repo_id
stringclasses 927
values | file_path
stringlengths 99
214
| content
stringlengths 2
4.15M
|
|---|---|---|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2412.yaml
|
id: GO-2023-2412
modules:
- module: github.com/containerd/containerd
versions:
- fixed: 1.6.26
- introduced: 1.7.0
- fixed: 1.7.11
vulnerable_at: 1.7.10
packages:
- package: github.com/containerd/containerd/contrib/apparmor
symbols:
- generate
derived_symbols:
- DumpDefaultProfile
- LoadDefaultProfile
summary: RAPL accessibility in github.com/containerd/containerd
ghsas:
- GHSA-7ww5-4wqc-m92c
references:
- advisory: https://github.com/containerd/containerd/security/advisories/GHSA-7ww5-4wqc-m92c
- fix: https://github.com/containerd/containerd/commit/67d356cb3095f3e8f8ad7d36f9a733fea1e7e28c
- fix: https://github.com/containerd/containerd/commit/746b910f05855c8bfdb4415a1c0f958b234910e5
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2655.yaml
|
id: GO-2024-2655
modules:
- module: github.com/zitadel/zitadel
versions:
- fixed: 1.80.0-v2.20.0.20240312162750-5908b97e7c22
non_go_versions:
- fixed: 2.41.15
- introduced: 2.42.0
- fixed: 2.42.15
- introduced: 2.43.0
- fixed: 2.43.9
- introduced: 2.44.0
- fixed: 2.44.3
- introduced: 2.45.0
- fixed: 2.45.1
- introduced: 2.46.0
- fixed: 2.46.1
- introduced: 2.47.0
- fixed: 2.47.4
vulnerable_at: 1.80.0-v2.20
packages:
- package: github.com/zitadel/zitadel/internal/renderer
skip_fix: Uses replacement directives.
summary: XSS in github.com/zitadel/zitadel
description: |-
The Login UI did not sanitize input parameters. An attacker could create a
malicious link, where injected code would be rendered as part of the login
screen.
cves:
- CVE-2024-28855
ghsas:
- GHSA-hfrg-4jwr-jfpj
credits:
- Daniel Philipp (OWT) and Thomas Wickham (Synopsis)
references:
- advisory: https://github.com/zitadel/zitadel/security/advisories/GHSA-hfrg-4jwr-jfpj
- fix: https://github.com/zitadel/zitadel/commit/07ec2efa9dc62f7a6c3a58c112b2879d24bc3e3c
notes:
- 1.80.0-v2.20.0.20240312162750-5908b97e7c22 corresponds to 2.47.4. We are using this as a timestamp.
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0187.yaml
|
id: GO-2022-0187
modules:
- module: std
versions:
- introduced: 1.6.0-0
- fixed: 1.7.6
- introduced: 1.8.0-0
- fixed: 1.8.2
vulnerable_at: 1.8.1
packages:
- package: crypto/elliptic
goarch:
- amd64
symbols:
- p256SubInternal
summary: Incorrect computation for P-256 curves in crypto/elliptic
description: |-
The ScalarMult implementation of curve P-256 for amd64 architectures generates
incorrect results for certain specific input points. An adaptive attack can
progressively extract the scalar input to ScalarMult by submitting crafted
points and observing failures to derive correct output. This leads to a full key
recovery attack against static ECDH, as used in popular JWT libraries.
published: 2022-07-01T20:11:15Z
cves:
- CVE-2017-8932
credits:
- Vlad Krasnov
- Filippo Valsorda at Cloudflare
references:
- fix: https://go.dev/cl/41070
- fix: https://go.googlesource.com/go/+/9294fa2749ffee7edbbb817a0ef9fe633136fa9c
- report: https://go.dev/issue/20040
- web: https://groups.google.com/g/golang-announce/c/B5ww0iFt1_Q/m/TgUFJV14BgAJ
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1998.yaml
|
id: GO-2023-1998
modules:
- module: github.com/projectdiscovery/nuclei/v2
versions:
- fixed: 2.9.9
vulnerable_at: 2.9.8
packages:
- package: github.com/projectdiscovery/nuclei/v2/cmd/nuclei
symbols:
- readConfig
derived_symbols:
- init#1
- main
- package: github.com/projectdiscovery/nuclei/v2/pkg/protocols/common/generators
symbols:
- New
- PayloadGenerator.loadPayloads
- package: github.com/projectdiscovery/nuclei/v2/pkg/protocols/common/protocolstate
symbols:
- Init
- package: github.com/projectdiscovery/nuclei/v2/pkg/protocols/dns
symbols:
- Request.Compile
- package: github.com/projectdiscovery/nuclei/v2/pkg/protocols/http
symbols:
- Request.Compile
- package: github.com/projectdiscovery/nuclei/v2/pkg/protocols/headless
symbols:
- Request.Compile
- package: github.com/projectdiscovery/nuclei/v2/pkg/protocols/network
symbols:
- Request.Compile
- package: github.com/projectdiscovery/nuclei/v2/pkg/protocols/websocket
symbols:
- Request.Compile
summary: |-
Improper path sanitization in sandbox mode in
github.com/projectdiscovery/nuclei/v2
cves:
- CVE-2023-37896
ghsas:
- GHSA-2xx4-jj5v-6mff
credits:
- keomutchoiboi
references:
- advisory: https://github.com/projectdiscovery/nuclei/security/advisories/GHSA-2xx4-jj5v-6mff
- fix: https://github.com/projectdiscovery/nuclei/pull/3927
- web: https://github.com/projectdiscovery/nuclei/releases/tag/v2.9.9
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2511.yaml
|
id: GO-2024-2511
modules:
- module: github.com/hashicorp/vault
versions:
- introduced: 1.15.0
- fixed: 1.15.5
vulnerable_at: 1.15.4
summary: Hashicorp Vault may expose sensitive log information in github.com/hashicorp/vault
cves:
- CVE-2024-0831
ghsas:
- GHSA-vgh3-mwxq-rcp8
unknown_aliases:
- BIT-vault-2024-0831
references:
- advisory: https://github.com/advisories/GHSA-vgh3-mwxq-rcp8
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-0831
- fix: https://github.com/hashicorp/vault/commit/2a72f2a8a5b57de88c22a2a94c4a5f08c6f3770b
- web: https://developer.hashicorp.com/vault/docs/upgrading/upgrade-to-1.15.x#audit-devices-could-log-raw-data-despite-configuration
- web: https://discuss.hashicorp.com/t/hcsec-2024-01-vault-may-expose-sensitive-information-when-configuring-an-audit-log-device/62311
- web: https://security.netapp.com/advisory/ntap-20240223-0005
source:
id: GHSA-vgh3-mwxq-rcp8
created: 2024-06-14T11:38:56.000042-04:00
review_status: UNREVIEWED
unexcluded: EFFECTIVELY_PRIVATE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0461.yaml
|
id: GO-2022-0461
modules:
- module: github.com/pion/dtls/v2
versions:
- fixed: 2.1.4
vulnerable_at: 2.1.3
packages:
- package: github.com/pion/dtls/v2
symbols:
- fragmentBuffer.push
derived_symbols:
- Client
- ClientWithContext
- Dial
- DialWithContext
- Resume
- Server
- ServerWithContext
- handshakeFSM.Run
- listener.Accept
summary: Unbounded memory consumption in github.com/pion/dtls/v2
description: |-
Attacker can cause unbounded memory consumption.
The Pion DTLS client and server buffer handshake data with no upper limit,
permitting an attacker to cause unbounded memory consumption by sending an
unterminated handshake.
published: 2022-07-01T20:07:25Z
cves:
- CVE-2022-29189
ghsas:
- GHSA-cx94-mrg9-rq4j
references:
- fix: https://github.com/pion/dtls/commit/a6397ff7282bc56dc37a68ea9211702edb4de1de
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2664.yaml
|
id: GO-2024-2664
modules:
- module: github.com/zitadel/zitadel
non_go_versions:
- fixed: 2.42.17
- introduced: 2.43.0
- fixed: 2.43.11
- introduced: 2.44.0
- fixed: 2.44.7
- introduced: 2.45.0
- fixed: 2.45.5
- introduced: 2.46.0
- fixed: 2.46.5
- introduced: 2.47.0
- fixed: 2.47.8
- introduced: 2.48.0
- fixed: 2.48.3
vulnerable_at: 1.87.5
summary: ZITADEL's actions can overload reserved claims in github.com/zitadel/zitadel
cves:
- CVE-2024-29892
ghsas:
- GHSA-gp8g-f42f-95q2
references:
- advisory: https://github.com/zitadel/zitadel/security/advisories/GHSA-gp8g-f42f-95q2
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-29892
- web: https://github.com/zitadel/zitadel/releases/tag/v2.42.17
- web: https://github.com/zitadel/zitadel/releases/tag/v2.43.11
- web: https://github.com/zitadel/zitadel/releases/tag/v2.44.7
- web: https://github.com/zitadel/zitadel/releases/tag/v2.45.5
- web: https://github.com/zitadel/zitadel/releases/tag/v2.46.5
- web: https://github.com/zitadel/zitadel/releases/tag/v2.47.8
- web: https://github.com/zitadel/zitadel/releases/tag/v2.48.3
source:
id: GHSA-gp8g-f42f-95q2
created: 2024-06-04T15:37:24.2634-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2459.yaml
|
id: GO-2024-2459
modules:
- module: github.com/quic-go/quic-go
versions:
- fixed: 0.37.7
- introduced: 0.38.0
- fixed: 0.38.2
- introduced: 0.39.0
- fixed: 0.39.4
- introduced: 0.40.0
- fixed: 0.40.1
vulnerable_at: 0.40.0
summary: Denial of service via path validation in github.com/quic-go/quic-go
cves:
- CVE-2023-49295
ghsas:
- GHSA-ppxx-5m9h-6vxf
references:
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2023-49295
- fix: https://github.com/quic-go/quic-go/commit/17fc98c2d81dbe685c19702dc694a9d606ac56dc
- fix: https://github.com/quic-go/quic-go/commit/21609ddfeff93668c7625a85eb09f1541fdad965
- fix: https://github.com/quic-go/quic-go/commit/3a9c18bcd27a01c551ac9bf8bd2b4bded77c189a
- fix: https://github.com/quic-go/quic-go/commit/554d543b50b917369fb1394cc5396d928166cf49
- fix: https://github.com/quic-go/quic-go/commit/6cc3d58935426191296171a6c0d1ee965e10534e
- fix: https://github.com/quic-go/quic-go/commit/9aaefe19fc3dc8c8917cc87e6128bb56d9e9e6cc
- fix: https://github.com/quic-go/quic-go/commit/a0ffa757499913f7be69aa78f573a6aee3430ae4
- fix: https://github.com/quic-go/quic-go/commit/d7aa627ebde91cf799ada2a07443faa9b1e5abb8
- web: https://seemann.io/posts/2023-12-18-exploiting-quics-path-validation/
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2595.yaml
|
id: GO-2024-2595
modules:
- module: github.com/mattermost/mattermost-server
versions:
- introduced: 9.0.0+incompatible
- fixed: 9.4.2+incompatible
vulnerable_at: 9.4.2-rc2+incompatible
- module: github.com/mattermost/mattermost-server/v5
vulnerable_at: 5.39.3
- module: github.com/mattermost/mattermost-server/v6
vulnerable_at: 6.7.2
- module: github.com/mattermost/mattermost/server/v8
non_go_versions:
- fixed: 8.1.9
vulnerable_at: 8.0.0-20240626184126-817e18414e41
summary: Mattermost fails to properly restrict the access of files attached to posts in github.com/mattermost/mattermost-server
cves:
- CVE-2024-23488
ghsas:
- GHSA-xgxj-j98c-59rv
unknown_aliases:
- CGA-cp3f-8rch-xvmv
references:
- advisory: https://github.com/advisories/GHSA-xgxj-j98c-59rv
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-23488
- web: https://mattermost.com/security-updates
source:
id: GHSA-xgxj-j98c-59rv
created: 2024-06-26T16:13:06.887134-04:00
review_status: UNREVIEWED
unexcluded: EFFECTIVELY_PRIVATE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0213.yaml
|
id: GO-2022-0213
modules:
- module: std
versions:
- fixed: 1.12.11
- introduced: 1.13.0-0
- fixed: 1.13.2
vulnerable_at: 1.13.1
packages:
- package: crypto/dsa
symbols:
- Verify
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
summary: Panic on invalid DSA public keys in crypto/dsa
description: |-
Invalid DSA public keys can cause a panic in dsa.Verify. In particular, using
crypto/x509.Verify on a crafted X.509 certificate chain can lead to a panic,
even if the certificates don't chain to a trusted root. The chain can be
delivered via a crypto/tls connection to a client, or to a server that accepts
and verifies client certificates. net/http clients can be made to crash by an
HTTPS server, while net/http servers that accept client certificates will
recover the panic and are unaffected.
Moreover, an application might crash invoking
crypto/x509.(*CertificateRequest).CheckSignature on an X.509 certificate
request, parsing a golang.org/x/crypto/openpgp Entity, or during a
golang.org/x/crypto/otr conversation. Finally, a golang.org/x/crypto/ssh client
can panic due to a malformed host key, while a server could panic if either
PublicKeyCallback accepts a malformed public key, or if IsUserAuthority accepts
a certificate with a malformed public key.
published: 2022-05-24T20:14:11Z
cves:
- CVE-2019-17596
credits:
- Daniel M
- ragona
references:
- fix: https://go.dev/cl/205441
- fix: https://go.googlesource.com/go/+/552987fdbf4c2bc9641016fd323c3ae5d3a0d9a3
- report: https://go.dev/issue/34960
- web: https://groups.google.com/g/golang-announce/c/lVEm7llp0w0/m/VbafyRkgCgAJ
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0166.yaml
|
id: GO-2022-0166
modules:
- module: std
versions:
- fixed: 1.5.4
- introduced: 1.6.0-0
- fixed: 1.6.1
vulnerable_at: 1.6.0
packages:
- package: crypto/dsa
symbols:
- Verify
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
summary: Denial of service due to unchecked parameters in crypto/dsa
description: |-
The Verify function in crypto/dsa passed certain parameters unchecked to the
underlying big integer library, possibly leading to extremely long-running
computations, which in turn makes Go programs vulnerable to remote denial of
service attacks. Programs using HTTPS client certificates or the Go SSH server
libraries are both exposed to this vulnerability.
published: 2022-05-24T22:06:33Z
cves:
- CVE-2016-3959
credits:
- David Wong
references:
- fix: https://go.dev/cl/21533
- fix: https://go.googlesource.com/go/+/eb876dd83cb8413335d64e50aae5d38337d1ebb4
- report: https://go.dev/issue/15184
- web: https://groups.google.com/g/golang-announce/c/9eqIHqaWvck
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1766.yaml
|
id: GO-2023-1766
modules:
- module: github.com/ipfs/go-libipfs
versions:
- fixed: 0.4.1
- introduced: 0.5.0
- fixed: 0.6.0
vulnerable_at: 0.5.0
packages:
- package: github.com/ipfs/go-libipfs/bitswap/server
- module: github.com/ipfs/go-bitswap
versions:
- fixed: 0.12.0
vulnerable_at: 0.11.0
packages:
- package: github.com/ipfs/go-bitswap/server
summary: Denial of service from memory leak in github.com/ipfs/go-libipfs
description: |-
An attacker can cause a Bitswap server to allocate and leak unbounded amounts of
memory.
cves:
- CVE-2023-25568
ghsas:
- GHSA-m974-xj4j-7qv5
- GHSA-q3j6-22wf-3jh9
references:
- advisory: https://github.com/ipfs/go-libipfs/security/advisories/GHSA-m974-xj4j-7qv5
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0400.yaml
|
id: GO-2022-0400
modules:
- module: github.com/ntbosscher/gobase
versions:
- fixed: 0.7.2
vulnerable_at: 0.7.1
packages:
- package: github.com/ntbosscher/gobase/auth/httpauth
symbols:
- Setup
- middleware
summary: Race condition in github.com/ntbosscher/gobase
description: A race condition can cause incorrect HTTP request routing.
published: 2022-07-01T20:10:50Z
ghsas:
- GHSA-4348-x292-h437
- GHSA-h2x7-2ff6-v32p
references:
- fix: https://github.com/ntbosscher/gobase/commit/a8d40bce9c429d324122d18c446924dab809e812
cve_metadata:
id: CVE-2022-2583
cwe: CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2477.yaml
|
id: GO-2024-2477
modules:
- module: github.com/openfga/openfga
versions:
- fixed: 1.4.3
vulnerable_at: 1.4.2
summary: OpenFGA denial of service in github.com/openfga/openfga
cves:
- CVE-2024-23820
ghsas:
- GHSA-rxpw-85vw-fx87
references:
- advisory: https://github.com/openfga/openfga/security/advisories/GHSA-rxpw-85vw-fx87
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-23820
- fix: https://github.com/openfga/openfga/commit/908ac85c8b7769c8042cca31886df8db01976c39
- web: https://github.com/openfga/openfga/releases/tag/v1.4.3
source:
id: GHSA-rxpw-85vw-fx87
created: 2024-06-14T11:36:36.858461-04:00
review_status: UNREVIEWED
unexcluded: EFFECTIVELY_PRIVATE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2668.yaml
|
id: GO-2024-2668
modules:
- module: github.com/IceWhaleTech/CasaOS-UserService
versions:
- fixed: 0.4.8
vulnerable_at: 0.4.7
packages:
- package: github.com/IceWhaleTech/CasaOS-UserService/route/v1
symbols:
- PostUserLogin
summary: Login username enumeration in github.com/IceWhaleTech/CasaOS-UserService
description: |-
The Casa OS Login page has a username enumeration vulnerability in the login
page that was patched in Casa OS v0.4.7. The issue exists because the
application response differs depending on whether the username or password is
incorrect, allowing an attacker to enumerate usernames by observing the
application response. For example, if the username is incorrect, the application
returns "User does not exist" with return code "10006", while if the password is
incorrect, it returns "User does not exist or password is invalid" with return
code "10013". This allows an attacker to determine if a username exists without
knowing the password.
