repo_id
stringclasses
927 values
file_path
stringlengths
99
214
content
stringlengths
2
4.15M
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2412.yaml
id: GO-2023-2412 modules: - module: github.com/containerd/containerd versions: - fixed: 1.6.26 - introduced: 1.7.0 - fixed: 1.7.11 vulnerable_at: 1.7.10 packages: - package: github.com/containerd/containerd/contrib/apparmor symbols: - generate derived_symbols: - DumpDefaultProfile - LoadDefaultProfile summary: RAPL accessibility in github.com/containerd/containerd ghsas: - GHSA-7ww5-4wqc-m92c references: - advisory: https://github.com/containerd/containerd/security/advisories/GHSA-7ww5-4wqc-m92c - fix: https://github.com/containerd/containerd/commit/67d356cb3095f3e8f8ad7d36f9a733fea1e7e28c - fix: https://github.com/containerd/containerd/commit/746b910f05855c8bfdb4415a1c0f958b234910e5 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2655.yaml
id: GO-2024-2655 modules: - module: github.com/zitadel/zitadel versions: - fixed: 1.80.0-v2.20.0.20240312162750-5908b97e7c22 non_go_versions: - fixed: 2.41.15 - introduced: 2.42.0 - fixed: 2.42.15 - introduced: 2.43.0 - fixed: 2.43.9 - introduced: 2.44.0 - fixed: 2.44.3 - introduced: 2.45.0 - fixed: 2.45.1 - introduced: 2.46.0 - fixed: 2.46.1 - introduced: 2.47.0 - fixed: 2.47.4 vulnerable_at: 1.80.0-v2.20 packages: - package: github.com/zitadel/zitadel/internal/renderer skip_fix: Uses replacement directives. summary: XSS in github.com/zitadel/zitadel description: |- The Login UI did not sanitize input parameters. An attacker could create a malicious link, where injected code would be rendered as part of the login screen. cves: - CVE-2024-28855 ghsas: - GHSA-hfrg-4jwr-jfpj credits: - Daniel Philipp (OWT) and Thomas Wickham (Synopsis) references: - advisory: https://github.com/zitadel/zitadel/security/advisories/GHSA-hfrg-4jwr-jfpj - fix: https://github.com/zitadel/zitadel/commit/07ec2efa9dc62f7a6c3a58c112b2879d24bc3e3c notes: - 1.80.0-v2.20.0.20240312162750-5908b97e7c22 corresponds to 2.47.4. We are using this as a timestamp. review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0187.yaml
id: GO-2022-0187 modules: - module: std versions: - introduced: 1.6.0-0 - fixed: 1.7.6 - introduced: 1.8.0-0 - fixed: 1.8.2 vulnerable_at: 1.8.1 packages: - package: crypto/elliptic goarch: - amd64 symbols: - p256SubInternal summary: Incorrect computation for P-256 curves in crypto/elliptic description: |- The ScalarMult implementation of curve P-256 for amd64 architectures generates incorrect results for certain specific input points. An adaptive attack can progressively extract the scalar input to ScalarMult by submitting crafted points and observing failures to derive correct output. This leads to a full key recovery attack against static ECDH, as used in popular JWT libraries. published: 2022-07-01T20:11:15Z cves: - CVE-2017-8932 credits: - Vlad Krasnov - Filippo Valsorda at Cloudflare references: - fix: https://go.dev/cl/41070 - fix: https://go.googlesource.com/go/+/9294fa2749ffee7edbbb817a0ef9fe633136fa9c - report: https://go.dev/issue/20040 - web: https://groups.google.com/g/golang-announce/c/B5ww0iFt1_Q/m/TgUFJV14BgAJ review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1998.yaml
id: GO-2023-1998 modules: - module: github.com/projectdiscovery/nuclei/v2 versions: - fixed: 2.9.9 vulnerable_at: 2.9.8 packages: - package: github.com/projectdiscovery/nuclei/v2/cmd/nuclei symbols: - readConfig derived_symbols: - init#1 - main - package: github.com/projectdiscovery/nuclei/v2/pkg/protocols/common/generators symbols: - New - PayloadGenerator.loadPayloads - package: github.com/projectdiscovery/nuclei/v2/pkg/protocols/common/protocolstate symbols: - Init - package: github.com/projectdiscovery/nuclei/v2/pkg/protocols/dns symbols: - Request.Compile - package: github.com/projectdiscovery/nuclei/v2/pkg/protocols/http symbols: - Request.Compile - package: github.com/projectdiscovery/nuclei/v2/pkg/protocols/headless symbols: - Request.Compile - package: github.com/projectdiscovery/nuclei/v2/pkg/protocols/network symbols: - Request.Compile - package: github.com/projectdiscovery/nuclei/v2/pkg/protocols/websocket symbols: - Request.Compile summary: |- Improper path sanitization in sandbox mode in github.com/projectdiscovery/nuclei/v2 cves: - CVE-2023-37896 ghsas: - GHSA-2xx4-jj5v-6mff credits: - keomutchoiboi references: - advisory: https://github.com/projectdiscovery/nuclei/security/advisories/GHSA-2xx4-jj5v-6mff - fix: https://github.com/projectdiscovery/nuclei/pull/3927 - web: https://github.com/projectdiscovery/nuclei/releases/tag/v2.9.9 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2511.yaml
id: GO-2024-2511 modules: - module: github.com/hashicorp/vault versions: - introduced: 1.15.0 - fixed: 1.15.5 vulnerable_at: 1.15.4 summary: Hashicorp Vault may expose sensitive log information in github.com/hashicorp/vault cves: - CVE-2024-0831 ghsas: - GHSA-vgh3-mwxq-rcp8 unknown_aliases: - BIT-vault-2024-0831 references: - advisory: https://github.com/advisories/GHSA-vgh3-mwxq-rcp8 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-0831 - fix: https://github.com/hashicorp/vault/commit/2a72f2a8a5b57de88c22a2a94c4a5f08c6f3770b - web: https://developer.hashicorp.com/vault/docs/upgrading/upgrade-to-1.15.x#audit-devices-could-log-raw-data-despite-configuration - web: https://discuss.hashicorp.com/t/hcsec-2024-01-vault-may-expose-sensitive-information-when-configuring-an-audit-log-device/62311 - web: https://security.netapp.com/advisory/ntap-20240223-0005 source: id: GHSA-vgh3-mwxq-rcp8 created: 2024-06-14T11:38:56.000042-04:00 review_status: UNREVIEWED unexcluded: EFFECTIVELY_PRIVATE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0461.yaml
id: GO-2022-0461 modules: - module: github.com/pion/dtls/v2 versions: - fixed: 2.1.4 vulnerable_at: 2.1.3 packages: - package: github.com/pion/dtls/v2 symbols: - fragmentBuffer.push derived_symbols: - Client - ClientWithContext - Dial - DialWithContext - Resume - Server - ServerWithContext - handshakeFSM.Run - listener.Accept summary: Unbounded memory consumption in github.com/pion/dtls/v2 description: |- Attacker can cause unbounded memory consumption. The Pion DTLS client and server buffer handshake data with no upper limit, permitting an attacker to cause unbounded memory consumption by sending an unterminated handshake. published: 2022-07-01T20:07:25Z cves: - CVE-2022-29189 ghsas: - GHSA-cx94-mrg9-rq4j references: - fix: https://github.com/pion/dtls/commit/a6397ff7282bc56dc37a68ea9211702edb4de1de review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2664.yaml
id: GO-2024-2664 modules: - module: github.com/zitadel/zitadel non_go_versions: - fixed: 2.42.17 - introduced: 2.43.0 - fixed: 2.43.11 - introduced: 2.44.0 - fixed: 2.44.7 - introduced: 2.45.0 - fixed: 2.45.5 - introduced: 2.46.0 - fixed: 2.46.5 - introduced: 2.47.0 - fixed: 2.47.8 - introduced: 2.48.0 - fixed: 2.48.3 vulnerable_at: 1.87.5 summary: ZITADEL's actions can overload reserved claims in github.com/zitadel/zitadel cves: - CVE-2024-29892 ghsas: - GHSA-gp8g-f42f-95q2 references: - advisory: https://github.com/zitadel/zitadel/security/advisories/GHSA-gp8g-f42f-95q2 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-29892 - web: https://github.com/zitadel/zitadel/releases/tag/v2.42.17 - web: https://github.com/zitadel/zitadel/releases/tag/v2.43.11 - web: https://github.com/zitadel/zitadel/releases/tag/v2.44.7 - web: https://github.com/zitadel/zitadel/releases/tag/v2.45.5 - web: https://github.com/zitadel/zitadel/releases/tag/v2.46.5 - web: https://github.com/zitadel/zitadel/releases/tag/v2.47.8 - web: https://github.com/zitadel/zitadel/releases/tag/v2.48.3 source: id: GHSA-gp8g-f42f-95q2 created: 2024-06-04T15:37:24.2634-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2459.yaml
id: GO-2024-2459 modules: - module: github.com/quic-go/quic-go versions: - fixed: 0.37.7 - introduced: 0.38.0 - fixed: 0.38.2 - introduced: 0.39.0 - fixed: 0.39.4 - introduced: 0.40.0 - fixed: 0.40.1 vulnerable_at: 0.40.0 summary: Denial of service via path validation in github.com/quic-go/quic-go cves: - CVE-2023-49295 ghsas: - GHSA-ppxx-5m9h-6vxf references: - advisory: https://nvd.nist.gov/vuln/detail/CVE-2023-49295 - fix: https://github.com/quic-go/quic-go/commit/17fc98c2d81dbe685c19702dc694a9d606ac56dc - fix: https://github.com/quic-go/quic-go/commit/21609ddfeff93668c7625a85eb09f1541fdad965 - fix: https://github.com/quic-go/quic-go/commit/3a9c18bcd27a01c551ac9bf8bd2b4bded77c189a - fix: https://github.com/quic-go/quic-go/commit/554d543b50b917369fb1394cc5396d928166cf49 - fix: https://github.com/quic-go/quic-go/commit/6cc3d58935426191296171a6c0d1ee965e10534e - fix: https://github.com/quic-go/quic-go/commit/9aaefe19fc3dc8c8917cc87e6128bb56d9e9e6cc - fix: https://github.com/quic-go/quic-go/commit/a0ffa757499913f7be69aa78f573a6aee3430ae4 - fix: https://github.com/quic-go/quic-go/commit/d7aa627ebde91cf799ada2a07443faa9b1e5abb8 - web: https://seemann.io/posts/2023-12-18-exploiting-quics-path-validation/ review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2595.yaml
id: GO-2024-2595 modules: - module: github.com/mattermost/mattermost-server versions: - introduced: 9.0.0+incompatible - fixed: 9.4.2+incompatible vulnerable_at: 9.4.2-rc2+incompatible - module: github.com/mattermost/mattermost-server/v5 vulnerable_at: 5.39.3 - module: github.com/mattermost/mattermost-server/v6 vulnerable_at: 6.7.2 - module: github.com/mattermost/mattermost/server/v8 non_go_versions: - fixed: 8.1.9 vulnerable_at: 8.0.0-20240626184126-817e18414e41 summary: Mattermost fails to properly restrict the access of files attached to posts in github.com/mattermost/mattermost-server cves: - CVE-2024-23488 ghsas: - GHSA-xgxj-j98c-59rv unknown_aliases: - CGA-cp3f-8rch-xvmv references: - advisory: https://github.com/advisories/GHSA-xgxj-j98c-59rv - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-23488 - web: https://mattermost.com/security-updates source: id: GHSA-xgxj-j98c-59rv created: 2024-06-26T16:13:06.887134-04:00 review_status: UNREVIEWED unexcluded: EFFECTIVELY_PRIVATE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0213.yaml
id: GO-2022-0213 modules: - module: std versions: - fixed: 1.12.11 - introduced: 1.13.0-0 - fixed: 1.13.2 vulnerable_at: 1.13.1 packages: - package: crypto/dsa symbols: - Verify skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)' summary: Panic on invalid DSA public keys in crypto/dsa description: |- Invalid DSA public keys can cause a panic in dsa.Verify. In particular, using crypto/x509.Verify on a crafted X.509 certificate chain can lead to a panic, even if the certificates don't chain to a trusted root. The chain can be delivered via a crypto/tls connection to a client, or to a server that accepts and verifies client certificates. net/http clients can be made to crash by an HTTPS server, while net/http servers that accept client certificates will recover the panic and are unaffected. Moreover, an application might crash invoking crypto/x509.(*CertificateRequest).CheckSignature on an X.509 certificate request, parsing a golang.org/x/crypto/openpgp Entity, or during a golang.org/x/crypto/otr conversation. Finally, a golang.org/x/crypto/ssh client can panic due to a malformed host key, while a server could panic if either PublicKeyCallback accepts a malformed public key, or if IsUserAuthority accepts a certificate with a malformed public key. published: 2022-05-24T20:14:11Z cves: - CVE-2019-17596 credits: - Daniel M - ragona references: - fix: https://go.dev/cl/205441 - fix: https://go.googlesource.com/go/+/552987fdbf4c2bc9641016fd323c3ae5d3a0d9a3 - report: https://go.dev/issue/34960 - web: https://groups.google.com/g/golang-announce/c/lVEm7llp0w0/m/VbafyRkgCgAJ review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0166.yaml
id: GO-2022-0166 modules: - module: std versions: - fixed: 1.5.4 - introduced: 1.6.0-0 - fixed: 1.6.1 vulnerable_at: 1.6.0 packages: - package: crypto/dsa symbols: - Verify skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)' summary: Denial of service due to unchecked parameters in crypto/dsa description: |- The Verify function in crypto/dsa passed certain parameters unchecked to the underlying big integer library, possibly leading to extremely long-running computations, which in turn makes Go programs vulnerable to remote denial of service attacks. Programs using HTTPS client certificates or the Go SSH server libraries are both exposed to this vulnerability. published: 2022-05-24T22:06:33Z cves: - CVE-2016-3959 credits: - David Wong references: - fix: https://go.dev/cl/21533 - fix: https://go.googlesource.com/go/+/eb876dd83cb8413335d64e50aae5d38337d1ebb4 - report: https://go.dev/issue/15184 - web: https://groups.google.com/g/golang-announce/c/9eqIHqaWvck review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1766.yaml
id: GO-2023-1766 modules: - module: github.com/ipfs/go-libipfs versions: - fixed: 0.4.1 - introduced: 0.5.0 - fixed: 0.6.0 vulnerable_at: 0.5.0 packages: - package: github.com/ipfs/go-libipfs/bitswap/server - module: github.com/ipfs/go-bitswap versions: - fixed: 0.12.0 vulnerable_at: 0.11.0 packages: - package: github.com/ipfs/go-bitswap/server summary: Denial of service from memory leak in github.com/ipfs/go-libipfs description: |- An attacker can cause a Bitswap server to allocate and leak unbounded amounts of memory. cves: - CVE-2023-25568 ghsas: - GHSA-m974-xj4j-7qv5 - GHSA-q3j6-22wf-3jh9 references: - advisory: https://github.com/ipfs/go-libipfs/security/advisories/GHSA-m974-xj4j-7qv5 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0400.yaml
id: GO-2022-0400 modules: - module: github.com/ntbosscher/gobase versions: - fixed: 0.7.2 vulnerable_at: 0.7.1 packages: - package: github.com/ntbosscher/gobase/auth/httpauth symbols: - Setup - middleware summary: Race condition in github.com/ntbosscher/gobase description: A race condition can cause incorrect HTTP request routing. published: 2022-07-01T20:10:50Z ghsas: - GHSA-4348-x292-h437 - GHSA-h2x7-2ff6-v32p references: - fix: https://github.com/ntbosscher/gobase/commit/a8d40bce9c429d324122d18c446924dab809e812 cve_metadata: id: CVE-2022-2583 cwe: CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2477.yaml
id: GO-2024-2477 modules: - module: github.com/openfga/openfga versions: - fixed: 1.4.3 vulnerable_at: 1.4.2 summary: OpenFGA denial of service in github.com/openfga/openfga cves: - CVE-2024-23820 ghsas: - GHSA-rxpw-85vw-fx87 references: - advisory: https://github.com/openfga/openfga/security/advisories/GHSA-rxpw-85vw-fx87 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-23820 - fix: https://github.com/openfga/openfga/commit/908ac85c8b7769c8042cca31886df8db01976c39 - web: https://github.com/openfga/openfga/releases/tag/v1.4.3 source: id: GHSA-rxpw-85vw-fx87 created: 2024-06-14T11:36:36.858461-04:00 review_status: UNREVIEWED unexcluded: EFFECTIVELY_PRIVATE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2668.yaml
