repo_id
stringclasses 927
values | file_path
stringlengths 99
214
| content
stringlengths 2
4.15M
|
|---|---|---|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0572.yaml
|
id: GO-2022-0572
modules:
- module: github.com/astaxie/beego
vulnerable_at: 1.12.3
packages:
- package: github.com/astaxie/beego
symbols:
- Tree.Match
derived_symbols:
- App.Run
- ControllerRegister.FindPolicy
- ControllerRegister.FindRouter
- ControllerRegister.ServeHTTP
- FilterRouter.ValidRouter
- InitBeegoBeforeTest
- Run
- RunWithMiddleWares
- TestBeegoInit
- adminApp.Run
- module: github.com/beego/beego
vulnerable_at: 1.12.11
packages:
- package: github.com/beego/beego
symbols:
- Tree.Match
derived_symbols:
- App.Run
- ControllerRegister.FindPolicy
- ControllerRegister.FindRouter
- ControllerRegister.ServeHTTP
- FilterRouter.ValidRouter
- InitBeegoBeforeTest
- Run
- RunWithMiddleWares
- TestBeegoInit
- adminApp.Run
- module: github.com/beego/beego/v2
versions:
- introduced: 2.0.0
- fixed: 2.0.3
vulnerable_at: 2.0.1
packages:
- package: github.com/beego/beego/v2/server/web
symbols:
- Tree.Match
derived_symbols:
- AddNamespace
- AddViewPath
- Any
- AutoPrefix
- AutoRouter
- BuildTemplate
- Compare
- CompareNot
- Controller.Abort
- Controller.CheckXSRFCookie
- Controller.CustomAbort
- Controller.Delete
- Controller.DestroySession
- Controller.Get
- Controller.GetBool
- Controller.GetFile
- Controller.GetFloat
- Controller.GetInt
- Controller.GetInt16
- Controller.GetInt32
- Controller.GetInt64
- Controller.GetInt8
- Controller.GetSecureCookie
- Controller.GetString
- Controller.GetStrings
- Controller.GetUint16
- Controller.GetUint32
- Controller.GetUint64
- Controller.GetUint8
- Controller.Head
- Controller.Input
- Controller.IsAjax
- Controller.Options
- Controller.ParseForm
- Controller.Patch
- Controller.Post
- Controller.Put
- Controller.Redirect
- Controller.Render
- Controller.RenderBytes
- Controller.RenderString
- Controller.SaveToFile
- Controller.ServeFormatted
- Controller.ServeJSON
- Controller.ServeJSONP
- Controller.ServeXML
- Controller.ServeYAML
- Controller.SessionRegenerateID
- Controller.SetData
- Controller.SetSecureCookie
- Controller.Trace
- Controller.URLFor
- Controller.XSRFFormHTML
- Controller.XSRFToken
- ControllerRegister.Add
- ControllerRegister.AddAuto
- ControllerRegister.AddAutoPrefix
- ControllerRegister.AddMethod
- ControllerRegister.Any
- ControllerRegister.Delete
- ControllerRegister.FindPolicy
- ControllerRegister.FindRouter
- ControllerRegister.Get
- ControllerRegister.GetContext
- ControllerRegister.Handler
- ControllerRegister.Head
- ControllerRegister.Include
- ControllerRegister.InsertFilter
- ControllerRegister.InsertFilterChain
- ControllerRegister.Options
- ControllerRegister.Patch
- ControllerRegister.Post
- ControllerRegister.Put
- ControllerRegister.ServeHTTP
- ControllerRegister.URLFor
- Date
- DateFormat
- DateParse
- Delete
- Exception
- ExecuteTemplate
- ExecuteViewPathTemplate
- FileSystem.Open
- FilterRouter.ValidRouter
- FlashData.Error
- FlashData.Notice
- FlashData.Set
- FlashData.Store
- FlashData.Success
- FlashData.Warning
- Get
- GetConfig
- HTML2str
- Handler
- Head
- Htmlquote
- Htmlunquote
- HttpServer.Any
- HttpServer.AutoPrefix
- HttpServer.AutoRouter
- HttpServer.Delete
- HttpServer.Get
- HttpServer.Handler
- HttpServer.Head
- HttpServer.Include
- HttpServer.InsertFilter
- HttpServer.InsertFilterChain
- HttpServer.LogAccess
- HttpServer.Options
- HttpServer.Patch
- HttpServer.Post
- HttpServer.PrintTree
- HttpServer.Put
- HttpServer.RESTRouter
- HttpServer.Router
- HttpServer.Run
- Include
- InitBeegoBeforeTest
- InsertFilter
- InsertFilterChain
- LoadAppConfig
- LogAccess
- MapGet
- Namespace.Any
- Namespace.AutoPrefix
- Namespace.AutoRouter
- Namespace.Cond
- Namespace.Delete
- Namespace.Filter
- Namespace.Get
- Namespace.Handler
- Namespace.Head
- Namespace.Include
- Namespace.Namespace
- Namespace.Options
- Namespace.Patch
- Namespace.Post
- Namespace.Put
- Namespace.Router
- NewControllerRegister
- NewControllerRegisterWithCfg
- NewHttpServerWithCfg
- NewHttpSever
- NewNamespace
- NotNil
- Options
- ParseForm
- Patch
- Policy
- Post
- PrintTree
- Put
- RESTRouter
- ReadFromRequest
- RenderForm
- Router
- Run
- RunWithMiddleWares
- TestBeegoInit
- Tree.AddRouter
- Tree.AddTree
- URLFor
- URLMap.GetMap
- URLMap.GetMapData
- Walk
- adminApp.Run
- adminController.AdminIndex
- adminController.Healthcheck
- adminController.ListConf
- adminController.ProfIndex
- adminController.PrometheusMetrics
- adminController.QpsIndex
- adminController.TaskStatus
- beegoAppConfig.Bool
- beegoAppConfig.DefaultBool
- beegoAppConfig.SaveConfigFile
- beegoAppConfig.Unmarshaler
summary: |-
Access control bypass via incorrect route lookup in github.com/beego/beego and
beego/v2
description: |-
An issue was discovered in the route lookup process in beego which attackers to
bypass access control.
published: 2022-08-22T17:56:17Z
cves:
- CVE-2021-30080
ghsas:
- GHSA-28r6-jm5h-mrgg
references:
- fix: https://github.com/beego/beego/pull/4459
- fix: https://github.com/beego/beego/commit/d5df5e470d0a8ed291930ae802fd7e6b95226519
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2185.yaml
|
id: GO-2023-2185
modules:
- module: std
versions:
- fixed: 1.20.11
- introduced: 1.21.0-0
- fixed: 1.21.4
vulnerable_at: 1.21.3
packages:
- package: path/filepath
goos:
- windows
symbols:
- Clean
- volumeNameLen
- join
derived_symbols:
- Abs
- Base
- Dir
- EvalSymlinks
- Glob
- IsLocal
- Join
- Rel
- Split
- VolumeName
- Walk
- WalkDir
- package: internal/safefilepath
goos:
- windows
symbols:
- fromFS
derived_symbols:
- FromFS
- module: std
versions:
- introduced: 1.20.11
- fixed: 1.20.12
- introduced: 1.21.4
- fixed: 1.21.5
vulnerable_at: 1.21.4
packages:
- package: path/filepath
goos:
- windows
symbols:
- volumeNameLen
derived_symbols:
- Abs
- Base
- Clean
- Dir
- EvalSymlinks
- Glob
- IsLocal
- Join
- Rel
- Split
- VolumeName
- Walk
- WalkDir
summary: Insecure parsing of Windows paths with a \??\ prefix in path/filepath
description: |-
The filepath package does not recognize paths with a \??\ prefix as special.
On Windows, a path beginning with \??\ is a Root Local Device path equivalent to
a path beginning with \\?\. Paths with a \??\ prefix may be used to access
arbitrary locations on the system. For example, the path \??\c:\x is equivalent
to the more common path c:\x.
Before fix, Clean could convert a rooted path such as \a\..\??\b into the root
local device path \??\b. Clean will now convert this to .\??\b.
Similarly, Join(\, ??, b) could convert a seemingly innocent sequence of path
elements into the root local device path \??\b. Join will now convert this to
\.\??\b.
In addition, with fix, IsAbs now correctly reports paths beginning with \??\ as
absolute, and VolumeName correctly reports the \??\ prefix as a volume name.
UPDATE: Go 1.20.11 and Go 1.21.4 inadvertently changed the definition of the
volume name in Windows paths starting with \?, resulting in
filepath.Clean(\?\c:) returning \?\c: rather than \?\c:\ (among other effects).
The previous behavior has been restored.
references:
- report: https://go.dev/issue/63713
- fix: https://go.dev/cl/540277
- web: https://groups.google.com/g/golang-announce/c/4tU8LZfBFkY
- report: https://go.dev/issue/64028
- fix: https://go.dev/cl/541175
- web: https://groups.google.com/g/golang-dev/c/6ypN5EjibjM/m/KmLVYH_uAgAJ
cve_metadata:
id: CVE-2023-45283
cwe: 'CWE-41: Improper Resolution of Path Equivalence'
references:
- http://www.openwall.com/lists/oss-security/2023/12/05/2
- https://security.netapp.com/advisory/ntap-20231214-0008/
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0962.yaml
|
id: GO-2022-0962
modules:
- module: helm.sh/helm/v3
versions:
- fixed: 3.9.4
vulnerable_at: 3.9.3
packages:
- package: helm.sh/helm/v3/pkg/strvals
symbols:
- setIndex
derived_symbols:
- Parse
- ParseFile
- ParseInto
- ParseIntoFile
- ParseIntoString
- ParseString
- ToYAML
summary: Denial of service through string value parsing in helm.sh/helm/v3
description: |-
Applications that use the strvals package in the Helm SDK to parse user supplied
input can suffer a Denial of Service when that input causes a panic that cannot
be recovered from.
The strvals package contains a parser that turns strings into Go structures. For
example, the Helm client has command line flags like --set, --set-string, and
others that enable the user to pass in strings that are merged into the values.
The strvals package converts these strings into structures Go can work with.
Some string inputs can cause array data structures to be created causing an out
of memory panic.
The Helm Client will panic with input to --set, --set-string, and other value
setting flags that causes an out of memory panic. Helm is not a long running
service so the panic will not affect future uses of the Helm client.
published: 2022-09-02T15:19:52Z
cves:
- CVE-2022-36055
ghsas:
- GHSA-7hfp-qfw3-5jxh
related:
- CVE-2022-36049
- GHSA-p2g7-xwvr-rrw3
credits:
- Ada Logics in a fuzzing audit sponsored by CNCF
references:
- advisory: https://github.com/helm/helm/security/advisories/GHSA-7hfp-qfw3-5jxh
- fix: https://github.com/helm/helm/commit/10466e3e179cc8cad4b0bb451108d3c442c69fbc
- web: https://github.com/helm/helm/releases/tag/v3.9.4
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0050.yaml
|
id: GO-2020-0050
modules:
- module: github.com/russellhaering/goxmldsig
versions:
- fixed: 1.1.0
vulnerable_at: 0.0.0-20200902171629-2e1fbc2c5593
packages:
- package: github.com/russellhaering/goxmldsig
symbols:
- ValidationContext.findSignature
derived_symbols:
- ValidationContext.Validate
summary: XML digital signature validation bypass in github.com/russellhaering/goxmldsig
description: |-
Due to the behavior of encoding/xml, a crafted XML document may cause XML
Digital Signature validation to be entirely bypassed, causing an unsigned
document to appear signed.
published: 2021-04-14T20:04:52Z
cves:
- CVE-2020-15216
ghsas:
- GHSA-q547-gmf8-8jr7
related:
- CVE-2020-26290
- CVE-2020-27847
- GHSA-2x32-jm95-2cpx
- GHSA-m9hp-7r99-94h5
credits:
- '@jupenur'
references:
- fix: https://github.com/russellhaering/goxmldsig/commit/f6188febf0c29d7ffe26a0436212b19cb9615e64
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2043.yaml
|
id: GO-2023-2043
modules:
- module: std
versions:
- fixed: 1.20.8
- introduced: 1.21.0-0
- fixed: 1.21.1
vulnerable_at: 1.21.0
packages:
- package: html/template
symbols:
- escaper.escapeText
- tSpecialTagEnd
- indexTagEnd
derived_symbols:
- Template.Execute
- Template.ExecuteTemplate
summary: Improper handling of special tags within script contexts in html/template
description: |-
The html/template package does not apply the proper rules for handling
occurrences of "<script", "<!--", and "</script" within JS literals in <script>
contexts. This may cause the template parser to improperly consider script
contexts to be terminated early, causing actions to be improperly escaped. This
could be leveraged to perform an XSS attack.
credits:
- Takeshi Kaneko (GMO Cybersecurity by Ierae, Inc.)
references:
- report: https://go.dev/issue/62197
- fix: https://go.dev/cl/526157
- web: https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ
cve_metadata:
id: CVE-2023-39319
cwe: 'CWE-79: Improper Neutralization of Input During Web Page Generation (''Cross-site Scripting'')'
references:
- https://security.netapp.com/advisory/ntap-20231020-0009/
- https://security.gentoo.org/glsa/202311-09
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0105.yaml
|
id: GO-2021-0105
modules:
- module: github.com/ethereum/go-ethereum
versions:
- introduced: 1.9.4
- fixed: 1.9.20
vulnerable_at: 1.9.20-0.20200821114314-b68929caee77
packages:
- package: github.com/ethereum/go-ethereum/core/state
symbols:
- StateDB.createObject
derived_symbols:
- StateDB.AddBalance
- StateDB.CreateAccount
- StateDB.GetOrNewStateObject
- StateDB.SetBalance
- StateDB.SetCode
- StateDB.SetNonce
- StateDB.SetState
- StateDB.SetStorage
- StateDB.SubBalance
summary: Consensus flaw in github.com/ethereum/go-ethereum
description: |-
Due to an incorrect state calculation, a specific set of transactions could
cause a consensus disagreement, causing users of this package to reject a
canonical chain.