cves:
- CVE-2024-28232
ghsas:
- GHSA-hcw2-2r9c-gc6p
credits:
- DrDark1999
references:
- fix: https://github.com/IceWhaleTech/CasaOS-UserService/commit/dd927fe1c805e53790f73cfe10c7a4ded3bc5bdb
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2938.yaml
|
id: GO-2024-2938
modules:
- module: github.com/go-skynet/LocalAI
non_go_versions:
- fixed: 2.16.0
vulnerable_at: 1.40.0
summary: LocalAI path traversal vulnerability in github.com/go-skynet/LocalAI
cves:
- CVE-2024-5182
ghsas:
- GHSA-cpcx-r2gq-x893
references:
- advisory: https://github.com/advisories/GHSA-cpcx-r2gq-x893
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-5182
- web: https://github.com/mudler/localai/commit/1a3dedece06cab1acc3332055d285ac540a47f0e
- web: https://huntr.com/bounties/f7a87f29-c22a-48e8-9fce-b6d5a273e545
source:
id: GHSA-cpcx-r2gq-x893
created: 2024-06-27T15:53:50.719644-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2514.yaml
|
id: GO-2024-2514
modules:
- module: github.com/hashicorp/vault
versions:
- introduced: 1.0.0
- fixed: 1.5.4
vulnerable_at: 1.5.3
summary: Token leases could outlive their TTL in HashiCorp Vault in github.com/hashicorp/vault
cves:
- CVE-2020-25816
ghsas:
- GHSA-57gg-cj55-q5g2
unknown_aliases:
- BIT-vault-2020-25816
references:
- advisory: https://github.com/advisories/GHSA-57gg-cj55-q5g2
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2020-25816
- fix: https://github.com/hashicorp/vault/pull/10020/commits/f192878110fe93eb13da914b2bee28caa7866a29
- web: https://github.com/hashicorp/vault/blob/master/CHANGELOG.md#147
- web: https://github.com/hashicorp/vault/blob/master/CHANGELOG.md#154
- web: https://www.hashicorp.com/blog/category/vault
source:
id: GHSA-57gg-cj55-q5g2
created: 2024-06-14T11:39:20.73164-04:00
review_status: UNREVIEWED
unexcluded: EFFECTIVELY_PRIVATE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0099.yaml
|
id: GO-2021-0099
modules:
- module: github.com/deislabs/oras
versions:
- fixed: 0.9.0
vulnerable_at: 0.8.1
packages:
- package: github.com/deislabs/oras/pkg/content
symbols:
- extractTarDirectory
derived_symbols:
- fileWriter.Commit
summary: Zip slip directory exploit in github.com/deislabs/oras
description: |-
Due to improper path validation, using the
github.com/deislabs/oras/pkg/content.FileStore content store may result in
directory traversal during archive extraction, allowing a malicious archive to
write paths to arbitrary paths that the process can write to.
published: 2021-04-14T20:04:52Z
cves:
- CVE-2021-21272
ghsas:
- GHSA-g5v4-5x39-vwhx
credits:
- Chris Smowton
references:
- fix: https://github.com/deislabs/oras/commit/96cd90423303f1bb42bd043cb4c36085e6e91e8e
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1765.yaml
|
id: GO-2023-1765
modules:
- module: github.com/cloudflare/circl
versions:
- fixed: 1.3.3
vulnerable_at: 1.3.2
packages:
- package: github.com/cloudflare/circl/abe/cpabe/tkn20/internal/tkn
symbols:
- EncryptCCA
- package: github.com/cloudflare/circl/blindsign/blindrsa
symbols:
- RSAVerifier.Blind
- package: github.com/cloudflare/circl/kem/frodo/frodo640shake
symbols:
- PublicKey.EncapsulateTo
derived_symbols:
- scheme.Encapsulate
- scheme.EncapsulateDeterministically
- package: github.com/cloudflare/circl/kem/kyber/kyber1024
symbols:
- PublicKey.EncapsulateTo
derived_symbols:
- scheme.Encapsulate
- scheme.EncapsulateDeterministically
- package: github.com/cloudflare/circl/kem/kyber/kyber512
symbols:
- PublicKey.EncapsulateTo
derived_symbols:
- scheme.Encapsulate
- scheme.EncapsulateDeterministically
- package: github.com/cloudflare/circl/kem/kyber/kyber768
symbols:
- PublicKey.EncapsulateTo
derived_symbols:
- scheme.Encapsulate
- scheme.EncapsulateDeterministically
- package: github.com/cloudflare/circl/kem/sike/sikep434
symbols:
- scheme.Encapsulate
- package: github.com/cloudflare/circl/kem/sike/sikep503
symbols:
- scheme.Encapsulate
- package: github.com/cloudflare/circl/kem/sike/sikep751
symbols:
- scheme.Encapsulate
summary: Leaked shared secret and weak blinding in github.com/cloudflare/circl
description: |-
When sampling randomness for a shared secret, the implementation of Kyber and
FrodoKEM, did not check whether crypto/rand.Read() returns an error. In rare
deployment cases (error thrown by the Read() function), this could lead to a
predictable shared secret.
The tkn20 and blindrsa components did not check whether enough randomness was
returned from the user provided randomness source. Typically the user provides
crypto/rand.Reader, which in the vast majority of cases will always return the
right number random bytes. In the cases where it does not, or the user provides
a source that does not, the blinding for blindrsa is weak and integrity of the
plaintext is not ensured in tkn20.
cves:
- CVE-2023-1732
ghsas:
- GHSA-2q89-485c-9j2x
references:
- advisory: https://github.com/cloudflare/circl/security/advisories/GHSA-2q89-485c-9j2x
- fix: https://github.com/cloudflare/circl/commit/ff8d91225f8954b4970b6d6382d2e4c78f4a4cf8
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2980.yaml
|
id: GO-2024-2980
modules:
- module: github.com/nats-io/nats-server
vulnerable_at: 1.4.1
- module: github.com/nats-io/nats-server/v2
versions:
- fixed: 2.8.2
vulnerable_at: 2.8.1
- module: github.com/nats-io/nats-streaming-server
versions:
- fixed: 0.24.6
vulnerable_at: 0.24.5
summary: |-
NATS Server and Streaming Server fails to enforce negative user permissions, may
allow denied subjects in github.com/nats-io/nats-server
cves:
- CVE-2022-29946
ghsas:
- GHSA-2h2x-8hh2-mfq8
references:
- advisory: https://github.com/advisories/GHSA-2h2x-8hh2-mfq8
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2022-29946
- web: https://github.com/nats-io/advisories/blob/main/CVE/CVE-2022-29946.txt
source:
id: GHSA-2h2x-8hh2-mfq8
created: 2024-07-12T16:33:37.628744846Z
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1872.yaml
|
id: GO-2023-1872
modules:
- module: github.com/openfga/openfga
versions:
- fixed: 1.1.1
vulnerable_at: 1.1.1-0.20230623171216-d180fc3e227f
packages:
- package: github.com/openfga/openfga/pkg/typesystem
symbols:
- New
- NewAndValidate
- TypeSystem.validateNames
- TypeSystem.validateRelationTypeRestrictions
summary: Denial of service in github.com/openfga/openfga
description: |-
OpenFGA is vulnerable to a denial of service attack when certain Check and
ListObjects calls are executed against authorization models that contain
circular relationship definitions.
cves:
- CVE-2023-35933
ghsas:
- GHSA-hr9r-8phq-5x8j
references:
- advisory: https://github.com/openfga/openfga/security/advisories/GHSA-hr9r-8phq-5x8j
- fix: https://github.com/openfga/openfga/commit/087ce392595f3c319ab3028b5089118ea4063452
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0043.yaml
|
id: GO-2020-0043
modules:
- module: github.com/mholt/caddy
versions:
- fixed: 0.10.13
vulnerable_at: 0.10.13-0.20180330123946-2966db7b7800
packages:
- package: github.com/mholt/caddy/caddyhttp/httpserver
symbols:
- httpContext.MakeServers
- Server.serveHTTP
- assertConfigsCompatible
skip_fix: 'TODO: revisit this reason. (cannot find module providing package github.com/lucas-clemente/quic-go/h2quic)'
summary: Authentication bypass in github.com/mholt/caddy
description: |-
Due to improper TLS verification when serving traffic for multiple SNIs, an
attacker may bypass TLS client authentication by indicating an SNI during the
TLS handshake that is different from the name in the HTTP Host header.
published: 2021-04-14T20:04:52Z
cves:
- CVE-2018-21246
ghsas:
- GHSA-gr7w-x2jp-3xgw
references:
- fix: https://github.com/caddyserver/caddy/pull/2099
- fix: https://github.com/caddyserver/caddy/commit/4d9ee000c8d2cbcdd8284007c1e0f2da7bc3c7c3
- web: https://bugs.gentoo.org/715214
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2647.yaml
|
id: GO-2024-2647
modules:
- module: github.com/go-vela/cli
versions:
- fixed: 0.23.2
vulnerable_at: 0.23.1
summary: CLI for Vela Insecure Variable Substitution in github.com/go-vela/cli
ghsas:
- GHSA-4jhj-3gv3-c3gr
references:
- advisory: https://github.com/go-vela/cli/security/advisories/GHSA-4jhj-3gv3-c3gr
- fix: https://github.com/go-vela/cli/commit/0349a2060c35722e341bf65a4215592c6c4bc5b4
source:
id: GHSA-4jhj-3gv3-c3gr
created: 2024-05-17T16:14:32.912261-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2860.yaml
|
id: GO-2024-2860
modules:
- module: github.com/goreleaser/goreleaser
versions:
- introduced: 1.26.0
- fixed: 1.26.1
vulnerable_at: 1.26.0
summary: goreleaser shows environment by default in github.com/goreleaser/goreleaser
ghsas:
- GHSA-f6mm-5fc7-3g3c
references:
- advisory: https://github.com/goreleaser/goreleaser/security/advisories/GHSA-f6mm-5fc7-3g3c
- fix: https://github.com/goreleaser/goreleaser/commit/22f734e41f7a5111a031a3a4eb714c1b6aa6456b
- fix: https://github.com/goreleaser/goreleaser/pull/4787
source:
id: GHSA-f6mm-5fc7-3g3c
created: 2024-05-17T16:08:46.141932-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1570.yaml
|
id: GO-2023-1570
modules:
- module: std
versions:
- fixed: 1.19.6
- introduced: 1.20.0-0
- fixed: 1.20.1
vulnerable_at: 1.20.0
packages:
- package: crypto/tls
symbols:
- handshakeMessage.marshal
- Conn.writeRecord
- Conn.readHandshake
- Conn.handleRenegotiation
- Conn.handlePostHandshakeMessage
- Conn.handleKeyUpdate
- Conn.clientHandshake
- Conn.loadSession
- clientHandshakeState.handshake
- clientHandshakeState.doFullHandshake
- clientHandshakeState.readFinished
- clientHandshakeState.readSessionTicket
- clientHandshakeState.sendFinished
- clientHandshakeStateTLS13.handshake
- clientHandshakeStateTLS13.sendDummyChangeCipherSpec
- clientHandshakeStateTLS13.processHelloRetryRequest
- clientHandshakeStateTLS13.readServerParameters
- clientHandshakeStateTLS13.readServerCertificate
- clientHandshakeStateTLS13.readServerFinished
- clientHandshakeStateTLS13.sendClientCertificate
- clientHandshakeStateTLS13.sendClientFinished
- clientHelloMsg.marshal
- clientHelloMsg.marshalWithoutBinders
- clientHelloMsg.updateBinders
- serverHelloMsg.marshal
- encryptedExtensionsMsg.marshal
- endOfEarlyDataMsg.marshal
- keyUpdateMsg.marshal
- newSessionTicketMsgTLS13.marshal
- certificateRequestMsgTLS13.marshal
- certificateMsg.marshal
- certificateMsgTLS13.marshal
- serverKeyExchangeMsg.marshal
- certificateStatusMsg.marshal
- serverHelloDoneMsg.marshal
- clientKeyExchangeMsg.marshal
- finishedMsg.marshal
- certificateRequestMsg.marshal
- certificateVerifyMsg.marshal
- newSessionTicketMsg.marshal
- helloRequestMsg.marshal
- Conn.readClientHello
- serverHandshakeState.doResumeHandshake
- serverHandshakeState.doFullHandshake
- serverHandshakeState.readFinished
- serverHandshakeState.sendSessionTicket
- serverHandshakeState.sendFinished
- serverHandshakeStateTLS13.checkForResumption
- serverHandshakeStateTLS13.sendDummyChangeCipherSpec
- serverHandshakeStateTLS13.doHelloRetryRequest
- serverHandshakeStateTLS13.sendServerParameters
- serverHandshakeStateTLS13.sendServerCertificate
- serverHandshakeStateTLS13.sendServerFinished
- serverHandshakeStateTLS13.sendSessionTickets
- serverHandshakeStateTLS13.readClientCertificate
- serverHandshakeStateTLS13.readClientFinished
- cipherSuiteTLS13.expandLabel
- sessionState.marshal
- sessionStateTLS13.marshal
derived_symbols:
- Conn.Handshake
- Conn.HandshakeContext
- Conn.Read
- Conn.Write
- ConnectionState.ExportKeyingMaterial
- Dial
- DialWithDialer
- Dialer.Dial
- Dialer.DialContext
summary: Panic on large handshake records in crypto/tls
description: |-
Large handshake records may cause panics in crypto/tls.
Both clients and servers may send large TLS handshake records which cause
servers and clients, respectively, to panic when attempting to construct
responses.
This affects all TLS 1.3 clients, TLS 1.2 clients which explicitly enable
session resumption (by setting Config.ClientSessionCache to a non-nil value),
and TLS 1.3 servers which request client certificates (by setting
Config.ClientAuth >= RequestClientCert).
credits:
- Marten Seemann
references:
- report: https://go.dev/issue/58001
- fix: https://go.dev/cl/468125
- web: https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E
cve_metadata:
id: CVE-2022-41724
cwe: 'CWE-400: Uncontrolled Resource Consumption'
references:
- https://security.gentoo.org/glsa/202311-09
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2779.yaml
|
id: GO-2024-2779
modules:
- module: github.com/ipfs/go-ipfs
versions:
- fixed: 0.7.0
vulnerable_at: 0.7.0-rc2
summary: Access Restriction Bypass in go-ipfs in github.com/ipfs/go-ipfs
cves:
- CVE-2020-10937
ghsas:
- GHSA-r23h-3jmw-q7hr
references:
- advisory: https://github.com/advisories/GHSA-r23h-3jmw-q7hr
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2020-10937
- web: https://blog.ipfs.io/2020-10-30-dht-hardening
- web: https://graz.pure.elsevier.com/en/publications/total-eclipse-of-the-heart-disrupting-the-interplanetary-file-sys
source:
id: GHSA-r23h-3jmw-q7hr
created: 2024-05-17T16:11:32.240595-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2737.yaml
|
id: GO-2024-2737
modules:
- module: github.com/docker/docker
versions:
- introduced: 26.0.0+incompatible
- fixed: 26.0.2+incompatible
vulnerable_at: 26.0.1+incompatible
summary: IPv6 enabled on IPv4-only network interfaces in github.com/docker/docker
cves:
- CVE-2024-32473
ghsas:
- GHSA-x84c-p2g9-rqv9
references:
- advisory: https://github.com/moby/moby/security/advisories/GHSA-x84c-p2g9-rqv9
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-32473
- web: https://github.com/moby/moby/commit/7cef0d9cd1cf221d8c0b7b7aeda69552649e0642
source:
id: GHSA-x84c-p2g9-rqv9
created: 2024-06-04T15:30:04.899272-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0586.yaml
|
id: GO-2022-0586
modules:
- module: github.com/hashicorp/go-getter
versions:
- fixed: 1.6.1
vulnerable_at: 1.6.0
packages:
- package: github.com/hashicorp/go-getter
- module: github.com/hashicorp/go-getter/v2
versions:
- fixed: 2.1.0
vulnerable_at: 2.0.2
packages:
- package: github.com/hashicorp/go-getter/v2
- module: github.com/hashicorp/go-getter/s3/v2
versions:
- fixed: 2.1.0
vulnerable_at: 2.0.2
packages:
- package: github.com/hashicorp/go-getter/s3/v2
symbols:
- Getter.Mode
- Getter.Get
- Getter.GetFile
- module: github.com/hashicorp/go-getter/gcs/v2
versions:
- fixed: 2.1.0
vulnerable_at: 2.0.2
packages:
- package: github.com/hashicorp/go-getter/gcs/v2
symbols:
- Getter.Mode
- Getter.Get
- Getter.GetFile
summary: Resource exhaustion in github.com/hashicorp/go-getter and related modules
description: |-
Malicious HTTP responses can cause a number of misbehaviors, including
overwriting local files, resource exhaustion, and panics.
