/immudb/security/advisories/GHSA-6cqj-6969-p57x"
},
{
"type": "FIX",
"url": "https://github.com/codenotary/immudb/commit/cade04756ff3f0a3b9e8d24149062744574adf5d"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2022-1118",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0318.json
|
{
"schema_version": "1.3.1",
"id": "GO-2022-0318",
"modified": "0001-01-01T00:00:00Z",
"published": "2022-08-01T22:20:42Z",
"aliases": [
"CVE-2022-23773"
],
"summary": "Incorrect access control in the go command in cmd/go/internal/modfetch",
"details": "Incorrect access control is possible in the go command.\n\nThe go command can misinterpret branch names that falsely appear to be version tags. This can lead to incorrect access control if an actor is authorized to create branches but not tags.",
"affected": [
{
"package": {
"name": "toolchain",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.16.14"
},
{
"introduced": "1.17.0-0"
},
{
"fixed": "1.17.7"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "cmd/go/internal/modfetch",
"symbols": [
"codeRepo.convert",
"codeRepo.validatePseudoVersion"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://go.dev/cl/378400"
},
{
"type": "FIX",
"url": "https://go.googlesource.com/go/+/fa4d9b8e2bc2612960c80474fca83a4c85a974eb"
},
{
"type": "REPORT",
"url": "https://go.dev/issue/35671"
},
{
"type": "WEB",
"url": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2022-0318",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0316.json
|
{
"schema_version": "1.3.1",
"id": "GO-2022-0316",
"modified": "0001-01-01T00:00:00Z",
"published": "2022-07-27T20:27:33Z",
"aliases": [
"CVE-2022-23628",
"GHSA-hcw3-j74m-qc58"
],
"summary": "Incorrect calculation in github.com/open-policy-agent/opa",
"details": "Pretty-printing an AST that contains synthetic nodes can change the logic of some statements by reordering array literals.",
"affected": [
{
"package": {
"name": "github.com/open-policy-agent/opa",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0.33.1"
},
{
"fixed": "0.37.2"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/open-policy-agent/opa/format",
"symbols": [
"Ast",
"MustAst",
"Source",
"groupIterable"
]
}
]
}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/open-policy-agent/opa/security/advisories/GHSA-hcw3-j74m-qc58"
},
{
"type": "FIX",
"url": "https://github.com/open-policy-agent/opa/commit/932e4ffc37a590ace79e9b75ca4340288c220239"
},
{
"type": "WEB",
"url": "https://github.com/open-policy-agent/opa/commit/2bd8edab9e10e2dc9cf76ae8335ced0c224f3055"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2022-0316",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0470.json
|
{
"schema_version": "1.3.1",
"id": "GO-2022-0470",
"modified": "0001-01-01T00:00:00Z",
"published": "2022-07-15T23:29:55Z",
"aliases": [
"CVE-2022-31022",
"GHSA-9w9f-6mg8-jp7w"
],
"summary": "No access control in github.com/blevesearch/bleve and bleve/v2",
"details": "HTTP handlers provide unauthenticated access to the local filesystem.\n\nThe Bleve http package is intended for demonstration purposes and contains no authentication, authorization, or validation of user inputs. Exposing handlers from this package can permit attackers to create files and delete directories.",
"affected": [
{
"package": {
"name": "github.com/blevesearch/bleve",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/blevesearch/bleve/http",
"symbols": [
"AliasHandler.ServeHTTP",
"CreateIndexHandler.ServeHTTP",
"DebugDocumentHandler.ServeHTTP",
"DeleteIndexHandler.ServeHTTP",
"DocCountHandler.ServeHTTP",
"DocDeleteHandler.ServeHTTP",
"DocGetHandler.ServeHTTP",
"DocIndexHandler.ServeHTTP",
"GetIndexHandler.ServeHTTP",
"ListFieldsHandler.ServeHTTP",
"SearchHandler.ServeHTTP"
]
}
]
}
},
{
"package": {
"name": "github.com/blevesearch/bleve/v2",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/blevesearch/bleve/v2/http",
"symbols": [
"AliasHandler.ServeHTTP",
"CreateIndexHandler.ServeHTTP",
"DebugDocumentHandler.ServeHTTP",
"DeleteIndexHandler.ServeHTTP",
"DocCountHandler.ServeHTTP",
"DocDeleteHandler.ServeHTTP",
"DocGetHandler.ServeHTTP",
"DocIndexHandler.ServeHTTP",
"GetIndexHandler.ServeHTTP",
"ListFieldsHandler.ServeHTTP",