published: 2021-07-28T18:08:05Z
cves:
- CVE-2020-26265
ghsas:
- GHSA-xw37-57qp-9mm4
credits:
- John Youngseok Yang (Software Platform Lab)
references:
- fix: https://github.com/ethereum/go-ethereum/pull/21080
- fix: https://github.com/ethereum/go-ethereum/commit/87c0ba92136a75db0ab2aba1046d4a9860375d6a
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2875.yaml
|
id: GO-2024-2875
modules:
- module: github.com/requarks/wiki
unsupported_versions:
- cve_version_range: affected at <= 2.5.302
vulnerable_at: 2.5.303+incompatible
summary: Wiki.js Stored XSS through Client Side Template Injection in github.com/requarks/wiki
cves:
- CVE-2024-34710
references:
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-34710
- fix: https://github.com/requarks/wiki/commit/1238d614e1599fefadd4614ee4b5797a087f50ac
- web: https://github.com/requarks/wiki/security/advisories/GHSA-xjcj-p2qv-q3rf
source:
id: CVE-2024-34710
created: 2024-06-04T15:25:57.702499-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2932.yaml
|
id: GO-2024-2932
modules:
- module: github.com/rancher/rancher
non_go_versions:
- introduced: 2.7.0
- fixed: 2.7.14
- introduced: 2.8.0
- fixed: 2.8.5
vulnerable_at: 1.6.30
summary: Rancher's RKE1 Encryption Config kept in plain-text within cluster AppliedSpec in github.com/rancher/rancher
cves:
- CVE-2024-22032
ghsas:
- GHSA-q6c7-56cq-g2wm
references:
- advisory: https://github.com/rancher/rancher/security/advisories/GHSA-q6c7-56cq-g2wm
source:
id: GHSA-q6c7-56cq-g2wm
created: 2024-06-27T15:54:05.57143-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2523.yaml
|
id: GO-2024-2523
modules:
- module: github.com/grafana/grafana
non_go_versions:
- fixed: 6.7.2
vulnerable_at: 5.4.5+incompatible
summary: Grafana stored XSS in github.com/grafana/grafana
cves:
- CVE-2020-11110
ghsas:
- GHSA-xr3x-62qw-vc4w
unknown_aliases:
- BIT-grafana-2020-11110
references:
- advisory: https://github.com/advisories/GHSA-xr3x-62qw-vc4w
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2020-11110
- fix: https://github.com/grafana/grafana/commit/fb114a75241aaef4c08581b42509c750738b768a
- fix: https://github.com/grafana/grafana/pull/23254
- web: https://github.com/grafana/grafana/blob/master/CHANGELOG.md
- web: https://security.netapp.com/advisory/ntap-20200810-0002
source:
id: GHSA-xr3x-62qw-vc4w
created: 2024-06-14T11:40:12.676807-04:00
review_status: UNREVIEWED
unexcluded: EFFECTIVELY_PRIVATE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2718.yaml
|
id: GO-2024-2718
modules:
- module: github.com/sigstore/cosign
vulnerable_at: 1.13.6
- module: github.com/sigstore/cosign/v2
versions:
- fixed: 2.2.4
unsupported_versions:
- last_affected: 2.2.3
vulnerable_at: 2.2.3
summary: Cosign malicious attachments can cause system-wide denial of service in github.com/sigstore/cosign
cves:
- CVE-2024-29902
ghsas:
- GHSA-88jx-383q-w4qc
unknown_aliases:
- BIT-cosign-2024-29902
references:
- advisory: https://github.com/sigstore/cosign/security/advisories/GHSA-88jx-383q-w4qc
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-29902
- fix: https://github.com/sigstore/cosign/commit/629f5f8fa672973503edde75f84dcd984637629e
- web: https://github.com/google/go-containerregistry/blob/a0658aa1d0cc7a7f1bcc4a3af9155335b6943f40/pkg/v1/remote/layer.go#L36-L40
- web: https://github.com/sigstore/cosign/blob/9bc3ee309bf35d2f6e17f5d23f231a3d8bf580bc/pkg/oci/remote/remote.go#L228-L239
- web: https://github.com/sigstore/cosign/releases/tag/v2.2.4
source:
id: GHSA-88jx-383q-w4qc
created: 2024-06-26T14:00:44.029803-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0326.yaml
|
id: GO-2022-0326
modules:
- module: github.com/sigstore/cosign
versions:
- fixed: 1.5.2
vulnerable_at: 1.5.1
packages:
- package: github.com/sigstore/cosign/pkg/cosign
symbols:
- VerifyBundle
derived_symbols:
- VerifyImageAttestations
- VerifyImageSignature
- VerifyImageSignatures
- VerifyLocalImageAttestations
- VerifyLocalImageSignatures
- package: github.com/sigstore/cosign/pkg/sget
symbols:
- SecureGet.Do
- package: github.com/sigstore/cosign/cmd/cosign/cli/verify
symbols:
- VerifyAttestationCommand.Exec
- VerifyCommand.Exec
- PrintVerificationHeader
summary: Improper certificate validation in github.com/sigstore/cosign
description: |-
Cosign can be manipulated to claim that an entry for a signature in the OCI
registry exists in the Rekor transparency log even if it does not. This requires
the attacker to have pull and push permissions for the signature in OCI. This
can happen with both standard signing with a keypair and "keyless signing" with
Fulcio certificate authority.
cves:
- CVE-2022-23649
ghsas:
- GHSA-ccxc-vr6p-4858
references:
- fix: https://github.com/sigstore/cosign/commit/96d410a6580e4e81d24d112a0855c70ca3fb5b49
- web: https://github.com/sigstore/cosign/releases/tag/v1.5.2
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2581.yaml
|
id: GO-2024-2581
modules:
- module: github.com/treeverse/lakefs
versions:
- introduced: 0.90.0
- fixed: 1.12.1
vulnerable_at: 1.12.0
summary: |-
User with ci:ReadAction permissions and write permissions to one path in a
repository may copy objects from any path in the repository in github.com/treeverse/lakefs
ghsas:
- GHSA-fvv5-h29g-f6w5
references:
- advisory: https://github.com/treeverse/lakeFS/security/advisories/GHSA-fvv5-h29g-f6w5
- web: https://github.com/treeverse/lakeFS/commit/56556ee5406fc5425b9302cd08a8d412635fdcd7
source:
id: GHSA-fvv5-h29g-f6w5
created: 2024-05-17T16:15:01.346474-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2481.yaml
|
id: GO-2024-2481
modules:
- module: github.com/0xJacky/Nginx-UI
non_go_versions:
- fixed: 2.0.0-beta.12
vulnerable_at: 1.9.9
summary: |-
Nginx-UI vulnerable to arbitrary file write through the Import Certificate
feature in github.com/0xJacky/Nginx-UI
cves:
- CVE-2024-23827
ghsas:
- GHSA-xvq9-4vpv-227m
references:
- advisory: https://github.com/0xJacky/nginx-ui/security/advisories/GHSA-xvq9-4vpv-227m
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-23827
- web: https://github.com/0xJacky/nginx-ui/blob/f20d97a9fdc2a83809498b35b6abc0239ec7fdda/api/certificate/certificate.go#L72
- web: https://github.com/0xJacky/nginx-ui/blob/f20d97a9fdc2a83809498b35b6abc0239ec7fdda/internal/cert/write_file.go#L15
- web: https://github.com/0xJacky/nginx-ui/commit/8581bdd3c6f49ab345b773517ba9173fa7fc6199
source:
id: GHSA-xvq9-4vpv-227m
created: 2024-06-14T11:37:04.445587-04:00
review_status: UNREVIEWED
unexcluded: NOT_IMPORTABLE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2643.yaml
|
id: GO-2024-2643
modules:
- module: github.com/argoproj/argo-cd
versions:
- introduced: 1.2.0-rc1
vulnerable_at: 1.8.6
packages:
- package: github.com/argoproj/argo-cd/server/application
symbols:
- Server.Create
skip_fix: Cannot handle replace directives within the go.mod file.
- module: github.com/argoproj/argo-cd/v2
versions:
- introduced: 2.0.0
- fixed: 2.8.12
- introduced: 2.9.0
- fixed: 2.9.8
- introduced: 2.10.0
- fixed: 2.10.3
vulnerable_at: 2.10.2
packages:
- package: github.com/argoproj/argo-cd/v2/server/application
symbols:
- Server.Create
summary: Bypass manifest during application creation in github.com/argoproj/argo-cd/v2
description: |-
An improper validation bug allows users who have create privileges to sync a
local manifest during application creation. This allows for bypassing the
restriction that the manifests come from some approved git/Helm/OCI source.
cves:
- CVE-2023-50726
ghsas:
- GHSA-g623-jcgg-mhmm
unknown_aliases:
- BIT-argo-cd-2023-50726
credits:
- '@crenshaw-dev'
references:
- fix: https://github.com/argoproj/argo-cd/commit/3b8f673f06c2d228e01cbc830e5cb57cef008978
- web: https://argo-cd.readthedocs.io/en/latest/operator-manual/rbac
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0097.yaml
|
id: GO-2021-0097
modules:
- module: github.com/dhowden/tag
versions:
- fixed: 0.0.0-20201120070457-d52dcb253c63
vulnerable_at: 0.0.0-20201119192538-6b18201aa5c5
packages:
- package: github.com/dhowden/tag
symbols:
- readPICFrame
- readAPICFrame
- readTextWithDescrFrame
- metadataMP4.readAtomData
derived_symbols:
- ReadAtoms
- ReadDSFTags
- ReadFrom
- ReadID3v2Tags
summary: Panic due to out-of-bounds read in github.com/dhowden/tag
description: |-
Due to improper bounds checking, a number of methods can trigger a panic due to
attempted out-of-bounds reads. If the package is used to parse user supplied
input, this may be used as a vector for a denial of service attack.
published: 2021-04-14T20:04:52Z
cves:
- CVE-2020-29242
- CVE-2020-29243
- CVE-2020-29244
- CVE-2020-29245
ghsas:
- GHSA-27mh-3343-6hg5
- GHSA-9wm7-rc47-g56m
- GHSA-9xm8-8qvc-vw3p
- GHSA-wg79-2cgp-qrjm
credits:
- '@Jayl1n'
references:
- fix: https://github.com/dhowden/tag/commit/d52dcb253c63a153632bfee5f269dd411dcd8e96
- web: https://github.com/dhowden/tag/commit/a92213460e4838490ce3066ef11dc823cdc1740e
- web: https://github.com/dhowden/tag/commit/4b595ed4fac79f467594aa92f8953f90f817116e
- web: https://github.com/dhowden/tag/commit/6b18201aa5c5535511802ddfb4e4117686b4866d
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2729.yaml
|
id: GO-2024-2729
modules:
- module: github.com/openfga/openfga
versions:
- introduced: 1.5.0
- fixed: 1.5.3
vulnerable_at: 1.5.2
summary: OpenFGA Authorization Bypass in github.com/openfga/openfga
cves:
- CVE-2024-31452
ghsas:
- GHSA-8cph-m685-6v6r
references:
- advisory: https://github.com/openfga/openfga/security/advisories/GHSA-8cph-m685-6v6r
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-31452
- fix: https://github.com/openfga/openfga/commit/b6a6d99b2bdbf8c3781503989576076289f48ed2
source:
id: GHSA-8cph-m685-6v6r
created: 2024-05-17T16:13:06.3276-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2721.yaml
|
id: GO-2024-2721
modules:
- module: github.com/tiagorlampert/CHAOS
vulnerable_at: 0.0.0-20221223015212-7d5b20ad7e58
packages:
- package: github.com/tiagorlampert/CHAOS/presentation/http
symbols:
- httpController.sendCommandHandler
derived_symbols:
- NewServer
summary: Cross site scripting in github.com/tiagorlampert/CHAOS
description: |-
A malicious actor may be able to extract a JWT token via malicious "/command"
request. This is a form of cross site scripting (XSS).
cves:
- CVE-2024-31839
ghsas:
- GHSA-c5rv-hjjc-jv7m
references:
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-31839
- web: https://blog.chebuya.com/posts/remote-code-execution-on-chaos-rat-via-spoofed-agents
source:
id: GHSA-c5rv-hjjc-jv7m
created: 2024-05-08T22:48:36.09641-07:00
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2970.yaml
|
id: GO-2024-2970
modules:
- module: github.com/gogs/gogs
unsupported_versions:
- last_affected: 0.13.0
vulnerable_at: 0.13.0
summary: Gogs allows deletion of internal files in github.com/gogs/gogs
cves:
- CVE-2024-39931
ghsas:
- GHSA-2vgj-3pvg-xh4w
references:
- advisory: https://github.com/advisories/GHSA-2vgj-3pvg-xh4w
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-39931
- web: https://github.com/gogs/gogs/releases
- web: https://www.sonarsource.com/blog/securing-developer-tools-unpatched-code-vulnerabilities-in-gogs-1
source:
id: GHSA-2vgj-3pvg-xh4w
created: 2024-07-08T13:24:08.798271-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2795.yaml
|
id: GO-2024-2795
modules:
- module: github.com/mattermost/mattermost-server
versions:
- introduced: 8.1.0+incompatible
- fixed: 8.1.12+incompatible
- introduced: 9.4.0+incompatible
- fixed: 9.4.5+incompatible
- introduced: 9.5.0+incompatible
- fixed: 9.5.3+incompatible
- introduced: 9.6.0-rc1+incompatible
- fixed: 9.6.1+incompatible
vulnerable_at: 9.6.1-rc3+incompatible
summary: Mattermost crashes web clients via a malformed custom status in github.com/mattermost/mattermost-server
cves:
- CVE-2024-4182
ghsas:
- GHSA-8f99-g2pj-x8w3
references:
- advisory: https://github.com/advisories/GHSA-8f99-g2pj-x8w3
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-4182
- web: https://github.com/mattermost/mattermost/commit/41333a0babf565453d89287549bec1e546e75ce7
- web: https://github.com/mattermost/mattermost/commit/6cbab0f7ece104681f73dd12c75d9f22d567125e
- web: https://github.com/mattermost/mattermost/commit/a99dadd80c57d376185ca06f8f70919a6f135bc6
- web: https://github.com/mattermost/mattermost/commit/f84f8ed65f6a5faba974426424b684635455a527
- web: https://mattermost.com/security-updates
source:
id: GHSA-8f99-g2pj-x8w3
created: 2024-06-04T15:27:08.837695-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2575.yaml
|
id: GO-2024-2575
modules:
- module: helm.sh/helm/v3
versions:
- fixed: 3.14.2
vulnerable_at: 3.14.1
packages:
- package: helm.sh/helm/v3/pkg/plugin
symbols:
- validatePluginData
derived_symbols:
- FindPlugins
- LoadAll
- LoadDir
- package: helm.sh/helm/v3/pkg/repo
symbols:
- loadIndex
derived_symbols:
- ChartRepository.DownloadIndexFile
- ChartRepository.Load
- FindChartInAuthAndTLSAndPassRepoURL
- FindChartInAuthAndTLSRepoURL
- FindChartInAuthRepoURL
- FindChartInRepoURL
- LoadIndexFile
summary: Helm's Missing YAML Content Leads To Panic in helm.sh/helm/v3
cves:
- CVE-2024-26147
ghsas:
- GHSA-r53h-jv2g-vpx6
unknown_aliases:
- BIT-helm-2024-26147
credits:
- Jakub Ciolek at AlphaSense
references:
- advisory: https://github.com/helm/helm/security/advisories/GHSA-r53h-jv2g-vpx6
- fix: https://github.com/helm/helm/commit/bb4cc9125503a923afb7988f3eb478722a8580af
source:
id: GHSA-r53h-jv2g-vpx6
created: 2024-07-01T14:57:47.79335-04:00
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2611.yaml
|
id: GO-2024-2611
modules:
- module: google.golang.org/protobuf
versions:
- fixed: 1.33.0
vulnerable_at: 1.32.0
packages:
- package: google.golang.org/protobuf/encoding/protojson
symbols:
- UnmarshalOptions.unmarshal
derived_symbols:
- Unmarshal
- UnmarshalOptions.Unmarshal
- package: google.golang.org/protobuf/internal/encoding/json
symbols:
- Decoder.Read
derived_symbols:
- Decoder.Peek
summary: Infinite loop in JSON unmarshaling in google.golang.org/protobuf
description: |-
The protojson.Unmarshal function can enter an infinite loop when unmarshaling
certain forms of invalid JSON. This condition can occur when unmarshaling into a
message which contains a google.protobuf.Any value, or when the
UnmarshalOptions.DiscardUnknown option is set.
ghsas:
- GHSA-8r3f-844c-mc37
references:
- fix: https://go.dev/cl/569356
cve_metadata:
id: CVE-2024-24786
cwe: 'CWE-1286: Improper Validation of Syntactic Correctness of Input'
references:
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDMBHAVSDU2FBDZ45U3A2VLSM35OJ2HU/
- http://www.openwall.com/lists/oss-security/2024/03/08/4
- https://security.netapp.com/advisory/ntap-20240517-0002/
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1052.yaml
|
id: GO-2022-1052
modules:
- module: github.com/tendermint/tendermint
versions:
- introduced: 0.34.0
- fixed: 0.34.3
vulnerable_at: 0.34.2
packages:
- package: github.com/tendermint/tendermint/evidence
symbols:
- Pool.Update
- Pool.CheckEvidence
- package: github.com/tendermint/tendermint/consensus
symbols:
- State.tryAddVote
derived_symbols:
- BaseWAL.OnStart
- Handshaker.Handshake
- Handshaker.ReplayBlocks
- Reactor.OnStart
- Reactor.SwitchToConsensus
- RunReplayFile
- State.OnStart
- State.OpenWAL
- State.ReplayFile
- WALGenerateNBlocks
- WALWithNBlocks
summary: |-
Uncontrolled resource consumption during consensus in
github.com/tendermint/tendermint
description: |-
Mishandling of timestamps during consensus process can cause a denial of
service.