id: GO-2024-2668 modules: - module: github.com/IceWhaleTech/CasaOS-UserService versions: - fixed: 0.4.8 vulnerable_at: 0.4.7 packages: - package: github.com/IceWhaleTech/CasaOS-UserService/route/v1 symbols: - PostUserLogin summary: Login username enumeration in github.com/IceWhaleTech/CasaOS-UserService description: |- The Casa OS Login page has a username enumeration vulnerability in the login page that was patched in Casa OS v0.4.7. The issue exists because the application response differs depending on whether the username or password is incorrect, allowing an attacker to enumerate usernames by observing the application response. For example, if the username is incorrect, the application returns "User does not exist" with return code "10006", while if the password is incorrect, it returns "User does not exist or password is invalid" with return code "10013". This allows an attacker to determine if a username exists without knowing the password. cves: - CVE-2024-28232 ghsas: - GHSA-hcw2-2r9c-gc6p credits: - DrDark1999 references: - fix: https://github.com/IceWhaleTech/CasaOS-UserService/commit/dd927fe1c805e53790f73cfe10c7a4ded3bc5bdb review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2938.yaml
id: GO-2024-2938 modules: - module: github.com/go-skynet/LocalAI non_go_versions: - fixed: 2.16.0 vulnerable_at: 1.40.0 summary: LocalAI path traversal vulnerability in github.com/go-skynet/LocalAI cves: - CVE-2024-5182 ghsas: - GHSA-cpcx-r2gq-x893 references: - advisory: https://github.com/advisories/GHSA-cpcx-r2gq-x893 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-5182 - web: https://github.com/mudler/localai/commit/1a3dedece06cab1acc3332055d285ac540a47f0e - web: https://huntr.com/bounties/f7a87f29-c22a-48e8-9fce-b6d5a273e545 source: id: GHSA-cpcx-r2gq-x893 created: 2024-06-27T15:53:50.719644-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2514.yaml
id: GO-2024-2514 modules: - module: github.com/hashicorp/vault versions: - introduced: 1.0.0 - fixed: 1.5.4 vulnerable_at: 1.5.3 summary: Token leases could outlive their TTL in HashiCorp Vault in github.com/hashicorp/vault cves: - CVE-2020-25816 ghsas: - GHSA-57gg-cj55-q5g2 unknown_aliases: - BIT-vault-2020-25816 references: - advisory: https://github.com/advisories/GHSA-57gg-cj55-q5g2 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2020-25816 - fix: https://github.com/hashicorp/vault/pull/10020/commits/f192878110fe93eb13da914b2bee28caa7866a29 - web: https://github.com/hashicorp/vault/blob/master/CHANGELOG.md#147 - web: https://github.com/hashicorp/vault/blob/master/CHANGELOG.md#154 - web: https://www.hashicorp.com/blog/category/vault source: id: GHSA-57gg-cj55-q5g2 created: 2024-06-14T11:39:20.73164-04:00 review_status: UNREVIEWED unexcluded: EFFECTIVELY_PRIVATE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0099.yaml
id: GO-2021-0099 modules: - module: github.com/deislabs/oras versions: - fixed: 0.9.0 vulnerable_at: 0.8.1 packages: - package: github.com/deislabs/oras/pkg/content symbols: - extractTarDirectory derived_symbols: - fileWriter.Commit summary: Zip slip directory exploit in github.com/deislabs/oras description: |- Due to improper path validation, using the github.com/deislabs/oras/pkg/content.FileStore content store may result in directory traversal during archive extraction, allowing a malicious archive to write paths to arbitrary paths that the process can write to. published: 2021-04-14T20:04:52Z cves: - CVE-2021-21272 ghsas: - GHSA-g5v4-5x39-vwhx credits: - Chris Smowton references: - fix: https://github.com/deislabs/oras/commit/96cd90423303f1bb42bd043cb4c36085e6e91e8e review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1765.yaml
id: GO-2023-1765 modules: - module: github.com/cloudflare/circl versions: - fixed: 1.3.3 vulnerable_at: 1.3.2 packages: - package: github.com/cloudflare/circl/abe/cpabe/tkn20/internal/tkn symbols: - EncryptCCA - package: github.com/cloudflare/circl/blindsign/blindrsa symbols: - RSAVerifier.Blind - package: github.com/cloudflare/circl/kem/frodo/frodo640shake symbols: - PublicKey.EncapsulateTo derived_symbols: - scheme.Encapsulate - scheme.EncapsulateDeterministically - package: github.com/cloudflare/circl/kem/kyber/kyber1024 symbols: - PublicKey.EncapsulateTo derived_symbols: - scheme.Encapsulate - scheme.EncapsulateDeterministically - package: github.com/cloudflare/circl/kem/kyber/kyber512 symbols: - PublicKey.EncapsulateTo derived_symbols: - scheme.Encapsulate - scheme.EncapsulateDeterministically - package: github.com/cloudflare/circl/kem/kyber/kyber768 symbols: - PublicKey.EncapsulateTo derived_symbols: - scheme.Encapsulate - scheme.EncapsulateDeterministically - package: github.com/cloudflare/circl/kem/sike/sikep434 symbols: - scheme.Encapsulate - package: github.com/cloudflare/circl/kem/sike/sikep503 symbols: - scheme.Encapsulate - package: github.com/cloudflare/circl/kem/sike/sikep751 symbols: - scheme.Encapsulate summary: Leaked shared secret and weak blinding in github.com/cloudflare/circl description: |- When sampling randomness for a shared secret, the implementation of Kyber and FrodoKEM, did not check whether crypto/rand.Read() returns an error. In rare deployment cases (error thrown by the Read() function), this could lead to a predictable shared secret. The tkn20 and blindrsa components did not check whether enough randomness was returned from the user provided randomness source. Typically the user provides crypto/rand.Reader, which in the vast majority of cases will always return the right number random bytes. In the cases where it does not, or the user provides a source that does not, the blinding for blindrsa is weak and integrity of the plaintext is not ensured in tkn20. cves: - CVE-2023-1732 ghsas: - GHSA-2q89-485c-9j2x references: - advisory: https://github.com/cloudflare/circl/security/advisories/GHSA-2q89-485c-9j2x - fix: https://github.com/cloudflare/circl/commit/ff8d91225f8954b4970b6d6382d2e4c78f4a4cf8 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2980.yaml
id: GO-2024-2980 modules: - module: github.com/nats-io/nats-server vulnerable_at: 1.4.1 - module: github.com/nats-io/nats-server/v2 versions: - fixed: 2.8.2 vulnerable_at: 2.8.1 - module: github.com/nats-io/nats-streaming-server versions: - fixed: 0.24.6 vulnerable_at: 0.24.5 summary: |- NATS Server and Streaming Server fails to enforce negative user permissions, may allow denied subjects in github.com/nats-io/nats-server cves: - CVE-2022-29946 ghsas: - GHSA-2h2x-8hh2-mfq8 references: - advisory: https://github.com/advisories/GHSA-2h2x-8hh2-mfq8 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2022-29946 - web: https://github.com/nats-io/advisories/blob/main/CVE/CVE-2022-29946.txt source: id: GHSA-2h2x-8hh2-mfq8 created: 2024-07-12T16:33:37.628744846Z review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1872.yaml
id: GO-2023-1872 modules: - module: github.com/openfga/openfga versions: - fixed: 1.1.1 vulnerable_at: 1.1.1-0.20230623171216-d180fc3e227f packages: - package: github.com/openfga/openfga/pkg/typesystem symbols: - New - NewAndValidate - TypeSystem.validateNames - TypeSystem.validateRelationTypeRestrictions summary: Denial of service in github.com/openfga/openfga description: |- OpenFGA is vulnerable to a denial of service attack when certain Check and ListObjects calls are executed against authorization models that contain circular relationship definitions. cves: - CVE-2023-35933 ghsas: - GHSA-hr9r-8phq-5x8j references: - advisory: https://github.com/openfga/openfga/security/advisories/GHSA-hr9r-8phq-5x8j - fix: https://github.com/openfga/openfga/commit/087ce392595f3c319ab3028b5089118ea4063452 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0043.yaml
id: GO-2020-0043 modules: - module: github.com/mholt/caddy versions: - fixed: 0.10.13 vulnerable_at: 0.10.13-0.20180330123946-2966db7b7800 packages: - package: github.com/mholt/caddy/caddyhttp/httpserver symbols: - httpContext.MakeServers - Server.serveHTTP - assertConfigsCompatible skip_fix: 'TODO: revisit this reason. (cannot find module providing package github.com/lucas-clemente/quic-go/h2quic)' summary: Authentication bypass in github.com/mholt/caddy description: |- Due to improper TLS verification when serving traffic for multiple SNIs, an attacker may bypass TLS client authentication by indicating an SNI during the TLS handshake that is different from the name in the HTTP Host header. published: 2021-04-14T20:04:52Z cves: - CVE-2018-21246 ghsas: - GHSA-gr7w-x2jp-3xgw references: - fix: https://github.com/caddyserver/caddy/pull/2099 - fix: https://github.com/caddyserver/caddy/commit/4d9ee000c8d2cbcdd8284007c1e0f2da7bc3c7c3 - web: https://bugs.gentoo.org/715214 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2647.yaml
id: GO-2024-2647 modules: - module: github.com/go-vela/cli versions: - fixed: 0.23.2 vulnerable_at: 0.23.1 summary: CLI for Vela Insecure Variable Substitution in github.com/go-vela/cli ghsas: - GHSA-4jhj-3gv3-c3gr references: - advisory: https://github.com/go-vela/cli/security/advisories/GHSA-4jhj-3gv3-c3gr - fix: https://github.com/go-vela/cli/commit/0349a2060c35722e341bf65a4215592c6c4bc5b4 source: id: GHSA-4jhj-3gv3-c3gr created: 2024-05-17T16:14:32.912261-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2860.yaml
id: GO-2024-2860 modules: - module: github.com/goreleaser/goreleaser versions: - introduced: 1.26.0 - fixed: 1.26.1 vulnerable_at: 1.26.0 summary: goreleaser shows environment by default in github.com/goreleaser/goreleaser ghsas: - GHSA-f6mm-5fc7-3g3c references: - advisory: https://github.com/goreleaser/goreleaser/security/advisories/GHSA-f6mm-5fc7-3g3c - fix: https://github.com/goreleaser/goreleaser/commit/22f734e41f7a5111a031a3a4eb714c1b6aa6456b - fix: https://github.com/goreleaser/goreleaser/pull/4787 source: id: GHSA-f6mm-5fc7-3g3c created: 2024-05-17T16:08:46.141932-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1570.yaml
id: GO-2023-1570 modules: - module: std versions: - fixed: 1.19.6 - introduced: 1.20.0-0 - fixed: 1.20.1 vulnerable_at: 1.20.0 packages: - package: crypto/tls symbols: - handshakeMessage.marshal - Conn.writeRecord - Conn.readHandshake - Conn.handleRenegotiation - Conn.handlePostHandshakeMessage - Conn.handleKeyUpdate - Conn.clientHandshake - Conn.loadSession - clientHandshakeState.handshake - clientHandshakeState.doFullHandshake - clientHandshakeState.readFinished - clientHandshakeState.readSessionTicket - clientHandshakeState.sendFinished - clientHandshakeStateTLS13.handshake - clientHandshakeStateTLS13.sendDummyChangeCipherSpec - clientHandshakeStateTLS13.processHelloRetryRequest - clientHandshakeStateTLS13.readServerParameters - clientHandshakeStateTLS13.readServerCertificate - clientHandshakeStateTLS13.readServerFinished - clientHandshakeStateTLS13.sendClientCertificate - clientHandshakeStateTLS13.sendClientFinished - clientHelloMsg.marshal - clientHelloMsg.marshalWithoutBinders - clientHelloMsg.updateBinders - serverHelloMsg.marshal - encryptedExtensionsMsg.marshal - endOfEarlyDataMsg.marshal - keyUpdateMsg.marshal - newSessionTicketMsgTLS13.marshal - certificateRequestMsgTLS13.marshal - certificateMsg.marshal - certificateMsgTLS13.marshal - serverKeyExchangeMsg.marshal - certificateStatusMsg.marshal - serverHelloDoneMsg.marshal - clientKeyExchangeMsg.marshal - finishedMsg.marshal - certificateRequestMsg.marshal - certificateVerifyMsg.marshal - newSessionTicketMsg.marshal - helloRequestMsg.marshal - Conn.readClientHello - serverHandshakeState.doResumeHandshake - serverHandshakeState.doFullHandshake - serverHandshakeState.readFinished - serverHandshakeState.sendSessionTicket - serverHandshakeState.sendFinished - serverHandshakeStateTLS13.checkForResumption - serverHandshakeStateTLS13.sendDummyChangeCipherSpec - serverHandshakeStateTLS13.doHelloRetryRequest - serverHandshakeStateTLS13.sendServerParameters - serverHandshakeStateTLS13.sendServerCertificate - serverHandshakeStateTLS13.sendServerFinished - serverHandshakeStateTLS13.sendSessionTickets - serverHandshakeStateTLS13.readClientCertificate - serverHandshakeStateTLS13.readClientFinished - cipherSuiteTLS13.expandLabel - sessionState.marshal - sessionStateTLS13.marshal derived_symbols: - Conn.Handshake - Conn.HandshakeContext - Conn.Read - Conn.Write - ConnectionState.ExportKeyingMaterial - Dial - DialWithDialer - Dialer.Dial - Dialer.DialContext summary: Panic on large handshake records in crypto/tls description: |- Large handshake records may cause panics in crypto/tls. Both clients and servers may send large TLS handshake records which cause servers and clients, respectively, to panic when attempting to construct responses. This affects all TLS 1.3 clients, TLS 1.2 clients which explicitly enable session resumption (by setting Config.ClientSessionCache to a non-nil value), and TLS 1.3 servers which request client certificates (by setting Config.ClientAuth >= RequestClientCert). credits: - Marten Seemann references: - report: https://go.dev/issue/58001 - fix: https://go.dev/cl/468125 - web: https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E cve_metadata: id: CVE-2022-41724 cwe: 'CWE-400: Uncontrolled Resource Consumption' references: - https://security.gentoo.org/glsa/202311-09 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2779.yaml
id: GO-2024-2779 modules: - module: github.com/ipfs/go-ipfs versions: - fixed: 0.7.0 vulnerable_at: 0.7.0-rc2 summary: Access Restriction Bypass in go-ipfs in github.com/ipfs/go-ipfs cves: - CVE-2020-10937 ghsas: - GHSA-r23h-3jmw-q7hr references: - advisory: https://github.com/advisories/GHSA-r23h-3jmw-q7hr - advisory: https://nvd.nist.gov/vuln/detail/CVE-2020-10937 - web: https://blog.ipfs.io/2020-10-30-dht-hardening - web: https://graz.pure.elsevier.com/en/publications/total-eclipse-of-the-heart-disrupting-the-interplanetary-file-sys source: id: GHSA-r23h-3jmw-q7hr created: 2024-05-17T16:11:32.240595-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2737.yaml
id: GO-2024-2737 modules: - module: github.com/docker/docker versions: - introduced: 26.0.0+incompatible - fixed: 26.0.2+incompatible vulnerable_at: 26.0.1+incompatible summary: IPv6 enabled on IPv4-only network interfaces in github.com/docker/docker cves: - CVE-2024-32473 ghsas: - GHSA-x84c-p2g9-rqv9 references: - advisory: https://github.com/moby/moby/security/advisories/GHSA-x84c-p2g9-rqv9 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-32473 - web: https://github.com/moby/moby/commit/7cef0d9cd1cf221d8c0b7b7aeda69552649e0642 source: id: GHSA-x84c-p2g9-rqv9 created: 2024-06-04T15:30:04.899272-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0586.yaml