"SearchHandler.ServeHTTP"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://github.com/blevesearch/bleve/commit/1c7509d6a17d36f265c90b4e8f4e3a3182fe79ff"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2022-0470",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2020-0022.json
|
{
"schema_version": "1.3.1",
"id": "GO-2020-0022",
"modified": "0001-01-01T00:00:00Z",
"published": "2021-04-14T20:04:52Z",
"aliases": [
"CVE-2014-125026",
"GHSA-4wp2-8rm2-jgmh"
],
"summary": "Out-of-bounds write in github.com/cloudflare/golz4",
"details": "LZ4 bindings use a deprecated C API that is vulnerable to memory corruption, which could lead to arbitrary code execution if called with untrusted user input.",
"affected": [
{
"package": {
"name": "github.com/cloudflare/golz4",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.0.0-20140711154735-199f5f787806"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/cloudflare/golz4",
"symbols": [
"Uncompress"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://github.com/cloudflare/golz4/commit/199f5f7878062ca17a98e079f2dbe1205e2ed898"
},
{
"type": "WEB",
"url": "https://github.com/cloudflare/golz4/issues/5"
}
],
"credits": [
{
"name": "Yann Collet"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2020-0022",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0154.json
|
{
"schema_version": "1.3.1",
"id": "GO-2021-0154",
"modified": "0001-01-01T00:00:00Z",
"published": "2022-05-25T21:11:41Z",
"aliases": [
"CVE-2014-7189"
],
"summary": "Man-in-the-middle attack with SessionTicketsDisabled in crypto/tls",
"details": "When SessionTicketsDisabled is enabled, crypto/tls allowed man-in-the-middle attackers to spoof clients via unspecified vectors.\n\nIf the server enables TLS client authentication using certificates (this is rare) and explicitly sets SessionTicketsDisabled to true in the tls.Config, then a malicious client can falsely assert ownership of any client certificate it wishes.",
"affected": [
{
"package": {
"name": "stdlib",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "1.1.0-0"
},
{
"fixed": "1.3.2"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "crypto/tls",
"symbols": [
"checkForResumption",
"decryptTicket"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://go.dev/cl/148080043"
},
{
"type": "REPORT",
"url": "https://go.dev/issue/53085"
},
{
"type": "WEB",
"url": "https://groups.google.com/g/golang-nuts/c/eeOHNw_shwU/m/OHALUmroA5kJ"
}
],
"credits": [
{
"name": "Go Team"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2021-0154",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2021-0065.json
|
{
"schema_version": "1.3.1",
"id": "GO-2021-0065",
"modified": "0001-01-01T00:00:00Z",
"published": "2021-04-14T20:04:52Z",
"aliases": [
"CVE-2019-11250",
"GHSA-jmrx-5g74-6v2f"
],
"summary": "Unauthorized credential disclosure in k8s.io/kubernetes and k8s.io/client-go",
"details": "Authorization tokens may be inappropriately logged if the verbosity level is set to a debug level.",
"affected": [
{
"package": {
"name": "k8s.io/client-go",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.17.0"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "k8s.io/client-go/transport",
"symbols": [
"basicAuthRoundTripper.RoundTrip",
"bearerAuthRoundTripper.RoundTrip",
"debuggingRoundTripper.RoundTrip",
"impersonatingRoundTripper.RoundTrip",
"userAgentRoundTripper.RoundTrip"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://github.com/kubernetes/kubernetes/pull/81330"
},
{
"type": "FIX",
"url": "https://github.com/kubernetes/kubernetes/commit/4441f1d9c3e94d9a3d93b4f184a591cab02a5245"
},
{
"type": "WEB",
"url": "https://github.com/kubernetes/kubernetes/issues/81114"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2021-0065",
"review_status": "REVIEWED"
}
}
|
osv
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/osv/GO-2022-0230.json
|
{
"schema_version": "1.3.1",
"id": "GO-2022-0230",
"modified": "0001-01-01T00:00:00Z",
"published": "2022-07-01T20:17:57Z",
"aliases": [
"CVE-2021-20206",
"GHSA-xjqr-g762-pxwp"
],
"summary": "Improper limitation of path name in github.com/containernetworking/cni",