* Protocol switching, endless redirect, and configuration bypass are possible
through abuse of custom HTTP response header processing.
* Arbitrary host access is possible through go-getter path traversal, symlink
processing, and command injection flaws.
* Asymmetric resource exhaustion can occur when go-getter processes malicious
HTTP responses.
* A panic can be triggered when go-getter processed password-protected ZIP
files.
published: 2022-05-26T00:01:27Z
cves:
- CVE-2022-26945
- CVE-2022-30321
- CVE-2022-30322
- CVE-2022-30323
ghsas:
- GHSA-28r2-q6m8-9hpx
- GHSA-cjr4-fv6c-f3mv
- GHSA-fcgg-rvwg-jv58
- GHSA-x24g-9w7v-vprh
credits:
- Joern Schneeweisz of GitLab
- Alessio Della Libera of Snyk
- HashiCorp Product Security
references:
- advisory: https://discuss.hashicorp.com/t/hcsec-2022-13-multiple-vulnerabilities-in-go-getter-library/39930
- fix: https://github.com/hashicorp/go-getter/pull/361
- fix: https://github.com/hashicorp/go-getter/commit/38e97387488f5439616be60874979433a12edb48
- web: https://github.com/hashicorp/go-getter/commit/a2ebce998f8d4105bd4b78d6c99a12803ad97a45
- web: https://github.com/hashicorp/go-getter/pull/359
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2645.yaml
|
id: GO-2024-2645
modules:
- module: github.com/projectdiscovery/nuclei
vulnerable_at: 1.1.7
- module: github.com/projectdiscovery/nuclei/v2
vulnerable_at: 2.9.15
- module: github.com/projectdiscovery/nuclei/v3
versions:
- introduced: 3.0.0
- fixed: 3.2.0
vulnerable_at: 3.1.10
summary: Nuclei allows unsigned code template execution through workflows in github.com/projectdiscovery/nuclei
cves:
- CVE-2024-27920
ghsas:
- GHSA-w5wx-6g2r-r78q
references:
- advisory: https://github.com/projectdiscovery/nuclei/security/advisories/GHSA-w5wx-6g2r-r78q
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-27920
- fix: https://github.com/projectdiscovery/nuclei/commit/e86f38299765b82ad724fdb701557e0eaff3884d
- fix: https://github.com/projectdiscovery/nuclei/pull/4822
- web: https://docs.projectdiscovery.io/templates/protocols/code
- web: https://docs.projectdiscovery.io/templates/reference/template-signing
- web: https://docs.projectdiscovery.io/templates/workflows/overview
source:
id: GHSA-w5wx-6g2r-r78q
created: 2024-06-26T13:58:33.793233-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0154.yaml
|
id: GO-2021-0154
modules:
- module: std
versions:
- introduced: 1.1.0-0
- fixed: 1.3.2
vulnerable_at: 1.3.1
packages:
- package: crypto/tls
symbols:
- checkForResumption
- decryptTicket
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
summary: Man-in-the-middle attack with SessionTicketsDisabled in crypto/tls
description: |-
When SessionTicketsDisabled is enabled, crypto/tls allowed man-in-the-middle
attackers to spoof clients via unspecified vectors.
If the server enables TLS client authentication using certificates (this is
rare) and explicitly sets SessionTicketsDisabled to true in the tls.Config, then
a malicious client can falsely assert ownership of any client certificate it
wishes.
published: 2022-05-25T21:11:41Z
cves:
- CVE-2014-7189
credits:
- Go Team
references:
- fix: https://go.dev/cl/148080043
- report: https://go.dev/issue/53085
- web: https://groups.google.com/g/golang-nuts/c/eeOHNw_shwU/m/OHALUmroA5kJ
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2660.yaml
|
id: GO-2024-2660
modules:
- module: github.com/golang-fips/openssl/v2
versions:
- fixed: 2.0.1
vulnerable_at: 2.0.0
packages:
- package: github.com/golang-fips/openssl/v2
symbols:
- newCipherCtx
- setupEVP
derived_symbols:
- DecryptRSANoPadding
- DecryptRSAOAEP
- DecryptRSAPKCS1
- EncryptRSANoPadding
- EncryptRSAOAEP
- EncryptRSAPKCS1
- NewGCMTLS
- NewGCMTLS13
- NewRC4Cipher
- SignMarshalECDSA
- SignRSAPKCS1v15
- SignRSAPSS
- VerifyECDSA
- VerifyRSAPKCS1v15
- VerifyRSAPSS
- aesCipher.Decrypt
- aesCipher.Encrypt
- aesCipher.NewCBCDecrypter
- aesCipher.NewCBCEncrypter
- aesCipher.NewCTR
- aesCipher.NewGCM
- aesCipher.NewGCMTLS
- aesCipher.NewGCMTLS13
- desCipher.Decrypt
- desCipher.Encrypt
- desCipher.NewCBCDecrypter
- desCipher.NewCBCEncrypter
- desCipherWithoutCBC.Decrypt
- desCipherWithoutCBC.Encrypt
- noGCM.Decrypt
- noGCM.Encrypt
- module: github.com/microsoft/go-crypto-openssl
versions:
- fixed: 0.2.9
vulnerable_at: 0.2.8
packages:
- package: github.com/microsoft/go-crypto-openssl/openssl
symbols:
- setupEVP
derived_symbols:
- DecryptRSANoPadding
- DecryptRSAOAEP
- DecryptRSAOAEPWithMGF1Hash
- DecryptRSAPKCS1
- EncryptRSANoPadding
- EncryptRSAOAEP
- EncryptRSAOAEPWithMGF1Hash
- EncryptRSAPKCS1
- SignMarshalECDSA
- SignRSAPKCS1v15
- SignRSAPSS
- VerifyECDSA
- VerifyRSAPKCS1v15
- VerifyRSAPSS
summary: |-
Memory leak in github.com/golang-fips/openssl/v2 and
github.com/microsoft/go-crypto-openssl
description: |-
Using crafted public RSA keys can cause a small memory leak when encrypting and
verifying payloads. This can be gradually leveraged into a denial of service
attack.
cves:
- CVE-2024-1394
ghsas:
- GHSA-78hx-gp6g-7mj6
credits:
- '@qmuntal and @r3kumar'
references:
- fix: https://github.com/golang-fips/openssl/commit/85d31d0d257ce842c8a1e63c4d230ae850348136
- fix: https://github.com/microsoft/go-crypto-openssl/commit/104fe7f6912788d2ad44602f77a0a0a62f1f259f
notes:
- github.com/golang-fips/go is patches to go standard compiler and library.
- github.com/microsoft/go is a clone of the go standard compiler and library. This is outside of what vulncheck can handle.
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2399.yaml
|
id: GO-2023-2399
modules:
- module: github.com/hashicorp/vault
versions:
- introduced: 1.12.0
- fixed: 1.13.12
- introduced: 1.14.0
- fixed: 1.14.8
- introduced: 1.15.0
- fixed: 1.15.4
vulnerable_at: 1.15.3
packages:
- package: github.com/hashicorp/vault/helper/forwarding
symbols:
- GenerateForwardedRequest
derived_symbols:
- GenerateForwardedHTTPRequest
- package: github.com/hashicorp/vault/http
symbols:
- handler
- wrapGenericHandler
- parseJSONRequest
- parseFormRequest
- rateLimitQuotaWrapping
derived_symbols:
- HandlerAnchor.Handler
- TestServer
- TestServerWithListener
- TestServerWithListenerAndProperties
skip_fix: 'TODO: module github.com/hashicorp/vault must be updated with go get github.com/hashicorp/vault/sdk@v0.10.2 to reproduce.'
- package: github.com/hashicorp/vault/vault
symbols:
- Core.DetermineRoleFromLoginRequestFromBytes
- Core.DetermineRoleFromLoginRequest
- SystemBackend.handleStorageRaftSnapshotWrite
derived_symbols:
- Core.ForwardRequest
- Core.HandleRequest
- NewSystemBackend
- NewTestCluster
- TestCluster.InitCores
- TestCoreUnsealed
- TestCoreUnsealedRaw
- TestCoreUnsealedWithConfig
- TestCoreUnsealedWithMetrics
- TestCoreWithCustomResponseHeaderAndUI
skip_fix: 'TODO: module github.com/hashicorp/vault must be updated with go get github.com/hashicorp/vault/sdk@v0.10.2 to reproduce.'
summary: Denial of service via memory exhaustion in github.com/hashicorp/vault
description: |-
Unauthenticated and authenticated HTTP requests from a client will be attempted
to be mapped to memory. Large requests may result in the exhaustion of available
memory on the host, which may cause crashes and denial of service.
cves:
- CVE-2023-6337
ghsas:
- GHSA-6p62-6cg9-f5f5
references:
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2023-6337
- web: https://discuss.hashicorp.com/t/hcsec-2023-34-vault-vulnerable-to-denial-of-service-through-memory-exhaustion-when-handling-large-http-requests/60741
- fix: https://github.com/hashicorp/vault/pull/24354
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2914.yaml
|
id: GO-2024-2914
modules:
- module: github.com/docker/docker
versions:
- fixed: 20.10.11+incompatible
vulnerable_at: 20.10.10+incompatible
- module: github.com/moby/moby
versions:
- fixed: 20.10.11+incompatible
vulnerable_at: 20.10.10+incompatible
summary: Moby (Docker Engine) is vulnerable to Ambiguous OCI manifest parsing in github.com/docker/docker
ghsas:
- GHSA-xmmx-7jpf-fx42
related:
- CVE-2021-41190
references:
- advisory: https://github.com/moby/moby/security/advisories/GHSA-xmmx-7jpf-fx42
notes:
- could not locate fix commit
source:
id: GHSA-xmmx-7jpf-fx42
created: 2024-07-01T14:25:08.035766-04:00
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0412.yaml
|
id: GO-2021-0412
modules:
- module: github.com/containerd/imgcrypt
versions:
- fixed: 1.1.4
vulnerable_at: 1.1.3
packages:
- package: github.com/containerd/imgcrypt/images/encryption
symbols:
- cryptManifestList
derived_symbols:
- CheckAuthorization
- DecryptImage
- EncryptImage
summary: Incorrect authorization in github.com/containerd/imgcrypt
description: |-
The imgcrypt library provides API extensions for containerd to support encrypted
container images and implements the ctd-decoder command line tool for use by
containerd to decrypt encrypted container images. The imgcrypt function
CheckAuthorization is supposed to check whether the current used is authorized
to access an encrypted image and prevent the user from running an image that
another user previously decrypted on the same system. In versions prior to
1.1.4, a failure occurs when an image with a ManifestList is used and the
architecture of the local host is not the first one in the ManifestList. Only
the first architecture in the list was tested, which may not have its layers
available locally since it could not be run on the host architecture. Therefore,
the verdict on unavailable layers was that the image could be run anticipating
that image run failure would occur later due to the layers not being available.
However, this verdict to allow the image to run enabled other architectures in
the ManifestList to run an image without providing keys if that image had
previously been decrypted. A patch has been applied to imgcrypt 1.1.4.
Workarounds may include usage of different namespaces for each remote user.
published: 2022-04-28T23:35:11Z
cves:
- CVE-2022-24778
ghsas:
- GHSA-8v99-48m9-c8pm
credits:
- '@dimitar-dimitrow'
references:
- fix: https://github.com/containerd/imgcrypt/commit/6fdd9818a4d8142107b7ecd767d839c9707700d9
- web: https://github.com/containerd/imgcrypt/issues/69
- web: https://github.com/containerd/imgcrypt/releases/tag/v1.1.4
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2728.yaml
|
id: GO-2024-2728
modules:
- module: github.com/argoproj/argo-cd
vulnerable_at: 1.8.6
- module: github.com/argoproj/argo-cd/v2
versions:
- introduced: 2.4.0
- fixed: 2.8.16
- introduced: 2.9.0
- fixed: 2.9.12
- introduced: 2.10.0
- fixed: 2.10.7
vulnerable_at: 2.10.6
summary: Argo CD's API server does not enforce project sourceNamespaces in github.com/argoproj/argo-cd
cves:
- CVE-2024-31990
ghsas:
- GHSA-2gvw-w6fj-7m3c
unknown_aliases:
- BIT-argo-cd-2024-31990
references:
- advisory: https://github.com/argoproj/argo-cd/security/advisories/GHSA-2gvw-w6fj-7m3c
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-31990
- fix: https://github.com/argoproj/argo-cd/commit/c514105af739eebedb9dbe89d8a6dd8dfc30bb2c
- fix: https://github.com/argoproj/argo-cd/commit/c5a252c4cc260e240e2074794aedb861d07e9ca5
- fix: https://github.com/argoproj/argo-cd/commit/e0ff56d89fbd7d066e9c862b30337f6520f13f17
source:
id: GHSA-2gvw-w6fj-7m3c
created: 2024-06-26T14:01:04.285149-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2761.yaml
|
id: GO-2024-2761
modules:
- module: github.com/rancher/rancher
unsupported_versions:
- last_affected: 2.1.4
vulnerable_at: 1.6.30
summary: Rancher Login Parameter Can Be Edited in github.com/rancher/rancher
cves:
- CVE-2019-11881
ghsas:
- GHSA-2p4g-jrmx-r34m
references:
- advisory: https://github.com/advisories/GHSA-2p4g-jrmx-r34m
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2019-11881
- report: https://github.com/rancher/rancher/issues/20216
- web: https://github.com/MauroEldritch/VanCleef
source:
id: GHSA-2p4g-jrmx-r34m
created: 2024-06-04T15:29:02.104941-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2847.yaml
|
id: GO-2024-2847
modules:
- module: github.com/grafana/grafana
non_go_versions:
- fixed: 8.5.13
- introduced: 9.0.0
- fixed: 9.0.9
- introduced: 9.1.0
- fixed: 9.1.6
vulnerable_at: 5.4.5+incompatible
summary: Grafana Escalation from admin to server admin when auth proxy is used in github.com/grafana/grafana
cves:
- CVE-2022-35957
ghsas:
- GHSA-ff5c-938w-8c9q
unknown_aliases:
- BIT-grafana-2022-35957
references:
- advisory: https://github.com/grafana/grafana/security/advisories/GHSA-ff5c-938w-8c9q
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2022-35957
- web: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WYU5C2RITLHVZSTCWNGQWA6KSPYNXM2H
- web: https://security.netapp.com/advisory/ntap-20221215-0001
source:
id: GHSA-ff5c-938w-8c9q
created: 2024-06-04T14:27:32.534925-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2464.yaml
|
id: GO-2024-2464
modules:
- module: github.com/0xJacky/Nginx-UI
versions:
- fixed: 1.9.10-0.20231219184941-827e76c46e63
vulnerable_at: 1.9.10-0.20231219042952-0a9e23daf406
packages:
- package: github.com/0xJacky/Nginx-UI/api/system
symbols:
- GetSettings
- SaveSettings
summary: Remote command execution in github.com/0xJacky/Nginx-UI
cves:
- CVE-2024-22197
ghsas:
- GHSA-pxmr-q2x3-9x9m
credits:
- '@jorgectf'
references:
- fix: https://github.com/0xJacky/nginx-ui/commit/827e76c46e63c52114a62a899f61313039c754e3
- advisory: https://github.com/advisories/GHSA-pxmr-q2x3-9x9m
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2923.yaml
|
id: GO-2024-2923
modules:
- module: github.com/k8sgpt-ai/k8sgpt
versions:
- fixed: 0.3.33
vulnerable_at: 0.3.32
summary: Vulnerabilities with the k8sGPT in github.com/k8sgpt-ai/k8sgpt
ghsas:
- GHSA-85rg-8m6h-825p
references:
- advisory: https://github.com/k8sgpt-ai/k8sgpt/security/advisories/GHSA-85rg-8m6h-825p
- web: https://github.com/k8sgpt-ai/k8sgpt/releases/tag/v0.3.33
source:
id: GHSA-85rg-8m6h-825p
created: 2024-06-14T13:47:55.972779-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2762.yaml
|
id: GO-2024-2762
modules:
- module: github.com/rancher/rancher
versions:
- introduced: 2.0.0+incompatible
- fixed: 2.2.4+incompatible
vulnerable_at: 2.2.4-rc9+incompatible
summary: Rancher code injection via fluentd config commands in github.com/rancher/rancher
cves:
- CVE-2019-12303
ghsas:
- GHSA-53pj-67m4-9w98
references:
- advisory: https://github.com/advisories/GHSA-53pj-67m4-9w98
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2019-12303