id: GO-2022-0586 modules: - module: github.com/hashicorp/go-getter versions: - fixed: 1.6.1 vulnerable_at: 1.6.0 packages: - package: github.com/hashicorp/go-getter - module: github.com/hashicorp/go-getter/v2 versions: - fixed: 2.1.0 vulnerable_at: 2.0.2 packages: - package: github.com/hashicorp/go-getter/v2 - module: github.com/hashicorp/go-getter/s3/v2 versions: - fixed: 2.1.0 vulnerable_at: 2.0.2 packages: - package: github.com/hashicorp/go-getter/s3/v2 symbols: - Getter.Mode - Getter.Get - Getter.GetFile - module: github.com/hashicorp/go-getter/gcs/v2 versions: - fixed: 2.1.0 vulnerable_at: 2.0.2 packages: - package: github.com/hashicorp/go-getter/gcs/v2 symbols: - Getter.Mode - Getter.Get - Getter.GetFile summary: Resource exhaustion in github.com/hashicorp/go-getter and related modules description: |- Malicious HTTP responses can cause a number of misbehaviors, including overwriting local files, resource exhaustion, and panics. * Protocol switching, endless redirect, and configuration bypass are possible through abuse of custom HTTP response header processing. * Arbitrary host access is possible through go-getter path traversal, symlink processing, and command injection flaws. * Asymmetric resource exhaustion can occur when go-getter processes malicious HTTP responses. * A panic can be triggered when go-getter processed password-protected ZIP files. published: 2022-05-26T00:01:27Z cves: - CVE-2022-26945 - CVE-2022-30321 - CVE-2022-30322 - CVE-2022-30323 ghsas: - GHSA-28r2-q6m8-9hpx - GHSA-cjr4-fv6c-f3mv - GHSA-fcgg-rvwg-jv58 - GHSA-x24g-9w7v-vprh credits: - Joern Schneeweisz of GitLab - Alessio Della Libera of Snyk - HashiCorp Product Security references: - advisory: https://discuss.hashicorp.com/t/hcsec-2022-13-multiple-vulnerabilities-in-go-getter-library/39930 - fix: https://github.com/hashicorp/go-getter/pull/361 - fix: https://github.com/hashicorp/go-getter/commit/38e97387488f5439616be60874979433a12edb48 - web: https://github.com/hashicorp/go-getter/commit/a2ebce998f8d4105bd4b78d6c99a12803ad97a45 - web: https://github.com/hashicorp/go-getter/pull/359 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2645.yaml
id: GO-2024-2645 modules: - module: github.com/projectdiscovery/nuclei vulnerable_at: 1.1.7 - module: github.com/projectdiscovery/nuclei/v2 vulnerable_at: 2.9.15 - module: github.com/projectdiscovery/nuclei/v3 versions: - introduced: 3.0.0 - fixed: 3.2.0 vulnerable_at: 3.1.10 summary: Nuclei allows unsigned code template execution through workflows in github.com/projectdiscovery/nuclei cves: - CVE-2024-27920 ghsas: - GHSA-w5wx-6g2r-r78q references: - advisory: https://github.com/projectdiscovery/nuclei/security/advisories/GHSA-w5wx-6g2r-r78q - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-27920 - fix: https://github.com/projectdiscovery/nuclei/commit/e86f38299765b82ad724fdb701557e0eaff3884d - fix: https://github.com/projectdiscovery/nuclei/pull/4822 - web: https://docs.projectdiscovery.io/templates/protocols/code - web: https://docs.projectdiscovery.io/templates/reference/template-signing - web: https://docs.projectdiscovery.io/templates/workflows/overview source: id: GHSA-w5wx-6g2r-r78q created: 2024-06-26T13:58:33.793233-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0154.yaml
id: GO-2021-0154 modules: - module: std versions: - introduced: 1.1.0-0 - fixed: 1.3.2 vulnerable_at: 1.3.1 packages: - package: crypto/tls symbols: - checkForResumption - decryptTicket skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)' summary: Man-in-the-middle attack with SessionTicketsDisabled in crypto/tls description: |- When SessionTicketsDisabled is enabled, crypto/tls allowed man-in-the-middle attackers to spoof clients via unspecified vectors. If the server enables TLS client authentication using certificates (this is rare) and explicitly sets SessionTicketsDisabled to true in the tls.Config, then a malicious client can falsely assert ownership of any client certificate it wishes. published: 2022-05-25T21:11:41Z cves: - CVE-2014-7189 credits: - Go Team references: - fix: https://go.dev/cl/148080043 - report: https://go.dev/issue/53085 - web: https://groups.google.com/g/golang-nuts/c/eeOHNw_shwU/m/OHALUmroA5kJ review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2660.yaml
id: GO-2024-2660 modules: - module: github.com/golang-fips/openssl/v2 versions: - fixed: 2.0.1 vulnerable_at: 2.0.0 packages: - package: github.com/golang-fips/openssl/v2 symbols: - newCipherCtx - setupEVP derived_symbols: - DecryptRSANoPadding - DecryptRSAOAEP - DecryptRSAPKCS1 - EncryptRSANoPadding - EncryptRSAOAEP - EncryptRSAPKCS1 - NewGCMTLS - NewGCMTLS13 - NewRC4Cipher - SignMarshalECDSA - SignRSAPKCS1v15 - SignRSAPSS - VerifyECDSA - VerifyRSAPKCS1v15 - VerifyRSAPSS - aesCipher.Decrypt - aesCipher.Encrypt - aesCipher.NewCBCDecrypter - aesCipher.NewCBCEncrypter - aesCipher.NewCTR - aesCipher.NewGCM - aesCipher.NewGCMTLS - aesCipher.NewGCMTLS13 - desCipher.Decrypt - desCipher.Encrypt - desCipher.NewCBCDecrypter - desCipher.NewCBCEncrypter - desCipherWithoutCBC.Decrypt - desCipherWithoutCBC.Encrypt - noGCM.Decrypt - noGCM.Encrypt - module: github.com/microsoft/go-crypto-openssl versions: - fixed: 0.2.9 vulnerable_at: 0.2.8 packages: - package: github.com/microsoft/go-crypto-openssl/openssl symbols: - setupEVP derived_symbols: - DecryptRSANoPadding - DecryptRSAOAEP - DecryptRSAOAEPWithMGF1Hash - DecryptRSAPKCS1 - EncryptRSANoPadding - EncryptRSAOAEP - EncryptRSAOAEPWithMGF1Hash - EncryptRSAPKCS1 - SignMarshalECDSA - SignRSAPKCS1v15 - SignRSAPSS - VerifyECDSA - VerifyRSAPKCS1v15 - VerifyRSAPSS summary: |- Memory leak in github.com/golang-fips/openssl/v2 and github.com/microsoft/go-crypto-openssl description: |- Using crafted public RSA keys can cause a small memory leak when encrypting and verifying payloads. This can be gradually leveraged into a denial of service attack. cves: - CVE-2024-1394 ghsas: - GHSA-78hx-gp6g-7mj6 credits: - '@qmuntal and @r3kumar' references: - fix: https://github.com/golang-fips/openssl/commit/85d31d0d257ce842c8a1e63c4d230ae850348136 - fix: https://github.com/microsoft/go-crypto-openssl/commit/104fe7f6912788d2ad44602f77a0a0a62f1f259f notes: - github.com/golang-fips/go is patches to go standard compiler and library. - github.com/microsoft/go is a clone of the go standard compiler and library. This is outside of what vulncheck can handle. review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2399.yaml
id: GO-2023-2399 modules: - module: github.com/hashicorp/vault versions: - introduced: 1.12.0 - fixed: 1.13.12 - introduced: 1.14.0 - fixed: 1.14.8 - introduced: 1.15.0 - fixed: 1.15.4 vulnerable_at: 1.15.3 packages: - package: github.com/hashicorp/vault/helper/forwarding symbols: - GenerateForwardedRequest derived_symbols: - GenerateForwardedHTTPRequest - package: github.com/hashicorp/vault/http symbols: - handler - wrapGenericHandler - parseJSONRequest - parseFormRequest - rateLimitQuotaWrapping derived_symbols: - HandlerAnchor.Handler - TestServer - TestServerWithListener - TestServerWithListenerAndProperties skip_fix: 'TODO: module github.com/hashicorp/vault must be updated with go get github.com/hashicorp/vault/sdk@v0.10.2 to reproduce.' - package: github.com/hashicorp/vault/vault symbols: - Core.DetermineRoleFromLoginRequestFromBytes - Core.DetermineRoleFromLoginRequest - SystemBackend.handleStorageRaftSnapshotWrite derived_symbols: - Core.ForwardRequest - Core.HandleRequest - NewSystemBackend - NewTestCluster - TestCluster.InitCores - TestCoreUnsealed - TestCoreUnsealedRaw - TestCoreUnsealedWithConfig - TestCoreUnsealedWithMetrics - TestCoreWithCustomResponseHeaderAndUI skip_fix: 'TODO: module github.com/hashicorp/vault must be updated with go get github.com/hashicorp/vault/sdk@v0.10.2 to reproduce.' summary: Denial of service via memory exhaustion in github.com/hashicorp/vault description: |- Unauthenticated and authenticated HTTP requests from a client will be attempted to be mapped to memory. Large requests may result in the exhaustion of available memory on the host, which may cause crashes and denial of service. cves: - CVE-2023-6337 ghsas: - GHSA-6p62-6cg9-f5f5 references: - advisory: https://nvd.nist.gov/vuln/detail/CVE-2023-6337 - web: https://discuss.hashicorp.com/t/hcsec-2023-34-vault-vulnerable-to-denial-of-service-through-memory-exhaustion-when-handling-large-http-requests/60741 - fix: https://github.com/hashicorp/vault/pull/24354 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2914.yaml
id: GO-2024-2914 modules: - module: github.com/docker/docker versions: - fixed: 20.10.11+incompatible vulnerable_at: 20.10.10+incompatible - module: github.com/moby/moby versions: - fixed: 20.10.11+incompatible vulnerable_at: 20.10.10+incompatible summary: Moby (Docker Engine) is vulnerable to Ambiguous OCI manifest parsing in github.com/docker/docker ghsas: - GHSA-xmmx-7jpf-fx42 related: - CVE-2021-41190 references: - advisory: https://github.com/moby/moby/security/advisories/GHSA-xmmx-7jpf-fx42 notes: - could not locate fix commit source: id: GHSA-xmmx-7jpf-fx42 created: 2024-07-01T14:25:08.035766-04:00 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0412.yaml
id: GO-2021-0412 modules: - module: github.com/containerd/imgcrypt versions: - fixed: 1.1.4 vulnerable_at: 1.1.3 packages: - package: github.com/containerd/imgcrypt/images/encryption symbols: - cryptManifestList derived_symbols: - CheckAuthorization - DecryptImage - EncryptImage summary: Incorrect authorization in github.com/containerd/imgcrypt description: |- The imgcrypt library provides API extensions for containerd to support encrypted container images and implements the ctd-decoder command line tool for use by containerd to decrypt encrypted container images. The imgcrypt function CheckAuthorization is supposed to check whether the current used is authorized to access an encrypted image and prevent the user from running an image that another user previously decrypted on the same system. In versions prior to 1.1.4, a failure occurs when an image with a ManifestList is used and the architecture of the local host is not the first one in the ManifestList. Only the first architecture in the list was tested, which may not have its layers available locally since it could not be run on the host architecture. Therefore, the verdict on unavailable layers was that the image could be run anticipating that image run failure would occur later due to the layers not being available. However, this verdict to allow the image to run enabled other architectures in the ManifestList to run an image without providing keys if that image had previously been decrypted. A patch has been applied to imgcrypt 1.1.4. Workarounds may include usage of different namespaces for each remote user. published: 2022-04-28T23:35:11Z cves: - CVE-2022-24778 ghsas: - GHSA-8v99-48m9-c8pm credits: - '@dimitar-dimitrow' references: - fix: https://github.com/containerd/imgcrypt/commit/6fdd9818a4d8142107b7ecd767d839c9707700d9 - web: https://github.com/containerd/imgcrypt/issues/69 - web: https://github.com/containerd/imgcrypt/releases/tag/v1.1.4 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2728.yaml
id: GO-2024-2728 modules: - module: github.com/argoproj/argo-cd vulnerable_at: 1.8.6 - module: github.com/argoproj/argo-cd/v2 versions: - introduced: 2.4.0 - fixed: 2.8.16 - introduced: 2.9.0 - fixed: 2.9.12 - introduced: 2.10.0 - fixed: 2.10.7 vulnerable_at: 2.10.6 summary: Argo CD's API server does not enforce project sourceNamespaces in github.com/argoproj/argo-cd cves: - CVE-2024-31990 ghsas: - GHSA-2gvw-w6fj-7m3c unknown_aliases: - BIT-argo-cd-2024-31990 references: - advisory: https://github.com/argoproj/argo-cd/security/advisories/GHSA-2gvw-w6fj-7m3c - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-31990 - fix: https://github.com/argoproj/argo-cd/commit/c514105af739eebedb9dbe89d8a6dd8dfc30bb2c - fix: https://github.com/argoproj/argo-cd/commit/c5a252c4cc260e240e2074794aedb861d07e9ca5 - fix: https://github.com/argoproj/argo-cd/commit/e0ff56d89fbd7d066e9c862b30337f6520f13f17 source: id: GHSA-2gvw-w6fj-7m3c created: 2024-06-26T14:01:04.285149-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2761.yaml
id: GO-2024-2761 modules: - module: github.com/rancher/rancher unsupported_versions: - last_affected: 2.1.4 vulnerable_at: 1.6.30 summary: Rancher Login Parameter Can Be Edited in github.com/rancher/rancher cves: - CVE-2019-11881 ghsas: - GHSA-2p4g-jrmx-r34m references: - advisory: https://github.com/advisories/GHSA-2p4g-jrmx-r34m - advisory: https://nvd.nist.gov/vuln/detail/CVE-2019-11881 - report: https://github.com/rancher/rancher/issues/20216 - web: https://github.com/MauroEldritch/VanCleef source: id: GHSA-2p4g-jrmx-r34m created: 2024-06-04T15:29:02.104941-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2847.yaml
id: GO-2024-2847 modules: - module: github.com/grafana/grafana non_go_versions: - fixed: 8.5.13 - introduced: 9.0.0 - fixed: 9.0.9 - introduced: 9.1.0 - fixed: 9.1.6 vulnerable_at: 5.4.5+incompatible summary: Grafana Escalation from admin to server admin when auth proxy is used in github.com/grafana/grafana cves: - CVE-2022-35957 ghsas: - GHSA-ff5c-938w-8c9q unknown_aliases: - BIT-grafana-2022-35957 references: - advisory: https://github.com/grafana/grafana/security/advisories/GHSA-ff5c-938w-8c9q - advisory: https://nvd.nist.gov/vuln/detail/CVE-2022-35957 - web: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WYU5C2RITLHVZSTCWNGQWA6KSPYNXM2H - web: https://security.netapp.com/advisory/ntap-20221215-0001 source: id: GHSA-ff5c-938w-8c9q created: 2024-06-04T14:27:32.534925-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2464.yaml
id: GO-2024-2464 modules: - module: github.com/0xJacky/Nginx-UI versions: - fixed: 1.9.10-0.20231219184941-827e76c46e63 vulnerable_at: 1.9.10-0.20231219042952-0a9e23daf406 packages: - package: github.com/0xJacky/Nginx-UI/api/system symbols: - GetSettings - SaveSettings summary: Remote command execution in github.com/0xJacky/Nginx-UI cves: - CVE-2024-22197 ghsas: - GHSA-pxmr-q2x3-9x9m credits: - '@jorgectf' references: - fix: https://github.com/0xJacky/nginx-ui/commit/827e76c46e63c52114a62a899f61313039c754e3 - advisory: https://github.com/advisories/GHSA-pxmr-q2x3-9x9m review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2923.yaml
id: GO-2024-2923 modules: - module: github.com/k8sgpt-ai/k8sgpt versions: - fixed: 0.3.33 vulnerable_at: 0.3.32 summary: Vulnerabilities with the k8sGPT in github.com/k8sgpt-ai/k8sgpt ghsas: - GHSA-85rg-8m6h-825p references: - advisory: https://github.com/k8sgpt-ai/k8sgpt/security/advisories/GHSA-85rg-8m6h-825p - web: https://github.com/k8sgpt-ai/k8sgpt/releases/tag/v0.3.33 source: id: GHSA-85rg-8m6h-825p created: 2024-06-14T13:47:55.972779-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2762.yaml