"details": "The FindInPath function is vulnerable to directory traversal attacks, potentially permitting attackers to execute arbitrary binaries.\n\nThis function does not sanitize its plugin parameter, so parameter names containing \"../\" or other such elements may reference arbitrary locations on the filesystem.",
"affected": [
{
"package": {
"name": "github.com/containernetworking/cni",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.8.1"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/containernetworking/cni/pkg/invoke",
"symbols": [
"DelegateAdd",
"DelegateCheck",
"DelegateDel",
"FindInPath",
"RawExec.FindInPath"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://github.com/containernetworking/cni/pull/808"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919391"
},
{
"type": "WEB",
"url": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMCONTAINERNETWORKINGCNIPKGINVOKE-1070549"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2022-0230",
"review_status": "REVIEWED"
}
}
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2609.yaml
|
id: GO-2024-2609
modules:
- module: std
versions:
- fixed: 1.21.8
- introduced: 1.22.0-0
- fixed: 1.22.1
vulnerable_at: 1.22.0
packages:
- package: net/mail
symbols:
- addrParser.consumeGroupList
- addrParser.consumePhrase
- isAtext
derived_symbols:
- Address.String
- AddressParser.Parse
- AddressParser.ParseList
- Header.AddressList
- ParseAddress
- ParseAddressList
summary: Comments in display names are incorrectly handled in net/mail
description: |-
The ParseAddressList function incorrectly handles comments (text within
parentheses) within display names. Since this is a misalignment with conforming
address parsers, it can result in different trust decisions being made by
programs using different parsers.
credits:
- Juho Nurminen of Mattermost
- Slonser (https://github.com/Slonser)
references:
- report: https://go.dev/issue/65083
- fix: https://go.dev/cl/555596
- web: https://groups.google.com/g/golang-announce/c/5pwGVUPoMbg
cve_metadata:
id: CVE-2024-24784
cwe: 'CWE-150: Improper Neutralization of Escape, Meta, or Control Sequences'
references:
- https://security.netapp.com/advisory/ntap-20240329-0007/
- http://www.openwall.com/lists/oss-security/2024/03/08/4
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1187.yaml
|
id: GO-2022-1187
modules:
- module: github.com/go-macaron/i18n
versions:
- fixed: 0.5.0
vulnerable_at: 0.0.0-20200216154541-326bc77d7eb1
packages:
- package: github.com/go-macaron/i18n
symbols:
- I18n
summary: Open redirect vulnerability in github.com/go-macaron/i18n
description: A user controlled string could lead to open redirect.
cves:
- CVE-2020-36627
ghsas:
- GHSA-jwrv-x6rx-8vfm
references:
- web: https://vuldb.com/?id.216745
- fix: https://github.com/go-macaron/i18n/commit/329b0c4844cc16a5a253c011b55180598e707735
- web: https://github.com/go-macaron/i18n/releases/tag/v0.5.0
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2701.yaml
|
id: GO-2024-2701
modules:
- module: github.com/stacklok/minder
versions:
- introduced: 0.0.39
- fixed: 0.0.40
vulnerable_at: 0.0.39
summary: Minder GetRepositoryByName data leak in github.com/stacklok/minder
cves:
- CVE-2024-31455
ghsas:
- GHSA-ggp5-28x4-xcj9
references:
- advisory: https://github.com/stacklok/minder/security/advisories/GHSA-ggp5-28x4-xcj9
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-31455
- fix: https://github.com/stacklok/minder/commit/11b6573ad62cfdd783a8bb52f3fce461466037f4
- fix: https://github.com/stacklok/minder/commit/5c381cfbf3e4b7ce040ed8511a1fae1a78a0014b
- fix: https://github.com/stacklok/minder/pull/2941
source:
id: GHSA-ggp5-28x4-xcj9
created: 2024-05-17T16:13:47.983144-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0049.yaml
|
id: GO-2020-0049
modules:
- module: github.com/justinas/nosurf
versions:
- fixed: 1.1.1
vulnerable_at: 1.1.0
packages:
- package: github.com/justinas/nosurf
symbols:
- VerifyToken
- verifyToken
derived_symbols:
- CSRFHandler.ServeHTTP
summary: Improper input validation in github.com/justinas/nosurf
description: |-
Due to improper validation of caller input, validation is silently disabled if
the provided expected token is malformed, causing any user supplied token to be
considered valid.