While reaching consensus, different tendermint nodes can observe a different
timestamp for a consensus evidence. This mismatch can cause the evidence to be
invalid, upon which the node producing the evidence will be asked to generate a
new evidence. This new evidence will be the same, which means it will again be
rejected by other nodes involved in the consensus. This loop will continue until
the peer nodes decide to disconnect from the node producing the evidence.
cves:
- CVE-2021-21271
ghsas:
- GHSA-p658-8693-mhvg
credits:
- cmwaters (Github)
references:
- advisory: https://github.com/tendermint/tendermint/security/advisories/GHSA-p658-8693-mhvg
- article: https://github.com/tendermint/tendermint/blob/v0.34.3/CHANGELOG.md#v0.34.3
- fix: https://github.com/tendermint/tendermint/commit/a2a6852ab99e4a0f9e79f0ea8c1726e262e25c76
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2912.yaml
|
id: GO-2024-2912
modules:
- module: github.com/docker/cli
versions:
- fixed: 20.10.9+incompatible
vulnerable_at: 20.10.8+incompatible
packages:
- package: github.com/docker/cli/cli/command
symbols:
- RegistryAuthenticationPrivilegedFunc
- GetDefaultAuthConfig
skip_fix: fix error due to incompatible version
- package: github.com/docker/cli/cli/command/registry
symbols:
- runLogin
skip_fix: fix error due to incompatible version
summary: Docker CLI leaks private registry credentials to registry-1.docker.io in github.com/docker/cli
cves:
- CVE-2021-41092
ghsas:
- GHSA-99pg-grm5-qq3v
unknown_aliases:
- CGA-f849-gq83-8362
references:
- advisory: https://github.com/docker/cli/security/advisories/GHSA-99pg-grm5-qq3v
- fix: https://github.com/docker/cli/commit/893e52cf4ba4b048d72e99748e0f86b2767c6c6b
source:
id: GHSA-99pg-grm5-qq3v
created: 2024-07-01T16:01:00.847043-04:00
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0347.yaml
|
id: GO-2021-0347
modules:
- module: std
versions:
- fixed: 1.16.15
- introduced: 1.17.0-0
- fixed: 1.17.8
vulnerable_at: 1.17.7
packages:
- package: regexp
symbols:
- regexp.Compile
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
summary: Stack exhaustion when compiling deeply nested expressions in regexp
description: |-
On 64-bit platforms, an extremely deeply nested expression can cause
regexp.Compile to cause goroutine stack exhaustion, forcing the program to exit.
Note this applies to very large expressions, on the order of 2MB.
published: 2022-05-23T22:15:47Z
cves:
- CVE-2022-24921
credits:
- Juho Nurminen
references:
- fix: https://go.dev/cl/384616
- fix: https://go.googlesource.com/go/+/452f24ae94f38afa3704d4361d91d51218405c0a
- report: https://go.dev/issue/51112
- web: https://groups.google.com/g/golang-announce/c/RP1hfrBYVuk
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0761.yaml
|
id: GO-2022-0761
modules:
- module: std
versions:
- fixed: 1.6.3
vulnerable_at: 1.6.2
packages:
- package: net/http
symbols:
- Handler.ServeHTTP
- package: net/http/cgi
symbols:
- ProxyFromEnvironment
summary: Improper input validation in net/http and net/http/cgi
description: |-
An input validation flaw in the CGI components allows the HTTP_PROXY environment
variable to be set by the incoming Proxy header, which changes where Go by
default proxies all outbound HTTP requests.
This environment variable is also used to set the outgoing proxy, enabling an
attacker to insert a proxy into outgoing requests of a CGI program.
Read more about "httpoxy" here: https://httpoxy.org.
published: 2022-08-09T17:05:15Z
cves:
- CVE-2016-5386
credits:
- Dominic Scheirlinck
references:
- fix: https://go.dev/cl/25010
- fix: https://go.googlesource.com/go/+/b97df54c31d6c4cc2a28a3c83725366d52329223
- report: https://go.dev/issue/16405
- web: https://groups.google.com/g/golang-announce/c/7jZDOQ8f8tM/m/eWRWHnc8CgAJ
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2969.yaml
|
id: GO-2024-2969
modules:
- module: github.com/gogs/gogs
vulnerable_at: 0.13.0
summary: CVE-2024-39930 in github.com/gogs/gogs
cves:
- CVE-2024-39930
references:
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-39930
- web: https://github.com/gogs/gogs/releases
- web: https://www.sonarsource.com/blog/securing-developer-tools-unpatched-code-vulnerabilities-in-gogs-1/
source:
id: CVE-2024-39930
created: 2024-07-08T13:24:12.021689-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0629.yaml
|
id: GO-2022-0629
modules:
- module: sigs.k8s.io/secrets-store-csi-driver
versions:
- introduced: 0.0.15
- fixed: 0.0.17
vulnerable_at: 0.0.16
packages:
- package: sigs.k8s.io/secrets-store-csi-driver/controllers
symbols:
- SecretProviderClassPodStatusReconciler.Reconcile
- package: sigs.k8s.io/secrets-store-csi-driver/pkg/rotation
symbols:
- Reconciler.reconcile
derived_symbols:
- Reconciler.Run
- package: sigs.k8s.io/secrets-store-csi-driver/pkg/secrets-store
symbols:
- nodeServer.NodeUnpublishVolume
derived_symbols:
- SecretsStore.Run
summary: Directory traversal in sigs.k8s.io/secrets-store-csi-driver
description: |-
Modifying pod status allows host directory traversal.
Kubernetes Secrets Store CSI Driver allows an attacker who can modify a
SecretProviderClassPodStatus/Status resource the ability to write content to the
host filesystem and sync file contents to Kubernetes Secrets. This includes
paths under var/lib/kubelet/pods that contain other Kubernetes Secrets.
published: 2022-02-15T01:57:18Z
cves:
- CVE-2020-8568
ghsas:
- GHSA-5cgx-vhfp-6cf9
credits:
- tam7t (Tommy Murphy)
references:
- fix: https://github.com/kubernetes-sigs/secrets-store-csi-driver/pull/371
- fix: https://github.com/kubernetes-sigs/secrets-store-csi-driver/commit/c2cbb19e2eef16638fa0523383788a4bc22231fd
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0036.yaml
|
id: GO-2020-0036
modules:
- module: gopkg.in/yaml.v2
versions:
- fixed: 2.2.8
vulnerable_at: 2.2.7
packages:
- package: gopkg.in/yaml.v2
symbols:
- yaml_parser_fetch_more_tokens
- yaml_parser_save_simple_key
- yaml_parser_remove_simple_key
- yaml_parser_decrease_flow_level
- yaml_parser_fetch_stream_start
- yaml_parser_fetch_value
derived_symbols:
- Decoder.Decode
- Unmarshal
- UnmarshalStrict
- module: github.com/go-yaml/yaml
vulnerable_at: 2.1.0+incompatible
packages:
- package: github.com/go-yaml/yaml
symbols:
- yaml_parser_fetch_more_tokens
- yaml_parser_save_simple_key
- yaml_parser_remove_simple_key
- yaml_parser_decrease_flow_level
- yaml_parser_fetch_stream_start
- yaml_parser_fetch_value
derived_symbols:
- Decoder.Decode
- Unmarshal
- UnmarshalStrict
summary: Excessive resource consumption in YAML parsing in gopkg.in/yaml.v2
description: |-
Due to unbounded aliasing, a crafted YAML file can cause consumption of
significant system resources. If parsing user supplied input, this may be used
as a denial of service vector.
published: 2021-04-14T20:04:52Z
cves:
- CVE-2019-11254
ghsas:
- GHSA-wxc4-f4m6-wwqv
references:
- fix: https://github.com/go-yaml/yaml/pull/555
- fix: https://github.com/go-yaml/yaml/commit/53403b58ad1b561927d19068c655246f2db79d48
- web: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18496
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0172.yaml
|
id: GO-2021-0172
modules:
- module: std
versions:
- fixed: 1.6.4
- introduced: 1.7.0-0
- fixed: 1.7.4
vulnerable_at: 1.7.3
packages:
- package: mime/multipart
symbols:
- Reader.readForm
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
summary: Denial of service when parsing large forms in mime/multipart
description: |-
When parsing large multipart/form-data, an attacker can cause a HTTP server to
open a large number of file descriptors. This may be used as a denial-of-service
vector.
published: 2022-02-15T23:56:14Z
cves:
- CVE-2017-1000098
credits:
- Simon Rawet
references:
- fix: https://go.dev/cl/30410
- fix: https://go.googlesource.com/go/+/7478ea5dba7ed02ddffd91c1d17ec8141f7cf184
- report: https://go.dev/issue/16296
- web: https://groups.google.com/g/golang-dev/c/4NdLzS8sls8/m/uIz8QlnIBQAJ
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1534.yaml
|
id: GO-2023-1534
modules:
- module: github.com/pion/dtls/v2
versions:
- fixed: 2.2.4
vulnerable_at: 2.2.3
packages:
- package: github.com/pion/dtls/v2/pkg/protocol/handshake
symbols:
- MessageHelloVerifyRequest.Unmarshal
derived_symbols:
- Handshake.Unmarshal
summary: Panic during unmarshal of Hello Verify Request in github.com/pion/dtls/v2
description: |-
Unmarshalling a Hello Verify request can panic, which could allow a denial of
service.
ghsas:
- GHSA-4xgv-j62q-h3rj
references:
- fix: https://github.com/pion/dtls/commit/a50d26c5e4eed2ca87509494ffef2d2ebd22b1eb
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2453.yaml
|
id: GO-2024-2453
modules:
- module: github.com/cloudflare/circl
versions:
- fixed: 1.3.7
vulnerable_at: 1.3.6
packages:
- package: github.com/cloudflare/circl/pke/kyber/internal/common
symbols:
- Poly.CompressTo
summary: Timing side channel in github.com/cloudflare/circl
ghsas:
- GHSA-9763-4f94-gfch
references:
- advisory: https://github.com/cloudflare/circl/security/advisories/GHSA-9763-4f94-gfch
- fix: https://github.com/cloudflare/circl/commit/75ef91e8a2f438e6ce2b6e620d236add8be1887d
- web: https://kyberslash.cr.yp.to/
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2974.yaml
|
id: GO-2024-2974
modules:
- module: github.com/evmos/evmos
non_go_versions:
- fixed: 19.0.0
vulnerable_at: 1.1.3
summary: Evmos vulnerable to exploit of smart contract account and vesting in github.com/evmos/evmos
cves:
- CVE-2024-39696
references:
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-39696
- fix: https://github.com/evmos/evmos/commit/0a620e176617a835ac697eea494afea09185dfaf
- web: https://github.com/evmos/evmos/security/advisories/GHSA-q6hg-6m9x-5g9c
source:
id: CVE-2024-39696
created: 2024-07-08T13:23:28.697883-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2776.yaml
|
id: GO-2024-2776
modules:
- module: github.com/apache/trafficcontrol
versions:
- introduced: 5.1.0+incompatible
- fixed: 5.1.4+incompatible
- introduced: 6.0.0+incompatible
- fixed: 6.0.1+incompatible
vulnerable_at: 6.0.0+incompatible
summary: Apache Traffic Control Traffic Ops Vulnerable to LDAP Injection in github.com/apache/trafficcontrol
cves:
- CVE-2021-43350
ghsas:
- GHSA-mg2c-rc36-p594
references:
- advisory: https://github.com/advisories/GHSA-mg2c-rc36-p594
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2021-43350
- web: http://www.openwall.com/lists/oss-security/2021/11/11/3
- web: http://www.openwall.com/lists/oss-security/2021/11/11/4
- web: http://www.openwall.com/lists/oss-security/2021/11/17/1
- web: https://trafficcontrol.apache.org/security
source:
id: GHSA-mg2c-rc36-p594
created: 2024-06-06T16:13:56.758827-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2801.yaml
|
id: GO-2024-2801
modules:
- module: github.com/projectcalico/calico
non_go_versions:
- fixed: 3.26.5
- introduced: 3.27.0
- fixed: 3.27.3
vulnerable_at: 2.6.12+incompatible
summary: Calico privilege escalation vulnerability in github.com/projectcalico/calico
cves:
- CVE-2024-33522
ghsas:
- GHSA-6362-gv4m-53ww
unknown_aliases:
- CGA-c9f6-83fw-wmpv
- CGA-vw5m-65r5-hgf5
references:
- advisory: https://github.com/advisories/GHSA-6362-gv4m-53ww
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-33522
- fix: https://github.com/projectcalico/calico/pull/8447
- fix: https://github.com/projectcalico/calico/pull/8517
- report: https://github.com/projectcalico/calico/issues/7981
- web: https://www.tigera.io/security-bulletins-tta-2024-001
source:
id: GHSA-6362-gv4m-53ww
created: 2024-06-26T14:05:52.596558-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1566.yaml
|
id: GO-2023-1566
modules:
- module: github.com/usememos/memos
versions:
- fixed: 0.10.4-0.20230211093429-b11d2130a084
vulnerable_at: 0.10.3
packages:
- package: github.com/usememos/memos/server
symbols:
- Server.registerResourcePublicRoutes
- Server.registerResourceRoutes
derived_symbols:
- NewServer
summary: Cross site scripting in github.com/usememos/memos
description: |-
A malicious actor can introduce links starting with a "javascript:" scheme due
to insufficient checks on external resources. This can be used as a part of
Cross-site Scripting (XSS) attack.