- web: https://forums.rancher.com/t/rancher-release-v2-2-4-addresses-rancher-cve-2019-12274-and-cve-2019-12303/14466
source:
id: GHSA-53pj-67m4-9w98
created: 2024-06-04T15:28:59.347324-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2798.yaml
|
id: GO-2024-2798
modules:
- module: github.com/mattermost/mattermost-server
versions:
- introduced: 8.1.0+incompatible
- fixed: 8.1.12+incompatible
- introduced: 9.4.0+incompatible
- fixed: 9.4.5+incompatible
- introduced: 9.5.0+incompatible
- fixed: 9.5.3+incompatible
- introduced: 9.6.0-rc1+incompatible
- fixed: 9.6.1+incompatible
vulnerable_at: 9.6.1-rc3+incompatible
summary: Mattermost fails to limit the number of active sessions in github.com/mattermost/mattermost-server
cves:
- CVE-2024-4183
ghsas:
- GHSA-wj37-mpq9-xrcm
references:
- advisory: https://github.com/advisories/GHSA-wj37-mpq9-xrcm
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-4183
- web: https://github.com/mattermost/mattermost/commit/86920d641760552c5aafa5e1d14c93bd30039bc4
- web: https://github.com/mattermost/mattermost/commit/9d81eee979aee93374bff8ba6714d805e12ffb03
- web: https://github.com/mattermost/mattermost/commit/b45c3dac4c160992a1ce757ade968e8f5ec506c1
- web: https://github.com/mattermost/mattermost/commit/bc699e6789cf3ba1544235087897699aaa639e7d
- web: https://mattermost.com/security-updates
source:
id: GHSA-wj37-mpq9-xrcm
created: 2024-06-04T15:26:28.930861-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2532.yaml
|
id: GO-2024-2532
modules:
- module: github.com/hashicorp/boundary
versions:
- introduced: 0.8.0
- fixed: 0.15.0
vulnerable_at: 0.14.5
summary: Boundary vulnerable to session hijacking through TLS certificate tampering in github.com/hashicorp/boundary
cves:
- CVE-2024-1052
ghsas:
- GHSA-vh73-q3rw-qx7w
references:
- advisory: https://github.com/advisories/GHSA-vh73-q3rw-qx7w
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-1052
- web: https://discuss.hashicorp.com/t/hcsec-2024-02-boundary-vulnerable-to-session-hijacking-through-tls-certificate-tampering/62458
source:
id: GHSA-vh73-q3rw-qx7w
created: 2024-06-14T11:40:47.48502-04:00
review_status: UNREVIEWED
unexcluded: EFFECTIVELY_PRIVATE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0463.yaml
|
id: GO-2022-0463
modules:
- module: github.com/astaxie/beego
vulnerable_at: 1.12.3
packages:
- package: github.com/astaxie/beego
symbols:
- Tree.Match
derived_symbols:
- App.Run
- ControllerRegister.FindPolicy
- ControllerRegister.FindRouter
- ControllerRegister.ServeHTTP
- FilterRouter.ValidRouter
- InitBeegoBeforeTest
- Run
- RunWithMiddleWares
- TestBeegoInit
- adminApp.Run
- module: github.com/beego/beego
versions:
- fixed: 1.12.9
vulnerable_at: 1.12.8
packages:
- package: github.com/beego/beego
symbols:
- Tree.match
derived_symbols:
- App.Run
- ControllerRegister.FindPolicy
- ControllerRegister.FindRouter
- ControllerRegister.ServeHTTP
- FilterRouter.ValidRouter
- InitBeegoBeforeTest
- Run
- RunWithMiddleWares
- TestBeegoInit
- Tree.Match
- adminApp.Run
- module: github.com/beego/beego/v2
versions:
- fixed: 2.0.3
vulnerable_at: 2.0.2
packages:
- package: github.com/beego/beego/v2/server/web
symbols:
- Tree.match
derived_symbols:
- AddNamespace
- AddViewPath
- Any
- AutoPrefix
- AutoRouter
- BuildTemplate
- Compare
- CompareNot
- Controller.Abort
- Controller.Bind
- Controller.BindForm
- Controller.BindJSON
- Controller.BindProtobuf
- Controller.BindXML
- Controller.BindYAML
- Controller.CheckXSRFCookie
- Controller.CustomAbort
- Controller.Delete
- Controller.DestroySession
- Controller.Get
- Controller.GetBool
- Controller.GetFile
- Controller.GetFloat
- Controller.GetInt
- Controller.GetInt16
- Controller.GetInt32
- Controller.GetInt64
- Controller.GetInt8
- Controller.GetSecureCookie
- Controller.GetString
- Controller.GetStrings
- Controller.GetUint16
- Controller.GetUint32
- Controller.GetUint64
- Controller.GetUint8
- Controller.Head
- Controller.Input
- Controller.IsAjax
- Controller.JSONResp
- Controller.Options
- Controller.ParseForm
- Controller.Patch
- Controller.Post
- Controller.Put
- Controller.Redirect
- Controller.Render
- Controller.RenderBytes
- Controller.RenderString
- Controller.Resp
- Controller.SaveToFile
- Controller.SaveToFileWithBuffer
- Controller.ServeFormatted
- Controller.ServeJSON
- Controller.ServeJSONP
- Controller.ServeXML
- Controller.ServeYAML
- Controller.SessionRegenerateID
- Controller.SetData
- Controller.SetSecureCookie
- Controller.Trace
- Controller.URLFor
- Controller.XMLResp
- Controller.XSRFFormHTML
- Controller.XSRFToken
- Controller.YamlResp
- ControllerRegister.Add
- ControllerRegister.AddAuto
- ControllerRegister.AddAutoPrefix
- ControllerRegister.AddMethod
- ControllerRegister.AddRouterMethod
- ControllerRegister.Any
- ControllerRegister.CtrlAny
- ControllerRegister.CtrlDelete
- ControllerRegister.CtrlGet
- ControllerRegister.CtrlHead
- ControllerRegister.CtrlOptions
- ControllerRegister.CtrlPatch
- ControllerRegister.CtrlPost
- ControllerRegister.CtrlPut
- ControllerRegister.Delete
- ControllerRegister.FindPolicy
- ControllerRegister.FindRouter
- ControllerRegister.Get
- ControllerRegister.GetContext
- ControllerRegister.Handler
- ControllerRegister.Head
- ControllerRegister.Include
- ControllerRegister.Init
- ControllerRegister.InsertFilter
- ControllerRegister.Options
- ControllerRegister.Patch
- ControllerRegister.Post
- ControllerRegister.Put
- ControllerRegister.ServeHTTP
- ControllerRegister.URLFor
- CtrlAny
- CtrlDelete
- CtrlGet
- CtrlHead
- CtrlOptions
- CtrlPatch
- CtrlPost
- CtrlPut
- Date
- DateFormat
- DateParse
- Delete
- Exception
- ExecuteTemplate
- ExecuteViewPathTemplate
- FileSystem.Open
- FilterRouter.ValidRouter
- FlashData.Error
- FlashData.Notice
- FlashData.Set
- FlashData.Store
- FlashData.Success
- FlashData.Warning
- Get
- GetConfig
- HTML2str
- Handler
- Head
- Htmlquote
- Htmlunquote
- HttpServer.Any
- HttpServer.AutoPrefix
- HttpServer.AutoRouter
- HttpServer.CtrlAny
- HttpServer.CtrlDelete
- HttpServer.CtrlGet
- HttpServer.CtrlHead
- HttpServer.CtrlOptions
- HttpServer.CtrlPatch
- HttpServer.CtrlPost
- HttpServer.CtrlPut
- HttpServer.Delete
- HttpServer.Get
- HttpServer.Handler
- HttpServer.Head
- HttpServer.Include
- HttpServer.InsertFilter
- HttpServer.LogAccess
- HttpServer.Options
- HttpServer.Patch
- HttpServer.Post
- HttpServer.PrintTree
- HttpServer.Put
- HttpServer.RESTRouter
- HttpServer.Router
- HttpServer.RouterWithOpts
- HttpServer.Run
- Include
- InitBeegoBeforeTest
- InsertFilter
- LoadAppConfig
- LogAccess
- MapGet
- Namespace.Any
- Namespace.AutoPrefix
- Namespace.AutoRouter
- Namespace.Cond
- Namespace.CtrlAny
- Namespace.CtrlDelete
- Namespace.CtrlGet
- Namespace.CtrlHead
- Namespace.CtrlOptions
- Namespace.CtrlPatch
- Namespace.CtrlPost
- Namespace.CtrlPut
- Namespace.Delete
- Namespace.Filter
- Namespace.Get
- Namespace.Handler
- Namespace.Head
- Namespace.Include
- Namespace.Namespace
- Namespace.Options
- Namespace.Patch
- Namespace.Post
- Namespace.Put
- Namespace.Router
- NewControllerRegister
- NewControllerRegisterWithCfg
- NewHttpServerWithCfg
- NewHttpSever
- NewNamespace
- NotNil
- Options
- ParseForm
- Patch
- Policy
- Post
- PrintTree
- Put
- RESTRouter
- ReadFromRequest
- RenderForm
- Router
- RouterWithOpts
- Run
- RunWithMiddleWares
- TestBeegoInit
- Tree.AddRouter
- Tree.AddTree
- Tree.Match
- URLFor
- URLMap.GetMap
- URLMap.GetMapData
- Walk
- adminApp.Run
- adminController.AdminIndex
- adminController.Healthcheck
- adminController.ListConf
- adminController.ProfIndex
- adminController.PrometheusMetrics
- adminController.QpsIndex
- adminController.TaskStatus
- beegoAppConfig.Bool
- beegoAppConfig.DefaultBool
- beegoAppConfig.SaveConfigFile
- beegoAppConfig.Unmarshaler
summary: |-
Access control bypass due to broad route matching in github.com/beego/beego and
beego/v2
description: |-
Routes in the beego HTTP router can match unintended patterns. This overly-broad
matching may permit an attacker to bypass access controls.
For example, the pattern "/a/b/:name" can match the URL "/a.xml/b/". This may
bypass access control applied to the prefix "/a/".
published: 2022-07-01T20:06:59Z
cves:
- CVE-2022-31259
ghsas:
- GHSA-qx32-f6g6-fcfr
references:
- fix: https://github.com/beego/beego/pull/4958
- fix: https://github.com/beego/beego/commit/64cf44d725c8cc35d782327d333df9cbeb1bf2dd
- web: https://github.com/beego/beego/issues/4946
- web: https://github.com/beego/beego/pull/4954
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1914.yaml
|
id: GO-2023-1914
modules:
- module: github.com/superfly/tokenizer
versions:
- fixed: 0.0.1
vulnerable_at: 0.0.0-20230712185157-1939fc3dca13
packages:
- package: github.com/superfly/tokenizer
summary: Brute-force of token secrets in github.com/superfly/tokenizer
ghsas:
- GHSA-f28g-86hc-823q
references:
- advisory: https://github.com/advisories/GHSA-f28g-86hc-823q
- fix: https://github.com/superfly/tokenizer/pull/8
- fix: https://github.com/superfly/tokenizer/pull/9
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0515.yaml
|
id: GO-2022-0515
modules:
- module: std
versions:
- fixed: 1.17.12
- introduced: 1.18.0-0
- fixed: 1.18.4
vulnerable_at: 1.18.3
packages:
- package: go/parser
symbols:
- ParseFile
- ParseExprFrom
- parser.tryIdentOrType
- parser.parsePrimaryExpr
- parser.parseUnaryExpr
- parser.parseBinaryExpr
- parser.parseIfStmt
- parser.parseStmt
- resolver.openScope
- resolver.closeScope
summary: Stack exhaustion due to deeply nested types in go/parser
description: |-
Calling any of the Parse functions on Go source code which contains deeply
nested types or declarations can cause a panic due to stack exhaustion.
published: 2022-07-20T17:01:45Z
credits:
- Juho Nurminen of Mattermost
references:
- fix: https://go.dev/cl/417063
- fix: https://go.googlesource.com/go/+/695be961d57508da5a82217f7415200a11845879
- report: https://go.dev/issue/53616
- web: https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE
cve_metadata:
id: CVE-2022-1962
cwe: 'CWE-674: Uncontrolled Recursion'
description: |-
Uncontrolled recursion in the Parse functions in go/parser before Go 1.17.12 and
Go 1.18.4 allow an attacker to cause a panic due to stack exhaustion via deeply
nested types or declarations.
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2707.yaml
|
id: GO-2024-2707
modules:
- module: github.com/mattermost/mattermost-server
vulnerable_at: 9.9.0+incompatible
- module: github.com/mattermost/mattermost-server/v5
vulnerable_at: 5.39.3
- module: github.com/mattermost/mattermost-server/v6
vulnerable_at: 6.7.2
- module: github.com/mattermost/mattermost/server/v8
non_go_versions:
- fixed: 8.1.11
vulnerable_at: 8.0.0-20240626145722-59998b0b8473
summary: Mattermost Server Improper Access Control in github.com/mattermost/mattermost-server
cves:
- CVE-2024-21848
ghsas:
- GHSA-xp9j-8p68-9q93
unknown_aliases:
- CGA-w76m-mrwf-j7rf
references:
- advisory: https://github.com/advisories/GHSA-xp9j-8p68-9q93
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-21848
- web: https://mattermost.com/security-updates
source:
id: GHSA-xp9j-8p68-9q93
created: 2024-06-26T14:00:29.455068-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0058.yaml
|
id: GO-2021-0058
modules:
- module: github.com/crewjam/saml
versions:
- fixed: 0.4.3
vulnerable_at: 0.4.2
packages:
- package: github.com/crewjam/saml
symbols:
- IdpAuthnRequest.Validate
- ServiceProvider.ParseXMLResponse
- ServiceProvider.ValidateLogoutResponseForm
- ServiceProvider.ValidateLogoutResponseRedirect
derived_symbols:
- IdentityProvider.ServeSSO
- ServiceProvider.ParseResponse
- ServiceProvider.ValidateLogoutResponseRequest
- package: github.com/crewjam/saml/samlidp
symbols:
- getSPMetadata
derived_symbols:
- Server.HandlePutService
- package: github.com/crewjam/saml/samlsp
symbols:
- ParseMetadata
derived_symbols:
- FetchMetadata
- Middleware.ServeHTTP
- New
summary: |-
Signature validation bypass due to XML processing error in
github.com/crewjam/saml
description: |-
Due to the behavior of encoding/xml, a crafted XML document may cause XML
Digital Signature validation to be entirely bypassed, causing an unsigned
document to appear signed.
published: 2021-04-14T20:04:52Z
cves:
- CVE-2020-27846
ghsas:
- GHSA-4hq8-gmxx-h6w9
references:
- fix: https://github.com/crewjam/saml/commit/da4f1a0612c0a8dd0452cf8b3c7a6518f6b4d053
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1143.yaml
|
id: GO-2022-1143
modules:
- module: std
versions:
- fixed: 1.18.9
- introduced: 1.19.0-0
- fixed: 1.19.4
vulnerable_at: 1.19.3
packages:
- package: os
goos:
- windows
symbols:
- dirFS.Open
- dirFS.Stat
- DirFS
- package: net/http
goos:
- windows
symbols:
- Dir.Open
derived_symbols:
- ServeFile
- fileHandler.ServeHTTP
- fileTransport.RoundTrip
summary: Restricted file access on Windows in os and net/http
description: |-
On Windows, restricted files can be accessed via os.DirFS and http.Dir.
The os.DirFS function and http.Dir type provide access to a tree of files rooted
at a given directory. These functions permit access to Windows device files
under that root. For example, os.DirFS("C:/tmp").Open("COM1") opens the COM1
device. Both os.DirFS and http.Dir only provide read-only filesystem access.
In addition, on Windows, an os.DirFS for the directory (the root of the current
drive) can permit a maliciously crafted path to escape from the drive and access
any path on the system.
With fix applied, the behavior of os.DirFS("") has changed. Previously, an empty
root was treated equivalently to "/", so os.DirFS("").Open("tmp") would open the
path "/tmp". This now returns an error.
references:
- report: https://go.dev/issue/56694
- fix: https://go.dev/cl/455716
- web: https://groups.google.com/g/golang-announce/c/L_3rmdT0BMU/m/yZDrXjIiBQAJ
cve_metadata:
id: CVE-2022-41720
cwe: 'CWE 22: Improper Limitation of a Pathname to a Restricted Directory (''Path Traversal'')'
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2386.yaml
|
id: GO-2023-2386
modules:
- module: github.com/mojocn/base64Captcha
versions:
- fixed: 1.3.6
vulnerable_at: 1.3.5
packages:
- package: github.com/mojocn/base64Captcha
symbols:
- memoryStore.Verify
summary: Captcha verification bypass in github.com/mojocn/base64Captcha
description: |-
When using the default implementation of Verify to check a Captcha, verification
can be bypassed.