published: 2021-04-14T20:04:52Z
ghsas:
- GHSA-5x84-q523-vvwr
credits:
- '@aeneasr'
references:
- fix: https://github.com/justinas/nosurf/pull/60
- fix: https://github.com/justinas/nosurf/commit/4d86df7a4affa1fa50ab39fb09aac56c3ce9c314
cve_metadata:
id: CVE-2020-36564
cwe: 'CWE 345: Insufficient Verification of Data Authenticity'
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0258.yaml
|
id: GO-2021-0258
modules:
- module: github.com/pomerium/pomerium
versions:
- fixed: 0.15.6
vulnerable_at: 0.15.5
packages:
- package: github.com/pomerium/pomerium/internal/identity/manager
symbols:
- Manager.onUpdateRecords
derived_symbols:
- Manager.Run
- Manager.RunLeased
summary: Incorrect authorization in github.com/pomerium/pomerium
description: |-
Pomerium is an open source identity-aware access proxy. Changes to the OIDC
claims of a user after initial login are not reflected in policy evaluation when
using allowed_idp_claims as part of policy. If using allowed_idp_claims and a
user's claims are changed, Pomerium can make incorrect authorization decisions.
For users unable to upgrade clear data on databroker service by clearing redis
or restarting the in-memory databroker to force claims to be updated.
published: 2022-01-14T17:30:31Z
cves:
- CVE-2021-41230
ghsas:
- GHSA-j6wp-3859-vxfg
references:
- fix: https://github.com/pomerium/pomerium/pull/2724
- fix: https://github.com/pomerium/pomerium/commit/f20542c4bf2cc691e4c324f7ec79e02e46d95511
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2898.yaml
|
id: GO-2024-2898
modules:
- module: github.com/argoproj/argo-cd
versions:
- introduced: 0.11.0
vulnerable_at: 1.8.6
- module: github.com/argoproj/argo-cd/v2
versions:
- fixed: 2.9.17
- introduced: 2.10.0
- fixed: 2.10.12
- introduced: 2.11.0
- fixed: 2.11.3
vulnerable_at: 2.11.2
summary: Argo-cd authenticated users can enumerate clusters by name in github.com/argoproj/argo-cd
cves:
- CVE-2024-36106
ghsas:
- GHSA-3cqf-953p-h5cp
unknown_aliases:
- BIT-argo-cd-2024-36106
references:
- advisory: https://github.com/argoproj/argo-cd/security/advisories/GHSA-3cqf-953p-h5cp
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-36106
- fix: https://github.com/argoproj/argo-cd/commit/c2647055c261a550e5da075793260f6524e65ad9
source:
id: GHSA-3cqf-953p-h5cp
created: 2024-06-27T15:55:03.407268-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2813.yaml
|
id: GO-2024-2813
modules:
- module: github.com/jub0bs/cors
versions:
- fixed: 0.1.3
vulnerable_at: 0.1.2
packages:
- package: github.com/jub0bs/cors/internal/origins/radix
symbols:
- Tree.Contains
- Tree.Insert
summary: Some CORS middleware allow untrusted origins in github.com/jub0bs/cors
description: |-
Some CORS middleware (more specifically those created by specifying two or more
origin patterns whose hosts share a proper suffix) incorrectly allow some
untrusted origins, thereby opening the door to cross-origin attacks from the
untrusted origins in question.
For example, specifying origin patterns "https://foo.com" and "https://bar.com"
(in that order) would yield a middleware that would incorrectly allow untrusted
origin "https://barfoo.com".
ghsas:
- GHSA-vhxv-fg4m-p2w8
related:
- GHSA-v84h-653v-4pq9
references:
- advisory: https://github.com/jub0bs/cors/security/advisories/GHSA-vhxv-fg4m-p2w8
- fix: https://github.com/jub0bs/cors/commit/63900fa1776237095fa0ed47ff85791e21f3a7d7
source:
id: GHSA-vhxv-fg4m-p2w8
created: 2024-05-20T16:46:53.79904-04:00
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2648.yaml
|
id: GO-2024-2648
modules:
- module: github.com/go-vela/server
versions:
- fixed: 0.23.2
vulnerable_at: 0.23.1
summary: Server/API for Vela Insecure Variable Substitution in github.com/go-vela/server
ghsas:
- GHSA-69p4-j5v5-x234
references:
- advisory: https://github.com/go-vela/server/security/advisories/GHSA-69p4-j5v5-x234
- fix: https://github.com/go-vela/server/commit/a645c822da1d91e1f4159b69685224232683bebb
source:
id: GHSA-69p4-j5v5-x234
created: 2024-05-17T16:14:32.195885-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0230.yaml
|
id: GO-2022-0230
modules:
- module: github.com/containernetworking/cni
versions:
- fixed: 0.8.1
vulnerable_at: 0.8.0
packages:
- package: github.com/containernetworking/cni/pkg/invoke
symbols:
- FindInPath
derived_symbols:
- DelegateAdd
- DelegateCheck
- DelegateDel
- RawExec.FindInPath
summary: Improper limitation of path name in github.com/containernetworking/cni
description: |-
The FindInPath function is vulnerable to directory traversal attacks,
potentially permitting attackers to execute arbitrary binaries.