cves:
- CVE-2022-25978
ghsas:
- GHSA-9w8x-5hv5-r6gw
credits:
- Kahla
references:
- web: https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMUSEMEMOSMEMOSSERVER-3319070
- fix: https://github.com/usememos/memos/commit/b11d2130a084385eb65c3761a3c841ebe9f81ae8
- report: https://github.com/usememos/memos/issues/1026
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2703.yaml
|
id: GO-2024-2703
modules:
- module: github.com/kopia/kopia
versions:
- fixed: 0.16.0
vulnerable_at: 0.15.0
summary: |-
Kopia: Storage connection credentials written to console on "repository status"
CLI command with JSON output in github.com/kopia/kopia
ghsas:
- GHSA-j5vm-7qcc-2wwg
references:
- advisory: https://github.com/kopia/kopia/security/advisories/GHSA-j5vm-7qcc-2wwg
- fix: https://github.com/kopia/kopia/commit/1d6f852cd6534f4bea978cbdc85c583803d79f77
- fix: https://github.com/kopia/kopia/pull/3589
source:
id: GHSA-j5vm-7qcc-2wwg
created: 2024-05-17T16:13:46.760398-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0956.yaml
|
id: GO-2022-0956
modules:
- module: gopkg.in/yaml.v2
versions:
- fixed: 2.2.4
vulnerable_at: 2.2.3
packages:
- package: gopkg.in/yaml.v2
symbols:
- decoder.unmarshal
- yaml_parser_increase_flow_level
- yaml_parser_roll_indent
derived_symbols:
- Decoder.Decode
- Unmarshal
- UnmarshalStrict
summary: Excessive resource consumption in gopkg.in/yaml.v2
description: |-
Parsing malicious or large YAML documents can consume excessive amounts of CPU
or memory.
published: 2022-08-29T22:15:46Z
ghsas:
- GHSA-6q6q-88xp-6f2r
references:
- fix: https://github.com/go-yaml/yaml/commit/f221b8435cfb71e54062f6c6e99e9ade30b124d5
- web: https://github.com/go-yaml/yaml/releases/tag/v2.2.4
cve_metadata:
id: CVE-2022-3064
cwe: 'CWE 400: Uncontrolled Resource Consumption'
references:
- https://lists.debian.org/debian-lts-announce/2023/07/msg00001.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTE4ITXXPIWZEQ4HYQCB6N6GZIMWXDAI/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4SBIUECMLNC572P23DDOKJNKPJVX26SP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PW3XC47AUW5J5M2ULJX7WCCL3B2ETLMT/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYZOKMMVX4SIEHPJW3SJUQGMO5YZCPHC/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XNF4OLYZRQE75EB5TW5N42FSXHBXGWFE/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ANIOPUXWIHVRA6CEWXCGOMX3YYS6KFHG/
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2666.yaml
|
id: GO-2024-2666
modules:
- module: github.com/cilium/cilium
versions:
- fixed: 1.13.14
- introduced: 1.14.0
- fixed: 1.14.9
- introduced: 1.15.0
- fixed: 1.15.3
vulnerable_at: 1.15.0
summary: Insecure IPsec transparent encryption in github.com/cilium/cilium
cves:
- CVE-2024-28860
ghsas:
- GHSA-pwqm-x5x6-5586
references:
- advisory: https://github.com/cilium/cilium/security/advisories/GHSA-pwqm-x5x6-5586
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1883.yaml
|
id: GO-2023-1883
modules:
- module: github.com/cometbft/cometbft
versions:
- fixed: 0.37.2
vulnerable_at: 0.37.1
packages:
- package: github.com/cometbft/cometbft/mempool/v0
symbols:
- CListMempool.resCbFirstTime
derived_symbols:
- CListMempool.CheckTx
- Reactor.ReceiveEnvelope
summary: Denial of service via OOM in github.com/cometbft/cometbft
description: |-
A bug in the CometBFT middleware causes the mempool's two data structures to
fall out of sync. This can lead to duplicate transactions that cannot be
removed, even after they are committed in a block. The only way to remove the
transaction is to restart the node. This can be exploited by an attacker to
bring down a node by repeatedly submitting duplicate transactions.
cves:
- CVE-2023-34451
ghsas:
- GHSA-w24w-wp77-qffm
references:
- advisory: https://github.com/cometbft/cometbft/security/advisories/GHSA-w24w-wp77-qffm
- fix: https://github.com/cometbft/cometbft/pull/890
- fix: https://github.com/tendermint/tendermint/pull/2778
notes:
- The advisory refers to versions beginning 0.34. The module at those versions requires a replace directive to be usable. There is a fix in 0.34.28.
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1059.yaml
|
id: GO-2022-1059
modules:
- module: golang.org/x/text
versions:
- fixed: 0.3.8
vulnerable_at: 0.3.7
packages:
- package: golang.org/x/text/language
symbols:
- ParseAcceptLanguage
derived_symbols:
- MatchStrings
summary: |-
Denial of service via crafted Accept-Language header in
golang.org/x/text/language
description: |-
An attacker may cause a denial of service by crafting an Accept-Language header
which ParseAcceptLanguage will take significant time to parse.
ghsas:
- GHSA-69ch-w2m2-3vjp
credits:
- Adam Korczynski (ADA Logics)
- OSS-Fuzz
references:
- report: https://go.dev/issue/56152
- fix: https://go.dev/cl/442235
- web: https://groups.google.com/g/golang-announce/c/-hjNw559_tE/m/KlGTfid5CAAJ
cve_metadata:
id: CVE-2022-32149
cwe: 'CWE 400: Uncontrolled Resource Consumption'
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0042.yaml
|
id: GO-2020-0042
modules:
- module: github.com/sassoftware/go-rpmutils
versions:
- fixed: 0.1.0
vulnerable_at: 0.0.0-20200612150239-e314ffa6ce54
packages:
- package: github.com/sassoftware/go-rpmutils/cpio
symbols:
- Extract
summary: |-
Arbitrary File Write via Archive Extraction (Zip Slip) in
github.com/sassoftware/go-rpmutils
description: |-
Due to improper path sanitization, RPMs containing relative file paths can cause
files to be written (or overwritten) outside of the target directory.
published: 2021-04-14T20:04:52Z
cves:
- CVE-2020-7667
ghsas:
- GHSA-9423-6c93-gpp8
references:
- fix: https://github.com/sassoftware/go-rpmutils/commit/a64058cf21b8aada501bba923c9aab66fb6febf0
- web: https://snyk.io/research/zip-slip-vulnerability
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0988.yaml
|
id: GO-2022-0988
modules:
- module: std
versions:
- introduced: 1.19.0-0
- fixed: 1.19.1
vulnerable_at: 1.19.0
packages:
- package: net/url
symbols:
- URL.JoinPath
derived_symbols:
- JoinPath
summary: Failure to strip relative path components in net/url
description: |-
JoinPath and URL.JoinPath do not remove ../ path elements appended to a relative
path. For example, JoinPath("https://go.dev", "../go") returns the URL
"https://go.dev/../go", despite the JoinPath documentation stating that ../ path
elements are removed from the result.
published: 2022-09-12T20:23:15Z
credits:
- '@q0jt'
references:
- web: https://groups.google.com/g/golang-announce/c/x49AQzIVX-s
- report: https://go.dev/issue/54385
- fix: https://go.dev/cl/423514
cve_metadata:
id: CVE-2022-32190
cwe: 'CWE-22: Improper Limitation of a Pathname to a Restricted Directory (''Path Traversal'')'
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1839.yaml
|
id: GO-2023-1839
modules:
- module: cmd
versions:
- fixed: 1.19.10
- introduced: 1.20.0-0
- fixed: 1.20.5
vulnerable_at: 1.20.4
packages:
- package: cmd/go
summary: Code injection via go command with cgo in cmd/go
description: |-
The go command may generate unexpected code at build time when using cgo. This
may result in unexpected behavior when running a go program which uses cgo.
This may occur when running an untrusted module which contains directories with
newline characters in their names. Modules which are retrieved using the go
command, i.e. via "go get", are not affected (modules retrieved using
GOPATH-mode, i.e. GO111MODULE=off, may be affected).
credits:
- Juho Nurminen of Mattermost
references:
- report: https://go.dev/issue/60167
- fix: https://go.dev/cl/501226
- web: https://groups.google.com/g/golang-announce/c/q5135a9d924/m/j0ZoAJOHAwAJ
cve_metadata:
id: CVE-2023-29402
cwe: 'CWE-94: Improper Control of Generation of Code (''Code Injection'')'
references:
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XBS3IIK6ADV24C5ULQU55QLT2UE762ZX/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NZ2O6YCO2IZMZJELQGZYR2WAUNEDLYV6/
- https://security.gentoo.org/glsa/202311-09
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0069.yaml
|
id: GO-2021-0069
modules:
- module: std
versions:
- introduced: 1.14.0-0
- fixed: 1.14.12
- introduced: 1.15.0-0
- fixed: 1.15.5
vulnerable_at: 1.15.4
packages:
- package: math/big
symbols:
- nat.divRecursiveStep
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
summary: Panic during division of very large numbers in math/big
description: |-
A number of math/big.Int methods can panic when provided large inputs due to a
flawed division method.
published: 2021-04-14T20:04:52Z
cves:
- CVE-2020-28362
references:
- fix: https://go.dev/cl/269657
- fix: https://go.googlesource.com/go/+/1e1fa5903b760c6714ba17e50bf850b01f49135c
- report: https://go.dev/issue/42552
- web: https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2635.yaml
|
id: GO-2024-2635
modules:
- module: github.com/mattermost/mattermost-server
versions:
- introduced: 9.0.0+incompatible
- fixed: 9.4.0+incompatible
vulnerable_at: 9.4.0-rc4+incompatible
- module: github.com/mattermost/mattermost-server/v5
vulnerable_at: 5.39.3
- module: github.com/mattermost/mattermost-server/v6
vulnerable_at: 6.7.2
- module: github.com/mattermost/mattermost/server/v8
non_go_versions:
- fixed: 8.1.9
vulnerable_at: 8.0.0-20240626145722-59998b0b8473
summary: Mattermost incorrectly allows access individual posts in github.com/mattermost/mattermost-server
cves:
- CVE-2024-1952
ghsas:
- GHSA-r4fm-g65h-cr54
unknown_aliases:
- CGA-xmgp-mf9v-pph8
references:
- advisory: https://github.com/advisories/GHSA-r4fm-g65h-cr54
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-1952
- web: https://mattermost.com/security-updates
source:
id: GHSA-r4fm-g65h-cr54
created: 2024-06-26T13:58:04.253107-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2529.yaml
|
id: GO-2024-2529
modules:
- module: go.etcd.io/etcd
vulnerable_at: 2.3.8+incompatible
- module: go.etcd.io/etcd/v3
non_go_versions:
- fixed: 3.3.23
- introduced: 3.4.0-rc.0
- fixed: 3.4.10
vulnerable_at: 3.5.14
summary: |-
Etcd embed auto compaction retention negative value causing a compaction loop or
a crash in go.etcd.io/etcd
ghsas:
- GHSA-pm3m-32r3-7mfh
references:
- advisory: https://github.com/etcd-io/etcd/security/advisories/GHSA-pm3m-32r3-7mfh
source:
id: GHSA-pm3m-32r3-7mfh
created: 2024-06-26T16:10:36.366486-04:00
review_status: UNREVIEWED
unexcluded: EFFECTIVELY_PRIVATE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2608.yaml
|
id: GO-2024-2608
modules:
- module: github.com/stacklok/minder
versions:
- fixed: 0.0.33
vulnerable_at: 0.0.32
packages:
- package: github.com/stacklok/minder/internal/db
symbols:
- Queries.GetRepositoryByRepoName
- package: github.com/stacklok/minder/internal/controlplane
symbols:
- Server.GetArtifactByName
- Server.GetRepositoryByName
- Server.DeleteRepositoryByName
derived_symbols:
- EntityContextProjectInterceptor
- ProjectAuthorizationInterceptor
- Server.StartGRPCServer
- TokenValidationInterceptor
summary: Minder access control bypass in github.com/stacklok/minder
description: |-
A Minder user can use the endpoints to access any repository in the DB,
irrespective of who owns the repo and any permissions that user may have. The DB
query used checks by repo owner, repo name and provider name (which is always
"github"). These query values are not distinct for the particular user, as long
as the user has valid credentials and a provider, they can set the repo
owner/name to any value they want and the server will return information on this
repo. DeleteRepositoryByName uses the same query and a user can delete another
user's repo using this technique. The GetArtifactByName endpoint also uses this
DB query.
cves:
- CVE-2024-27916
ghsas:
- GHSA-v627-69v2-xx37
credits:
- dmjb
references:
- advisory: https://github.com/stacklok/minder/security/advisories/GHSA-v627-69v2-xx37
- fix: https://github.com/stacklok/minder/commit/45750b4e9fb2de33365758366e06c19e999bd2eb
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2636.yaml
|
id: GO-2024-2636
modules:
- module: github.com/1Panel-dev/1Panel
versions:
- fixed: 1.10.1-lts
vulnerable_at: 1.10.0-lts
summary: 1Panel is vulnerable to command injection in github.com/1Panel-dev/1Panel
cves:
- CVE-2024-2352
ghsas:
- GHSA-x2vg-5wrf-vj6v
references:
- advisory: https://github.com/advisories/GHSA-x2vg-5wrf-vj6v
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-2352
- fix: https://github.com/1Panel-dev/1Panel/pull/4131
- fix: https://github.com/1Panel-dev/1Panel/pull/4131#issue-2176105990
- fix: https://github.com/1Panel-dev/1Panel/pull/4131/commits/0edd7a9f6f5100aab98a0ea6e5deedff7700396c
- web: https://vuldb.com/?ctiid.256304
- web: https://vuldb.com/?id.256304
source:
id: GHSA-x2vg-5wrf-vj6v
created: 2024-05-17T16:14:46.922117-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1559.yaml
|
id: GO-2023-1559
modules:
- module: github.com/ipfs/go-unixfsnode
versions:
- fixed: 1.5.2
vulnerable_at: 1.5.1
packages:
- package: github.com/ipfs/go-unixfsnode/hamt
symbols:
- NewUnixFSHAMTShard
- bitField
derived_symbols:
- AttemptHAMTShardFromNode
- NewUnixFSHAMTShardWithPreload
- _UnixFSHAMTShard.Length
- _UnixFSHAMTShard.Lookup
- _UnixFSHAMTShard.LookupByNode
- _UnixFSHAMTShard.LookupBySegment
- _UnixFSHAMTShard.LookupByString
- _UnixFSShardedDir__ListItr.Next
- package: github.com/ipfs/go-unixfsnode/data/builder
symbols:
- shard.bitmap
- shard.serialize
derived_symbols:
- BlockSizes
- BuildUnixFS
- BuildUnixFSDirectory
- BuildUnixFSFile
- BuildUnixFSRecursive
- BuildUnixFSShardedDirectory
- BuildUnixFSSymlink
- Data
- DataType
- Fanout
- FileSize
- FractionalNanoseconds
- HashType
- Mtime
- Permissions
- PermissionsString
- Seconds
- Time
summary: Denial of service via HAMT decoding panic in github.com/ipfs/go-unixfsnode
description: |-
Trying to read malformed HAMT sharded directories can cause panics and virtual
memory leaks. If you are reading untrusted user input, an attacker can then
trigger a panic.