id: GO-2024-2762 modules: - module: github.com/rancher/rancher versions: - introduced: 2.0.0+incompatible - fixed: 2.2.4+incompatible vulnerable_at: 2.2.4-rc9+incompatible summary: Rancher code injection via fluentd config commands in github.com/rancher/rancher cves: - CVE-2019-12303 ghsas: - GHSA-53pj-67m4-9w98 references: - advisory: https://github.com/advisories/GHSA-53pj-67m4-9w98 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2019-12303 - web: https://forums.rancher.com/t/rancher-release-v2-2-4-addresses-rancher-cve-2019-12274-and-cve-2019-12303/14466 source: id: GHSA-53pj-67m4-9w98 created: 2024-06-04T15:28:59.347324-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2798.yaml
id: GO-2024-2798 modules: - module: github.com/mattermost/mattermost-server versions: - introduced: 8.1.0+incompatible - fixed: 8.1.12+incompatible - introduced: 9.4.0+incompatible - fixed: 9.4.5+incompatible - introduced: 9.5.0+incompatible - fixed: 9.5.3+incompatible - introduced: 9.6.0-rc1+incompatible - fixed: 9.6.1+incompatible vulnerable_at: 9.6.1-rc3+incompatible summary: Mattermost fails to limit the number of active sessions in github.com/mattermost/mattermost-server cves: - CVE-2024-4183 ghsas: - GHSA-wj37-mpq9-xrcm references: - advisory: https://github.com/advisories/GHSA-wj37-mpq9-xrcm - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-4183 - web: https://github.com/mattermost/mattermost/commit/86920d641760552c5aafa5e1d14c93bd30039bc4 - web: https://github.com/mattermost/mattermost/commit/9d81eee979aee93374bff8ba6714d805e12ffb03 - web: https://github.com/mattermost/mattermost/commit/b45c3dac4c160992a1ce757ade968e8f5ec506c1 - web: https://github.com/mattermost/mattermost/commit/bc699e6789cf3ba1544235087897699aaa639e7d - web: https://mattermost.com/security-updates source: id: GHSA-wj37-mpq9-xrcm created: 2024-06-04T15:26:28.930861-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2532.yaml
id: GO-2024-2532 modules: - module: github.com/hashicorp/boundary versions: - introduced: 0.8.0 - fixed: 0.15.0 vulnerable_at: 0.14.5 summary: Boundary vulnerable to session hijacking through TLS certificate tampering in github.com/hashicorp/boundary cves: - CVE-2024-1052 ghsas: - GHSA-vh73-q3rw-qx7w references: - advisory: https://github.com/advisories/GHSA-vh73-q3rw-qx7w - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-1052 - web: https://discuss.hashicorp.com/t/hcsec-2024-02-boundary-vulnerable-to-session-hijacking-through-tls-certificate-tampering/62458 source: id: GHSA-vh73-q3rw-qx7w created: 2024-06-14T11:40:47.48502-04:00 review_status: UNREVIEWED unexcluded: EFFECTIVELY_PRIVATE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0463.yaml
id: GO-2022-0463 modules: - module: github.com/astaxie/beego vulnerable_at: 1.12.3 packages: - package: github.com/astaxie/beego symbols: - Tree.Match derived_symbols: - App.Run - ControllerRegister.FindPolicy - ControllerRegister.FindRouter - ControllerRegister.ServeHTTP - FilterRouter.ValidRouter - InitBeegoBeforeTest - Run - RunWithMiddleWares - TestBeegoInit - adminApp.Run - module: github.com/beego/beego versions: - fixed: 1.12.9 vulnerable_at: 1.12.8 packages: - package: github.com/beego/beego symbols: - Tree.match derived_symbols: - App.Run - ControllerRegister.FindPolicy - ControllerRegister.FindRouter - ControllerRegister.ServeHTTP - FilterRouter.ValidRouter - InitBeegoBeforeTest - Run - RunWithMiddleWares - TestBeegoInit - Tree.Match - adminApp.Run - module: github.com/beego/beego/v2 versions: - fixed: 2.0.3 vulnerable_at: 2.0.2 packages: - package: github.com/beego/beego/v2/server/web symbols: - Tree.match derived_symbols: - AddNamespace - AddViewPath - Any - AutoPrefix - AutoRouter - BuildTemplate - Compare - CompareNot - Controller.Abort - Controller.Bind - Controller.BindForm - Controller.BindJSON - Controller.BindProtobuf - Controller.BindXML - Controller.BindYAML - Controller.CheckXSRFCookie - Controller.CustomAbort - Controller.Delete - Controller.DestroySession - Controller.Get - Controller.GetBool - Controller.GetFile - Controller.GetFloat - Controller.GetInt - Controller.GetInt16 - Controller.GetInt32 - Controller.GetInt64 - Controller.GetInt8 - Controller.GetSecureCookie - Controller.GetString - Controller.GetStrings - Controller.GetUint16 - Controller.GetUint32 - Controller.GetUint64 - Controller.GetUint8 - Controller.Head - Controller.Input - Controller.IsAjax - Controller.JSONResp - Controller.Options - Controller.ParseForm - Controller.Patch - Controller.Post - Controller.Put - Controller.Redirect - Controller.Render - Controller.RenderBytes - Controller.RenderString - Controller.Resp - Controller.SaveToFile - Controller.SaveToFileWithBuffer - Controller.ServeFormatted - Controller.ServeJSON - Controller.ServeJSONP - Controller.ServeXML - Controller.ServeYAML - Controller.SessionRegenerateID - Controller.SetData - Controller.SetSecureCookie - Controller.Trace - Controller.URLFor - Controller.XMLResp - Controller.XSRFFormHTML - Controller.XSRFToken - Controller.YamlResp - ControllerRegister.Add - ControllerRegister.AddAuto - ControllerRegister.AddAutoPrefix - ControllerRegister.AddMethod - ControllerRegister.AddRouterMethod - ControllerRegister.Any - ControllerRegister.CtrlAny - ControllerRegister.CtrlDelete - ControllerRegister.CtrlGet - ControllerRegister.CtrlHead - ControllerRegister.CtrlOptions - ControllerRegister.CtrlPatch - ControllerRegister.CtrlPost - ControllerRegister.CtrlPut - ControllerRegister.Delete - ControllerRegister.FindPolicy - ControllerRegister.FindRouter - ControllerRegister.Get - ControllerRegister.GetContext - ControllerRegister.Handler - ControllerRegister.Head - ControllerRegister.Include - ControllerRegister.Init - ControllerRegister.InsertFilter - ControllerRegister.Options - ControllerRegister.Patch - ControllerRegister.Post - ControllerRegister.Put - ControllerRegister.ServeHTTP - ControllerRegister.URLFor - CtrlAny - CtrlDelete - CtrlGet - CtrlHead - CtrlOptions - CtrlPatch - CtrlPost - CtrlPut - Date - DateFormat - DateParse - Delete - Exception - ExecuteTemplate - ExecuteViewPathTemplate - FileSystem.Open - FilterRouter.ValidRouter - FlashData.Error - FlashData.Notice - FlashData.Set - FlashData.Store - FlashData.Success - FlashData.Warning - Get - GetConfig - HTML2str - Handler - Head - Htmlquote - Htmlunquote - HttpServer.Any - HttpServer.AutoPrefix - HttpServer.AutoRouter - HttpServer.CtrlAny - HttpServer.CtrlDelete - HttpServer.CtrlGet - HttpServer.CtrlHead - HttpServer.CtrlOptions - HttpServer.CtrlPatch - HttpServer.CtrlPost - HttpServer.CtrlPut - HttpServer.Delete - HttpServer.Get - HttpServer.Handler - HttpServer.Head - HttpServer.Include - HttpServer.InsertFilter - HttpServer.LogAccess - HttpServer.Options - HttpServer.Patch - HttpServer.Post - HttpServer.PrintTree - HttpServer.Put - HttpServer.RESTRouter - HttpServer.Router - HttpServer.RouterWithOpts - HttpServer.Run - Include - InitBeegoBeforeTest - InsertFilter - LoadAppConfig - LogAccess - MapGet - Namespace.Any - Namespace.AutoPrefix - Namespace.AutoRouter - Namespace.Cond - Namespace.CtrlAny - Namespace.CtrlDelete - Namespace.CtrlGet - Namespace.CtrlHead - Namespace.CtrlOptions - Namespace.CtrlPatch - Namespace.CtrlPost - Namespace.CtrlPut - Namespace.Delete - Namespace.Filter - Namespace.Get - Namespace.Handler - Namespace.Head - Namespace.Include - Namespace.Namespace - Namespace.Options - Namespace.Patch - Namespace.Post - Namespace.Put - Namespace.Router - NewControllerRegister - NewControllerRegisterWithCfg - NewHttpServerWithCfg - NewHttpSever - NewNamespace - NotNil - Options - ParseForm - Patch - Policy - Post - PrintTree - Put - RESTRouter - ReadFromRequest - RenderForm - Router - RouterWithOpts - Run - RunWithMiddleWares - TestBeegoInit - Tree.AddRouter - Tree.AddTree - Tree.Match - URLFor - URLMap.GetMap - URLMap.GetMapData - Walk - adminApp.Run - adminController.AdminIndex - adminController.Healthcheck - adminController.ListConf - adminController.ProfIndex - adminController.PrometheusMetrics - adminController.QpsIndex - adminController.TaskStatus - beegoAppConfig.Bool - beegoAppConfig.DefaultBool - beegoAppConfig.SaveConfigFile - beegoAppConfig.Unmarshaler summary: |- Access control bypass due to broad route matching in github.com/beego/beego and beego/v2 description: |- Routes in the beego HTTP router can match unintended patterns. This overly-broad matching may permit an attacker to bypass access controls. For example, the pattern "/a/b/:name" can match the URL "/a.xml/b/". This may bypass access control applied to the prefix "/a/". published: 2022-07-01T20:06:59Z cves: - CVE-2022-31259 ghsas: - GHSA-qx32-f6g6-fcfr references: - fix: https://github.com/beego/beego/pull/4958 - fix: https://github.com/beego/beego/commit/64cf44d725c8cc35d782327d333df9cbeb1bf2dd - web: https://github.com/beego/beego/issues/4946 - web: https://github.com/beego/beego/pull/4954 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1914.yaml
id: GO-2023-1914 modules: - module: github.com/superfly/tokenizer versions: - fixed: 0.0.1 vulnerable_at: 0.0.0-20230712185157-1939fc3dca13 packages: - package: github.com/superfly/tokenizer summary: Brute-force of token secrets in github.com/superfly/tokenizer ghsas: - GHSA-f28g-86hc-823q references: - advisory: https://github.com/advisories/GHSA-f28g-86hc-823q - fix: https://github.com/superfly/tokenizer/pull/8 - fix: https://github.com/superfly/tokenizer/pull/9 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0515.yaml
id: GO-2022-0515 modules: - module: std versions: - fixed: 1.17.12 - introduced: 1.18.0-0 - fixed: 1.18.4 vulnerable_at: 1.18.3 packages: - package: go/parser symbols: - ParseFile - ParseExprFrom - parser.tryIdentOrType - parser.parsePrimaryExpr - parser.parseUnaryExpr - parser.parseBinaryExpr - parser.parseIfStmt - parser.parseStmt - resolver.openScope - resolver.closeScope summary: Stack exhaustion due to deeply nested types in go/parser description: |- Calling any of the Parse functions on Go source code which contains deeply nested types or declarations can cause a panic due to stack exhaustion. published: 2022-07-20T17:01:45Z credits: - Juho Nurminen of Mattermost references: - fix: https://go.dev/cl/417063 - fix: https://go.googlesource.com/go/+/695be961d57508da5a82217f7415200a11845879 - report: https://go.dev/issue/53616 - web: https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE cve_metadata: id: CVE-2022-1962 cwe: 'CWE-674: Uncontrolled Recursion' description: |- Uncontrolled recursion in the Parse functions in go/parser before Go 1.17.12 and Go 1.18.4 allow an attacker to cause a panic due to stack exhaustion via deeply nested types or declarations. review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2707.yaml
id: GO-2024-2707 modules: - module: github.com/mattermost/mattermost-server vulnerable_at: 9.9.0+incompatible - module: github.com/mattermost/mattermost-server/v5 vulnerable_at: 5.39.3 - module: github.com/mattermost/mattermost-server/v6 vulnerable_at: 6.7.2 - module: github.com/mattermost/mattermost/server/v8 non_go_versions: - fixed: 8.1.11 vulnerable_at: 8.0.0-20240626145722-59998b0b8473 summary: Mattermost Server Improper Access Control in github.com/mattermost/mattermost-server cves: - CVE-2024-21848 ghsas: - GHSA-xp9j-8p68-9q93 unknown_aliases: - CGA-w76m-mrwf-j7rf references: - advisory: https://github.com/advisories/GHSA-xp9j-8p68-9q93 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-21848 - web: https://mattermost.com/security-updates source: id: GHSA-xp9j-8p68-9q93 created: 2024-06-26T14:00:29.455068-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0058.yaml
id: GO-2021-0058 modules: - module: github.com/crewjam/saml versions: - fixed: 0.4.3 vulnerable_at: 0.4.2 packages: - package: github.com/crewjam/saml symbols: - IdpAuthnRequest.Validate - ServiceProvider.ParseXMLResponse - ServiceProvider.ValidateLogoutResponseForm - ServiceProvider.ValidateLogoutResponseRedirect derived_symbols: - IdentityProvider.ServeSSO - ServiceProvider.ParseResponse - ServiceProvider.ValidateLogoutResponseRequest - package: github.com/crewjam/saml/samlidp symbols: - getSPMetadata derived_symbols: - Server.HandlePutService - package: github.com/crewjam/saml/samlsp symbols: - ParseMetadata derived_symbols: - FetchMetadata - Middleware.ServeHTTP - New summary: |- Signature validation bypass due to XML processing error in github.com/crewjam/saml description: |- Due to the behavior of encoding/xml, a crafted XML document may cause XML Digital Signature validation to be entirely bypassed, causing an unsigned document to appear signed. published: 2021-04-14T20:04:52Z cves: - CVE-2020-27846 ghsas: - GHSA-4hq8-gmxx-h6w9 references: - fix: https://github.com/crewjam/saml/commit/da4f1a0612c0a8dd0452cf8b3c7a6518f6b4d053 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1143.yaml
id: GO-2022-1143 modules: - module: std versions: - fixed: 1.18.9 - introduced: 1.19.0-0 - fixed: 1.19.4 vulnerable_at: 1.19.3 packages: - package: os goos: - windows symbols: - dirFS.Open - dirFS.Stat - DirFS - package: net/http goos: - windows symbols: - Dir.Open derived_symbols: - ServeFile - fileHandler.ServeHTTP - fileTransport.RoundTrip summary: Restricted file access on Windows in os and net/http description: |- On Windows, restricted files can be accessed via os.DirFS and http.Dir. The os.DirFS function and http.Dir type provide access to a tree of files rooted at a given directory. These functions permit access to Windows device files under that root. For example, os.DirFS("C:/tmp").Open("COM1") opens the COM1 device. Both os.DirFS and http.Dir only provide read-only filesystem access. In addition, on Windows, an os.DirFS for the directory (the root of the current drive) can permit a maliciously crafted path to escape from the drive and access any path on the system. With fix applied, the behavior of os.DirFS("") has changed. Previously, an empty root was treated equivalently to "/", so os.DirFS("").Open("tmp") would open the path "/tmp". This now returns an error. references: - report: https://go.dev/issue/56694 - fix: https://go.dev/cl/455716 - web: https://groups.google.com/g/golang-announce/c/L_3rmdT0BMU/m/yZDrXjIiBQAJ cve_metadata: id: CVE-2022-41720 cwe: 'CWE 22: Improper Limitation of a Pathname to a Restricted Directory (''Path Traversal'')' review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2386.yaml
id: GO-2023-2386 modules: - module: github.com/mojocn/base64Captcha versions: - fixed: 1.3.6 vulnerable_at: 1.3.5 packages: - package: github.com/mojocn/base64Captcha symbols: - memoryStore.Verify summary: Captcha verification bypass in github.com/mojocn/base64Captcha description: |- When using the default implementation of Verify to check a Captcha, verification can be bypassed. For example, if the first parameter is a non-existent id, the second parameter is an empty string, and the third parameter is true, the function will always consider the Captcha to be correct. ghsas: - GHSA-5mmw-p5qv-w3x5 credits: - '@cangkuai' references: - report: https://github.com/mojocn/base64Captcha/issues/120 - fix: https://github.com/mojocn/base64Captcha/commit/9b11012caca58925f1e47c770f79f2fa47e3ad13 - fix: https://github.com/mojocn/base64Captcha/commit/5ab86bd6f333aad3936f912fc52b411168dcd4a7 cve_metadata: id: CVE-2023-45292 cwe: 'CWE-305: Authentication Bypass by Primary Weakness' review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2759.yaml