This function does not sanitize its plugin parameter, so parameter names
containing "../" or other such elements may reference arbitrary locations on the
filesystem.
published: 2022-07-01T20:17:57Z
cves:
- CVE-2021-20206
ghsas:
- GHSA-xjqr-g762-pxwp
references:
- fix: https://github.com/containernetworking/cni/pull/808
- web: https://bugzilla.redhat.com/show_bug.cgi?id=1919391
- web: https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMCONTAINERNETWORKINGCNIPKGINVOKE-1070549
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2383.yaml
|
id: GO-2023-2383
modules:
- module: cmd
versions:
- fixed: 1.20.12
- introduced: 1.21.0-0
- fixed: 1.21.5
vulnerable_at: 1.21.4
packages:
- package: cmd/go
summary: Command 'go get' may unexpectedly fallback to insecure git in cmd/go
description: |-
Using go get to fetch a module with the ".git" suffix may unexpectedly fallback
to the insecure "git://" protocol if the module is unavailable via the secure
"https://" and "git+ssh://" protocols, even if GOINSECURE is not set for said
module. This only affects users who are not using the module proxy and are
fetching modules directly (i.e. GOPROXY=off).
credits:
- David Leadbeater
references:
- web: https://groups.google.com/g/golang-dev/c/6ypN5EjibjM/m/KmLVYH_uAgAJ
- report: https://go.dev/issue/63845
- fix: https://go.dev/cl/540257
cve_metadata:
id: CVE-2023-45285
cwe: 'CWE-636: Not Failing Securely (''Failing Open'')'
references:
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UIU6HOGV6RRIKWM57LOXQA75BGZSIH6G/
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2947.yaml
|
id: GO-2024-2947
modules:
- module: github.com/hashicorp/go-retryablehttp
versions:
- fixed: 0.7.7
vulnerable_at: 0.7.6
packages:
- package: github.com/hashicorp/go-retryablehttp
symbols:
- Client.Do
derived_symbols:
- Client.Get
- Client.Head
- Client.Post
- Client.PostForm
- Get
- Head
- Post
- PostForm
- RoundTripper.RoundTrip
summary: |-
Leak of sensitive information to log files in
github.com/hashicorp/go-retryablehttp
description: |-
URLs were not sanitized when writing them to log files. This could lead to
writing sensitive HTTP basic auth credentials to the log file.
cves:
- CVE-2024-6104
ghsas:
- GHSA-v6v8-xj6m-xwqh
references:
- advisory: https://github.com/advisories/GHSA-v6v8-xj6m-xwqh
- fix: https://github.com/hashicorp/go-retryablehttp/commit/a99f07beb3c5faaa0a283617e6eb6bcf25f5049a
- web: https://discuss.hashicorp.com/t/hcsec-2024-12-go-retryablehttp-can-leak-basic-auth-credentials-to-log-files/68027
source:
id: GHSA-v6v8-xj6m-xwqh
created: 2024-06-25T10:14:42.391443-07:00
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2659.yaml
|
id: GO-2024-2659
modules:
- module: github.com/docker/docker
versions:
- introduced: 25.0.0+incompatible
- fixed: 25.0.5+incompatible
- introduced: 26.0.0-rc1+incompatible
- fixed: 26.0.0-rc3+incompatible
vulnerable_at: 26.0.0-rc1+incompatible
summary: Data exfiltration from internal networks in github.com/docker/docker
description: |-
dockerd forwards DNS requests to the host loopback device, bypassing the
container network namespace's normal routing semantics, networks marked as
'internal' can unexpectedly forward DNS requests to an external nameserver. By
registering a domain for which they control the authoritative nameservers, an
attacker could arrange for a compromised container to exfiltrate data by
encoding it in DNS queries that will eventually be answered by their
nameservers.