This is caused by a bogus fanout parameter in the HAMT directory nodes.
There are no known workarounds (users are advised to upgrade).
cves:
- CVE-2023-23631
ghsas:
- GHSA-4gj3-6r43-3wfc
credits:
- Jorropo
references:
- advisory: https://github.com/ipfs/go-unixfsnode/security/advisories/GHSA-4gj3-6r43-3wfc
- fix: https://github.com/ipfs/go-unixfsnode/commit/59050ea8bc458ae55246ae09243e6e165923e076
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0047.yaml
|
id: GO-2020-0047
modules:
- module: github.com/RobotsAndPencils/go-saml
vulnerable_at: 0.0.0-20170520135329-fb13cb52a46b
packages:
- package: github.com/RobotsAndPencils/go-saml
symbols:
- AuthnRequest.Validate
- NewAuthnRequest
- NewSignedResponse
derived_symbols:
- ServiceProviderSettings.GetAuthnRequest
summary: Weak hash (SHA-1) in github.com/RobotsAndPencils/go-saml
description: |-
XML Digital Signatures generated and validated using this package use SHA-1,
which may allow an attacker to craft inputs which cause hash collisions
depending on their control over the input.
published: 2021-04-14T20:04:52Z
ghsas:
- GHSA-5rhg-xhgr-5hfj
references:
- web: https://github.com/RobotsAndPencils/go-saml/pull/38
cve_metadata:
id: CVE-2020-36563
cwe: 'CWE 328: Use of Weak Hash'
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1497.yaml
|
id: GO-2023-1497
modules:
- module: github.com/sylabs/scs-library-client
versions:
- fixed: 1.3.4
vulnerable_at: 1.3.3
packages:
- package: github.com/sylabs/scs-library-client/client
symbols:
- Client.httpGetRangeRequest
derived_symbols:
- Client.ConcurrentDownloadImage
- Client.UploadImage
- module: github.com/sylabs/scs-library-client
versions:
- introduced: 1.4.0
- fixed: 1.4.2
vulnerable_at: 1.4.1
packages:
- package: github.com/sylabs/scs-library-client/client
symbols:
- Client.legacyDownloadImage
derived_symbols:
- Client.ConcurrentDownloadImage
summary: Leaked user credentials in github.com/sylabs/scs-library-client
description: |-
When the scs-library-client is used to pull a container image, with
authentication, the HTTP Authorization header sent by the client to the library
service may be incorrectly leaked to an S3 backing storage provider.
cves:
- CVE-2022-23538
ghsas:
- GHSA-7p8m-22h4-9pj7
references:
- fix: https://github.com/sylabs/scs-library-client/commit/68ac4cab5cda0afd8758ff5b5e2e57be6a22fcfa
- fix: https://github.com/sylabs/scs-library-client/commit/eebd7caaab310b1fa803e55b8fc1acd9dcd2d00c
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0006.yaml
|
id: GO-2020-0006
modules:
- module: github.com/miekg/dns
versions:
- fixed: 1.0.4-0.20180125103619-43913f2f4fbd
vulnerable_at: 1.0.3
packages:
- package: github.com/miekg/dns
symbols:
- Server.serveTCP
derived_symbols:
- ActivateAndServe
- ListenAndServe
- ListenAndServeTLS
- Server.ActivateAndServe
- Server.ListenAndServe
summary: Denial of service via open idle connection in github.com/miekg/dns
description: |-
An attacker may prevent TCP connections to a Server by opening a connection and
leaving it idle, until the connection is closed by the server no other
connections will be accepted.
published: 2021-04-14T20:04:52Z
cves:
- CVE-2017-15133
ghsas:
- GHSA-p55x-7x9v-q8m4
credits:
- Pedro Sampaio
references:
- fix: https://github.com/miekg/dns/pull/631
- fix: https://github.com/miekg/dns/commit/43913f2f4fbd7dcff930b8a809e709591e4dd79e
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1573.yaml
|
id: GO-2023-1573
modules:
- module: github.com/containerd/containerd
versions:
- introduced: 1.6.0
- fixed: 1.6.18
vulnerable_at: 1.6.0
packages:
- package: github.com/containerd/containerd/images/archive
symbols:
- onUntarJSON
- ImportIndex
- module: github.com/containerd/containerd
versions:
- fixed: 1.5.18
vulnerable_at: 1.5.17
packages:
- package: github.com/containerd/containerd/images/archive
symbols:
- onUntarJSON
- ImportIndex
summary: Memory exhaustion via OCI image importer in github.com/containerd/containerd
description: |-
When importing an OCI image, there was no limit on the number of bytes read from
the io.Reader passed into ImportIndex. A large number of bytes could be read
from this and could cause a denial of service.
cves:
- CVE-2023-25153
ghsas:
- GHSA-259w-8hf6-59c2
credits:
- '@AdamKorcz'
- '@DavidKorczynski'
references:
- advisory: https://github.com/containerd/containerd/security/advisories/GHSA-259w-8hf6-59c2
- fix: https://github.com/containerd/containerd/commit/0c314901076a74a7b797a545d2f462285fdbb8c4
- web: https://github.com/containerd/containerd/releases/tag/v1.5.18
- web: https://github.com/containerd/containerd/releases/tag/v1.6.18
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0084.yaml
|
id: GO-2021-0084
modules:
- module: github.com/astaxie/beego
versions:
- fixed: 1.12.2
vulnerable_at: 1.12.1
packages:
- package: github.com/astaxie/beego/session
symbols:
- FileProvider.SessionRead
- FileProvider.SessionRegenerate
derived_symbols:
- Manager.GetSessionStore
- Manager.SessionRegenerateID
- Manager.SessionStart
fix_links:
- https://github.com/beego/beego/commit/f99cbe0fa40936f2f8dd28e70620c559b6e5e2fd
summary: Incorrect permissions for critical resource in github.com/astaxie/beego
description: |-
Session data is stored using permissive permissions, allowing local users with
filesystem access to read arbitrary data.
published: 2021-04-14T20:04:52Z
cves:
- CVE-2019-16354
- CVE-2019-16355
ghsas:
- GHSA-f6px-w8rh-7r89
- GHSA-hf4p-4j9r-3cvx
credits:
- '@nicowaisman'
references:
- fix: https://github.com/beego/beego/pull/3975
- fix: https://github.com/beego/beego/commit/bac2b31afecc65d9a89f9e473b8006c5edc0c8d1
- web: https://github.com/beego/beego/issues/3763
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0100.yaml
|
id: GO-2021-0100
modules:
- module: github.com/containers/storage
versions:
- fixed: 1.28.1
vulnerable_at: 1.28.1-0.20210316105906-29dc2106ab59
packages:
- package: github.com/containers/storage/pkg/archive
symbols:
- cmdStream
derived_symbols:
- ApplyLayer
- ApplyUncompressedLayer
- Archiver.CopyFileWithTar
- Archiver.CopyWithTar
- Archiver.TarUntar
- Archiver.UntarPath
- CopyResource
- CopyTo
- DecompressStream
- IsArchivePath
- Untar
- UntarPath
- UntarUncompressed
summary: Denial of service via deadlock in github.com/containers/storage
description: |-
Due to a goroutine deadlock, using
github.com/containers/storage/pkg/archive.DecompressStream on a xz archive
returns a reader which will hang indefinitely when Close is called. An attacker
can use this to cause denial of service if they are able to cause the caller to
attempt to decompress an archive they control.
published: 2021-07-28T18:08:05Z
cves:
- CVE-2021-20291
ghsas:
- GHSA-7qw8-847f-pggm
credits:
- Aviv Sasson (Palo Alto Networks)
references:
- fix: https://github.com/containers/storage/pull/860
- fix: https://github.com/containers/storage/commit/306fcabc964470e4b3b87a43a8f6b7d698209ee1
- web: https://bugzilla.redhat.com/show_bug.cgi?id=1939485
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2024.yaml
|
id: GO-2023-2024
modules:
- module: github.com/libp2p/go-libp2p
versions:
- fixed: 0.27.4
vulnerable_at: 0.27.3
packages:
- package: github.com/libp2p/go-libp2p/core/record
symbols:
- ConsumeEnvelope
- package: github.com/libp2p/go-libp2p/p2p/protocol/identify
symbols:
- idService.consumeMessage
derived_symbols:
- idService.IdentifyConn
- idService.IdentifyWait
- netNotifiee.Connected
summary: Out-of-memory vulnerability in github.com/libp2p/go-libp2p
description: |-
A malicious actor can store an arbitrary amount of data in the memory of a
remote node by sending the node a message with a signed peer record. Signed peer
records from randomly generated peers can be sent by a malicious actor. This
memory does not get garbage collected and so the remote node can run out of
memory (OOM).
cves:
- CVE-2023-40583
ghsas:
- GHSA-gcq9-qqwx-rgj3
credits:
- Marten Seemann
references:
- advisory: https://github.com/libp2p/go-libp2p/security/advisories/GHSA-gcq9-qqwx-rgj3
- fix: https://github.com/libp2p/go-libp2p/commit/45d3c6fff662ddd6938982e7e9309ad5fa2ad8dd
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0060.yaml
|
id: GO-2021-0060
modules:
- module: github.com/russellhaering/gosaml2
versions:
- fixed: 0.6.0
vulnerable_at: 0.5.0
packages:
- package: github.com/russellhaering/gosaml2
symbols:
- parseResponse
derived_symbols:
- SAMLServiceProvider.RetrieveAssertionInfo
- SAMLServiceProvider.ValidateEncodedLogoutRequestPOST
- SAMLServiceProvider.ValidateEncodedLogoutResponsePOST
- SAMLServiceProvider.ValidateEncodedResponse
summary: Authentication bypass in github.com/russellhaering/gosaml2
description: |-
Due to the behavior of encoding/xml, a crafted XML document may cause XML
Digital Signature validation to be entirely bypassed, causing an unsigned
document to appear signed.
published: 2021-04-14T20:04:52Z
cves:
- CVE-2020-29509
ghsas:
- GHSA-xhqq-x44f-9fgg
credits:
- Juho Nurminen
references:
- fix: https://github.com/russellhaering/gosaml2/commit/42606dafba60c58c458f14f75c4c230459672ab9
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2927.yaml
|
id: GO-2024-2927
modules:
- module: github.com/evmos/evmos
vulnerable_at: 1.1.3
- module: github.com/evmos/evmos/v2
vulnerable_at: 2.0.2
- module: github.com/evmos/evmos/v3
vulnerable_at: 3.0.3
- module: github.com/evmos/evmos/v4
vulnerable_at: 4.0.2
- module: github.com/evmos/evmos/v5
vulnerable_at: 5.0.1
- module: github.com/evmos/evmos/v6
vulnerable_at: 6.0.4
- module: github.com/evmos/evmos/v7
vulnerable_at: 7.0.0
- module: github.com/evmos/evmos/v8
vulnerable_at: 8.2.3
- module: github.com/evmos/evmos/v9
vulnerable_at: 9.1.0
- module: github.com/evmos/evmos/v10
vulnerable_at: 10.0.1
- module: github.com/evmos/evmos/v11
vulnerable_at: 11.0.2
- module: github.com/evmos/evmos/v12
vulnerable_at: 12.1.6
- module: github.com/evmos/evmos/v13
vulnerable_at: 13.0.2
- module: github.com/evmos/evmos/v14
vulnerable_at: 14.1.0
- module: github.com/evmos/evmos/v15
vulnerable_at: 15.0.0
- module: github.com/evmos/evmos/v16
vulnerable_at: 16.0.4
- module: github.com/evmos/evmos/v17
vulnerable_at: 17.0.1
- module: github.com/evmos/evmos/v18
versions:
- fixed: 18.0.0
summary: Evmos is missing create validator check in github.com/evmos/evmos
cves:
- CVE-2024-37159
references:
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-37159
- fix: https://github.com/evmos/evmos/commit/b2a09ca66613d8b04decd3f2dcba8e1e77709dcb
- web: https://github.com/evmos/evmos/security/advisories/GHSA-pxv8-qhrh-jc7v
notes:
- fix: 'github.com/evmos/evmos/v18: could not add vulnerable_at: could not find tagged version between introduced and fixed'
source:
id: CVE-2024-37159
created: 2024-06-27T15:54:26.419866-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2933.yaml
|
id: GO-2024-2933
modules:
- module: github.com/bazelbuild/intellij
unsupported_versions:
- cve_version_range: 'affected from 0 before 2024.06.04.0.2 (default: unaffected)'
vulnerable_at: 2021.12.13+incompatible
summary: Improper trust check in Bazel Build intellij plugin in github.com/bazelbuild/intellij
cves:
- CVE-2024-5899
references:
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-5899
- web: https://github.com/bazelbuild/intellij/releases/tag/v2024.06.04-aswb-stable
- web: https://github.com/bazelbuild/intellij/security/advisories/GHSA-hh9f-wmhw-46vg
source:
id: CVE-2024-5899
created: 2024-06-27T15:54:02.860699-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0345.yaml
|
id: GO-2022-0345
modules:
- module: github.com/containers/buildah
versions:
- fixed: 1.22.0
vulnerable_at: 1.21.0
packages:
- package: github.com/containers/buildah/chroot
symbols:
- RunUsingChroot
summary: Environment variable leakage in github.com/containers/buildah
description: |-
The RunUsingChroot function unintentionally propagates environment variables
from the current process to the child process.
published: 2022-07-15T23:30:21Z
cves:
- CVE-2021-3602
ghsas:
- GHSA-7638-r9r3-rmjj
references:
- fix: https://github.com/containers/buildah/commit/a468ce0ffd347035d53ee0e26c205ef604097fb0
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0070.yaml
|
id: GO-2021-0070
modules:
- module: github.com/opencontainers/runc
versions:
- fixed: 0.1.0
vulnerable_at: 0.0.9
packages:
- package: github.com/opencontainers/runc/libcontainer/user
symbols:
- GetExecUser
derived_symbols:
- GetExecUserPath
summary: Privilege escalation in github.com/opencontainers/runc
description: |-
GetExecUser in the github.com/opencontainers/runc/libcontainer/user package will
improperly interpret numeric UIDs as usernames. If the method is used without
verifying that usernames are formatted as expected, it may allow a user to gain
unexpected privileges.