id: GO-2024-2759 modules: - module: github.com/IBAX-io/go-ibax versions: - fixed: 1.4.2 vulnerable_at: 1.4.0 summary: IBAX go-ibax vulnerable to SQL injection in github.com/IBAX-io/go-ibax cves: - CVE-2022-3799 ghsas: - GHSA-fcgf-j8cf-h2rm references: - advisory: https://github.com/advisories/GHSA-fcgf-j8cf-h2rm - advisory: https://nvd.nist.gov/vuln/detail/CVE-2022-3799 - fix: https://github.com/IBAX-io/go-ibax/commit/b0183d8e550836dc50282ee74ff421ee41b25a37 - report: https://github.com/IBAX-io/go-ibax/issues/2060 - web: https://vuldb.com/?id.212635 source: id: GHSA-fcgf-j8cf-h2rm created: 2024-06-04T17:59:40.095-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2858.yaml
id: GO-2024-2858 modules: - module: github.com/grafana/grafana versions: - introduced: 5.0.0-beta1+incompatible non_go_versions: - fixed: 8.5.14 - introduced: 9.0.0 - fixed: 9.1.8 vulnerable_at: 5.4.5+incompatible summary: |- Grafana Data source and plugin proxy endpoints could leak the authentication cookie to some destination plugins in github.com/grafana/grafana cves: - CVE-2022-39201 ghsas: - GHSA-x744-mm8v-vpgr unknown_aliases: - BIT-grafana-2022-39201 references: - advisory: https://github.com/grafana/grafana/security/advisories/GHSA-x744-mm8v-vpgr - advisory: https://nvd.nist.gov/vuln/detail/CVE-2022-39201 - fix: https://github.com/grafana/grafana/commit/b571acc1dc130a33f24742c1f93b93216da6cf57 - fix: https://github.com/grafana/grafana/commit/c658816f5229d17f877579250c07799d3bbaebc9 - web: https://github.com/grafana/grafana/releases/tag/v9.1.8 source: id: GHSA-x744-mm8v-vpgr created: 2024-06-26T14:07:24.577803-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1987.yaml
id: GO-2023-1987 modules: - module: std versions: - fixed: 1.19.12 - introduced: 1.20.0-0 - fixed: 1.20.7 - introduced: 1.21.0-0 - fixed: 1.21.0-rc.4 vulnerable_at: 1.20.6 packages: - package: crypto/tls symbols: - Conn.verifyServerCertificate - Conn.processCertsFromClient derived_symbols: - Conn.Handshake - Conn.HandshakeContext - Conn.Read - Conn.Write - Dial - DialWithDialer - Dialer.Dial - Dialer.DialContext summary: Large RSA keys can cause high CPU usage in crypto/tls description: |- Extremely large RSA keys in certificate chains can cause a client/server to expend significant CPU time verifying signatures. With fix, the size of RSA keys transmitted during handshakes is restricted to <= 8192 bits. Based on a survey of publicly trusted RSA keys, there are currently only three certificates in circulation with keys larger than this, and all three appear to be test certificates that are not actively deployed. It is possible there are larger keys in use in private PKIs, but we target the web PKI, so causing breakage here in the interests of increasing the default safety of users of crypto/tls seems reasonable. credits: - Mateusz Poliwczak references: - report: https://go.dev/issue/61460 - fix: https://go.dev/cl/515257 - web: https://groups.google.com/g/golang-announce/c/X0b6CsSAaYI/m/Efv5DbZ9AwAJ cve_metadata: id: CVE-2023-29409 cwe: 'CWE-400: Uncontrolled Resource Consumption' references: - https://security.netapp.com/advisory/ntap-20230831-0010/ - https://security.gentoo.org/glsa/202311-09 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0965.yaml
id: GO-2022-0965 modules: - module: k8s.io/apimachinery versions: - fixed: 0.0.0-20190927203648-9ce6eca90e73 vulnerable_at: 0.0.0-20190925125216-3ddb1b485b38 packages: - package: k8s.io/apimachinery/pkg/runtime/serializer/json symbols: - customNumberDecoder.Decode derived_symbols: - Serializer.Decode - Serializer.Encode - package: k8s.io/apimachinery/pkg/util/json symbols: - Unmarshal summary: Unbounded recursion in JSON parsing in k8s.io/apimachinery description: |- Unbounded recursion in JSON parsing allows malicious JSON input to cause excessive memory consumption or panics. published: 2022-09-02T21:12:51Z ghsas: - GHSA-74fp-r6jw-h4mp references: - fix: https://github.com/kubernetes/kubernetes/pull/83261 - web: https://github.com/advisories/GHSA-pmqp-h87c-mr78 - web: https://nvd.nist.gov/vuln/detail/CVE-2019-11253 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0223.yaml
id: GO-2021-0223 modules: - module: std versions: - fixed: 1.13.13 - introduced: 1.14.0-0 - fixed: 1.14.5 vulnerable_at: 1.14.4 packages: - package: crypto/x509 goos: - windows symbols: - Certificate.systemVerify skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)' summary: Certificate verification error on Windows in crypto/x509 description: |- On Windows, if VerifyOptions.Roots is nil, Certificate.Verify does not check the EKU requirements specified in VerifyOptions.KeyUsages. This may allow a certificate to be used for an unintended purpose. published: 2022-02-17T17:46:03Z cves: - CVE-2020-14039 credits: - Niall Newman references: - fix: https://go.dev/cl/242597 - fix: https://go.googlesource.com/go/+/82175e699a2e2cd83d3aa34949e9b922d66d52f5 - report: https://go.dev/issue/39360 - web: https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1117.yaml
id: GO-2022-1117 modules: - module: github.com/codenotary/immudb versions: - fixed: 1.4.1 vulnerable_at: 1.4.0 packages: - package: github.com/codenotary/immudb/pkg/client/auditor symbols: - defaultAuditor.audit derived_symbols: - defaultAuditor.Run - package: github.com/codenotary/immudb/pkg/client symbols: - immuClient.verifiedGet - immuClient.VerifiedSet - immuClient.VerifiedTxByID - immuClient.VerifiedSetReferenceAt - immuClient.VerifiedZAddAt - immuClient.VerifyRow - immuClient._streamVerifiedSet - immuClient._streamVerifiedGet derived_symbols: - immuClient.SafeGet - immuClient.SafeReference - immuClient.SafeSet - immuClient.SafeZAdd - immuClient.StreamVerifiedGet - immuClient.StreamVerifiedSet - immuClient.VerifiedGet - immuClient.VerifiedGetAt - immuClient.VerifiedGetAtRevision - immuClient.VerifiedGetSince - immuClient.VerifiedSetReference - immuClient.VerifiedZAdd - package: github.com/codenotary/immudb/embedded/store symbols: - ImmuStore.DualProof - VerifyLinearProof - VerifyDualProof summary: Insufficient verification of proofs in github.com/codenotary/immudb description: |- In certain scenarios, a malicious immudb server can provide a falsified proof that will be accepted by the client SDK signing a falsified transaction replacing the genuine one. This situation can not be triggered by a genuine immudb server and requires the client to perform a specific list of verified operations resulting in acceptance of an invalid state value. This vulnerability only affects immudb client SDKs, the immudb server itself is not affected by this vulnerability. cves: - CVE-2022-36111 ghsas: - GHSA-672p-m5jq-mrh8 references: - advisory: https://github.com/codenotary/immudb/security/advisories/GHSA-672p-m5jq-mrh8 - article: https://github.com/codenotary/immudb/tree/master/docs/security/vulnerabilities/linear-fake - fix: https://github.com/codenotary/immudb/commit/acf7f1b3d62436ea5e038acea1fc6394f90ab1c6 - fix: https://github.com/codenotary/immudb/commit/7267d67e28be8f0257b71d734611a051593e8a81 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2629.yaml
id: GO-2024-2629 modules: - module: github.com/grafana/grafana non_go_versions: - introduced: 8.5.0 - fixed: 9.5.7 - introduced: 10.0.0 - fixed: 10.0.12 - introduced: 10.1.0 - fixed: 10.1.8 - introduced: 10.2.0 - fixed: 10.2.5 - introduced: 10.3.0 - fixed: 10.3.4 vulnerable_at: 5.4.5+incompatible summary: |- Grafana's users with permissions to create a data source can CRUD all data sources in github.com/grafana/grafana cves: - CVE-2024-1442 ghsas: - GHSA-5mxf-42f5-j782 unknown_aliases: - BIT-grafana-2024-1442 references: - advisory: https://github.com/advisories/GHSA-5mxf-42f5-j782 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-1442 - web: https://grafana.com/security/security-advisories/cve-2024-1442 source: id: GHSA-5mxf-42f5-j782 created: 2024-06-04T15:37:37.122896-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2657.yaml
id: GO-2024-2657 modules: - module: github.com/cilium/cilium versions: - introduced: 1.14.0 - fixed: 1.14.8 - introduced: 1.15.0 - fixed: 1.15.2 vulnerable_at: 1.15.1 summary: Unencrypted traffic between nodes with WireGuard in github.com/cilium/cilium description: |- In Cilium clusters with WireGuard enabled and traffic matching Layer 7 policies: traffic that should be WireGuard-encrypted is sent unencrypted between a node's Envoy proxy and pods on other nodes, and traffic that should be WireGuard-encrypted is sent unencrypted between a node's DNS proxy and pods on other nodes. cves: - CVE-2024-28250 ghsas: - GHSA-v6q2-4qr3-5cw6 credits: - '@brb' - '@giorio94' - '@gandro' - '@jschwinger233' references: - advisory: https://github.com/cilium/cilium/security/advisories/GHSA-v6q2-4qr3-5cw6 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2753.yaml
id: GO-2024-2753 modules: - module: k8s.io/kubernetes versions: - introduced: 1.1.0 - fixed: 1.16.13 - introduced: 1.17.0 - fixed: 1.17.9 - introduced: 1.18.0 - fixed: 1.18.6 vulnerable_at: 1.18.6-rc.0 summary: Denial of service in Kubernetes in k8s.io/kubernetes cves: - CVE-2020-8557 ghsas: - GHSA-55qj-gj3x-jq9r references: - advisory: https://github.com/advisories/GHSA-55qj-gj3x-jq9r - advisory: https://nvd.nist.gov/vuln/detail/CVE-2020-8557 - web: https://github.com/kubernetes/kubernetes/commit/530f199b6e07cdaab32361e39709ac45f3fdc446 - web: https://github.com/kubernetes/kubernetes/commit/68750fefd3df76b7b008ef7b18e8acd18d5c2f2e - web: https://github.com/kubernetes/kubernetes/commit/7fd849cffa2f93061fbcb0a6ae4efd0539b1e981 - web: https://github.com/kubernetes/kubernetes/issues/93032 - web: https://github.com/kubernetes/kubernetes/pull/92921 - web: https://groups.google.com/g/kubernetes-security-announce/c/cB_JUsYEKyY/m/vVSO61AhBwAJ - web: https://security.netapp.com/advisory/ntap-20200821-0002 source: id: GHSA-55qj-gj3x-jq9r created: 2024-06-07T11:23:44.913991-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0233.yaml
id: GO-2022-0233 modules: - module: github.com/pires/go-proxyproto versions: - fixed: 0.6.1 vulnerable_at: 0.5.0 packages: - package: github.com/pires/go-proxyproto symbols: - Listener.Accept summary: Resource exhaustion in github.com/pires/go-proxyproto description: |- The PROXY protocol server does not impose a timeout on reading the header from new connections, allowing a malicious client to cause resource exhaustion and a denial of service by opening many connections and sending no data on them. v0.6.0 of the proxyproto package adds support for a user-defined header timeout. v0.6.1 adds a default timeout of 200ms and v0.6.2 increases the default timeout to 10s. published: 2022-07-01T20:18:04Z cves: - CVE-2021-23409 ghsas: - GHSA-xcf7-q56x-78gh references: - fix: https://github.com/pires/go-proxyproto/pull/74 - fix: https://github.com/pires/go-proxyproto/pull/74/commits/cdc63867da24fc609b727231f682670d0d1cd346 - web: https://github.com/pires/go-proxyproto/issues/65 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0558.yaml
id: GO-2022-0558 modules: - module: github.com/containers/psgo versions: - fixed: 1.7.2 vulnerable_at: 1.7.1 packages: - package: github.com/containers/psgo symbols: - contextFromOptions derived_symbols: - JoinNamespaceAndProcessInfo - JoinNamespaceAndProcessInfoByPids - JoinNamespaceAndProcessInfoByPidsWithOptions - JoinNamespaceAndProcessInfoWithOptions - ProcessInfo - ProcessInfoByPids - package: github.com/containers/psgo/internal/proc symbols: - readStatusUserNS derived_symbols: - ParseStatus summary: Privilege escalation in github.com/containers/psgo description: |- The psgo package executes the 'nsenter' binary, potentially allowing privilege escalation when used in environments where nsenter is provided by an untrusted source. published: 2022-08-22T18:07:59Z cves: - CVE-2022-1227 ghsas: - GHSA-66vw-v2x9-hw75 references: - fix: https://github.com/containers/psgo/pull/92 - web: https://github.com/containers/podman/issues/10941 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1040.yaml
id: GO-2022-1040 modules: - module: helm.sh/helm/v3 versions: - introduced: 3.0.0 - fixed: 3.5.2 vulnerable_at: 3.5.1 packages: - package: helm.sh/helm/v3/pkg/chart symbols: - Metadata.Validate derived_symbols: - Chart.Validate - package: helm.sh/helm/v3/pkg/plugin symbols: - validatePluginData derived_symbols: - FindPlugins - LoadAll - LoadDir - package: helm.sh/helm/v3/pkg/repo symbols: - IndexFile.Add - loadIndex derived_symbols: - ChartRepository.DownloadIndexFile - ChartRepository.Index - ChartRepository.Load - FindChartInAuthAndTLSRepoURL - FindChartInAuthRepoURL - FindChartInRepoURL - IndexDirectory - LoadIndexFile summary: Insufficient sanitization of data files in helm.sh/helm/v3 description: |- Helm does not sanitize all fields read from repository data files. A maliciously crafted data file may contain strings containing arbitrary data. If printed to a terminal, a malicious string could obscure or alter data on the screen. cves: - CVE-2021-21303 ghsas: - GHSA-c38g-469g-cmgx references: - advisory: https://github.com/advisories/GHSA-c38g-469g-cmgx - fix: https://github.com/helm/helm/commit/6ce9ba60b73013857e2e7c73d3f86ed70bc1ac9a review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0193.yaml
id: GO-2022-0193 modules: - module: golang.org/x/net versions: - fixed: 0.0.0-20180921000356-2f5d2388922f vulnerable_at: 0.0.0-20180911220305-26e67e76b6c3 packages: - package: golang.org/x/net/html symbols: - inBodyIM derived_symbols: - Parse - ParseFragment summary: Panic on unconsidered isindex and template combination in golang.org/x/net/html description: |- The Parse function can panic on some invalid inputs. For example, the Parse function panics on the input "<template><tBody><isindex/action=0>". published: 2022-07-06T18:14:54Z cves: - CVE-2018-17143 ghsas: - GHSA-fcf9-6fv2-fc5v credits: - '@tr3ee' references: - fix: https://go-review.googlesource.com/c/net/+/136575 - fix: https://go.googlesource.com/net/+/2f5d2388922f370f4355f327fcf4cfe9f5583908 - report: https://go.dev/issue/27704 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2692.yaml