cves:
- CVE-2024-29018
ghsas:
- GHSA-mq39-4gv4-mvpx
credits:
- '@robmry'
- '@akerouanton'
- '@neersighted'
- '@gabriellavengeo'
references:
- advisory: https://github.com/moby/moby/security/advisories/GHSA-mq39-4gv4-mvpx
- web: https://github.com/moby/moby/pull/46609
notes:
- 23.0.11 is not yet released. It can be added as a fix once it is.
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2955.yaml
|
id: GO-2024-2955
modules:
- module: github.com/gin-contrib/cors
versions:
- fixed: 1.6.0
vulnerable_at: 1.5.0
packages:
- package: github.com/gin-contrib/cors
symbols:
- Config.parseWildcardRules
derived_symbols:
- Default
- New
summary: Gin mishandles a wildcard in the origin string in github.com/gin-contrib/cors
description: |-
Gin-Gonic CORS middleware mishandles a wildcard at the end of an origin string.
Examples: https://example.community/* is accepted by the origin string
https://example.com/* and http://localhost.example.com/* is accepted by the
origin string http://localhost/* .
cves:
- CVE-2019-25211
ghsas:
- GHSA-869c-j7wc-8jqv
credits:
- '@maxshine'
references:
- advisory: https://github.com/advisories/GHSA-869c-j7wc-8jqv
- fix: https://github.com/gin-contrib/cors/commit/27b723a473efd80d5a498fa9f5933c80204c850d
- fix: https://github.com/gin-contrib/cors/pull/106
- fix: https://github.com/gin-contrib/cors/pull/57
- web: https://github.com/gin-contrib/cors/compare/v1.5.0...v1.6.0
- web: https://github.com/gin-contrib/cors/releases/tag/v1.6.0
source:
id: GHSA-869c-j7wc-8jqv
created: 2024-07-02T10:00:03.105364-07:00
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2469.yaml
|
id: GO-2024-2469
modules:
- module: github.com/kudelskisecurity/crystals-go
versions:
- fixed: 0.0.0-20240116172146-2a6ca2d4e64d
vulnerable_at: 0.0.0-20240110153620-c06ce985b2b8
packages:
- package: github.com/kudelskisecurity/crystals-go/crystals-kyber
symbols:
- Kyber.Decrypt
- Kyber.Encaps
- Kyber.Decaps
summary: Kyberslash timing attack possible in github.com/kudelskisecurity/crystals-go
ghsas:
- GHSA-f6jh-hvg2-9525
references:
- advisory: https://github.com/kudelskisecurity/crystals-go/security/advisories/GHSA-f6jh-hvg2-9525
- fix: https://github.com/kudelskisecurity/crystals-go/pull/20
- fix: https://github.com/kudelskisecurity/crystals-go/pull/21
- report: https://github.com/kudelskisecurity/crystals-go/issues/19
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2614.yaml
|
id: GO-2024-2614
modules:
- module: github.com/IceWhaleTech/CasaOS-UserService
versions:
- introduced: 0.4.4-3-alpha1
- fixed: 0.4.7
vulnerable_at: 0.4.6-alpha3
packages:
- package: github.com/IceWhaleTech/CasaOS-UserService/route/v1
symbols:
- PostUserLogin
summary: Password brute force attack in github.com/IceWhaleTech/CasaOS-UserService
description: |-
The CasaOS web application does not have protection against password brute force
attacks. An attacker can use a password brute force attack to find and gain full
access to the server. This vulnerability allows attackers to get super
user-level access over the server.