published: 2021-04-14T20:04:52Z
cves:
- CVE-2016-3697
ghsas:
- GHSA-q3j5-32m5-58c2
references:
- fix: https://github.com/opencontainers/runc/pull/708
- fix: https://github.com/opencontainers/runc/commit/69af385de62ea68e2e608335cffbb0f4aa3db091
- web: https://github.com/docker/docker/issues/21436
- web: http://rhn.redhat.com/errata/RHSA-2016-1034.html
- web: http://rhn.redhat.com/errata/RHSA-2016-2634.html
- web: https://security.gentoo.org/glsa/201612-28
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0071.yaml
|
id: GO-2021-0071
modules:
- module: github.com/lxc/lxd
versions:
- fixed: 0.0.0-20151004155856-19c6961cc101
vulnerable_at: 0.0.0-20151004071337-96e120e828e4
packages:
- package: github.com/lxc/lxd/shared
symbols:
- IdmapSet.doUidshiftIntoContainer
skip_fix: 'TODO: Revisit this reason (Fix causes error containing cannot find module providing package github.com/chai2010/gettext-go/gettext - possibly an issue with lack of go.mod file in affected version)'
summary: Race condition in github.com/lxc/lxd
description: |-
A race between chown and chmod operations during a container filesystem shift
may allow a user who can modify the filesystem to chmod an arbitrary path of
their choice, rather than the expected path.
published: 2021-04-14T20:04:52Z
cves:
- CVE-2015-1340
ghsas:
- GHSA-8mpq-fmr3-6jxv
credits:
- Seth Arnold
references:
- fix: https://github.com/lxc/lxd/commit/19c6961cc1012c8a529f20807328a9357f5034f4
- web: https://bugs.launchpad.net/ubuntu/+source/lxd/+bug/1502270
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1717.yaml
|
id: GO-2023-1717
modules:
- module: vitess.io/vitess
versions:
- fixed: 0.16.1
vulnerable_at: 0.16.0
packages:
- package: vitess.io/vitess/go/vt/vtorc/inst
symbols:
- ReadKeyspace
derived_symbols:
- GetDurabilityPolicy
- ReadTopologyInstance
- ReadTopologyInstanceBufferable
- SwitchPrimary
- package: vitess.io/vitess/go/vt/topo
symbols:
- Server.CreateKeyspace
- Server.GetKeyspace
derived_symbols:
- Server.CreateShard
- Server.FindAllShardsInKeyspace
- Server.GetKeyspaceDurability
- Server.GetOnlyShard
- Server.GetOrCreateShard
- Server.GetServingShards
- Server.GetShardNames
- Server.InitTablet
- Server.ResolveShardWildcard
summary: Improper handling of keyspaces in vitess.io/vitess
description: |-
Users can create a keyspace containing '/'. Future attempts to view keyspaces
from some tools (including VTAdmin and "vtctldclient GetKeyspaces") receive an
error.
cves:
- CVE-2023-29194
ghsas:
- GHSA-735r-hv67-g38f
credits:
- '@AdamKorcz'
- '@ajm188'
references:
- advisory: https://github.com/vitessio/vitess/security/advisories/GHSA-735r-hv67-g38f
- fix: https://github.com/vitessio/vitess/commit/adf10196760ad0b3991a7aa7a8580a544e6ddf88
- fix: https://github.com/vitessio/vitess/commits/v0.16.1/
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1988.yaml
|
id: GO-2023-1988
modules:
- module: golang.org/x/net
versions:
- fixed: 0.13.0
vulnerable_at: 0.12.0
packages:
- package: golang.org/x/net/html
symbols:
- render1
derived_symbols:
- Render
summary: Improper rendering of text nodes in golang.org/x/net/html
description: |-
Text nodes not in the HTML namespace are incorrectly literally rendered, causing
text which should be escaped to not be. This could lead to an XSS attack.
ghsas:
- GHSA-2wrh-6pvc-2jm9
references:
- report: https://go.dev/issue/61615
- fix: https://go.dev/cl/514896
cve_metadata:
id: CVE-2023-3978
cwe: 'CWE-79: Improper Neutralization of Input During Web Page Generation (''Cross-site Scripting'')'
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2665.yaml
|
id: GO-2024-2665
modules:
- module: github.com/zitadel/zitadel
non_go_versions:
- fixed: 2.42.17
- introduced: 2.43.0
- fixed: 2.43.11
- introduced: 2.44.0
- fixed: 2.44.7
- introduced: 2.45.0
- fixed: 2.45.5
- introduced: 2.46.0
- fixed: 2.46.5
- introduced: 2.47.0
- fixed: 2.47.8
- introduced: 2.48.0
- fixed: 2.48.3
vulnerable_at: 1.87.5
summary: |-
ZITADEL's Improper Content-Type Validation Leads to Account Takeover via Stored
XSS + CSP Bypass in github.com/zitadel/zitadel
cves:
- CVE-2024-29891
ghsas:
- GHSA-hr5w-cwwq-2v4m
references:
- advisory: https://github.com/zitadel/zitadel/security/advisories/GHSA-hr5w-cwwq-2v4m
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-29891
- web: https://github.com/zitadel/zitadel/releases/tag/v2.42.17
- web: https://github.com/zitadel/zitadel/releases/tag/v2.43.11
- web: https://github.com/zitadel/zitadel/releases/tag/v2.44.7
- web: https://github.com/zitadel/zitadel/releases/tag/v2.45.5
- web: https://github.com/zitadel/zitadel/releases/tag/v2.46.5
- web: https://github.com/zitadel/zitadel/releases/tag/v2.47.8
- web: https://github.com/zitadel/zitadel/releases/tag/v2.48.3
source:
id: GHSA-hr5w-cwwq-2v4m
created: 2024-06-04T15:37:16.762486-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2456.yaml
|
id: GO-2024-2456
modules:
- module: gopkg.in/src-d/go-git.v4
versions:
- introduced: 4.7.1
vulnerable_at: 4.13.1
- module: github.com/go-git/go-git/v5
versions:
- introduced: 5.0.0
- fixed: 5.11.0
vulnerable_at: 5.10.1
packages:
- package: github.com/go-git/go-git/v5
symbols:
- checkFastForwardUpdate
- isFastForward
- InitWithOptions
- Repository.CreateTag
- Worktree.PullContext
- Worktree.createBranch
- Worktree.checkoutFileSymlink
derived_symbols:
- AddOptions.Validate
- Blame
- BlameResult.String
- Clone
- CloneContext
- CommitOptions.Validate
- CreateTagOptions.Validate
- GrepOptions.Validate
- GrepResult.String
- Init
- NoMatchingRefSpecError.Error
- Open
- PlainClone
- PlainCloneContext
- PlainInit
- PlainInitWithOptions
- PlainOpen
- PlainOpenWithOptions
- Remote.Fetch
- Remote.FetchContext
- Remote.List
- Remote.ListContext
- Remote.Push
- Remote.PushContext
- Remote.String
- Repository.BlobObject
- Repository.BlobObjects
- Repository.Branch
- Repository.Branches
- Repository.CommitObject
- Repository.CommitObjects
- Repository.Config
- Repository.ConfigScoped
- Repository.CreateBranch
- Repository.CreateRemote
- Repository.CreateRemoteAnonymous
- Repository.DeleteBranch
- Repository.DeleteObject
- Repository.DeleteRemote
- Repository.DeleteTag
- Repository.Fetch
- Repository.FetchContext
- Repository.Grep
- Repository.Head
- Repository.Log
- Repository.Notes
- Repository.Object
- Repository.Objects
- Repository.Prune
- Repository.Push
- Repository.PushContext
- Repository.Reference
- Repository.References
- Repository.Remote
- Repository.Remotes
- Repository.RepackObjects
- Repository.ResolveRevision
- Repository.SetConfig
- Repository.Tag
- Repository.TagObject
- Repository.TagObjects
- Repository.Tags
- Repository.TreeObject
- Repository.TreeObjects
- ResetOptions.Validate
- Status.String
- Submodule.Init
- Submodule.Repository
- Submodule.Status
- Submodule.Update
- Submodule.UpdateContext
- SubmoduleStatus.String
- Submodules.Init
- Submodules.Status
- Submodules.Update
- Submodules.UpdateContext
- SubmodulesStatus.String
- Worktree.Add
- Worktree.AddGlob
- Worktree.AddWithOptions
- Worktree.Checkout
- Worktree.Clean
- Worktree.Commit
- Worktree.Grep
- Worktree.Move
- Worktree.Pull
- Worktree.Remove
- Worktree.RemoveGlob
- Worktree.Reset
- Worktree.ResetSparsely
- Worktree.Status
- Worktree.Submodule
- Worktree.Submodules
- buildTreeHelper.BuildTree
- package: github.com/go-git/go-git/v5/config
symbols:
- RemoteConfig.Validate
- Branch.Validate
derived_symbols:
- Config.Unmarshal
- Config.Validate
- LoadConfig
- ReadConfig
- package: github.com/go-git/go-git/v5/plumbing/object
symbols:
- getFileStatsFromFilePatches
derived_symbols:
- Commit.Stats
- Commit.StatsContext
- Patch.Stats
- package: github.com/go-git/go-git/v5/storage/filesystem
symbols:
- NewStorageWithOptions
derived_symbols:
- ConfigStorage.Config
- ConfigStorage.SetConfig
- ModuleStorage.Module
- NewStorage
- ObjectStorage.EncodedObject
- package: github.com/go-git/go-git/v5/storage/filesystem/dotgit
symbols:
- DotGit.Alternates
summary: |-
Path traversal and RCE in github.com/go-git/go-git/v5 and
gopkg.in/src-d/go-git.v4
cves:
- CVE-2023-49569
ghsas:
- GHSA-449p-3h89-pw88
credits:
- Ionut Lalu
references:
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2023-49569
notes:
- Symbols were obtained by looking at every change between 5.10.1 and 5.11.0.
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2821.yaml
|
id: GO-2024-2821
modules:
- module: github.com/stacklok/minder
versions:
- fixed: 0.0.48
vulnerable_at: 0.0.47
packages:
- package: github.com/stacklok/minder/internal/controlplane
symbols:
- Server.HandleGitHubWebHook
- Server.StartHTTPServer
summary: Denial of Service from untrusted requests in github.com/stacklok/minder
description: |-
HandleGithubWebhook is susceptible to a denial of service attack from an
untrusted HTTP request. An untrusted request can cause the server to allocate
large amounts of memory resulting in a denial of service.
cves:
- CVE-2024-34084
ghsas:
- GHSA-9c5w-9q3f-3hv7
credits:
- '@AdamKorcz and @DavidKorczynski'
references:
- advisory: https://github.com/stacklok/minder/security/advisories/GHSA-9c5w-9q3f-3hv7
- fix: https://github.com/stacklok/minder/commit/3e5a527d2f1b535159206161d1d519602c75bd0d
- web: https://github.com/stacklok/minder/blob/ee66f6c0763212503c898cfefb65ce1450c7f5ac/internal/controlplane/handlers_githubwebhooks.go#L213-L218
- web: https://github.com/stacklok/minder/blob/ee66f6c0763212503c898cfefb65ce1450c7f5ac/internal/controlplane/handlers_githubwebhooks.go#L337-L342
- web: https://github.com/stacklok/minder/blob/ee66f6c0763212503c898cfefb65ce1450c7f5ac/internal/controlplane/handlers_githubwebhooks.go#L367-L377
- web: https://github.com/stacklok/minder/blob/ee66f6c0763212503c898cfefb65ce1450c7f5ac/internal/controlplane/handlers_githubwebhooks_test.go#L278-L283
source:
id: GHSA-9c5w-9q3f-3hv7
created: 2024-05-08T14:06:25.679756-07:00
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2331.yaml
|
id: GO-2023-2331
modules:
- module: go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc
versions:
- fixed: 0.46.0
vulnerable_at: 0.45.0
packages:
- package: go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc
symbols:
- StreamClientInterceptor
- UnaryClientInterceptor
- UnaryServerInterceptor
- spanInfo
- StreamServerInterceptor
summary: |-
Denial of service in
go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc
description: |-
The grpc Unary Server Interceptor created by the otelgrpc package added the
labels net.peer.sock.addr and net.peer.sock.port with unbounded cardinality.
This can lead to the server's potential memory exhaustion when many malicious
requests are sent. This leads to a denial-of-service.
cves:
- CVE-2023-47108
ghsas:
- GHSA-8pgv-569h-w5rw
references:
- advisory: https://github.com/open-telemetry/opentelemetry-go-contrib/security/advisories/GHSA-8pgv-569h-w5rw
- fix: https://github.com/open-telemetry/opentelemetry-go-contrib/commit/b44dfc9092b157625a5815cb437583cee663333b
- fix: https://github.com/open-telemetry/opentelemetry-go-contrib/pull/4322
- web: https://pkg.go.dev/go.opentelemetry.io/otel/metric/noop#NewMeterProvider
source:
id: GHSA-8pgv-569h-w5rw
created: 2024-06-26T17:06:54.775224-07:00
review_status: REVIEWED
unexcluded: DEPENDENT_VULNERABILITY
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0588.yaml
|
id: GO-2022-0588
modules:
- module: github.com/microcosm-cc/bluemonday
versions:
- fixed: 1.0.16
vulnerable_at: 1.0.15
packages:
- package: github.com/microcosm-cc/bluemonday
symbols:
- Policy.AllowElements
- Policy.AllowElementsMatching
derived_symbols:
- Policy.AllowLists
- Policy.AllowTables
- UGCPolicy
summary: |-
Cross-site scripting via leaked style elements in
github.com/microcosm-cc/bluemonday
description: |-
The bluemonday HTML sanitizer can leak the contents of a "style" element into
HTML output, potentially causing XSS vulnerabilities.
The default bluemonday sanitization policies are not vulnerable. Only
user-defined policies allowing "select", "style", and "option" elements are
affected.