For example, if the first parameter is a non-existent id, the second parameter
is an empty string, and the third parameter is true, the function will always
consider the Captcha to be correct.
ghsas:
- GHSA-5mmw-p5qv-w3x5
credits:
- '@cangkuai'
references:
- report: https://github.com/mojocn/base64Captcha/issues/120
- fix: https://github.com/mojocn/base64Captcha/commit/9b11012caca58925f1e47c770f79f2fa47e3ad13
- fix: https://github.com/mojocn/base64Captcha/commit/5ab86bd6f333aad3936f912fc52b411168dcd4a7
cve_metadata:
id: CVE-2023-45292
cwe: 'CWE-305: Authentication Bypass by Primary Weakness'
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2759.yaml
|
id: GO-2024-2759
modules:
- module: github.com/IBAX-io/go-ibax
versions:
- fixed: 1.4.2
vulnerable_at: 1.4.0
summary: IBAX go-ibax vulnerable to SQL injection in github.com/IBAX-io/go-ibax
cves:
- CVE-2022-3799
ghsas:
- GHSA-fcgf-j8cf-h2rm
references:
- advisory: https://github.com/advisories/GHSA-fcgf-j8cf-h2rm
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2022-3799
- fix: https://github.com/IBAX-io/go-ibax/commit/b0183d8e550836dc50282ee74ff421ee41b25a37
- report: https://github.com/IBAX-io/go-ibax/issues/2060
- web: https://vuldb.com/?id.212635
source:
id: GHSA-fcgf-j8cf-h2rm
created: 2024-06-04T17:59:40.095-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2858.yaml
|
id: GO-2024-2858
modules:
- module: github.com/grafana/grafana
versions:
- introduced: 5.0.0-beta1+incompatible
non_go_versions:
- fixed: 8.5.14
- introduced: 9.0.0
- fixed: 9.1.8
vulnerable_at: 5.4.5+incompatible
summary: |-
Grafana Data source and plugin proxy endpoints could leak the authentication
cookie to some destination plugins in github.com/grafana/grafana
cves:
- CVE-2022-39201
ghsas:
- GHSA-x744-mm8v-vpgr
unknown_aliases:
- BIT-grafana-2022-39201
references:
- advisory: https://github.com/grafana/grafana/security/advisories/GHSA-x744-mm8v-vpgr
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2022-39201
- fix: https://github.com/grafana/grafana/commit/b571acc1dc130a33f24742c1f93b93216da6cf57
- fix: https://github.com/grafana/grafana/commit/c658816f5229d17f877579250c07799d3bbaebc9
- web: https://github.com/grafana/grafana/releases/tag/v9.1.8
source:
id: GHSA-x744-mm8v-vpgr
created: 2024-06-26T14:07:24.577803-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1987.yaml
|
id: GO-2023-1987
modules:
- module: std
versions:
- fixed: 1.19.12
- introduced: 1.20.0-0
- fixed: 1.20.7
- introduced: 1.21.0-0
- fixed: 1.21.0-rc.4
vulnerable_at: 1.20.6
packages:
- package: crypto/tls
symbols:
- Conn.verifyServerCertificate
- Conn.processCertsFromClient
derived_symbols:
- Conn.Handshake
- Conn.HandshakeContext
- Conn.Read
- Conn.Write
- Dial
- DialWithDialer
- Dialer.Dial
- Dialer.DialContext
summary: Large RSA keys can cause high CPU usage in crypto/tls
description: |-
Extremely large RSA keys in certificate chains can cause a client/server to
expend significant CPU time verifying signatures.
With fix, the size of RSA keys transmitted during handshakes is restricted to <=
8192 bits.
Based on a survey of publicly trusted RSA keys, there are currently only three
certificates in circulation with keys larger than this, and all three appear to
be test certificates that are not actively deployed. It is possible there are
larger keys in use in private PKIs, but we target the web PKI, so causing
breakage here in the interests of increasing the default safety of users of
crypto/tls seems reasonable.
credits:
- Mateusz Poliwczak
references:
- report: https://go.dev/issue/61460
- fix: https://go.dev/cl/515257
- web: https://groups.google.com/g/golang-announce/c/X0b6CsSAaYI/m/Efv5DbZ9AwAJ
cve_metadata:
id: CVE-2023-29409
cwe: 'CWE-400: Uncontrolled Resource Consumption'
references:
- https://security.netapp.com/advisory/ntap-20230831-0010/
- https://security.gentoo.org/glsa/202311-09
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0965.yaml
|
id: GO-2022-0965
modules:
- module: k8s.io/apimachinery
versions:
- fixed: 0.0.0-20190927203648-9ce6eca90e73
vulnerable_at: 0.0.0-20190925125216-3ddb1b485b38
packages:
- package: k8s.io/apimachinery/pkg/runtime/serializer/json
symbols:
- customNumberDecoder.Decode
derived_symbols:
- Serializer.Decode
- Serializer.Encode
- package: k8s.io/apimachinery/pkg/util/json
symbols:
- Unmarshal
summary: Unbounded recursion in JSON parsing in k8s.io/apimachinery
description: |-
Unbounded recursion in JSON parsing allows malicious JSON input to cause
excessive memory consumption or panics.
published: 2022-09-02T21:12:51Z
ghsas:
- GHSA-74fp-r6jw-h4mp
references:
- fix: https://github.com/kubernetes/kubernetes/pull/83261
- web: https://github.com/advisories/GHSA-pmqp-h87c-mr78
- web: https://nvd.nist.gov/vuln/detail/CVE-2019-11253
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0223.yaml
|
id: GO-2021-0223
modules:
- module: std
versions:
- fixed: 1.13.13
- introduced: 1.14.0-0
- fixed: 1.14.5
vulnerable_at: 1.14.4
packages:
- package: crypto/x509
goos:
- windows
symbols:
- Certificate.systemVerify
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
summary: Certificate verification error on Windows in crypto/x509
description: |-
On Windows, if VerifyOptions.Roots is nil, Certificate.Verify does not check the
EKU requirements specified in VerifyOptions.KeyUsages. This may allow a
certificate to be used for an unintended purpose.
published: 2022-02-17T17:46:03Z
cves:
- CVE-2020-14039
credits:
- Niall Newman
references:
- fix: https://go.dev/cl/242597
- fix: https://go.googlesource.com/go/+/82175e699a2e2cd83d3aa34949e9b922d66d52f5
- report: https://go.dev/issue/39360
- web: https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1117.yaml
|
id: GO-2022-1117
modules:
- module: github.com/codenotary/immudb
versions:
- fixed: 1.4.1
vulnerable_at: 1.4.0
packages:
- package: github.com/codenotary/immudb/pkg/client/auditor
symbols:
- defaultAuditor.audit
derived_symbols:
- defaultAuditor.Run
- package: github.com/codenotary/immudb/pkg/client
symbols:
- immuClient.verifiedGet
- immuClient.VerifiedSet
- immuClient.VerifiedTxByID
- immuClient.VerifiedSetReferenceAt
- immuClient.VerifiedZAddAt
- immuClient.VerifyRow
- immuClient._streamVerifiedSet
- immuClient._streamVerifiedGet
derived_symbols:
- immuClient.SafeGet
- immuClient.SafeReference
- immuClient.SafeSet
- immuClient.SafeZAdd
- immuClient.StreamVerifiedGet
- immuClient.StreamVerifiedSet
- immuClient.VerifiedGet
- immuClient.VerifiedGetAt
- immuClient.VerifiedGetAtRevision
- immuClient.VerifiedGetSince
- immuClient.VerifiedSetReference
- immuClient.VerifiedZAdd
- package: github.com/codenotary/immudb/embedded/store
symbols:
- ImmuStore.DualProof
- VerifyLinearProof
- VerifyDualProof
summary: Insufficient verification of proofs in github.com/codenotary/immudb
description: |-
In certain scenarios, a malicious immudb server can provide a falsified proof
that will be accepted by the client SDK signing a falsified transaction
replacing the genuine one. This situation can not be triggered by a genuine
immudb server and requires the client to perform a specific list of verified
operations resulting in acceptance of an invalid state value.
This vulnerability only affects immudb client SDKs, the immudb server itself is
not affected by this vulnerability.
cves:
- CVE-2022-36111
ghsas:
- GHSA-672p-m5jq-mrh8
references:
- advisory: https://github.com/codenotary/immudb/security/advisories/GHSA-672p-m5jq-mrh8
- article: https://github.com/codenotary/immudb/tree/master/docs/security/vulnerabilities/linear-fake
- fix: https://github.com/codenotary/immudb/commit/acf7f1b3d62436ea5e038acea1fc6394f90ab1c6
- fix: https://github.com/codenotary/immudb/commit/7267d67e28be8f0257b71d734611a051593e8a81
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2629.yaml
|
id: GO-2024-2629
modules:
- module: github.com/grafana/grafana
non_go_versions:
- introduced: 8.5.0
- fixed: 9.5.7
- introduced: 10.0.0
- fixed: 10.0.12
- introduced: 10.1.0
- fixed: 10.1.8
- introduced: 10.2.0
- fixed: 10.2.5
- introduced: 10.3.0
- fixed: 10.3.4
vulnerable_at: 5.4.5+incompatible
summary: |-
Grafana's users with permissions to create a data source can CRUD all data
sources in github.com/grafana/grafana
cves:
- CVE-2024-1442
ghsas:
- GHSA-5mxf-42f5-j782
unknown_aliases:
- BIT-grafana-2024-1442
references:
- advisory: https://github.com/advisories/GHSA-5mxf-42f5-j782
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-1442
- web: https://grafana.com/security/security-advisories/cve-2024-1442
source:
id: GHSA-5mxf-42f5-j782
created: 2024-06-04T15:37:37.122896-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2657.yaml
|
id: GO-2024-2657
modules:
- module: github.com/cilium/cilium
versions:
- introduced: 1.14.0
- fixed: 1.14.8
- introduced: 1.15.0
- fixed: 1.15.2
vulnerable_at: 1.15.1
summary: Unencrypted traffic between nodes with WireGuard in github.com/cilium/cilium
description: |-
In Cilium clusters with WireGuard enabled and traffic matching Layer 7 policies:
traffic that should be WireGuard-encrypted is sent unencrypted between a node's
Envoy proxy and pods on other nodes, and traffic that should be
WireGuard-encrypted is sent unencrypted between a node's DNS proxy and pods on
other nodes.
cves:
- CVE-2024-28250
ghsas:
- GHSA-v6q2-4qr3-5cw6
credits:
- '@brb'
- '@giorio94'
- '@gandro'
- '@jschwinger233'
references:
- advisory: https://github.com/cilium/cilium/security/advisories/GHSA-v6q2-4qr3-5cw6
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2753.yaml
|
id: GO-2024-2753
modules:
- module: k8s.io/kubernetes
versions:
- introduced: 1.1.0
- fixed: 1.16.13
- introduced: 1.17.0
- fixed: 1.17.9
- introduced: 1.18.0
- fixed: 1.18.6
vulnerable_at: 1.18.6-rc.0
summary: Denial of service in Kubernetes in k8s.io/kubernetes
cves:
- CVE-2020-8557
ghsas:
- GHSA-55qj-gj3x-jq9r
references:
- advisory: https://github.com/advisories/GHSA-55qj-gj3x-jq9r
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2020-8557
- web: https://github.com/kubernetes/kubernetes/commit/530f199b6e07cdaab32361e39709ac45f3fdc446
- web: https://github.com/kubernetes/kubernetes/commit/68750fefd3df76b7b008ef7b18e8acd18d5c2f2e
- web: https://github.com/kubernetes/kubernetes/commit/7fd849cffa2f93061fbcb0a6ae4efd0539b1e981
- web: https://github.com/kubernetes/kubernetes/issues/93032
- web: https://github.com/kubernetes/kubernetes/pull/92921
- web: https://groups.google.com/g/kubernetes-security-announce/c/cB_JUsYEKyY/m/vVSO61AhBwAJ
- web: https://security.netapp.com/advisory/ntap-20200821-0002
source:
id: GHSA-55qj-gj3x-jq9r
created: 2024-06-07T11:23:44.913991-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0233.yaml
|
id: GO-2022-0233
modules:
- module: github.com/pires/go-proxyproto
versions:
- fixed: 0.6.1
vulnerable_at: 0.5.0
packages:
- package: github.com/pires/go-proxyproto
symbols:
- Listener.Accept
summary: Resource exhaustion in github.com/pires/go-proxyproto
description: |-
The PROXY protocol server does not impose a timeout on reading the header from
new connections, allowing a malicious client to cause resource exhaustion and a
denial of service by opening many connections and sending no data on them.
v0.6.0 of the proxyproto package adds support for a user-defined header timeout.
v0.6.1 adds a default timeout of 200ms and v0.6.2 increases the default timeout
to 10s.
published: 2022-07-01T20:18:04Z
cves:
- CVE-2021-23409
ghsas:
- GHSA-xcf7-q56x-78gh
references:
- fix: https://github.com/pires/go-proxyproto/pull/74
- fix: https://github.com/pires/go-proxyproto/pull/74/commits/cdc63867da24fc609b727231f682670d0d1cd346
- web: https://github.com/pires/go-proxyproto/issues/65
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0558.yaml
|
id: GO-2022-0558
modules:
- module: github.com/containers/psgo
versions:
- fixed: 1.7.2
vulnerable_at: 1.7.1
packages:
- package: github.com/containers/psgo
symbols:
- contextFromOptions
derived_symbols:
- JoinNamespaceAndProcessInfo
- JoinNamespaceAndProcessInfoByPids
- JoinNamespaceAndProcessInfoByPidsWithOptions
- JoinNamespaceAndProcessInfoWithOptions
- ProcessInfo
- ProcessInfoByPids
- package: github.com/containers/psgo/internal/proc
symbols:
- readStatusUserNS
derived_symbols:
- ParseStatus
summary: Privilege escalation in github.com/containers/psgo
description: |-
The psgo package executes the 'nsenter' binary, potentially allowing privilege
escalation when used in environments where nsenter is provided by an untrusted
source.
published: 2022-08-22T18:07:59Z
cves:
- CVE-2022-1227
ghsas:
- GHSA-66vw-v2x9-hw75
references:
- fix: https://github.com/containers/psgo/pull/92
- web: https://github.com/containers/podman/issues/10941
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1040.yaml
|
id: GO-2022-1040
modules:
- module: helm.sh/helm/v3
versions:
- introduced: 3.0.0
- fixed: 3.5.2
vulnerable_at: 3.5.1
packages:
- package: helm.sh/helm/v3/pkg/chart
symbols:
- Metadata.Validate
derived_symbols:
- Chart.Validate
- package: helm.sh/helm/v3/pkg/plugin
symbols:
- validatePluginData
derived_symbols:
- FindPlugins
- LoadAll
- LoadDir
- package: helm.sh/helm/v3/pkg/repo
symbols:
- IndexFile.Add
- loadIndex
derived_symbols:
- ChartRepository.DownloadIndexFile
- ChartRepository.Index
- ChartRepository.Load
- FindChartInAuthAndTLSRepoURL
- FindChartInAuthRepoURL
- FindChartInRepoURL
- IndexDirectory
- LoadIndexFile
summary: Insufficient sanitization of data files in helm.sh/helm/v3
description: |-
Helm does not sanitize all fields read from repository data files. A maliciously
crafted data file may contain strings containing arbitrary data. If printed to a
terminal, a malicious string could obscure or alter data on the screen.
cves:
- CVE-2021-21303
ghsas:
- GHSA-c38g-469g-cmgx
references:
- advisory: https://github.com/advisories/GHSA-c38g-469g-cmgx
- fix: https://github.com/helm/helm/commit/6ce9ba60b73013857e2e7c73d3f86ed70bc1ac9a
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0193.yaml
|
id: GO-2022-0193
modules:
- module: golang.org/x/net
versions:
- fixed: 0.0.0-20180921000356-2f5d2388922f
vulnerable_at: 0.0.0-20180911220305-26e67e76b6c3
packages:
- package: golang.org/x/net/html
symbols:
- inBodyIM
derived_symbols:
- Parse
- ParseFragment
summary: Panic on unconsidered isindex and template combination in golang.org/x/net/html
description: |-
The Parse function can panic on some invalid inputs.