cves:
- CVE-2024-24767
ghsas:
- GHSA-c69x-5xmw-v44x
credits:
- DrDark1999
references:
- advisory: https://github.com/IceWhaleTech/CasaOS-UserService/security/advisories/GHSA-c69x-5xmw-v44x
- fix: https://github.com/IceWhaleTech/CasaOS-UserService/commit/62006f61b55951048dbace4ebd9e483274838699
- web: https://github.com/IceWhaleTech/CasaOS-UserService/releases/tag/v0.4.7
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2852.yaml
|
id: GO-2024-2852
modules:
- module: github.com/grafana/grafana
non_go_versions:
- introduced: 5.3.0
- fixed: 8.3.10
- introduced: 8.4.0
- fixed: 8.4.10
- introduced: 8.5.0
- fixed: 8.5.9
- introduced: 9.0.0
- fixed: 9.0.3
vulnerable_at: 5.4.5+incompatible
summary: Grafana account takeover via OAuth vulnerability in github.com/grafana/grafana
cves:
- CVE-2022-31107
ghsas:
- GHSA-mx47-6497-3fv2
unknown_aliases:
- BIT-grafana-2022-31107
references:
- advisory: https://github.com/grafana/grafana/security/advisories/GHSA-mx47-6497-3fv2
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2022-31107
- web: https://grafana.com/docs/grafana/next/release-notes/release-notes-8-4-10
- web: https://grafana.com/docs/grafana/next/release-notes/release-notes-8-5-9
- web: https://grafana.com/docs/grafana/next/release-notes/release-notes-9-0-3
- web: https://security.netapp.com/advisory/ntap-20220901-0010
source:
id: GHSA-mx47-6497-3fv2
created: 2024-06-26T14:07:05.767763-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2760.yaml
|
id: GO-2024-2760
modules:
- module: github.com/rancher/rancher
non_go_versions:
- fixed: 2.4.18
- introduced: 2.5.0
- fixed: 2.5.12
- introduced: 2.6.0
- fixed: 2.6.3
vulnerable_at: 1.6.30
summary: |-
Rancher's Failure to delete orphaned role bindings does not revoke project level
access from group based authentication in github.com/rancher/rancher
cves:
- CVE-2021-36775
ghsas:
- GHSA-28g7-896h-695v
references:
- advisory: https://github.com/rancher/rancher/security/advisories/GHSA-28g7-896h-695v
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2021-36775
- web: https://bugzilla.suse.com/show_bug.cgi?id=1189120
source:
id: GHSA-28g7-896h-695v
created: 2024-06-04T15:29:05.58925-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0438.yaml
|
id: GO-2022-0438
modules:
- module: github.com/hashicorp/go-getter
versions:
- fixed: 1.5.11
vulnerable_at: 1.5.10
packages:
- package: github.com/hashicorp/go-getter
symbols:
- RedactURL
derived_symbols:
- Client.ChecksumFromFile
- Client.Get
- FolderStorage.Get
- Get
- GetAny
- GetFile
- HttpGetter.Get
summary: Exposure of sensitive information via log file in github.com/hashicorp/go-getter
description: |-
The getter package can write SSH credentials to its logfile, exposing
credentials to local users able to read the logfile.
published: 2022-07-01T20:07:52Z
cves:
- CVE-2022-29810
ghsas:
- GHSA-27rq-4943-qcwp
references:
- fix: https://github.com/hashicorp/go-getter/pull/348
- fix: https://github.com/hashicorp/go-getter/commit/36b68b2f68a3ed10ee7ecbb0cb9f6b1dc5da49cc
- web: https://github.com/hashicorp/go-getter/releases/tag/v1.5.11
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2722.yaml
|
id: GO-2024-2722
modules:
- module: github.com/traefik/traefik
vulnerable_at: 1.7.34
- module: github.com/traefik/traefik/v2
versions:
- fixed: 2.11.2
vulnerable_at: 2.11.1
- module: github.com/traefik/traefik/v3
versions:
- introduced: 3.0.0-beta3
- fixed: 3.0.0-rc5
vulnerable_at: 3.0.0-rc4
summary: Traefik vulnerable to denial of service with Content-length header in github.com/traefik/traefik
cves:
- CVE-2024-28869
ghsas:
- GHSA-4vwx-54mw-vqfw
references:
- advisory: https://github.com/traefik/traefik/security/advisories/GHSA-4vwx-54mw-vqfw
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-28869
- fix: https://github.com/traefik/traefik/commit/240b83b77351dfd8cadb91c305b84e9d22e0f9c6
- web: https://doc.traefik.io/traefik/routing/entrypoints/#respondingtimeouts
- web: https://github.com/traefik/traefik/releases/tag/v2.11.2
- web: https://github.com/traefik/traefik/releases/tag/v3.0.0-rc5
source:
id: GHSA-4vwx-54mw-vqfw
created: 2024-06-26T14:00:53.030675-04:00
review_status: UNREVIEWED
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.