Permitting the "style" element in policies is hazardous, because bluemonday does
not contain a CSS sanitizer. Newer versions of bluemonday suppress "style" and
"script" elements even when allowed by a policy unless the policy explicitly
requests unsafe processing.
published: 2022-08-15T18:02:24Z
cves:
- CVE-2021-42576
ghsas:
- GHSA-x95h-979x-cf3j
references:
- fix: https://github.com/microcosm-cc/bluemonday/commit/c788a2a4d42e081ad54a31368478820bb4a42fb4
- web: https://docs.google.com/document/d/11SoX296sMS0XoQiQbpxc5pNxSdbJKDJkm5BDv0zrX50/
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1083.yaml
|
id: GO-2022-1083
modules:
- module: github.com/free5gc/aper
vulnerable_at: 1.0.4
packages:
- package: github.com/free5gc/aper
symbols:
- GetBitString
derived_symbols:
- GetBitsValue
- Marshal
- MarshalWithParams
- Unmarshal
- UnmarshalWithParams
summary: Panic on malformed messages in github.com/free5gc/aper
description: |-
A malformed message can crash the free5gc/amf and free5gc/ngap decoders via an
index-out-of-range panic in aper.GetBitString.
cves:
- CVE-2022-43677
ghsas:
- GHSA-59hj-62f5-fgmc
credits:
- '@fisherwky'
references:
- report: https://github.com/free5gc/free5gc/issues/402
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2972.yaml
|
id: GO-2024-2972
modules:
- module: github.com/gogs/gogs
unsupported_versions:
- last_affected: 0.13.0
vulnerable_at: 0.13.0
summary: Gogs allows argument injection during the tagging of a new release in github.com/gogs/gogs
cves:
- CVE-2024-39933
ghsas:
- GHSA-8mm6-wmpp-mmm3
references:
- advisory: https://github.com/advisories/GHSA-8mm6-wmpp-mmm3
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-39933
- web: https://www.sonarsource.com/blog/securing-developer-tools-unpatched-code-vulnerabilities-in-gogs-1
source:
id: GHSA-8mm6-wmpp-mmm3
created: 2024-07-08T13:24:01.718651-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2794.yaml
|
id: GO-2024-2794
modules:
- module: github.com/mattermost/mattermost-server
versions:
- introduced: 8.1.0+incompatible
- fixed: 8.1.12+incompatible
- introduced: 9.5.0+incompatible
- fixed: 9.5.3+incompatible
- introduced: 9.6.0-rc1+incompatible
- fixed: 9.6.1+incompatible
vulnerable_at: 9.6.1-rc3+incompatible
summary: Mattermost fails to fully validate role changes in github.com/mattermost/mattermost-server
cves:
- CVE-2024-4198
ghsas:
- GHSA-5qx9-9ffj-5r8f
references:
- advisory: https://github.com/advisories/GHSA-5qx9-9ffj-5r8f
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-4198
- web: https://github.com/mattermost/mattermost/commit/3d6d8a7c1f7105558fe266a1b379859a4dba4e9b
- web: https://github.com/mattermost/mattermost/commit/408ce4a82bb55ce27801f7044d9b3b49e82c47ed
- web: https://github.com/mattermost/mattermost/commit/fba5b8e348feada9b21290369c3598ccd5c04424
- web: https://mattermost.com/security-updates
source:
id: GHSA-5qx9-9ffj-5r8f
created: 2024-06-04T15:27:15.679327-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2689.yaml
|
id: GO-2024-2689
modules:
- module: go.temporal.io/server
versions:
- fixed: 1.20.5
- introduced: 1.21.0
- fixed: 1.21.6
- introduced: 1.22.0-rc1
- fixed: 1.22.7
vulnerable_at: 1.22.6
summary: Temporal Server Denial of Service in go.temporal.io/server
cves:
- CVE-2024-2689
ghsas:
- GHSA-wmxc-v39r-p9wf
references:
- advisory: https://github.com/advisories/GHSA-wmxc-v39r-p9wf
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-2689
- web: https://github.com/temporalio/temporal/commit/2099dfd945accbf794404c3b8d990d109de19f06
- web: https://github.com/temporalio/temporal/commit/679e3dc2ca8bd39e02c760f686cc8807f817bbfd
- web: https://github.com/temporalio/temporal/commit/f1fab97129f964dcca17d1f7c344f38666d1ee5f
- web: https://github.com/temporalio/temporal/releases
source:
id: GHSA-wmxc-v39r-p9wf
created: 2024-05-17T16:14:10.920801-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0192.yaml
|
id: GO-2022-0192
modules:
- module: golang.org/x/net
versions:
- fixed: 0.0.0-20180925071336-cf3bd585ca2a
vulnerable_at: 0.0.0-20180921000356-2f5d2388922f
packages:
- package: golang.org/x/net/html
symbols:
- parser.resetInsertionMode
derived_symbols:
- Parse
- ParseFragment
summary: Incorrect parsing of nested templates in golang.org/x/net/html
description: |-
The Parse function can panic on some invalid inputs.
For example, the Parse function panics on the input
"<math><template><mo><template>".
published: 2022-07-01T20:11:34Z
cves:
- CVE-2018-17142
ghsas:
- GHSA-2wp2-chmh-r934
credits:
- '@tr3ee'
references:
- fix: https://go.dev/cl/136875
- fix: https://go.googlesource.com/net/+/cf3bd585ca2a5a21b057abd8be7eea2204af89d0
- report: https://go.dev/issue/27702
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0019.yaml
|
id: GO-2020-0019
modules:
- module: github.com/gorilla/websocket
versions:
- fixed: 1.4.1
vulnerable_at: 1.4.0
packages:
- package: github.com/gorilla/websocket
symbols:
- Conn.advanceFrame
- messageReader.Read
derived_symbols:
- Conn.Close
- Conn.NextReader
- Conn.NextWriter
- Conn.ReadJSON
- Conn.ReadMessage
- Conn.WriteControl
- Conn.WriteJSON
- Conn.WriteMessage
- Conn.WritePreparedMessage
- Dialer.Dial
- Dialer.DialContext
- NewClient
- NewPreparedMessage
- ReadJSON
- Subprotocols
- Upgrade
- Upgrader.Upgrade
- WriteJSON
- flateReadWrapper.Read
- flateWriteWrapper.Close
- flateWriteWrapper.Write
- httpProxyDialer.Dial
- messageWriter.Close
- messageWriter.ReadFrom
- messageWriter.Write
- messageWriter.WriteString
- netDialerFunc.Dial
- proxy_direct.Dial
- proxy_envOnce.Get
- proxy_socks5.Dial
- truncWriter.Write
summary: Integer overflow in github.com/gorilla/websocket
description: |-
An attacker can craft malicious WebSocket frames that cause an integer overflow
in a variable which tracks the number of bytes remaining. This may cause the
server or client to get stuck attempting to read frames in a loop, which can be
used as a denial of service vector.
published: 2021-04-14T20:04:52Z
cves:
- CVE-2020-27813
ghsas:
- GHSA-3xh2-74w9-5vxm
- GHSA-jf24-p9p9-4rjh
credits:
- Max Justicz
references:
- fix: https://github.com/gorilla/websocket/pull/537
- fix: https://github.com/gorilla/websocket/commit/5b740c29263eb386f33f265561c8262522f19d37
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2687.yaml
|
id: GO-2024-2687
modules:
- module: std
versions:
- fixed: 1.21.9
- introduced: 1.22.0-0
- fixed: 1.22.2
vulnerable_at: 1.22.1
packages:
- package: net/http
symbols:
- http2Framer.readMetaFrame
derived_symbols:
- CanonicalHeaderKey
- Client.CloseIdleConnections
- Client.Do
- Client.Get
- Client.Head
- Client.Post
- Client.PostForm
- Cookie.String
- Cookie.Valid
- Dir.Open
- Error
- Get
- HandlerFunc.ServeHTTP
- Head
- Header.Add
- Header.Del
- Header.Get
- Header.Set
- Header.Values
- Header.Write
- Header.WriteSubset
- ListenAndServe
- ListenAndServeTLS
- NewRequest
- NewRequestWithContext
- NotFound
- ParseTime
- Post
- PostForm
- ProxyFromEnvironment
- ReadRequest
- ReadResponse
- Redirect
- Request.AddCookie
- Request.BasicAuth
- Request.FormFile
- Request.FormValue
- Request.MultipartReader
- Request.ParseForm
- Request.ParseMultipartForm
- Request.PostFormValue
- Request.Referer
- Request.SetBasicAuth
- Request.UserAgent
- Request.Write
- Request.WriteProxy
- Response.Cookies
- Response.Location
- Response.Write
- ResponseController.EnableFullDuplex
- ResponseController.Flush
- ResponseController.Hijack
- ResponseController.SetReadDeadline
- ResponseController.SetWriteDeadline
- Serve
- ServeContent
- ServeFile
- ServeMux.ServeHTTP
- ServeTLS
- Server.Close
- Server.ListenAndServe
- Server.ListenAndServeTLS
- Server.Serve
- Server.ServeTLS
- Server.SetKeepAlivesEnabled
- Server.Shutdown
- SetCookie
- Transport.CancelRequest
- Transport.Clone
- Transport.CloseIdleConnections
- Transport.RoundTrip
- body.Close
- body.Read
- bodyEOFSignal.Close
- bodyEOFSignal.Read
- bodyLocked.Read
- bufioFlushWriter.Write
- cancelTimerBody.Close
- cancelTimerBody.Read
- checkConnErrorWriter.Write
- chunkWriter.Write
- connReader.Read
- connectMethodKey.String
- expectContinueReader.Close
- expectContinueReader.Read
- extraHeader.Write
- fileHandler.ServeHTTP
- fileTransport.RoundTrip
- globalOptionsHandler.ServeHTTP
- gzipReader.Close
- gzipReader.Read
- http2ClientConn.Close
- http2ClientConn.Ping
- http2ClientConn.RoundTrip
- http2ClientConn.Shutdown
- http2ConnectionError.Error
- http2ErrCode.String
- http2FrameHeader.String
- http2FrameType.String
- http2FrameWriteRequest.String
- http2Framer.ReadFrame
- http2Framer.WriteContinuation
- http2Framer.WriteData
- http2Framer.WriteDataPadded
- http2Framer.WriteGoAway
- http2Framer.WriteHeaders
- http2Framer.WritePing
- http2Framer.WritePriority
- http2Framer.WritePushPromise
- http2Framer.WriteRSTStream
- http2Framer.WriteRawFrame
- http2Framer.WriteSettings
- http2Framer.WriteSettingsAck
- http2Framer.WriteWindowUpdate
- http2GoAwayError.Error
- http2Server.ServeConn
- http2Setting.String
- http2SettingID.String
- http2SettingsFrame.ForeachSetting
- http2StreamError.Error
- http2Transport.CloseIdleConnections
- http2Transport.NewClientConn
- http2Transport.RoundTrip
- http2Transport.RoundTripOpt
- http2bufferedWriter.Flush
- http2bufferedWriter.Write
- http2chunkWriter.Write
- http2clientConnPool.GetClientConn
- http2connError.Error
- http2dataBuffer.Read
- http2duplicatePseudoHeaderError.Error
- http2gzipReader.Close
- http2gzipReader.Read
- http2headerFieldNameError.Error
- http2headerFieldValueError.Error
- http2noDialClientConnPool.GetClientConn
- http2noDialH2RoundTripper.RoundTrip
- http2pipe.Read
- http2priorityWriteScheduler.CloseStream
- http2priorityWriteScheduler.OpenStream
- http2pseudoHeaderError.Error
- http2requestBody.Close
- http2requestBody.Read
- http2responseWriter.Flush
- http2responseWriter.FlushError
- http2responseWriter.Push
- http2responseWriter.SetReadDeadline
- http2responseWriter.SetWriteDeadline
- http2responseWriter.Write
- http2responseWriter.WriteHeader
- http2responseWriter.WriteString
- http2roundRobinWriteScheduler.OpenStream
- http2serverConn.CloseConn
- http2serverConn.Flush
- http2stickyErrWriter.Write
- http2transportResponseBody.Close
- http2transportResponseBody.Read
- http2writeData.String
- initALPNRequest.ServeHTTP
- loggingConn.Close
- loggingConn.Read
- loggingConn.Write
- maxBytesReader.Close
- maxBytesReader.Read
- onceCloseListener.Close
- persistConn.Read
- persistConnWriter.ReadFrom
- persistConnWriter.Write
- populateResponse.Write
- populateResponse.WriteHeader
- readTrackingBody.Close
- readTrackingBody.Read
- readWriteCloserBody.Read
- redirectHandler.ServeHTTP
- response.Flush
- response.FlushError
- response.Hijack
- response.ReadFrom
- response.Write
- response.WriteHeader
- response.WriteString
- serverHandler.ServeHTTP
- socksDialer.DialWithConn
- socksUsernamePassword.Authenticate
- stringWriter.WriteString
- timeoutHandler.ServeHTTP
- timeoutWriter.Write
- timeoutWriter.WriteHeader
- transportReadFromServerError.Error
- module: golang.org/x/net
versions:
- fixed: 0.23.0
vulnerable_at: 0.22.0
packages:
- package: golang.org/x/net/http2
symbols:
- Framer.readMetaFrame
derived_symbols:
- ClientConn.Close
- ClientConn.Ping
- ClientConn.RoundTrip
- ClientConn.Shutdown
- ConfigureServer
- ConfigureTransport
- ConfigureTransports
- ConnectionError.Error
- ErrCode.String
- FrameHeader.String
- FrameType.String
- FrameWriteRequest.String
- Framer.ReadFrame
- Framer.WriteContinuation
- Framer.WriteData
- Framer.WriteDataPadded
- Framer.WriteGoAway
- Framer.WriteHeaders
- Framer.WritePing
- Framer.WritePriority
- Framer.WritePushPromise
- Framer.WriteRSTStream
- Framer.WriteRawFrame
- Framer.WriteSettings
- Framer.WriteSettingsAck
- Framer.WriteWindowUpdate
- GoAwayError.Error
- ReadFrameHeader
- Server.ServeConn
- Setting.String
- SettingID.String
- SettingsFrame.ForeachSetting
- StreamError.Error
- Transport.CloseIdleConnections
- Transport.NewClientConn
- Transport.RoundTrip
- Transport.RoundTripOpt
- bufferedWriter.Flush
- bufferedWriter.Write
- chunkWriter.Write
- clientConnPool.GetClientConn
- connError.Error
- dataBuffer.Read
- duplicatePseudoHeaderError.Error
- gzipReader.Close
- gzipReader.Read
- headerFieldNameError.Error
- headerFieldValueError.Error
- noDialClientConnPool.GetClientConn
- noDialH2RoundTripper.RoundTrip
- pipe.Read
- priorityWriteScheduler.CloseStream
- priorityWriteScheduler.OpenStream
- pseudoHeaderError.Error
- requestBody.Close
- requestBody.Read
- responseWriter.Flush
- responseWriter.FlushError
- responseWriter.Push
- responseWriter.SetReadDeadline
- responseWriter.SetWriteDeadline
- responseWriter.Write
- responseWriter.WriteHeader
- responseWriter.WriteString
- roundRobinWriteScheduler.OpenStream
- serverConn.CloseConn
- serverConn.Flush
- stickyErrWriter.Write
- transportResponseBody.Close
- transportResponseBody.Read
- writeData.String
summary: HTTP/2 CONTINUATION flood in net/http
description: |-
An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header
data by sending an excessive number of CONTINUATION frames.
Maintaining HPACK state requires parsing and processing all HEADERS and
CONTINUATION frames on a connection. When a request's headers exceed
MaxHeaderBytes, no memory is allocated to store the excess headers, but they are
still parsed.
This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts
of header data, all associated with a request which is going to be rejected.
These headers can include Huffman-encoded data which is significantly more
expensive for the receiver to decode than for an attacker to send.