id: GO-2024-2692 modules: - module: github.com/canonical/pebble versions: - fixed: 1.1.1 - introduced: 1.2.0 - fixed: 1.4.2 - introduced: 1.5.0 - fixed: 1.7.3 - introduced: 1.8.0 - fixed: 1.10.2 vulnerable_at: 1.10.1 summary: Pebble service manager's file pull API allows access by any user in github.com/canonical/pebble cves: - CVE-2024-3250 ghsas: - GHSA-4685-2x5r-65pj references: - advisory: https://github.com/canonical/pebble/security/advisories/GHSA-4685-2x5r-65pj - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-3250 - advisory: https://www.cve.org/CVERecord?id=CVE-2024-3250 - fix: https://github.com/canonical/pebble/commit/4ca343d3889533143477e21c63867f2f3c3b5645 - fix: https://github.com/canonical/pebble/commit/a5f6f062a11ea156697b854264385ff7e1985fd8 - fix: https://github.com/canonical/pebble/commit/b8abd1ff0090f3e0749e81eb1fc3ea16ba95f514 - fix: https://github.com/canonical/pebble/commit/cd326225b9b0be067da7d8858e2c912078cbbbd5 - fix: https://github.com/canonical/pebble/pull/406 source: id: GHSA-4685-2x5r-65pj created: 2024-05-17T16:14:05.567804-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2334.yaml
id: GO-2023-2334 modules: - module: github.com/go-jose/go-jose/v3 versions: - fixed: 3.0.1 vulnerable_at: 3.0.0 packages: - package: github.com/go-jose/go-jose/v3 symbols: - symmetricKeyCipher.decryptKey derived_symbols: - JSONWebEncryption.Decrypt - JSONWebEncryption.DecryptMulti - module: github.com/square/go-jose vulnerable_at: 2.6.0+incompatible packages: - package: github.com/square/go-jose symbols: - symmetricKeyCipher.decryptKey derived_symbols: - JSONWebEncryption.Decrypt - JSONWebEncryption.DecryptMulti summary: |- Denial of service via decryption of malicious PBES2 JWE objects in github.com/go-jose/go-jose/v3 description: |- The go-jose package is subject to a "billion hashes attack" causing denial-of-service when decrypting JWE inputs. This occurs when an attacker can provide a PBES2 encrypted JWE blob with a very large p2c value that, when decrypted, produces a denial-of-service. ghsas: - GHSA-2c7c-3mj9-8fqh references: - fix: https://github.com/go-jose/go-jose/commit/65351c27657d58960c2e6c9fbb2b00f818e50568 - report: https://github.com/go-jose/go-jose/issues/64 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1165.yaml
id: GO-2022-1165 modules: - module: helm.sh/helm/v3 versions: - fixed: 3.10.3 vulnerable_at: 3.10.2 packages: - package: helm.sh/helm/v3/pkg/repo symbols: - IndexFile.MustAdd - loadIndex - File.Remove derived_symbols: - ChartRepository.DownloadIndexFile - ChartRepository.Index - ChartRepository.Load - FindChartInAuthAndTLSAndPassRepoURL - FindChartInAuthAndTLSRepoURL - FindChartInAuthRepoURL - FindChartInRepoURL - IndexDirectory - IndexFile.Add - LoadIndexFile summary: Denial of service via repository index file in helm.sh/helm/v3 description: |- Applications that use the repo package in the Helm SDK to parse an index file can suffer a Denial of Service when that input causes a panic that cannot be recovered from. The repo package contains a handler that processes the index file of a repository. For example, the Helm client adds references to chart repositories where charts are managed. The repo package parses the index file of the repository and loads it into memory. Some index files can cause array data structures to be created causing a memory violation. The Helm Client will panic with an index file that causes a memory violation panic. Helm is not a long running service so the panic will not affect future uses of the Helm client. cves: - CVE-2022-23525 ghsas: - GHSA-53c4-hhmh-vw5q credits: - Ada Logics, in a fuzzing audit sponsored by CNCF references: - advisory: https://github.com/helm/helm/security/advisories/GHSA-53c4-hhmh-vw5q - fix: https://github.com/helm/helm/commit/638ebffbc2e445156f3978f02fd83d9af1e56f5b review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0574.yaml
id: GO-2022-0574 modules: - module: github.com/open-policy-agent/opa versions: - fixed: 0.42.0 vulnerable_at: 0.41.0 packages: - package: github.com/open-policy-agent/opa/ast symbols: - rewriteDeclaredVarsInTerm derived_symbols: - Args.Copy - Args.Vars - Array.Copy - Array.Foreach - Array.Iter - Array.Until - ArrayComprehension.Copy - BeforeAfterVisitor.Walk - Body.Copy - Body.Vars - Call.Copy - CompileModules - CompileModulesWithOpt - Compiler.Compile - Compiler.GetRulesDynamic - Compiler.GetRulesDynamicWithOpts - Compiler.PassesTypeCheck - ContainsClosures - ContainsComprehensions - ContainsRefs - Copy - Every.Copy - Every.KeyValueVars - Expr.Copy - Expr.CopyWithoutTerms - Expr.Vars - GenericTransformer.Transform - GenericVisitor.Walk - Head.Copy - Head.Vars - Import.Copy - IsConstant - JSON - JSONWithOpt - Module.Copy - Module.UnmarshalJSON - MustCompileModules - MustCompileModulesWithOpts - MustJSON - MustParseBody - MustParseBodyWithOpts - MustParseExpr - MustParseImports - MustParseModule - MustParseModuleWithOpts - MustParsePackage - MustParseRef - MustParseRule - MustParseStatement - MustParseStatements - MustParseTerm - NewGraph - ObjectComprehension.Copy - OutputVarsFromBody - OutputVarsFromExpr - Package.Copy - ParseBody - ParseBodyWithOpts - ParseExpr - ParseImports - ParseModule - ParseModuleWithOpts - ParsePackage - ParseRef - ParseRule - ParseStatement - ParseStatements - ParseStatementsWithOpts - ParseTerm - Parser.Parse - Pretty - QueryContext.Copy - Ref.ConstantPrefix - Ref.Copy - Ref.Dynamic - Ref.Extend - Ref.OutputVars - Rule.Copy - SetComprehension.Copy - SomeDecl.Copy - Term.Copy - Term.Vars - Transform - TransformComprehensions - TransformRefs - TransformVars - TreeNode.DepthFirst - TypeEnv.Get - Unify - ValueMap.Copy - ValueMap.Equal - ValueMap.Hash - ValueMap.Iter - ValueMap.MarshalJSON - ValueMap.String - ValueToInterface - VarVisitor.Walk - Walk - WalkBeforeAndAfter - WalkBodies - WalkClosures - WalkExprs - WalkNodes - WalkRefs - WalkRules - WalkTerms - WalkVars - WalkWiths - With.Copy - baseDocEqIndex.AllRules - baseDocEqIndex.Build - baseDocEqIndex.Lookup - bodySafetyTransformer.Visit - comprehensionIndexNestedCandidateVisitor.Walk - comprehensionIndexRegressionCheckVisitor.Walk - metadataParser.Parse - object.Copy - object.Diff - object.Filter - object.Foreach - object.Intersect - object.Iter - object.Map - object.Merge - object.MergeWith - object.Until - queryCompiler.Compile - refChecker.Visit - refindices.Sorted - refindices.Update - rewriteNestedHeadVarLocalTransform.Visit - ruleArgLocalRewriter.Visit - ruleWalker.Do - set.Copy - set.Diff - set.Foreach - set.Intersect - set.Iter - set.Map - set.Reduce - set.Union - set.Until - trieNode.Do - trieNode.Traverse - trieTraversalResult.Add - typeChecker.CheckBody - typeChecker.CheckTypes summary: Denial of service in github.com/open-policy-agent/opa description: |- An issue in the AST parser of Open Policy Agent makes it possible for attackers to cause a Denial of Service attack from a crafted input. published: 2022-07-01T00:01:03Z cves: - CVE-2022-33082 ghsas: - GHSA-2m4x-4q9j-w97g references: - fix: https://github.com/open-policy-agent/opa/pull/4701 - fix: https://github.com/open-policy-agent/opa/commit/064f6168a8dfebdeb2ea147f7882bb9f5d2b7f67 - web: https://github.com/open-policy-agent/opa/issues/4762 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0016.yaml
id: GO-2020-0016 modules: - module: github.com/ulikunitz/xz versions: - fixed: 0.5.8 vulnerable_at: 0.5.7 packages: - package: github.com/ulikunitz/xz symbols: - readUvarint derived_symbols: - Reader.Read - blockHeader.UnmarshalBinary - streamReader.Read summary: Infinite loop in github.com/ulikunitz/xz description: |- An attacker can construct a series of bytes such that calling Reader.Read on the bytes could cause an infinite loop. If parsing user supplied input, this may be used as a denial of service vector. published: 2021-04-14T20:04:52Z cves: - CVE-2021-29482 ghsas: - GHSA-25xm-hr59-7c27 credits: - '@0xdecaf' references: - fix: https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b - web: https://github.com/ulikunitz/xz/issues/35 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2830.yaml
id: GO-2024-2830 modules: - module: github.com/1Panel-dev/1Panel versions: - fixed: 1.10.3-lts vulnerable_at: 1.10.2-lts packages: - package: github.com/1Panel-dev/1Panel/backend/utils/cmd symbols: - CheckIllegal summary: Arbitrary file write in github.com/1Panel-dev/1Panel description: A maliciously crafted packet can write to an arbitrary file. cves: - CVE-2024-34352 ghsas: - GHSA-f8ch-w75v-c847 credits: - '@an5er' references: - advisory: https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-f8ch-w75v-c847 - fix: https://github.com/1Panel-dev/1Panel/commit/e037b69f52799e110af8e98f39a3627ad0285ea6 source: id: GHSA-f8ch-w75v-c847 created: 2024-05-11T15:38:11.046626-07:00 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0023.yaml
id: GO-2020-0023 modules: - module: github.com/robbert229/jwt versions: - fixed: 0.0.0-20170426191122-ca1404ee6e83 vulnerable_at: 0.0.0-20170303194658-2eb16e9a008d packages: - package: github.com/robbert229/jwt symbols: - Algorithm.validateSignature derived_symbols: - Algorithm.Validate summary: Timing side-channel in github.com/robbert229/jwt description: |- Token validation methods are susceptible to a timing side-channel during HMAC comparison. With a large enough number of requests over a low latency connection, an attacker may use this to determine the expected HMAC. published: 2021-04-14T20:04:52Z ghsas: - GHSA-5vw4-v588-pgv8 references: - fix: https://github.com/robbert229/jwt/commit/ca1404ee6e83fcbafb66b09ed0d543850a15b654 - web: https://github.com/robbert229/jwt/issues/12 cve_metadata: id: CVE-2015-10004 cwe: 'CWE 208: Information Exposure Through Timing Discrepancy' review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0370.yaml
id: GO-2022-0370 modules: - module: mellium.im/xmpp versions: - introduced: 0.18.0 - fixed: 0.21.1 vulnerable_at: 0.21.0 packages: - package: mellium.im/xmpp/websocket symbols: - Dialer.config derived_symbols: - Dial - DialDirect - DialSession - Dialer.Dial - Dialer.DialDirect - NewClient summary: |- Man-in-the-middle attack due to improper validation of certificate in mellium.im/xmpp description: |- Websocket client connections are vulnerable to man-in-the-middle attacks via DNS spoofing. When looking up a WSS endpoint using a DNS TXT record, the server TLS certificate is incorrectly validated using the name of the server returned by the TXT record request, not the name of the the server being connected to. This permits any attacker that can spoof a DNS record to redirect the user to a server of their choosing. Providing a *tls.Config with a ServerName field set to the correct destination hostname will avoid this issue. published: 2022-07-29T20:00:14Z cves: - CVE-2022-24968 ghsas: - GHSA-h289-x5wc-xcv8 - GHSA-m658-p24x-p74r references: - advisory: https://mellium.im/cve/cve-2022-24968/ - fix: https://github.com/mellium/xmpp/pull/260 - fix: https://github.com/mellium/xmpp/commit/0d92aa486da69b71f2f4a30e62aa722c711b98ac - report: https://mellium.im/issue/259 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0386.yaml
id: GO-2022-0386 modules: - module: github.com/nats-io/jwt versions: - fixed: 1.2.3-0.20210314221642-a826c77dc9d2 vulnerable_at: 1.2.2 packages: - package: github.com/nats-io/jwt symbols: - ActivationClaims.Validate - Import.Validate derived_symbols: - Account.Validate - AccountClaims.Validate - Imports.Validate - module: github.com/nats-io/jwt/v2 versions: - fixed: 2.0.1 vulnerable_at: 2.0.0 packages: - package: github.com/nats-io/jwt/v2 symbols: - Import.Validate derived_symbols: - Account.Validate - AccountClaims.Validate - Imports.Validate summary: Import token permissions checking not enforced in github.com/nats-io/jwt description: |- Import tokens valid for one account may be used for any other account. Validation of Import token bindings incorrectly warns on mismatches, rather than rejecting the Goken. This permits a token for one account to be used for any other account. published: 2022-07-01T20:11:22Z cves: - CVE-2021-3127 ghsas: - GHSA-62mh-w5cv-p88c - GHSA-9r5x-fjv3-q6h4 - GHSA-j756-f273-xhp4 references: - advisory: https://advisories.nats.io/CVE/CVE-2021-3127.txt - fix: https://github.com/nats-io/jwt/pull/149 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2042.yaml
id: GO-2023-2042 modules: - module: cmd versions: - introduced: 1.21.0-0 - fixed: 1.21.1 vulnerable_at: 1.21.0 packages: - package: cmd/go summary: Arbitrary code execution via go.mod toolchain directive in cmd/go description: |- The go.mod toolchain directive, introduced in Go 1.21, can be leveraged to execute scripts and binaries relative to the root of the module when the "go" command was executed within the module. This applies to modules downloaded using the "go" command from the module proxy, as well as modules downloaded directly using VCS software. credits: - Juho Nurminen of Mattermost references: - report: https://go.dev/issue/62198 - fix: https://go.dev/cl/526158 - web: https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ cve_metadata: id: CVE-2023-39320 cwe: 'CWE-94: Improper Control of Generation of Code (''Code Injection'')' references: - https://security.netapp.com/advisory/ntap-20231020-0004/ - https://security.gentoo.org/glsa/202311-09 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1071.yaml
id: GO-2022-1071 modules: - module: github.com/fluxcd/helm-controller/api versions: - fixed: 0.26.0 vulnerable_at: 0.25.0 packages: - package: github.com/fluxcd/helm-controller/api/v2beta1 - module: github.com/fluxcd/image-automation-controller/api versions: - fixed: 0.26.1 vulnerable_at: 0.26.0 packages: - package: github.com/fluxcd/image-automation-controller/api/v1beta1 - module: github.com/fluxcd/image-reflector-controller/api versions: - fixed: 0.22.1 vulnerable_at: 0.22.0 packages: - package: github.com/fluxcd/image-reflector-controller/api/v1beta1 - module: github.com/fluxcd/kustomize-controller/api versions: - fixed: 0.30.0 vulnerable_at: 0.29.0 packages: - package: github.com/fluxcd/kustomize-controller/api/v1beta2 - module: github.com/fluxcd/notification-controller/api versions: - fixed: 0.28.0 vulnerable_at: 0.27.0 packages: - package: github.com/fluxcd/notification-controller/api/v1beta1 - module: github.com/fluxcd/source-controller/api versions: - fixed: 0.30.0 vulnerable_at: 0.29.0 packages: - package: github.com/fluxcd/source-controller/api/v1beta2 summary: Denial of service in flux controllers in github.com/fluxcd modules description: |- Flux controllers are vulnerable to a denial of service attack. Users that have permissions to change Flux's objects, either through a Flux source or directly within a cluster, can provide invalid data to fields .spec.interval or .spec.timeout (and structured variations of these fields), causing the entire object type to stop being processed. The issue has two root causes: a) the Kubernetes type metav1.Duration is not fully compatible with the Go type time.Duration as explained in https://github.com/kubernetes/apimachinery/issues/131, and b) a lack of validation within Flux to restrict allowed values. cves: - CVE-2022-39272 ghsas: - GHSA-f4p5-x4vc-mh4v credits: - Alexander Block (@codablock) references: - advisory: https://github.com/advisories/GHSA-f4p5-x4vc-mh4v - fix: https://github.com/fluxcd/helm-controller/pull/533 - fix: https://github.com/fluxcd/image-automation-controller/pull/439 - fix: https://github.com/fluxcd/image-reflector-controller/pull/314 - fix: https://github.com/fluxcd/kustomize-controller/pull/731 - fix: https://github.com/fluxcd/notification-controller/pull/420 - fix: https://github.com/fluxcd/source-controller/pull/903 - web: https://github.com/kubernetes/apimachinery#131 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0263.yaml