For example, the Parse function panics on the input
"<template><tBody><isindex/action=0>".
published: 2022-07-06T18:14:54Z
cves:
- CVE-2018-17143
ghsas:
- GHSA-fcf9-6fv2-fc5v
credits:
- '@tr3ee'
references:
- fix: https://go-review.googlesource.com/c/net/+/136575
- fix: https://go.googlesource.com/net/+/2f5d2388922f370f4355f327fcf4cfe9f5583908
- report: https://go.dev/issue/27704
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2692.yaml
|
id: GO-2024-2692
modules:
- module: github.com/canonical/pebble
versions:
- fixed: 1.1.1
- introduced: 1.2.0
- fixed: 1.4.2
- introduced: 1.5.0
- fixed: 1.7.3
- introduced: 1.8.0
- fixed: 1.10.2
vulnerable_at: 1.10.1
summary: Pebble service manager's file pull API allows access by any user in github.com/canonical/pebble
cves:
- CVE-2024-3250
ghsas:
- GHSA-4685-2x5r-65pj
references:
- advisory: https://github.com/canonical/pebble/security/advisories/GHSA-4685-2x5r-65pj
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-3250
- advisory: https://www.cve.org/CVERecord?id=CVE-2024-3250
- fix: https://github.com/canonical/pebble/commit/4ca343d3889533143477e21c63867f2f3c3b5645
- fix: https://github.com/canonical/pebble/commit/a5f6f062a11ea156697b854264385ff7e1985fd8
- fix: https://github.com/canonical/pebble/commit/b8abd1ff0090f3e0749e81eb1fc3ea16ba95f514
- fix: https://github.com/canonical/pebble/commit/cd326225b9b0be067da7d8858e2c912078cbbbd5
- fix: https://github.com/canonical/pebble/pull/406
source:
id: GHSA-4685-2x5r-65pj
created: 2024-05-17T16:14:05.567804-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2334.yaml
|
id: GO-2023-2334
modules:
- module: github.com/go-jose/go-jose/v3
versions:
- fixed: 3.0.1
vulnerable_at: 3.0.0
packages:
- package: github.com/go-jose/go-jose/v3
symbols:
- symmetricKeyCipher.decryptKey
derived_symbols:
- JSONWebEncryption.Decrypt
- JSONWebEncryption.DecryptMulti
- module: github.com/square/go-jose
vulnerable_at: 2.6.0+incompatible
packages:
- package: github.com/square/go-jose
symbols:
- symmetricKeyCipher.decryptKey
derived_symbols:
- JSONWebEncryption.Decrypt
- JSONWebEncryption.DecryptMulti
summary: |-
Denial of service via decryption of malicious PBES2 JWE objects in
github.com/go-jose/go-jose/v3
description: |-
The go-jose package is subject to a "billion hashes attack" causing
denial-of-service when decrypting JWE inputs. This occurs when an attacker can
provide a PBES2 encrypted JWE blob with a very large p2c value that, when
decrypted, produces a denial-of-service.
ghsas:
- GHSA-2c7c-3mj9-8fqh
references:
- fix: https://github.com/go-jose/go-jose/commit/65351c27657d58960c2e6c9fbb2b00f818e50568
- report: https://github.com/go-jose/go-jose/issues/64
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1165.yaml
|
id: GO-2022-1165
modules:
- module: helm.sh/helm/v3
versions:
- fixed: 3.10.3
vulnerable_at: 3.10.2
packages:
- package: helm.sh/helm/v3/pkg/repo
symbols:
- IndexFile.MustAdd
- loadIndex
- File.Remove
derived_symbols:
- ChartRepository.DownloadIndexFile
- ChartRepository.Index
- ChartRepository.Load
- FindChartInAuthAndTLSAndPassRepoURL
- FindChartInAuthAndTLSRepoURL
- FindChartInAuthRepoURL
- FindChartInRepoURL
- IndexDirectory
- IndexFile.Add
- LoadIndexFile
summary: Denial of service via repository index file in helm.sh/helm/v3
description: |-
Applications that use the repo package in the Helm SDK to parse an index file
can suffer a Denial of Service when that input causes a panic that cannot be
recovered from.
The repo package contains a handler that processes the index file of a
repository. For example, the Helm client adds references to chart repositories
where charts are managed. The repo package parses the index file of the
repository and loads it into memory. Some index files can cause array data
structures to be created causing a memory violation.
The Helm Client will panic with an index file that causes a memory violation
panic. Helm is not a long running service so the panic will not affect future
uses of the Helm client.
cves:
- CVE-2022-23525
ghsas:
- GHSA-53c4-hhmh-vw5q
credits:
- Ada Logics, in a fuzzing audit sponsored by CNCF
references:
- advisory: https://github.com/helm/helm/security/advisories/GHSA-53c4-hhmh-vw5q
- fix: https://github.com/helm/helm/commit/638ebffbc2e445156f3978f02fd83d9af1e56f5b
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0574.yaml
|
id: GO-2022-0574
modules:
- module: github.com/open-policy-agent/opa
versions:
- fixed: 0.42.0
vulnerable_at: 0.41.0
packages:
- package: github.com/open-policy-agent/opa/ast
symbols:
- rewriteDeclaredVarsInTerm
derived_symbols:
- Args.Copy
- Args.Vars
- Array.Copy
- Array.Foreach
- Array.Iter
- Array.Until
- ArrayComprehension.Copy
- BeforeAfterVisitor.Walk
- Body.Copy
- Body.Vars
- Call.Copy
- CompileModules
- CompileModulesWithOpt
- Compiler.Compile
- Compiler.GetRulesDynamic
- Compiler.GetRulesDynamicWithOpts
- Compiler.PassesTypeCheck
- ContainsClosures
- ContainsComprehensions
- ContainsRefs
- Copy
- Every.Copy
- Every.KeyValueVars
- Expr.Copy
- Expr.CopyWithoutTerms
- Expr.Vars
- GenericTransformer.Transform
- GenericVisitor.Walk
- Head.Copy
- Head.Vars
- Import.Copy
- IsConstant
- JSON
- JSONWithOpt
- Module.Copy
- Module.UnmarshalJSON
- MustCompileModules
- MustCompileModulesWithOpts
- MustJSON
- MustParseBody
- MustParseBodyWithOpts
- MustParseExpr
- MustParseImports
- MustParseModule
- MustParseModuleWithOpts
- MustParsePackage
- MustParseRef
- MustParseRule
- MustParseStatement
- MustParseStatements
- MustParseTerm
- NewGraph
- ObjectComprehension.Copy
- OutputVarsFromBody
- OutputVarsFromExpr
- Package.Copy
- ParseBody
- ParseBodyWithOpts
- ParseExpr
- ParseImports
- ParseModule
- ParseModuleWithOpts
- ParsePackage
- ParseRef
- ParseRule
- ParseStatement
- ParseStatements
- ParseStatementsWithOpts
- ParseTerm
- Parser.Parse
- Pretty
- QueryContext.Copy
- Ref.ConstantPrefix
- Ref.Copy
- Ref.Dynamic
- Ref.Extend
- Ref.OutputVars
- Rule.Copy
- SetComprehension.Copy
- SomeDecl.Copy
- Term.Copy
- Term.Vars
- Transform
- TransformComprehensions
- TransformRefs
- TransformVars
- TreeNode.DepthFirst
- TypeEnv.Get
- Unify
- ValueMap.Copy
- ValueMap.Equal
- ValueMap.Hash
- ValueMap.Iter
- ValueMap.MarshalJSON
- ValueMap.String
- ValueToInterface
- VarVisitor.Walk
- Walk
- WalkBeforeAndAfter
- WalkBodies
- WalkClosures
- WalkExprs
- WalkNodes
- WalkRefs
- WalkRules
- WalkTerms
- WalkVars
- WalkWiths
- With.Copy
- baseDocEqIndex.AllRules
- baseDocEqIndex.Build
- baseDocEqIndex.Lookup
- bodySafetyTransformer.Visit
- comprehensionIndexNestedCandidateVisitor.Walk
- comprehensionIndexRegressionCheckVisitor.Walk
- metadataParser.Parse
- object.Copy
- object.Diff
- object.Filter
- object.Foreach
- object.Intersect
- object.Iter
- object.Map
- object.Merge
- object.MergeWith
- object.Until
- queryCompiler.Compile
- refChecker.Visit
- refindices.Sorted
- refindices.Update
- rewriteNestedHeadVarLocalTransform.Visit
- ruleArgLocalRewriter.Visit
- ruleWalker.Do
- set.Copy
- set.Diff
- set.Foreach
- set.Intersect
- set.Iter
- set.Map
- set.Reduce
- set.Union
- set.Until
- trieNode.Do
- trieNode.Traverse
- trieTraversalResult.Add
- typeChecker.CheckBody
- typeChecker.CheckTypes
summary: Denial of service in github.com/open-policy-agent/opa
description: |-
An issue in the AST parser of Open Policy Agent makes it possible for attackers
to cause a Denial of Service attack from a crafted input.
published: 2022-07-01T00:01:03Z
cves:
- CVE-2022-33082
ghsas:
- GHSA-2m4x-4q9j-w97g
references:
- fix: https://github.com/open-policy-agent/opa/pull/4701
- fix: https://github.com/open-policy-agent/opa/commit/064f6168a8dfebdeb2ea147f7882bb9f5d2b7f67
- web: https://github.com/open-policy-agent/opa/issues/4762
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0016.yaml
|
id: GO-2020-0016
modules:
- module: github.com/ulikunitz/xz
versions:
- fixed: 0.5.8
vulnerable_at: 0.5.7
packages:
- package: github.com/ulikunitz/xz
symbols:
- readUvarint
derived_symbols:
- Reader.Read
- blockHeader.UnmarshalBinary
- streamReader.Read
summary: Infinite loop in github.com/ulikunitz/xz
description: |-
An attacker can construct a series of bytes such that calling Reader.Read on the
bytes could cause an infinite loop. If parsing user supplied input, this may be
used as a denial of service vector.
published: 2021-04-14T20:04:52Z
cves:
- CVE-2021-29482
ghsas:
- GHSA-25xm-hr59-7c27
credits:
- '@0xdecaf'
references:
- fix: https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b
- web: https://github.com/ulikunitz/xz/issues/35
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2830.yaml
|
id: GO-2024-2830
modules:
- module: github.com/1Panel-dev/1Panel
versions:
- fixed: 1.10.3-lts
vulnerable_at: 1.10.2-lts
packages:
- package: github.com/1Panel-dev/1Panel/backend/utils/cmd
symbols:
- CheckIllegal
summary: Arbitrary file write in github.com/1Panel-dev/1Panel
description: A maliciously crafted packet can write to an arbitrary file.
cves:
- CVE-2024-34352
ghsas:
- GHSA-f8ch-w75v-c847
credits:
- '@an5er'
references:
- advisory: https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-f8ch-w75v-c847
- fix: https://github.com/1Panel-dev/1Panel/commit/e037b69f52799e110af8e98f39a3627ad0285ea6
source:
id: GHSA-f8ch-w75v-c847
created: 2024-05-11T15:38:11.046626-07:00
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0023.yaml
|
id: GO-2020-0023
modules:
- module: github.com/robbert229/jwt
versions:
- fixed: 0.0.0-20170426191122-ca1404ee6e83
vulnerable_at: 0.0.0-20170303194658-2eb16e9a008d
packages:
- package: github.com/robbert229/jwt
symbols:
- Algorithm.validateSignature
derived_symbols:
- Algorithm.Validate
summary: Timing side-channel in github.com/robbert229/jwt
description: |-
Token validation methods are susceptible to a timing side-channel during HMAC
comparison. With a large enough number of requests over a low latency
connection, an attacker may use this to determine the expected HMAC.
published: 2021-04-14T20:04:52Z
ghsas:
- GHSA-5vw4-v588-pgv8
references:
- fix: https://github.com/robbert229/jwt/commit/ca1404ee6e83fcbafb66b09ed0d543850a15b654
- web: https://github.com/robbert229/jwt/issues/12
cve_metadata:
id: CVE-2015-10004
cwe: 'CWE 208: Information Exposure Through Timing Discrepancy'
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0370.yaml
|
id: GO-2022-0370
modules:
- module: mellium.im/xmpp
versions:
- introduced: 0.18.0
- fixed: 0.21.1
vulnerable_at: 0.21.0
packages:
- package: mellium.im/xmpp/websocket
symbols:
- Dialer.config
derived_symbols:
- Dial
- DialDirect
- DialSession
- Dialer.Dial
- Dialer.DialDirect
- NewClient
summary: |-
Man-in-the-middle attack due to improper validation of certificate in
mellium.im/xmpp
description: |-
Websocket client connections are vulnerable to man-in-the-middle attacks via DNS
spoofing.
When looking up a WSS endpoint using a DNS TXT record, the server TLS
certificate is incorrectly validated using the name of the server returned by
the TXT record request, not the name of the the server being connected to. This
permits any attacker that can spoof a DNS record to redirect the user to a
server of their choosing.
Providing a *tls.Config with a ServerName field set to the correct destination
hostname will avoid this issue.
published: 2022-07-29T20:00:14Z
cves:
- CVE-2022-24968
ghsas:
- GHSA-h289-x5wc-xcv8
- GHSA-m658-p24x-p74r
references:
- advisory: https://mellium.im/cve/cve-2022-24968/
- fix: https://github.com/mellium/xmpp/pull/260
- fix: https://github.com/mellium/xmpp/commit/0d92aa486da69b71f2f4a30e62aa722c711b98ac
- report: https://mellium.im/issue/259
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0386.yaml
|
id: GO-2022-0386
modules:
- module: github.com/nats-io/jwt
versions:
- fixed: 1.2.3-0.20210314221642-a826c77dc9d2
vulnerable_at: 1.2.2
packages:
- package: github.com/nats-io/jwt
symbols:
- ActivationClaims.Validate
- Import.Validate
derived_symbols:
- Account.Validate
- AccountClaims.Validate
- Imports.Validate
- module: github.com/nats-io/jwt/v2
versions:
- fixed: 2.0.1
vulnerable_at: 2.0.0
packages:
- package: github.com/nats-io/jwt/v2
symbols:
- Import.Validate
derived_symbols:
- Account.Validate
- AccountClaims.Validate
- Imports.Validate
summary: Import token permissions checking not enforced in github.com/nats-io/jwt
description: |-
Import tokens valid for one account may be used for any other account.
Validation of Import token bindings incorrectly warns on mismatches, rather than
rejecting the Goken. This permits a token for one account to be used for any
other account.
published: 2022-07-01T20:11:22Z
cves:
- CVE-2021-3127
ghsas:
- GHSA-62mh-w5cv-p88c
- GHSA-9r5x-fjv3-q6h4
- GHSA-j756-f273-xhp4
references:
- advisory: https://advisories.nats.io/CVE/CVE-2021-3127.txt
- fix: https://github.com/nats-io/jwt/pull/149
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2042.yaml
|
id: GO-2023-2042
modules:
- module: cmd
versions:
- introduced: 1.21.0-0
- fixed: 1.21.1
vulnerable_at: 1.21.0
packages:
- package: cmd/go
summary: Arbitrary code execution via go.mod toolchain directive in cmd/go
description: |-
The go.mod toolchain directive, introduced in Go 1.21, can be leveraged to
execute scripts and binaries relative to the root of the module when the "go"
command was executed within the module. This applies to modules downloaded using
the "go" command from the module proxy, as well as modules downloaded directly
using VCS software.
credits:
- Juho Nurminen of Mattermost
references:
- report: https://go.dev/issue/62198
- fix: https://go.dev/cl/526158
- web: https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ
cve_metadata:
id: CVE-2023-39320
cwe: 'CWE-94: Improper Control of Generation of Code (''Code Injection'')'
references:
- https://security.netapp.com/advisory/ntap-20231020-0004/
- https://security.gentoo.org/glsa/202311-09
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1071.yaml
|
id: GO-2022-1071
modules:
- module: github.com/fluxcd/helm-controller/api
versions:
- fixed: 0.26.0
vulnerable_at: 0.25.0
packages:
- package: github.com/fluxcd/helm-controller/api/v2beta1
- module: github.com/fluxcd/image-automation-controller/api
versions:
- fixed: 0.26.1
vulnerable_at: 0.26.0
packages:
- package: github.com/fluxcd/image-automation-controller/api/v1beta1
- module: github.com/fluxcd/image-reflector-controller/api
versions:
- fixed: 0.22.1
vulnerable_at: 0.22.0
packages:
- package: github.com/fluxcd/image-reflector-controller/api/v1beta1
- module: github.com/fluxcd/kustomize-controller/api
versions:
- fixed: 0.30.0
vulnerable_at: 0.29.0
packages:
- package: github.com/fluxcd/kustomize-controller/api/v1beta2
- module: github.com/fluxcd/notification-controller/api
versions:
- fixed: 0.28.0
vulnerable_at: 0.27.0
packages:
- package: github.com/fluxcd/notification-controller/api/v1beta1
- module: github.com/fluxcd/source-controller/api
versions:
- fixed: 0.30.0
vulnerable_at: 0.29.0
packages:
- package: github.com/fluxcd/source-controller/api/v1beta2
summary: Denial of service in flux controllers in github.com/fluxcd modules
description: |-
Flux controllers are vulnerable to a denial of service attack.
Users that have permissions to change Flux's objects, either through a Flux
source or directly within a cluster, can provide invalid data to fields
.spec.interval or .spec.timeout (and structured variations of these fields),
causing the entire object type to stop being processed.