id: GO-2021-0263 modules: - module: std versions: - fixed: 1.16.10 - introduced: 1.17.0-0 - fixed: 1.17.3 vulnerable_at: 1.17.2 packages: - package: debug/macho symbols: - NewFile skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)' summary: Panic on invalid symbol tables in debug/macho description: |- Calling File.ImportedSymbols on a loaded file which contains an invalid dynamic symbol table command can cause a panic, in particular if the encoded number of undefined symbols is larger than the number of symbols in the symbol table. published: 2022-01-13T03:45:03Z cves: - CVE-2021-41771 credits: - Burak Çarıkçı - Yunus Yıldırım (CT-Zer0 Crypttech) references: - fix: https://go.dev/cl/367075 - fix: https://go.googlesource.com/go/+/61536ec03063b4951163bd09609c86d82631fa27 - web: https://groups.google.com/g/golang-announce/c/0fM21h43arc - report: https://go.dev/issue/48990 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0979.yaml
id: GO-2022-0979 modules: - module: github.com/peterzen/goresolver vulnerable_at: 1.0.2 packages: - package: github.com/peterzen/goresolver summary: |- Incorrect DNSSEC validation due to unchecked owner names in github.com/peterzen/goresolver description: |- DNSSEC validation is not performed correctly. An attacker can cause this package to report successful validation for invalid, attacker-controlled records. The owner name of RRSIG RRs is not validated, permitting an attacker to present the RRSIG for an attacker-controlled domain in a response for any other domain. ghsas: - GHSA-87mm-qxm5-cp3f references: - report: https://github.com/peterzen/goresolver/issues/5 cve_metadata: id: CVE-2022-3346 cwe: 'CWE 347: Improper Verification of Cryptographic Signature' review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1568.yaml
id: GO-2023-1568 modules: - module: std versions: - fixed: 1.19.6 - introduced: 1.20.0-0 - fixed: 1.20.1 vulnerable_at: 1.20.0 packages: - package: path/filepath goos: - windows symbols: - Clean derived_symbols: - Abs - Dir - EvalSymlinks - Glob - IsLocal - Join - Rel - Walk - WalkDir summary: Path traversal on Windows in path/filepath description: |- A path traversal vulnerability exists in filepath.Clean on Windows. On Windows, the filepath.Clean function could transform an invalid path such as "a/../c:/b" into the valid path "c:\b". This transformation of a relative (if invalid) path into an absolute path could enable a directory traversal attack. After fix, the filepath.Clean function transforms this path into the relative (but still invalid) path ".\c:\b". credits: - RyotaK (https://ryotak.net) references: - report: https://go.dev/issue/57274 - fix: https://go.dev/cl/468123 - web: https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E cve_metadata: id: CVE-2022-41722 cwe: | CWE-22: Improper Limitation of a Pathname to a Restricted Directory ("Path Traversal") review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1930.yaml
id: GO-2023-1930 modules: - module: github.com/hamba/avro/v2 versions: - fixed: 2.13.0 vulnerable_at: 2.12.0 packages: - package: github.com/hamba/avro/v2 symbols: - Reader.readBytes derived_symbols: - Decoder.Decode - Reader.ReadArrayCB - Reader.ReadBytes - Reader.ReadMapCB - Reader.ReadNext - Reader.ReadString - Reader.ReadVal - Unmarshal - arrayDecoder.Decode - bytesCodec.Decode - bytesDecimalCodec.Decode - bytesDecimalPtrCodec.Decode - dereferenceDecoder.Decode - efaceDecoder.Decode - frozenConfig.Unmarshal - mapDecoder.Decode - mapSkipDecoder.Decode - mapUnionDecoder.Decode - recordIfaceDecoder.Decode - recordMapDecoder.Decode - recordSkipDecoder.Decode - referenceDecoder.Decode - sliceSkipDecoder.Decode - stringCodec.Decode - structDecoder.Decode - textMarshalerCodec.Decode - unionPtrDecoder.Decode - unionResolvedDecoder.Decode - unionSkipDecoder.Decode - module: github.com/hamba/avro vulnerable_at: 1.8.0 packages: - package: github.com/hamba/avro symbols: - Reader.ReadBytes - Reader.ReadString derived_symbols: - Decoder.Decode - Reader.ReadArrayCB - Reader.ReadMapCB - Reader.ReadNext - Reader.ReadVal - Unmarshal - arrayDecoder.Decode - bytesCodec.Decode - bytesDecimalCodec.Decode - bytesDecimalPtrCodec.Decode - dereferenceDecoder.Decode - efaceDecoder.Decode - frozenConfig.Unmarshal - mapDecoder.Decode - mapSkipDecoder.Decode - mapUnionDecoder.Decode - recordIfaceDecoder.Decode - recordMapDecoder.Decode - recordSkipDecoder.Decode - referenceDecoder.Decode - sliceSkipDecoder.Decode - stringCodec.Decode - structDecoder.Decode - textMarshalerCodec.Decode - unionPtrDecoder.Decode - unionResolvedDecoder.Decode - unionSkipDecoder.Decode summary: Unrestricted memory consumption in github.com/hamba/avro cves: - CVE-2023-37475 ghsas: - GHSA-9x44-9pgq-cf45 references: - advisory: https://github.com/hamba/avro/security/advisories/GHSA-9x44-9pgq-cf45 - fix: https://github.com/hamba/avro/pull/273 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2859.yaml
id: GO-2024-2859 modules: - module: github.com/fluxcd/source-controller versions: - fixed: 1.2.5 vulnerable_at: 1.2.4 summary: source-controller leaks Azure Storage SAS token into logs in github.com/fluxcd/source-controller cves: - CVE-2024-31216 ghsas: - GHSA-v554-xwgw-hc3w references: - advisory: https://github.com/fluxcd/source-controller/security/advisories/GHSA-v554-xwgw-hc3w - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-31216 - fix: https://github.com/fluxcd/source-controller/commit/915d1a072a4f37dd460ba33079dc094aa6e72fa9 - fix: https://github.com/fluxcd/source-controller/pull/1430 source: id: GHSA-v554-xwgw-hc3w created: 2024-05-17T16:08:47.429447-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2000.yaml
id: GO-2023-2000 modules: - module: github.com/libp2p/go-libp2p versions: - fixed: 0.27.8 - introduced: 0.28.0 - fixed: 0.28.2 - introduced: 0.29.0 - fixed: 0.29.1 vulnerable_at: 0.29.0 packages: - package: github.com/libp2p/go-libp2p/core/crypto symbols: - GenerateRSAKeyPair - UnmarshalRsaPrivateKey - UnmarshalRsaPublicKey derived_symbols: - GenerateKeyPair - GenerateKeyPairWithReader - PublicKeyFromProto - UnmarshalPrivateKey - UnmarshalPublicKey summary: Large RSA keys can cause high resource usage in github.com/libp2p/go-libp2p description: |- Large RSA keys can lead to resource exhaustion attacks. With fix, the size of RSA keys transmitted during handshakes is restricted to <= 8192 bits. cves: - CVE-2023-39533 ghsas: - GHSA-876p-8259-xjgg references: - advisory: https://github.com/libp2p/go-libp2p/security/advisories/GHSA-876p-8259-xjgg - report: https://go.dev/issue/61460 - fix: https://github.com/libp2p/go-libp2p/commit/0cce607219f3710addc7e18672cffd1f1d912fbb review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2880.yaml
id: GO-2024-2880 modules: - module: github.com/traefik/traefik unsupported_versions: - last_affected: 1.7.34 vulnerable_at: 1.7.34 - module: github.com/traefik/traefik/v2 versions: - fixed: 2.11.3 vulnerable_at: 2.11.2 - module: github.com/traefik/traefik/v3 versions: - fixed: 3.0.1 vulnerable_at: 3.0.0 summary: |- Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite loop in github.com/traefik/traefik ghsas: - GHSA-f7cq-5v43-8pwp references: - advisory: https://github.com/traefik/traefik/security/advisories/GHSA-f7cq-5v43-8pwp - web: https://github.com/advisories/GHSA-5fq7-4mxc-535h - web: https://github.com/traefik/traefik/releases/tag/v2.11.3 - web: https://github.com/traefik/traefik/releases/tag/v3.0.1 - web: https://www.cve.org/CVERecord?id=CVE-2024-24788 source: id: GHSA-f7cq-5v43-8pwp created: 2024-06-04T14:25:41.535025-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2594.yaml
id: GO-2024-2594 modules: - module: github.com/mattermost/mattermost-server versions: - introduced: 9.2.0+incompatible - fixed: 9.2.5+incompatible - introduced: 9.3.0+incompatible - fixed: 9.3.1+incompatible - introduced: 9.4.0+incompatible - fixed: 9.4.2+incompatible vulnerable_at: 9.4.2-rc2+incompatible - module: github.com/mattermost/mattermost-server/v5 vulnerable_at: 5.39.3 - module: github.com/mattermost/mattermost-server/v6 vulnerable_at: 6.7.2 - module: github.com/mattermost/mattermost/server/v8 non_go_versions: - fixed: 8.1.9 vulnerable_at: 8.0.0-20240626184126-817e18414e41 summary: Mattermost fails to limit the number of role names in github.com/mattermost/mattermost-server cves: - CVE-2024-1953 ghsas: - GHSA-vm9m-57jr-4pxh unknown_aliases: - CGA-25vp-ggq8-49x6 references: - advisory: https://github.com/advisories/GHSA-vm9m-57jr-4pxh - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-1953 - web: https://mattermost.com/security-updates source: id: GHSA-vm9m-57jr-4pxh created: 2024-06-26T16:08:54.70065-04:00 review_status: UNREVIEWED unexcluded: EFFECTIVELY_PRIVATE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2101.yaml
id: GO-2023-2101 modules: - module: github.com/consensys/gnark-crypto versions: - fixed: 0.12.1 vulnerable_at: 0.12.0 packages: - package: github.com/consensys/gnark-crypto/ecc/bls12-377 symbols: - G1Jac.mulWindowed - G2Jac.mulWindowed - package: github.com/consensys/gnark-crypto/ecc/bls12-381 symbols: - G1Jac.mulWindowed - G2Jac.mulWindowed - package: github.com/consensys/gnark-crypto/ecc/bls24-315 symbols: - G1Jac.mulWindowed - G2Jac.mulWindowed - package: github.com/consensys/gnark-crypto/ecc/bls24-317 symbols: - G1Jac.mulWindowed - G2Jac.mulWindowed - package: github.com/consensys/gnark-crypto/ecc/bn254 symbols: - G1Jac.mulWindowed - G2Jac.mulWindowed - package: github.com/consensys/gnark-crypto/ecc/bw6-633 symbols: - G1Jac.mulWindowed - G2Jac.mulWindowed - package: github.com/consensys/gnark-crypto/ecc/bw6-756 symbols: - G1Jac.mulWindowed - G2Jac.mulWindowed - package: github.com/consensys/gnark-crypto/ecc/bw6-761 symbols: - G1Jac.mulWindowed - G2Jac.mulWindowed - package: github.com/consensys/gnark-crypto/ecc/secp256k1 symbols: - G1Jac.mulWindowed - package: github.com/consensys/gnark-crypto/ecc/bls12-377/internal/fptower symbols: - E12.ExpGLV - package: github.com/consensys/gnark-crypto/ecc/bls12-381/internal/fptower symbols: - E12.ExpGLV - package: github.com/consensys/gnark-crypto/ecc/bls24-315/internal/fptower symbols: - E24.ExpGLV - package: github.com/consensys/gnark-crypto/ecc/bls24-317/internal/fptower symbols: - E24.ExpGLV - package: github.com/consensys/gnark-crypto/ecc/bn254/internal/fptower symbols: - E12.ExpGLV - package: github.com/consensys/gnark-crypto/ecc/bw6-633/internal/fptower symbols: - E6.ExpGLV - package: github.com/consensys/gnark-crypto/ecc/bw6-756/internal/fptower symbols: - E6.ExpGLV - package: github.com/consensys/gnark-crypto/ecc/bw6-761/internal/fptower symbols: - E6.ExpGLV summary: Incorrect exponentiation results in github.com/consensys/gnark-crypto ghsas: - GHSA-pffg-92cg-xf5c credits: - '@asanso' references: - fix: https://github.com/Consensys/gnark-crypto/pull/213 - fix: https://github.com/Consensys/gnark-crypto/pull/451 - fix: https://github.com/Consensys/gnark-crypto/commit/ec6be1a037f7c496d595c541a8a8d31c47bcfa3d - web: https://eprint.iacr.org/2015/565 - advisory: https://github.com/advisories/GHSA-pffg-92cg-xf5c review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1129.yaml
id: GO-2022-1129 modules: - module: github.com/crewjam/saml versions: - fixed: 0.4.9 vulnerable_at: 0.4.8 packages: - package: github.com/crewjam/saml symbols: - ServiceProvider.validateSignature - findChild derived_symbols: - ServiceProvider.ParseResponse - ServiceProvider.ParseXMLArtifactResponse - ServiceProvider.ParseXMLResponse - ServiceProvider.ValidateLogoutResponseForm - ServiceProvider.ValidateLogoutResponseRedirect - ServiceProvider.ValidateLogoutResponseRequest summary: Authentication bypass in github.com/crewjam/saml description: |- Authentication bypass is possible when processing SAML responses containing multiple Assertion elements. cves: - CVE-2022-41912 ghsas: - GHSA-j2jp-wvqg-wc2g credits: - Felix Wilhelm from Google Project Zero references: - advisory: https://github.com/prometheus/exporter-toolkit/security/advisories/GHSA-7rg2-cxvp-9p7p - fix: https://github.com/crewjam/saml/commit/aee3fb1edeeaf1088fcb458727e0fd863d277f8b review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0094.yaml
id: GO-2021-0094 modules: - module: github.com/hashicorp/go-slug versions: - fixed: 0.5.0 vulnerable_at: 0.4.3 packages: - package: github.com/hashicorp/go-slug symbols: - Unpack summary: Directory traversal in github.com/hashicorp/go-slug description: |- Protections against directory traversal during archive extraction can be bypassed by chaining multiple symbolic links within the archive. This allows a malicious attacker to cause files to be created outside of the target directory. Additionally if the attacker is able to read extracted files they may create symbolic links to arbitrary files on the system which the unpacker has permissions to read. published: 2021-04-14T20:04:52Z cves: - CVE-2020-29529 ghsas: - GHSA-2g5j-5x95-r6hr references: - fix: https://github.com/hashicorp/go-slug/pull/12 - fix: https://github.com/hashicorp/go-slug/commit/28cafc59c8da6126a3ae94dfa84181df4073454f - web: https://securitylab.github.com/advisories/GHSL-2020-262-zipslip-go-slug review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2482.yaml
id: GO-2024-2482 modules: - module: github.com/goreleaser/goreleaser versions: - introduced: 1.23.0 - fixed: 1.24.0 vulnerable_at: 1.23.0 packages: - package: github.com/goreleaser/goreleaser/internal/shell symbols: - Run - package: github.com/goreleaser/goreleaser/internal/pipe/sbom symbols: - catalogArtifact derived_symbols: - Pipe.Run - package: github.com/goreleaser/goreleaser/internal/exec symbols: - executeCommand derived_symbols: - Execute fix_links: - https://github.com/goreleaser/goreleaser/commit/d5b6a533ca1dc3366983d5d31ee2d2b6232b83c0 summary: Information leak in github.com/goreleaser/goreleaser description: Secret values can be printed to the --debug log when using a a custom publisher. cves: - CVE-2024-23840 ghsas: - GHSA-h3q2-8whx-c29h credits: - '@andreaangiolillo' - '@caarlos0' references: - advisory: https://github.com/goreleaser/goreleaser/security/advisories/GHSA-h3q2-8whx-c29h - fix: https://github.com/goreleaser/goreleaser/commit/d5b6a533ca1dc3366983d5d31ee2d2b6232b83c0 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2565.yaml
id: GO-2024-2565 modules: - module: github.com/greenpau/caddy-security unsupported_versions: - last_affected: 1.0.42 vulnerable_at: 1.1.29 summary: Use of Insufficiently Random Values in github.com/greenpau/caddy-security cves: - CVE-2024-21495 ghsas: - GHSA-c7vf-m394-m4x4 references: - advisory: https://github.com/advisories/GHSA-c7vf-m394-m4x4 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-21495 - report: https://github.com/greenpau/caddy-security/issues/265 - web: https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy - web: https://github.com/greenpau/go-authcrunch/commit/ecd3725baf2683eb1519bb3c81ae41085fbf7dc2 - web: https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-6248275 source: id: GHSA-c7vf-m394-m4x4 created: 2024-06-14T11:42:21.52675-04:00 review_status: UNREVIEWED unexcluded: EFFECTIVELY_PRIVATE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2906.yaml
id: GO-2024-2906 modules: - module: github.com/snapcore/snapd unsupported_versions: - cve_version_range: affected from 0 before 68ee9c6aa916ab87dbfd9a26030690f2cabf1e14 vulnerable_at: 0.0.0-20240613121802-3b573c423b52 summary: CVE-2024-5138 in github.com/snapcore/snapd cves: - CVE-2024-5138 credits: - Rory McNamara from Snyk Security Labs references: - advisory: https://www.cve.org/CVERecord?id=CVE-2024-5138 - fix: https://github.com/snapcore/snapd/commit/68ee9c6aa916ab87dbfd9a26030690f2cabf1e14 - report: https://bugs.launchpad.net/snapd/+bug/2065077 source: id: CVE-2024-5138 created: 2024-06-13T12:06:06.759735-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2789.yaml
id: GO-2024-2789 modules: - module: github.com/openshift/cluster-monitoring-operator unsupported_versions: - last_affected: 0.1.1 vulnerable_at: 3.11.0+incompatible summary: Cluster Monitoring Operator contains a credentials leak in github.com/openshift/cluster-monitoring-operator cves: - CVE-2024-1139 ghsas: - GHSA-x5m7-63c6-fx79 references: - advisory: https://github.com/advisories/GHSA-x5m7-63c6-fx79 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-1139 - fix: https://github.com/openshift/cluster-monitoring-operator/commit/1cfbe9ffafe1e43f8f87a451b72fddf5d76fa4e3 - fix: https://github.com/openshift/cluster-monitoring-operator/pull/1747 - web: https://access.redhat.com/errata/RHSA-2024:1887 - web: https://access.redhat.com/errata/RHSA-2024:1891 - web: https://access.redhat.com/errata/RHSA-2024:2047 - web: https://access.redhat.com/errata/RHSA-2024:2782 - web: https://access.redhat.com/security/cve/CVE-2024-1139 - web: https://bugzilla.redhat.com/show_bug.cgi?id=2262158 - web: https://github.com/openshift/cluster-monitoring-operator/blob/d45a3335c2bbada0948adef9fcba55c4e14fa1d7/pkg/manifests/manifests.go#L3135 source: id: GHSA-x5m7-63c6-fx79 created: 2024-06-04T15:27:27.603431-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0945.yaml
id: GO-2022-0945 modules: - module: gopkg.in/square/go-jose.v1 versions: - fixed: 1.1.0 vulnerable_at: 1.0.0-20160831185616-c7581939a365 packages: - package: gopkg.in/square/go-jose.v1 symbols: - JsonWebSignature.Verify - ecDecrypterSigner.decryptKey - rawJsonWebKey.ecPublicKey derived_symbols: - JsonWebEncryption.Decrypt - JsonWebKey.UnmarshalJSON - package: gopkg.in/square/go-jose.v1/cipher symbols: - DeriveECDHES - NewConcatKDF - cbcAEAD.Seal - cbcAEAD.computeAuthTag - padBuffer - resize derived_symbols: - cbcAEAD.Open summary: Signature validation bypass in gopkg.in/square/go-jose.v1 description: |- The go-jose library suffers from multiple signatures exploitation. When validating a signed message, the API did not indicate which signature was valid, which creates the potential for confusion. published: 2022-08-22T17:59:45Z cves: - CVE-2016-9122 ghsas: - GHSA-77gc-fj98-665h credits: - Quan Nguyen from Google's Information Security Engineering Team references: - advisory: https://www.openwall.com/lists/oss-security/2016/11/03/1 - fix: https://github.com/square/go-jose/pull/111 - fix: https://github.com/square/go-jose/commit/2c5656adca9909843c4ff50acf1d2cf8f32da7e6 - web: https://github.com/square/go-jose/commit/789a4c4bd4c118f7564954f441b29c153ccd6a96 - web: https://github.com/square/go-jose/commit/c7581939a3656bb65e89d64da0a52364a33d2507 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2539.yaml
id: GO-2024-2539 modules: - module: github.com/mattermost/mattermost-plugin-jira versions: - fixed: 1.1.2-0.20230830170046-f4cf4c6de017 non_go_versions: - fixed: 4.0.0-rc2 vulnerable_at: 1.1.2-0.20230829214939-57856e474934 packages: - package: github.com/mattermost/mattermost-plugin-jira/server symbols: - Plugin.httpOAuth1aDisconnect - Plugin.initializeRouter summary: |- Cross-site request forgery via logout button in github.com/mattermost/mattermost-plugin-jira cves: - CVE-2024-23319 ghsas: - GHSA-4fp6-574p-fc35 references: - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-23319 - fix: https://github.com/mattermost/mattermost-plugin-jira/commit/f4cf4c6de017ef6aa4428d393b78f418dd84cd8e - web: https://mattermost.com/security-updates review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0077.yaml
id: GO-2021-0077 modules: - module: go.etcd.io/etcd versions: - fixed: 0.5.0-alpha.5.0.20190108173120-83c051b701d3 vulnerable_at: 0.5.0-alpha.5.0.20190108163607-9c6b407e7d45 packages: - package: go.etcd.io/etcd/auth symbols: - authStore.AuthInfoFromTLS summary: Authentication bypass in go.etcd.io/etcd description: |- A user can use a valid client certificate that contains a CommonName that matches a valid RBAC username to authenticate themselves as that user, despite lacking the required credentials. This may allow authentication bypass, but requires a certificate that is issued by a CA trusted by the server. published: 2021-04-14T20:04:52Z cves: - CVE-2018-16886 ghsas: - GHSA-h6xx-pmxh-3wgp references: - fix: https://github.com/etcd-io/etcd/pull/10366 - fix: https://github.com/etcd-io/etcd/commit/bf9d0d8291dc71ecbfb2690612954e1a298154b2 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0089.yaml
id: GO-2021-0089 modules: - module: github.com/buger/jsonparser versions: - fixed: 1.0.0 vulnerable_at: 0.0.0-20191204142016-1a29609e0929 packages: - package: github.com/buger/jsonparser symbols: - findKeyStart derived_symbols: - Delete summary: Infinite loop in github.com/buger/jsonparser description: |- Parsing malformed JSON which contain opening brackets, but not closing brackets, leads to an infinite loop. If operating on untrusted user input this can be used as a denial of service vector. published: 2021-04-14T20:04:52Z cves: - CVE-2020-10675 ghsas: - GHSA-rmh2-65xw-9m6q credits: - Cong Wang references: - fix: https://github.com/buger/jsonparser/pull/192 - fix: https://github.com/buger/jsonparser/commit/91ac96899e492584984ded0c8f9a08f10b473717 - web: https://github.com/buger/jsonparser/issues/188 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0968.yaml
id: GO-2022-0968 modules: - module: golang.org/x/crypto versions: - fixed: 0.0.0-20211202192323-5770296d904e vulnerable_at: 0.0.0-20211117183948-ae814b36b871 packages: - package: golang.org/x/crypto/ssh symbols: - gcmCipher.readCipherPacket - chacha20Poly1305Cipher.readCipherPacket derived_symbols: - Dial - NewClientConn - NewServerConn - curve25519sha256.Client - curve25519sha256.Server - dhGEXSHA.Client - dhGEXSHA.Server - dhGroup.Client - dhGroup.Server - ecdh.Client - ecdh.Server summary: Panic on malformed packets in golang.org/x/crypto/ssh description: |- Unauthenticated clients can cause a panic in SSH servers. When using AES-GCM or ChaCha20Poly1305, consuming a malformed packet which contains an empty plaintext causes a panic. published: 2022-09-13T03:32:38Z cves: - CVE-2021-43565 ghsas: - GHSA-gwc9-m7rh-j2ww credits: - Rod Hynes (Psiphon Inc) references: - web: https://groups.google.com/g/golang-announce/c/2AR1sKiM-Qs - report: https://go.dev/issues/49932 - fix: https://go.dev/cl/368814/ review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0035.yaml
id: GO-2020-0035 modules: - module: github.com/yi-ge/unzip versions: - fixed: 1.0.3-0.20200308084313-2adbaa4891b9 vulnerable_at: 1.0.3-0.20190904092328-cc5a75ef5eca packages: - package: github.com/yi-ge/unzip symbols: - Unzip.Extract summary: Path traversal in github.com/yi-ge/unzip description: |- Due to improper path sanitization, archives containing relative file paths can cause files to be written (or overwritten) outside of the target directory. published: 2021-04-14T20:04:52Z ghsas: - GHSA-f5c5-hmw9-v8hx references: - fix: https://github.com/yi-ge/unzip/pull/1 - fix: https://github.com/yi-ge/unzip/commit/2adbaa4891b9690853ef10216189189f5ad7dc73 - web: https://snyk.io/research/zip-slip-vulnerability cve_metadata: id: CVE-2020-36561 cwe: 'CWE 29: Path Traversal: "\..\filename"' review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0040.yaml
id: GO-2020-0040 modules: - module: github.com/shiyanhui/dht vulnerable_at: 0.0.0-20201219151056-5a20f3199263 packages: - package: github.com/shiyanhui/dht summary: Uncontrolled Resource Consumption in github.com/shiyanhui/dht description: |- Due to unchecked type assertions, maliciously crafted messages can cause panics, which may be used as a denial of service vector. published: 2021-04-14T20:04:52Z ghsas: - GHSA-p6fg-723f-hgpw credits: - '@hMihaiDavid' references: - web: https://github.com/shiyanhui/dht/issues/57 cve_metadata: id: CVE-2020-36562 cwe: 'CWE-400: Uncontrolled Resource Consumption' review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2160.yaml
id: GO-2023-2160 modules: - module: github.com/quic-go/quic-go versions: - introduced: 0.37.0 - fixed: 0.37.3 vulnerable_at: 0.37.2 packages: - package: github.com/quic-go/quic-go summary: Panic during QUIC handshake in github.com/quic-go/quic-go description: |- The QUIC handshake can cause a panic when processing a certain sequence of frames. A malicious peer can deliberately trigger this panic. cves: - CVE-2023-46239 ghsas: - GHSA-3q6m-v84f-6p9h references: - advisory: https://github.com/quic-go/quic-go/security/advisories/GHSA-3q6m-v84f-6p9h - fix: https://github.com/quic-go/quic-go/commit/b6a4725b60f1fe04e8f1ddcc3114e290fcea1617 notes: - No symbols, because the only vulnerable versions only build with unreleased versions of Go and the vulnerability affects all users of the package anyway. review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1002.yaml
id: GO-2022-1002 modules: - module: github.com/pandatix/go-cvss versions: - introduced: 0.2.0 - fixed: 0.4.0 vulnerable_at: 0.3.0 packages: - package: github.com/pandatix/go-cvss/20 symbols: - ParseVector summary: Panic in github.com/pandatix/go-cvss description: ParseVector can panic when provided with invalid input. cves: - CVE-2022-39213 ghsas: - GHSA-xhmf-mmv2-4hhx references: - fix: https://github.com/pandatix/go-cvss/commit/d9d478ff0c13b8b09ace030db9262f3c2fe031f4 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2682.yaml
id: GO-2024-2682 modules: - module: github.com/quic-go/quic-go versions: - fixed: 0.42.0 vulnerable_at: 0.41.0 packages: - package: github.com/quic-go/quic-go symbols: - framerI.QueueControlFrame - connection.run derived_symbols: - Dial - DialAddr - DialAddrEarly - DialEarly - Listen - ListenAddr - ListenAddrEarly - ListenEarly - Transport.Dial - Transport.DialEarly - Transport.Listen - Transport.ListenEarly - connIDGenerator.Retire - connIDGenerator.SetMaxActiveConnIDs - connIDManager.Add - connIDManager.Get - connection.AcceptStream - connection.AcceptUniStream - connection.OpenStream - connection.OpenStreamSync - connection.OpenUniStream - connection.OpenUniStreamSync - framerI.AppendStreamFrames - packetPacker.AppendPacket - packetPacker.MaybePackProbePacket - packetPacker.PackAckOnlyPacket - packetPacker.PackApplicationClose - packetPacker.PackCoalescedPacket - packetPacker.PackConnectionClose - packetPacker.PackMTUProbePacket - receiveStream.CancelRead - receiveStream.CloseRemote - receiveStream.Read - sendStream.CancelWrite - streamsMap.AcceptStream - streamsMap.AcceptUniStream - streamsMap.DeleteStream - streamsMap.HandleMaxStreamsFrame - streamsMap.OpenStream - streamsMap.OpenStreamSync - streamsMap.OpenUniStream - streamsMap.OpenUniStreamSync - streamsMap.UpdateLimits - windowUpdateQueue.QueueAll summary: Denial of service via connection starvation in github.com/quic-go/quic-go description: |- An attacker can cause its peer to run out of memory by sending a large number of NEW_CONNECTION_ID frames that retire old connection IDs. The receiver is supposed to respond to each retirement frame with a RETIRE_CONNECTION_ID frame. The attacker can prevent the receiver from sending out (the vast majority of) these RETIRE_CONNECTION_ID frames by collapsing the peers congestion window (by selectively acknowledging received packets) and by manipulating the peer's RTT estimate. cves: - CVE-2024-22189 ghsas: - GHSA-c33x-xqrf-c478 credits: - marten-seemann references: - fix: https://github.com/quic-go/quic-go/commit/4a99b816ae3ab03ae5449d15aac45147c85ed47a - web: https://seemann.io/posts/2024-03-19-exploiting-quics-connection-id-management review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0248.yaml
id: GO-2022-0248 modules: - module: github.com/cloudflare/cfrpki versions: - fixed: 1.4.4 vulnerable_at: 1.4.2 packages: - package: github.com/cloudflare/cfrpki/validator/pki symbols: - ExtractPathManifest derived_symbols: - SimpleManager.Explore - SimpleManager.ExploreAdd - Validator.AddManifest - Validator.AddResource summary: Directory traversal in manifest path extraction in github.com/cloudflare/cfrpki description: |- Manifest path extraction is vulnerable to directory traversal attacks. The ExtractPathManifest function permits file paths containing relative directory components (".."), permitting files to reference arbitrary locations on the filesystem. published: 2022-07-15T23:07:18Z cves: - CVE-2021-3907 ghsas: - GHSA-cqh2-vc2f-q4fh - GHSA-8459-6rc9-8vf8 related: - GHSA-3jhm-87m6-x959 credits: - Koen van Hove references: - fix: https://github.com/cloudflare/cfrpki/commit/eb9cc4db7b7b79e44f56dfaa959fccdfb2af8284 - fix: https://github.com/cloudflare/cfrpki/commit/a053a808feeb3115c76b6cc263ee55598ce6e8cd review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2441.yaml
id: GO-2024-2441 modules: - module: github.com/karmada-io/karmada versions: - fixed: 1.8.0 vulnerable_at: 1.8.0-preview2 summary: The DES/3DES cipher was used as part of the TLS protocol by installation tools in github.com/karmada-io/karmada ghsas: - GHSA-7xg2-83f8-39mr references: - advisory: https://github.com/karmada-io/karmada/security/advisories/GHSA-7xg2-83f8-39mr - fix: https://github.com/karmada-io/karmada/commit/98e655fc552b2987c3f2d2a061007889ce8be536 - fix: https://github.com/karmada-io/karmada/commit/c3c376605403e07ca0ed2dc39c9e0f3c38f8e29d - report: https://github.com/karmada-io/karmada/issues/4191 - web: https://go.dev/issue/41476 source: id: GHSA-7xg2-83f8-39mr created: 2024-06-14T11:34:57.66072-04:00 review_status: UNREVIEWED unexcluded: EFFECTIVELY_PRIVATE