The issue has two root causes: a) the Kubernetes type metav1.Duration is not
fully compatible with the Go type time.Duration as explained in
https://github.com/kubernetes/apimachinery/issues/131, and b) a lack of
validation within Flux to restrict allowed values.
cves:
- CVE-2022-39272
ghsas:
- GHSA-f4p5-x4vc-mh4v
credits:
- Alexander Block (@codablock)
references:
- advisory: https://github.com/advisories/GHSA-f4p5-x4vc-mh4v
- fix: https://github.com/fluxcd/helm-controller/pull/533
- fix: https://github.com/fluxcd/image-automation-controller/pull/439
- fix: https://github.com/fluxcd/image-reflector-controller/pull/314
- fix: https://github.com/fluxcd/kustomize-controller/pull/731
- fix: https://github.com/fluxcd/notification-controller/pull/420
- fix: https://github.com/fluxcd/source-controller/pull/903
- web: https://github.com/kubernetes/apimachinery#131
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0263.yaml
|
id: GO-2021-0263
modules:
- module: std
versions:
- fixed: 1.16.10
- introduced: 1.17.0-0
- fixed: 1.17.3
vulnerable_at: 1.17.2
packages:
- package: debug/macho
symbols:
- NewFile
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
summary: Panic on invalid symbol tables in debug/macho
description: |-
Calling File.ImportedSymbols on a loaded file which contains an invalid dynamic
symbol table command can cause a panic, in particular if the encoded number of
undefined symbols is larger than the number of symbols in the symbol table.
published: 2022-01-13T03:45:03Z
cves:
- CVE-2021-41771
credits:
- Burak Çarıkçı - Yunus Yıldırım (CT-Zer0 Crypttech)
references:
- fix: https://go.dev/cl/367075
- fix: https://go.googlesource.com/go/+/61536ec03063b4951163bd09609c86d82631fa27
- web: https://groups.google.com/g/golang-announce/c/0fM21h43arc
- report: https://go.dev/issue/48990
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0979.yaml
|
id: GO-2022-0979
modules:
- module: github.com/peterzen/goresolver
vulnerable_at: 1.0.2
packages:
- package: github.com/peterzen/goresolver
summary: |-
Incorrect DNSSEC validation due to unchecked owner names in
github.com/peterzen/goresolver
description: |-
DNSSEC validation is not performed correctly. An attacker can cause this package
to report successful validation for invalid, attacker-controlled records.
The owner name of RRSIG RRs is not validated, permitting an attacker to present
the RRSIG for an attacker-controlled domain in a response for any other domain.
ghsas:
- GHSA-87mm-qxm5-cp3f
references:
- report: https://github.com/peterzen/goresolver/issues/5
cve_metadata:
id: CVE-2022-3346
cwe: 'CWE 347: Improper Verification of Cryptographic Signature'
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1568.yaml
|
id: GO-2023-1568
modules:
- module: std
versions:
- fixed: 1.19.6
- introduced: 1.20.0-0
- fixed: 1.20.1
vulnerable_at: 1.20.0
packages:
- package: path/filepath
goos:
- windows
symbols:
- Clean
derived_symbols:
- Abs
- Dir
- EvalSymlinks
- Glob
- IsLocal
- Join
- Rel
- Walk
- WalkDir
summary: Path traversal on Windows in path/filepath
description: |-
A path traversal vulnerability exists in filepath.Clean on Windows.
On Windows, the filepath.Clean function could transform an invalid path such as
"a/../c:/b" into the valid path "c:\b". This transformation of a relative (if
invalid) path into an absolute path could enable a directory traversal attack.
After fix, the filepath.Clean function transforms this path into the relative
(but still invalid) path ".\c:\b".
credits:
- RyotaK (https://ryotak.net)
references:
- report: https://go.dev/issue/57274
- fix: https://go.dev/cl/468123
- web: https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E
cve_metadata:
id: CVE-2022-41722
cwe: |
CWE-22: Improper Limitation of a Pathname to a Restricted
Directory ("Path Traversal")
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1930.yaml
|
id: GO-2023-1930
modules:
- module: github.com/hamba/avro/v2
versions:
- fixed: 2.13.0
vulnerable_at: 2.12.0
packages:
- package: github.com/hamba/avro/v2
symbols:
- Reader.readBytes
derived_symbols:
- Decoder.Decode
- Reader.ReadArrayCB
- Reader.ReadBytes
- Reader.ReadMapCB
- Reader.ReadNext
- Reader.ReadString
- Reader.ReadVal
- Unmarshal
- arrayDecoder.Decode
- bytesCodec.Decode
- bytesDecimalCodec.Decode
- bytesDecimalPtrCodec.Decode
- dereferenceDecoder.Decode
- efaceDecoder.Decode
- frozenConfig.Unmarshal
- mapDecoder.Decode
- mapSkipDecoder.Decode
- mapUnionDecoder.Decode
- recordIfaceDecoder.Decode
- recordMapDecoder.Decode
- recordSkipDecoder.Decode
- referenceDecoder.Decode
- sliceSkipDecoder.Decode
- stringCodec.Decode
- structDecoder.Decode
- textMarshalerCodec.Decode
- unionPtrDecoder.Decode
- unionResolvedDecoder.Decode
- unionSkipDecoder.Decode
- module: github.com/hamba/avro
vulnerable_at: 1.8.0
packages:
- package: github.com/hamba/avro
symbols:
- Reader.ReadBytes
- Reader.ReadString
derived_symbols:
- Decoder.Decode
- Reader.ReadArrayCB
- Reader.ReadMapCB
- Reader.ReadNext
- Reader.ReadVal
- Unmarshal
- arrayDecoder.Decode
- bytesCodec.Decode
- bytesDecimalCodec.Decode
- bytesDecimalPtrCodec.Decode
- dereferenceDecoder.Decode
- efaceDecoder.Decode
- frozenConfig.Unmarshal
- mapDecoder.Decode
- mapSkipDecoder.Decode
- mapUnionDecoder.Decode
- recordIfaceDecoder.Decode
- recordMapDecoder.Decode
- recordSkipDecoder.Decode
- referenceDecoder.Decode
- sliceSkipDecoder.Decode
- stringCodec.Decode
- structDecoder.Decode
- textMarshalerCodec.Decode
- unionPtrDecoder.Decode
- unionResolvedDecoder.Decode
- unionSkipDecoder.Decode
summary: Unrestricted memory consumption in github.com/hamba/avro
cves:
- CVE-2023-37475
ghsas:
- GHSA-9x44-9pgq-cf45
references:
- advisory: https://github.com/hamba/avro/security/advisories/GHSA-9x44-9pgq-cf45
- fix: https://github.com/hamba/avro/pull/273
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2859.yaml
|
id: GO-2024-2859
modules:
- module: github.com/fluxcd/source-controller
versions:
- fixed: 1.2.5
vulnerable_at: 1.2.4
summary: source-controller leaks Azure Storage SAS token into logs in github.com/fluxcd/source-controller
cves:
- CVE-2024-31216
ghsas:
- GHSA-v554-xwgw-hc3w
references:
- advisory: https://github.com/fluxcd/source-controller/security/advisories/GHSA-v554-xwgw-hc3w
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-31216
- fix: https://github.com/fluxcd/source-controller/commit/915d1a072a4f37dd460ba33079dc094aa6e72fa9
- fix: https://github.com/fluxcd/source-controller/pull/1430
source:
id: GHSA-v554-xwgw-hc3w
created: 2024-05-17T16:08:47.429447-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2000.yaml
|
id: GO-2023-2000
modules:
- module: github.com/libp2p/go-libp2p
versions:
- fixed: 0.27.8
- introduced: 0.28.0
- fixed: 0.28.2
- introduced: 0.29.0
- fixed: 0.29.1
vulnerable_at: 0.29.0
packages:
- package: github.com/libp2p/go-libp2p/core/crypto
symbols:
- GenerateRSAKeyPair
- UnmarshalRsaPrivateKey
- UnmarshalRsaPublicKey
derived_symbols:
- GenerateKeyPair
- GenerateKeyPairWithReader
- PublicKeyFromProto
- UnmarshalPrivateKey
- UnmarshalPublicKey
summary: Large RSA keys can cause high resource usage in github.com/libp2p/go-libp2p
description: |-
Large RSA keys can lead to resource exhaustion attacks.
With fix, the size of RSA keys transmitted during handshakes is restricted to <=
8192 bits.
cves:
- CVE-2023-39533
ghsas:
- GHSA-876p-8259-xjgg
references:
- advisory: https://github.com/libp2p/go-libp2p/security/advisories/GHSA-876p-8259-xjgg
- report: https://go.dev/issue/61460
- fix: https://github.com/libp2p/go-libp2p/commit/0cce607219f3710addc7e18672cffd1f1d912fbb
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2880.yaml
|
id: GO-2024-2880
modules:
- module: github.com/traefik/traefik
unsupported_versions:
- last_affected: 1.7.34
vulnerable_at: 1.7.34
- module: github.com/traefik/traefik/v2
versions:
- fixed: 2.11.3
vulnerable_at: 2.11.2
- module: github.com/traefik/traefik/v3
versions:
- fixed: 3.0.1
vulnerable_at: 3.0.0
summary: |-
Traefik vulnerable to GO issue allowing malformed DNS message to cause infinite
loop in github.com/traefik/traefik
ghsas:
- GHSA-f7cq-5v43-8pwp
references:
- advisory: https://github.com/traefik/traefik/security/advisories/GHSA-f7cq-5v43-8pwp
- web: https://github.com/advisories/GHSA-5fq7-4mxc-535h
- web: https://github.com/traefik/traefik/releases/tag/v2.11.3
- web: https://github.com/traefik/traefik/releases/tag/v3.0.1
- web: https://www.cve.org/CVERecord?id=CVE-2024-24788
source:
id: GHSA-f7cq-5v43-8pwp
created: 2024-06-04T14:25:41.535025-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2594.yaml
|
id: GO-2024-2594
modules:
- module: github.com/mattermost/mattermost-server
versions:
- introduced: 9.2.0+incompatible
- fixed: 9.2.5+incompatible
- introduced: 9.3.0+incompatible
- fixed: 9.3.1+incompatible
- introduced: 9.4.0+incompatible
- fixed: 9.4.2+incompatible
vulnerable_at: 9.4.2-rc2+incompatible
- module: github.com/mattermost/mattermost-server/v5
vulnerable_at: 5.39.3
- module: github.com/mattermost/mattermost-server/v6
vulnerable_at: 6.7.2
- module: github.com/mattermost/mattermost/server/v8
non_go_versions:
- fixed: 8.1.9
vulnerable_at: 8.0.0-20240626184126-817e18414e41
summary: Mattermost fails to limit the number of role names in github.com/mattermost/mattermost-server
cves:
- CVE-2024-1953
ghsas:
- GHSA-vm9m-57jr-4pxh
unknown_aliases:
- CGA-25vp-ggq8-49x6
references:
- advisory: https://github.com/advisories/GHSA-vm9m-57jr-4pxh
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-1953
- web: https://mattermost.com/security-updates
source:
id: GHSA-vm9m-57jr-4pxh
created: 2024-06-26T16:08:54.70065-04:00
review_status: UNREVIEWED
unexcluded: EFFECTIVELY_PRIVATE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2101.yaml
|
id: GO-2023-2101
modules:
- module: github.com/consensys/gnark-crypto
versions:
- fixed: 0.12.1
vulnerable_at: 0.12.0
packages:
- package: github.com/consensys/gnark-crypto/ecc/bls12-377
symbols:
- G1Jac.mulWindowed
- G2Jac.mulWindowed
- package: github.com/consensys/gnark-crypto/ecc/bls12-381
symbols:
- G1Jac.mulWindowed
- G2Jac.mulWindowed
- package: github.com/consensys/gnark-crypto/ecc/bls24-315
symbols:
- G1Jac.mulWindowed
- G2Jac.mulWindowed
- package: github.com/consensys/gnark-crypto/ecc/bls24-317
symbols:
- G1Jac.mulWindowed
- G2Jac.mulWindowed
- package: github.com/consensys/gnark-crypto/ecc/bn254
symbols:
- G1Jac.mulWindowed
- G2Jac.mulWindowed
- package: github.com/consensys/gnark-crypto/ecc/bw6-633
symbols:
- G1Jac.mulWindowed
- G2Jac.mulWindowed
- package: github.com/consensys/gnark-crypto/ecc/bw6-756
symbols:
- G1Jac.mulWindowed
- G2Jac.mulWindowed
- package: github.com/consensys/gnark-crypto/ecc/bw6-761
symbols:
- G1Jac.mulWindowed
- G2Jac.mulWindowed
- package: github.com/consensys/gnark-crypto/ecc/secp256k1
symbols:
- G1Jac.mulWindowed
- package: github.com/consensys/gnark-crypto/ecc/bls12-377/internal/fptower
symbols:
- E12.ExpGLV
- package: github.com/consensys/gnark-crypto/ecc/bls12-381/internal/fptower
symbols:
- E12.ExpGLV
- package: github.com/consensys/gnark-crypto/ecc/bls24-315/internal/fptower
symbols:
- E24.ExpGLV
- package: github.com/consensys/gnark-crypto/ecc/bls24-317/internal/fptower
symbols:
- E24.ExpGLV
- package: github.com/consensys/gnark-crypto/ecc/bn254/internal/fptower
symbols:
- E12.ExpGLV
- package: github.com/consensys/gnark-crypto/ecc/bw6-633/internal/fptower
symbols:
- E6.ExpGLV
- package: github.com/consensys/gnark-crypto/ecc/bw6-756/internal/fptower
symbols:
- E6.ExpGLV
- package: github.com/consensys/gnark-crypto/ecc/bw6-761/internal/fptower
symbols:
- E6.ExpGLV
summary: Incorrect exponentiation results in github.com/consensys/gnark-crypto
ghsas:
- GHSA-pffg-92cg-xf5c
credits:
- '@asanso'
references:
- fix: https://github.com/Consensys/gnark-crypto/pull/213
- fix: https://github.com/Consensys/gnark-crypto/pull/451
- fix: https://github.com/Consensys/gnark-crypto/commit/ec6be1a037f7c496d595c541a8a8d31c47bcfa3d
- web: https://eprint.iacr.org/2015/565
- advisory: https://github.com/advisories/GHSA-pffg-92cg-xf5c
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1129.yaml
|
id: GO-2022-1129
modules:
- module: github.com/crewjam/saml
versions:
- fixed: 0.4.9
vulnerable_at: 0.4.8
packages:
- package: github.com/crewjam/saml
symbols:
- ServiceProvider.validateSignature
- findChild
derived_symbols:
- ServiceProvider.ParseResponse
- ServiceProvider.ParseXMLArtifactResponse
- ServiceProvider.ParseXMLResponse
- ServiceProvider.ValidateLogoutResponseForm
- ServiceProvider.ValidateLogoutResponseRedirect
- ServiceProvider.ValidateLogoutResponseRequest
summary: Authentication bypass in github.com/crewjam/saml
description: |-
Authentication bypass is possible when processing SAML responses containing
multiple Assertion elements.
cves:
- CVE-2022-41912
ghsas:
- GHSA-j2jp-wvqg-wc2g
credits:
- Felix Wilhelm from Google Project Zero
references:
- advisory: https://github.com/prometheus/exporter-toolkit/security/advisories/GHSA-7rg2-cxvp-9p7p
- fix: https://github.com/crewjam/saml/commit/aee3fb1edeeaf1088fcb458727e0fd863d277f8b
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0094.yaml
|
id: GO-2021-0094
modules:
- module: github.com/hashicorp/go-slug
versions:
- fixed: 0.5.0
vulnerable_at: 0.4.3
packages:
- package: github.com/hashicorp/go-slug
symbols:
- Unpack
summary: Directory traversal in github.com/hashicorp/go-slug
description: |-
Protections against directory traversal during archive extraction can be
bypassed by chaining multiple symbolic links within the archive. This allows a
malicious attacker to cause files to be created outside of the target directory.
Additionally if the attacker is able to read extracted files they may create
symbolic links to arbitrary files on the system which the unpacker has
permissions to read.
published: 2021-04-14T20:04:52Z
cves:
- CVE-2020-29529
ghsas:
- GHSA-2g5j-5x95-r6hr
references:
- fix: https://github.com/hashicorp/go-slug/pull/12
- fix: https://github.com/hashicorp/go-slug/commit/28cafc59c8da6126a3ae94dfa84181df4073454f
- web: https://securitylab.github.com/advisories/GHSL-2020-262-zipslip-go-slug
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2482.yaml
|
id: GO-2024-2482
modules:
- module: github.com/goreleaser/goreleaser
versions:
- introduced: 1.23.0
- fixed: 1.24.0
vulnerable_at: 1.23.0
packages:
- package: github.com/goreleaser/goreleaser/internal/shell
symbols:
- Run
- package: github.com/goreleaser/goreleaser/internal/pipe/sbom
symbols:
- catalogArtifact
derived_symbols:
- Pipe.Run
- package: github.com/goreleaser/goreleaser/internal/exec
symbols:
- executeCommand
derived_symbols:
- Execute
fix_links:
- https://github.com/goreleaser/goreleaser/commit/d5b6a533ca1dc3366983d5d31ee2d2b6232b83c0
summary: Information leak in github.com/goreleaser/goreleaser
description: Secret values can be printed to the --debug log when using a a custom publisher.
cves:
- CVE-2024-23840
ghsas:
- GHSA-h3q2-8whx-c29h
credits:
- '@andreaangiolillo'
- '@caarlos0'
references:
- advisory: https://github.com/goreleaser/goreleaser/security/advisories/GHSA-h3q2-8whx-c29h
- fix: https://github.com/goreleaser/goreleaser/commit/d5b6a533ca1dc3366983d5d31ee2d2b6232b83c0
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2565.yaml
|
id: GO-2024-2565
modules:
- module: github.com/greenpau/caddy-security
unsupported_versions:
- last_affected: 1.0.42
vulnerable_at: 1.1.29
summary: Use of Insufficiently Random Values in github.com/greenpau/caddy-security
cves:
- CVE-2024-21495
ghsas:
- GHSA-c7vf-m394-m4x4
references:
- advisory: https://github.com/advisories/GHSA-c7vf-m394-m4x4
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-21495
- report: https://github.com/greenpau/caddy-security/issues/265
- web: https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy
- web: https://github.com/greenpau/go-authcrunch/commit/ecd3725baf2683eb1519bb3c81ae41085fbf7dc2
- web: https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-6248275
source:
id: GHSA-c7vf-m394-m4x4
created: 2024-06-14T11:42:21.52675-04:00
review_status: UNREVIEWED
unexcluded: EFFECTIVELY_PRIVATE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2906.yaml
|
id: GO-2024-2906
modules:
- module: github.com/snapcore/snapd
unsupported_versions:
- cve_version_range: affected from 0 before 68ee9c6aa916ab87dbfd9a26030690f2cabf1e14
vulnerable_at: 0.0.0-20240613121802-3b573c423b52
summary: CVE-2024-5138 in github.com/snapcore/snapd
cves:
- CVE-2024-5138
credits:
- Rory McNamara from Snyk Security Labs
references:
- advisory: https://www.cve.org/CVERecord?id=CVE-2024-5138
- fix: https://github.com/snapcore/snapd/commit/68ee9c6aa916ab87dbfd9a26030690f2cabf1e14
- report: https://bugs.launchpad.net/snapd/+bug/2065077
source:
id: CVE-2024-5138
created: 2024-06-13T12:06:06.759735-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2789.yaml
|
id: GO-2024-2789
modules:
- module: github.com/openshift/cluster-monitoring-operator
unsupported_versions:
- last_affected: 0.1.1
vulnerable_at: 3.11.0+incompatible
summary: Cluster Monitoring Operator contains a credentials leak in github.com/openshift/cluster-monitoring-operator
cves:
- CVE-2024-1139
ghsas:
- GHSA-x5m7-63c6-fx79
references:
- advisory: https://github.com/advisories/GHSA-x5m7-63c6-fx79
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-1139
- fix: https://github.com/openshift/cluster-monitoring-operator/commit/1cfbe9ffafe1e43f8f87a451b72fddf5d76fa4e3
- fix: https://github.com/openshift/cluster-monitoring-operator/pull/1747
- web: https://access.redhat.com/errata/RHSA-2024:1887
- web: https://access.redhat.com/errata/RHSA-2024:1891
- web: https://access.redhat.com/errata/RHSA-2024:2047
- web: https://access.redhat.com/errata/RHSA-2024:2782
- web: https://access.redhat.com/security/cve/CVE-2024-1139
- web: https://bugzilla.redhat.com/show_bug.cgi?id=2262158
- web: https://github.com/openshift/cluster-monitoring-operator/blob/d45a3335c2bbada0948adef9fcba55c4e14fa1d7/pkg/manifests/manifests.go#L3135
source:
id: GHSA-x5m7-63c6-fx79
created: 2024-06-04T15:27:27.603431-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0945.yaml
|
id: GO-2022-0945
modules:
- module: gopkg.in/square/go-jose.v1
versions:
- fixed: 1.1.0
vulnerable_at: 1.0.0-20160831185616-c7581939a365
packages:
- package: gopkg.in/square/go-jose.v1
symbols:
- JsonWebSignature.Verify
- ecDecrypterSigner.decryptKey
- rawJsonWebKey.ecPublicKey
derived_symbols:
- JsonWebEncryption.Decrypt
- JsonWebKey.UnmarshalJSON
- package: gopkg.in/square/go-jose.v1/cipher
symbols:
- DeriveECDHES
- NewConcatKDF
- cbcAEAD.Seal
- cbcAEAD.computeAuthTag
- padBuffer
- resize
derived_symbols:
- cbcAEAD.Open
summary: Signature validation bypass in gopkg.in/square/go-jose.v1
description: |-
The go-jose library suffers from multiple signatures exploitation. When
validating a signed message, the API did not indicate which signature was valid,
which creates the potential for confusion.
published: 2022-08-22T17:59:45Z
cves:
- CVE-2016-9122
ghsas:
- GHSA-77gc-fj98-665h
credits:
- Quan Nguyen from Google's Information Security Engineering Team
references:
- advisory: https://www.openwall.com/lists/oss-security/2016/11/03/1
- fix: https://github.com/square/go-jose/pull/111
- fix: https://github.com/square/go-jose/commit/2c5656adca9909843c4ff50acf1d2cf8f32da7e6
- web: https://github.com/square/go-jose/commit/789a4c4bd4c118f7564954f441b29c153ccd6a96
- web: https://github.com/square/go-jose/commit/c7581939a3656bb65e89d64da0a52364a33d2507
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2539.yaml
|
id: GO-2024-2539
modules:
- module: github.com/mattermost/mattermost-plugin-jira
versions:
- fixed: 1.1.2-0.20230830170046-f4cf4c6de017
non_go_versions:
- fixed: 4.0.0-rc2
vulnerable_at: 1.1.2-0.20230829214939-57856e474934
packages:
- package: github.com/mattermost/mattermost-plugin-jira/server
symbols:
- Plugin.httpOAuth1aDisconnect
- Plugin.initializeRouter
summary: |-
Cross-site request forgery via logout button in
github.com/mattermost/mattermost-plugin-jira
cves:
- CVE-2024-23319
ghsas:
- GHSA-4fp6-574p-fc35
references:
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-23319
- fix: https://github.com/mattermost/mattermost-plugin-jira/commit/f4cf4c6de017ef6aa4428d393b78f418dd84cd8e
- web: https://mattermost.com/security-updates
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0077.yaml
|
id: GO-2021-0077
modules:
- module: go.etcd.io/etcd
versions:
- fixed: 0.5.0-alpha.5.0.20190108173120-83c051b701d3
vulnerable_at: 0.5.0-alpha.5.0.20190108163607-9c6b407e7d45
packages:
- package: go.etcd.io/etcd/auth
symbols:
- authStore.AuthInfoFromTLS
summary: Authentication bypass in go.etcd.io/etcd
description: |-
A user can use a valid client certificate that contains a CommonName that
matches a valid RBAC username to authenticate themselves as that user, despite
lacking the required credentials. This may allow authentication bypass, but
requires a certificate that is issued by a CA trusted by the server.
published: 2021-04-14T20:04:52Z
cves:
- CVE-2018-16886
ghsas:
- GHSA-h6xx-pmxh-3wgp
references:
- fix: https://github.com/etcd-io/etcd/pull/10366
- fix: https://github.com/etcd-io/etcd/commit/bf9d0d8291dc71ecbfb2690612954e1a298154b2
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0089.yaml
|
id: GO-2021-0089
modules:
- module: github.com/buger/jsonparser
versions:
- fixed: 1.0.0
vulnerable_at: 0.0.0-20191204142016-1a29609e0929
packages:
- package: github.com/buger/jsonparser
symbols:
- findKeyStart
derived_symbols:
- Delete
summary: Infinite loop in github.com/buger/jsonparser
description: |-
Parsing malformed JSON which contain opening brackets, but not closing brackets,
leads to an infinite loop. If operating on untrusted user input this can be used
as a denial of service vector.
published: 2021-04-14T20:04:52Z
cves:
- CVE-2020-10675
ghsas:
- GHSA-rmh2-65xw-9m6q
credits:
- Cong Wang
references:
- fix: https://github.com/buger/jsonparser/pull/192
- fix: https://github.com/buger/jsonparser/commit/91ac96899e492584984ded0c8f9a08f10b473717
- web: https://github.com/buger/jsonparser/issues/188
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0968.yaml
|
id: GO-2022-0968
modules:
- module: golang.org/x/crypto
versions:
- fixed: 0.0.0-20211202192323-5770296d904e
vulnerable_at: 0.0.0-20211117183948-ae814b36b871
packages:
- package: golang.org/x/crypto/ssh
symbols:
- gcmCipher.readCipherPacket
- chacha20Poly1305Cipher.readCipherPacket
derived_symbols:
- Dial
- NewClientConn
- NewServerConn
- curve25519sha256.Client
- curve25519sha256.Server
- dhGEXSHA.Client
- dhGEXSHA.Server
- dhGroup.Client
- dhGroup.Server
- ecdh.Client
- ecdh.Server
summary: Panic on malformed packets in golang.org/x/crypto/ssh
description: |-
Unauthenticated clients can cause a panic in SSH servers.
When using AES-GCM or ChaCha20Poly1305, consuming a malformed packet which
contains an empty plaintext causes a panic.
published: 2022-09-13T03:32:38Z
cves:
- CVE-2021-43565
ghsas:
- GHSA-gwc9-m7rh-j2ww
credits:
- Rod Hynes (Psiphon Inc)
references:
- web: https://groups.google.com/g/golang-announce/c/2AR1sKiM-Qs
- report: https://go.dev/issues/49932
- fix: https://go.dev/cl/368814/
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0035.yaml
|
id: GO-2020-0035
modules:
- module: github.com/yi-ge/unzip
versions:
- fixed: 1.0.3-0.20200308084313-2adbaa4891b9
vulnerable_at: 1.0.3-0.20190904092328-cc5a75ef5eca
packages:
- package: github.com/yi-ge/unzip
symbols:
- Unzip.Extract
summary: Path traversal in github.com/yi-ge/unzip
description: |-
Due to improper path sanitization, archives containing relative file paths can
cause files to be written (or overwritten) outside of the target directory.
published: 2021-04-14T20:04:52Z
ghsas:
- GHSA-f5c5-hmw9-v8hx
references:
- fix: https://github.com/yi-ge/unzip/pull/1
- fix: https://github.com/yi-ge/unzip/commit/2adbaa4891b9690853ef10216189189f5ad7dc73
- web: https://snyk.io/research/zip-slip-vulnerability
cve_metadata:
id: CVE-2020-36561
cwe: 'CWE 29: Path Traversal: "\..\filename"'
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0040.yaml
|
id: GO-2020-0040
modules:
- module: github.com/shiyanhui/dht
vulnerable_at: 0.0.0-20201219151056-5a20f3199263
packages:
- package: github.com/shiyanhui/dht
summary: Uncontrolled Resource Consumption in github.com/shiyanhui/dht
description: |-
Due to unchecked type assertions, maliciously crafted messages can cause panics,
which may be used as a denial of service vector.
published: 2021-04-14T20:04:52Z
ghsas:
- GHSA-p6fg-723f-hgpw
credits:
- '@hMihaiDavid'
references:
- web: https://github.com/shiyanhui/dht/issues/57
cve_metadata:
id: CVE-2020-36562
cwe: 'CWE-400: Uncontrolled Resource Consumption'
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2160.yaml
|
id: GO-2023-2160
modules:
- module: github.com/quic-go/quic-go
versions:
- introduced: 0.37.0
- fixed: 0.37.3
vulnerable_at: 0.37.2
packages:
- package: github.com/quic-go/quic-go
summary: Panic during QUIC handshake in github.com/quic-go/quic-go
description: |-
The QUIC handshake can cause a panic when processing a certain sequence of
frames. A malicious peer can deliberately trigger this panic.
cves:
- CVE-2023-46239
ghsas:
- GHSA-3q6m-v84f-6p9h
references:
- advisory: https://github.com/quic-go/quic-go/security/advisories/GHSA-3q6m-v84f-6p9h
- fix: https://github.com/quic-go/quic-go/commit/b6a4725b60f1fe04e8f1ddcc3114e290fcea1617
notes:
- No symbols, because the only vulnerable versions only build with unreleased versions of Go and the vulnerability affects all users of the package anyway.
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1002.yaml
|
id: GO-2022-1002
modules:
- module: github.com/pandatix/go-cvss
versions:
- introduced: 0.2.0
- fixed: 0.4.0
vulnerable_at: 0.3.0
packages:
- package: github.com/pandatix/go-cvss/20
symbols:
- ParseVector
summary: Panic in github.com/pandatix/go-cvss
description: ParseVector can panic when provided with invalid input.
cves:
- CVE-2022-39213
ghsas:
- GHSA-xhmf-mmv2-4hhx
references:
- fix: https://github.com/pandatix/go-cvss/commit/d9d478ff0c13b8b09ace030db9262f3c2fe031f4
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2682.yaml
|
id: GO-2024-2682
modules:
- module: github.com/quic-go/quic-go
versions:
- fixed: 0.42.0
vulnerable_at: 0.41.0
packages:
- package: github.com/quic-go/quic-go
symbols:
- framerI.QueueControlFrame
- connection.run
derived_symbols:
- Dial
- DialAddr
- DialAddrEarly
- DialEarly
- Listen
- ListenAddr
- ListenAddrEarly
- ListenEarly
- Transport.Dial
- Transport.DialEarly
- Transport.Listen
- Transport.ListenEarly
- connIDGenerator.Retire
- connIDGenerator.SetMaxActiveConnIDs
- connIDManager.Add
- connIDManager.Get
- connection.AcceptStream
- connection.AcceptUniStream
- connection.OpenStream
- connection.OpenStreamSync
- connection.OpenUniStream
- connection.OpenUniStreamSync
- framerI.AppendStreamFrames
- packetPacker.AppendPacket
- packetPacker.MaybePackProbePacket
- packetPacker.PackAckOnlyPacket
- packetPacker.PackApplicationClose
- packetPacker.PackCoalescedPacket
- packetPacker.PackConnectionClose
- packetPacker.PackMTUProbePacket
- receiveStream.CancelRead
- receiveStream.CloseRemote
- receiveStream.Read
- sendStream.CancelWrite
- streamsMap.AcceptStream
- streamsMap.AcceptUniStream
- streamsMap.DeleteStream
- streamsMap.HandleMaxStreamsFrame
- streamsMap.OpenStream
- streamsMap.OpenStreamSync
- streamsMap.OpenUniStream
- streamsMap.OpenUniStreamSync
- streamsMap.UpdateLimits
- windowUpdateQueue.QueueAll
summary: Denial of service via connection starvation in github.com/quic-go/quic-go
description: |-
An attacker can cause its peer to run out of memory by sending a large number of
NEW_CONNECTION_ID frames that retire old connection IDs. The receiver is
supposed to respond to each retirement frame with a RETIRE_CONNECTION_ID frame.
The attacker can prevent the receiver from sending out (the vast majority of)
these RETIRE_CONNECTION_ID frames by collapsing the peers congestion window (by
selectively acknowledging received packets) and by manipulating the peer's RTT
estimate.
cves:
- CVE-2024-22189
ghsas:
- GHSA-c33x-xqrf-c478
credits:
- marten-seemann
references:
- fix: https://github.com/quic-go/quic-go/commit/4a99b816ae3ab03ae5449d15aac45147c85ed47a
- web: https://seemann.io/posts/2024-03-19-exploiting-quics-connection-id-management
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0248.yaml
|
id: GO-2022-0248
modules:
- module: github.com/cloudflare/cfrpki
versions:
- fixed: 1.4.4
vulnerable_at: 1.4.2
packages:
- package: github.com/cloudflare/cfrpki/validator/pki
symbols:
- ExtractPathManifest
derived_symbols:
- SimpleManager.Explore
- SimpleManager.ExploreAdd
- Validator.AddManifest
- Validator.AddResource
summary: Directory traversal in manifest path extraction in github.com/cloudflare/cfrpki
description: |-
Manifest path extraction is vulnerable to directory traversal attacks.
The ExtractPathManifest function permits file paths containing relative
directory components (".."), permitting files to reference arbitrary locations
on the filesystem.
published: 2022-07-15T23:07:18Z
cves:
- CVE-2021-3907
ghsas:
- GHSA-cqh2-vc2f-q4fh
- GHSA-8459-6rc9-8vf8
related:
- GHSA-3jhm-87m6-x959
credits:
- Koen van Hove
references:
- fix: https://github.com/cloudflare/cfrpki/commit/eb9cc4db7b7b79e44f56dfaa959fccdfb2af8284
- fix: https://github.com/cloudflare/cfrpki/commit/a053a808feeb3115c76b6cc263ee55598ce6e8cd
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2441.yaml
|
id: GO-2024-2441
modules:
- module: github.com/karmada-io/karmada
versions:
- fixed: 1.8.0
vulnerable_at: 1.8.0-preview2
summary: The DES/3DES cipher was used as part of the TLS protocol by installation tools in github.com/karmada-io/karmada
ghsas:
- GHSA-7xg2-83f8-39mr
references:
- advisory: https://github.com/karmada-io/karmada/security/advisories/GHSA-7xg2-83f8-39mr
- fix: https://github.com/karmada-io/karmada/commit/98e655fc552b2987c3f2d2a061007889ce8be536
- fix: https://github.com/karmada-io/karmada/commit/c3c376605403e07ca0ed2dc39c9e0f3c38f8e29d
- report: https://github.com/karmada-io/karmada/issues/4191
- web: https://go.dev/issue/41476
source:
id: GHSA-7xg2-83f8-39mr
created: 2024-06-14T11:34:57.66072-04:00
review_status: UNREVIEWED
unexcluded: EFFECTIVELY_PRIVATE
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.