The fix sets a limit on the amount of excess header frames we will process
before closing a connection.
ghsas:
- GHSA-4v7x-pqxf-cx7m
credits:
- Bartek Nowotarski (https://nowotarski.info/)
references:
- report: https://go.dev/issue/65051
- fix: https://go.dev/cl/576155
- web: https://groups.google.com/g/golang-announce/c/YgW0sx8mN3M
cve_metadata:
id: CVE-2023-45288
cwe: 'CWE-400: Uncontrolled Resource Consumption'
references:
- https://security.netapp.com/advisory/ntap-20240419-0009/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QRYFHIQ6XRKRYBI2F5UESH67BJBQXUPT/
- http://www.openwall.com/lists/oss-security/2024/04/05/4
- http://www.openwall.com/lists/oss-security/2024/04/03/16
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2871.yaml
|
id: GO-2024-2871
modules:
- module: github.com/stacklok/minder
versions:
- fixed: 0.0.50
vulnerable_at: 0.0.49
summary: |-
Stacklok Minder vulnerable to denial of service from maliciously crafted
templates in github.com/stacklok/minder
cves:
- CVE-2024-35194
ghsas:
- GHSA-crgc-2583-rw27
references:
- advisory: https://github.com/stacklok/minder/security/advisories/GHSA-crgc-2583-rw27
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-35194
- fix: https://github.com/stacklok/minder/commit/fe321d345b4f738de6a06b13207addc72b59f892
source:
id: GHSA-crgc-2583-rw27
created: 2024-06-04T14:26:26.747786-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2632.yaml
|
id: GO-2024-2632
modules:
- module: github.com/lestrrat-go/jwx
versions:
- fixed: 1.2.29
vulnerable_at: 1.2.28
packages:
- package: github.com/lestrrat-go/jwx/jwe
symbols:
- uncompress
- Decrypt
derived_symbols:
- Message.Decrypt
- module: github.com/lestrrat-go/jwx/v2
versions:
- fixed: 2.0.21
vulnerable_at: 2.0.20
packages:
- package: github.com/lestrrat-go/jwx/v2/jwe
symbols:
- uncompress
- Decrypt
- Settings
- decryptCtx.decryptContent
summary: |-
JWX vulnerable to a denial of service attack using compressed JWE message in
github.com/lestrrat-go/jwx
description: |-
An attacker with a trusted public key may cause a Denial-of-Service (DoS)
condition by crafting a malicious JSON Web Encryption (JWE) token with an
exceptionally high compression ratio. When this token is processed by the
recipient, it results in significant memory allocation and processing time
during decompression.
cves:
- CVE-2024-28122
ghsas:
- GHSA-hj3v-m684-v259
references:
- advisory: https://github.com/lestrrat-go/jwx/security/advisories/GHSA-hj3v-m684-v259
- fix: https://github.com/lestrrat-go/jwx/commit/d01027d74c7376d66037a10f4f64af9af26a7e34
- fix: https://github.com/lestrrat-go/jwx/commit/d43f2ceb7f0c13714dfe8854d6439766e86faa76
- web: https://github.com/lestrrat-go/jwx/releases/tag/v1.2.29
- web: https://github.com/lestrrat-go/jwx/releases/tag/v2.0.21
source:
id: GHSA-hj3v-m684-v259
created: 2024-05-17T15:43:27.61183-04:00
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1535.yaml
|
id: GO-2023-1535
modules:
- module: github.com/pion/dtls/v2
versions:
- fixed: 2.2.4
vulnerable_at: 2.2.3
packages:
- package: github.com/pion/dtls/v2/pkg/protocol/handshake
symbols:
- MessageServerHello.Unmarshal
derived_symbols:
- Handshake.Unmarshal
summary: Panic during unmarshal of Server Hello in github.com/pion/dtls/v2
description: Unmarshalling a Server Hello can panic, which could allow a denial of service.
ghsas:
- GHSA-hxp2-xqf3-v83h
references:
- fix: https://github.com/pion/dtls/commit/7a14903448b70069fd9e02adf210ca23083c56d2
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0355.yaml
|
id: GO-2022-0355
modules:
- module: github.com/valyala/fasthttp
versions:
- fixed: 1.34.0
vulnerable_at: 1.33.0
packages:
- package: github.com/valyala/fasthttp
symbols:
- FS.NewRequestHandler
derived_symbols:
- AppendBrotliBytes
- AppendBrotliBytesLevel
- AppendDeflateBytes
- AppendDeflateBytesLevel
- AppendGunzipBytes
- AppendGzipBytes
- AppendGzipBytesLevel
- AppendHTTPDate
- AppendInflateBytes
- AppendUnbrotliBytes
- Args.WriteTo
- Client.CloseIdleConnections
- Client.Do
- Client.DoDeadline
- Client.DoRedirects
- Client.DoTimeout
- Client.Get
- Client.GetDeadline
- Client.GetTimeout
- Client.Post
- Cookie.AppendBytes
- Cookie.Cookie
- Cookie.Parse
- Cookie.ParseBytes
- Cookie.String
- Cookie.WriteTo
- Dial
- DialDualStack
- DialDualStackTimeout
- DialTimeout
- Do
- DoDeadline
- DoRedirects
- DoTimeout
- FSHandler
- FileLastModified
- GenerateTestCertificate
- Get
- GetDeadline
- GetTimeout
- HostClient.CloseIdleConnections
- HostClient.Do
- HostClient.DoDeadline
- HostClient.DoRedirects
- HostClient.DoTimeout
- HostClient.Get
- HostClient.GetDeadline
- HostClient.GetTimeout
- HostClient.Post
- LBClient.Do
- LBClient.DoDeadline
- LBClient.DoTimeout
- ListenAndServe
- ListenAndServeTLS
- ListenAndServeTLSEmbed
- ListenAndServeUNIX
- NewStreamReader
- ParseByteRange
- ParseHTTPDate
- ParseIPv4
- PipelineClient.Do
- PipelineClient.DoDeadline
- PipelineClient.DoTimeout
- PipelineClient.PendingRequests
- Post
- Request.Body
- Request.BodyGunzip
- Request.BodyInflate
- Request.BodyUnbrotli
- Request.BodyWriteTo
- Request.ContinueReadBody
- Request.ContinueReadBodyStream
- Request.Host
- Request.MultipartForm
- Request.PostArgs
- Request.Read
- Request.ReadBody
- Request.ReadLimitBody
- Request.SetBodyStreamWriter
- Request.SetHost
- Request.SetHostBytes
- Request.String
- Request.SwapBody
- Request.URI
- Request.Write
- Request.WriteTo
- RequestCtx.FormFile
- RequestCtx.FormValue
- RequestCtx.Host
- RequestCtx.IfModifiedSince
- RequestCtx.MultipartForm
- RequestCtx.Path
- RequestCtx.PostArgs
- RequestCtx.PostBody
- RequestCtx.QueryArgs
- RequestCtx.Redirect
- RequestCtx.RedirectBytes
- RequestCtx.SendFile
- RequestCtx.SendFileBytes
- RequestCtx.SetBodyStreamWriter
- RequestCtx.String
- RequestCtx.URI
- RequestHeader.Add
- RequestHeader.AddBytesK
- RequestHeader.AddBytesKV
- RequestHeader.AddBytesV
- RequestHeader.Read
- RequestHeader.ReadTrailer
- RequestHeader.Set
- RequestHeader.SetByteRange
- RequestHeader.SetBytesK
- RequestHeader.SetBytesKV
- RequestHeader.SetBytesV
- RequestHeader.SetCanonical
- RequestHeader.SetReferer
- RequestHeader.SetRefererBytes
- RequestHeader.Write
- Response.Body
- Response.BodyGunzip
- Response.BodyInflate
- Response.BodyUnbrotli
- Response.BodyWriteTo
- Response.Read
- Response.ReadBody
- Response.ReadLimitBody
- Response.SendFile
- Response.SetBodyStreamWriter
- Response.String
- Response.SwapBody
- Response.Write
- Response.WriteDeflate
- Response.WriteDeflateLevel
- Response.WriteGzip
- Response.WriteGzipLevel
- Response.WriteTo
- ResponseHeader.Add
- ResponseHeader.AddBytesK
- ResponseHeader.AddBytesKV
- ResponseHeader.AddBytesV
- ResponseHeader.AppendBytes
- ResponseHeader.Cookie
- ResponseHeader.DelClientCookie
- ResponseHeader.DelClientCookieBytes
- ResponseHeader.Header
- ResponseHeader.Read
- ResponseHeader.ReadTrailer
- ResponseHeader.Set
- ResponseHeader.SetBytesK
- ResponseHeader.SetBytesKV
- ResponseHeader.SetBytesV
- ResponseHeader.SetCanonical
- ResponseHeader.SetContentRange
- ResponseHeader.SetCookie
- ResponseHeader.SetLastModified
- ResponseHeader.String
- ResponseHeader.Write
- ResponseHeader.WriteTo
- SaveMultipartFile
- Serve
- ServeConn
- ServeFile
- ServeFileBytes
- ServeFileBytesUncompressed
- ServeFileUncompressed
- ServeTLS
- ServeTLSEmbed
- Server.AppendCert
- Server.AppendCertEmbed
- Server.ListenAndServe
- Server.ListenAndServeTLS
- Server.ListenAndServeTLSEmbed
- Server.ListenAndServeUNIX
- Server.Serve
- Server.ServeConn
- Server.ServeTLS
- Server.ServeTLSEmbed
- Server.Shutdown
- TCPDialer.Dial
- TCPDialer.DialDualStack
- TCPDialer.DialDualStackTimeout
- TCPDialer.DialTimeout
- URI.Parse
- URI.Update
- URI.UpdateBytes
- URI.WriteTo
- WriteBrotli
- WriteBrotliLevel
- WriteDeflate
- WriteDeflateLevel
- WriteGunzip
- WriteGzip
- WriteGzipLevel
- WriteInflate
- WriteMultipartForm
- WriteUnbrotli
- bigFileReader.Read
- bigFileReader.WriteTo
- ctxLogger.Printf
- firstByteReader.Read
- flushWriter.Write
- fsFile.NewReader
- fsSmallFileReader.WriteTo
- hijackConn.Close
- hijackConn.Read
- perIPConn.Close
- perIPConnCounter.Unregister
- pipelineConnClient.Do
- pipelineConnClient.DoDeadline
- pipelineConnClient.PendingRequests
- requestStream.Read
- statsWriter.Write
- tcpKeepaliveListener.Accept
- workerPool.Serve
summary: Path traversal in github.com/valyala/fasthttp
description: |-
The fasthttp.FS request handler is vulnerable to directory traversal attacks on
Windows systems, and can serve files from outside the provided root directory.
URL path normalization does not handle Windows path separators (backslashes),
permitting an attacker to construct requests with relative paths.
published: 2022-07-27T20:26:59Z
cves:
- CVE-2022-21221
ghsas:
- GHSA-fx95-883v-4q4h
credits:
- egovorukhin
references:
- fix: https://github.com/valyala/fasthttp/commit/6b5bc7bb304975147b4af68df54ac214ed2554c1
- web: https://github.com/valyala/fasthttp/issues/1226
- web: https://github.com/valyala/fasthttp/releases/tag/v1.34.0
- web: https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMVALYALAFASTHTTP-2407866
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2764.yaml
|
id: GO-2024-2764
modules:
- module: github.com/rancher/rancher
versions:
- introduced: 2.0.0+incompatible
- fixed: 2.1.6+incompatible
vulnerable_at: 2.1.6-rc5+incompatible
summary: |-
Rancher Project Members Have Continued Access to Namespaces After Being Removed
From Them in github.com/rancher/rancher
cves:
- CVE-2019-6287
ghsas:
- GHSA-6r7x-4q7g-h83j
references:
- advisory: https://github.com/advisories/GHSA-6r7x-4q7g-h83j
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2019-6287
- report: https://github.com/rancher/rancher/issues/17244
- report: https://github.com/rancher/rancher/issues/17724
- web: https://forums.rancher.com/t/rancher-release-v2-1-6/13148
- web: https://forums.rancher.com/t/rancher-security-announcement-cve-2018-20321-and-cve-2019-6287/13149
- web: https://rancher.com/blog/2019/2019-01-29-explaining-security-vulnerabilities-addressed-in-rancher-v2-1-6-and-v2-0-11
source:
id: GHSA-6r7x-4q7g-h83j
created: 2024-06-04T15:28:51.235603-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2836.yaml
|
id: GO-2024-2836
modules:
- module: github.com/cea-hpc/sshproxy
versions:
- fixed: 1.6.3
vulnerable_at: 1.6.2
summary: sshproxy vulnerable to SSH option injection in github.com/cea-hpc/sshproxy
cves:
- CVE-2024-34713
ghsas:
- GHSA-jmqp-37m5-49wh
references:
- advisory: https://github.com/cea-hpc/sshproxy/security/advisories/GHSA-jmqp-37m5-49wh
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-34713
- fix: https://github.com/cea-hpc/sshproxy/commit/3b8bccc874dc4ca2c80c956cad65722abb46f0b9
- fix: https://github.com/cea-hpc/sshproxy/commit/f7eabd05d5f0f951e160293692327cad9a7d9580
source:
id: GHSA-jmqp-37m5-49wh
created: 2024-05-17T16:09:33.514363-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1213.yaml
|
id: GO-2022-1213
modules:
- module: github.com/go-macaron/csrf
versions:
- fixed: 0.0.0-20180426211050-dadd1711a617
vulnerable_at: 0.0.0-20170207230724-428b7c62d7d0
packages:
- package: github.com/go-macaron/csrf
symbols:
- Generate
skip_fix: 'TODO: revisit this reason (cannot find module providing package github.com/Unknwon/com)'
summary: Insecure generation of cookies in github.com/go-macaron/csrf
description: |-
The Options.Secure value is ignored, and cookies created by Generate never have
the secure attribute.
cves:
- CVE-2018-25060
ghsas:
- GHSA-hhxg-px5h-jc32
references:
- fix: https://github.com/go-macaron/csrf/pull/7
- fix: https://github.com/go-macaron/csrf/commit/dadd1711a617000b70e5e408a76531b73187031c
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1990.yaml
|
id: GO-2023-1990
modules:
- module: golang.org/x/image
versions:
- fixed: 0.10.0
vulnerable_at: 0.9.0
packages:
- package: golang.org/x/image/tiff
symbols:
- newDecoder
derived_symbols:
- Decode
- DecodeConfig
summary: |-
Excessive CPU consumption when decoding 0-height images in
golang.org/x/image/tiff
description: |-
A maliciously-crafted image can cause excessive CPU consumption in decoding.
A tiled image with a height of 0 and a very large width can cause excessive CPU
consumption, despite the image size (width * height) appearing to be zero.
ghsas:
- GHSA-j3p8-6mrq-6g7h
credits:
- Philippe Antoine (Catena cyber)
references:
- report: https://go.dev/issue/61581
- fix: https://go.dev/cl/514897
cve_metadata:
id: CVE-2023-29407
cwe: 'CWE-834: Excessive Iteration'
references:
- https://security.netapp.com/advisory/ntap-20230831-0009/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KO54NBDUJXKAZNGCFOEYL2LKK2RQP6K6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWH6Q7NVM4MV3GWFEU4PA67AWZHVFJQ2/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XZTEP6JYILRBNDTNWTEQ5D4QUUVQBESK/
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2886.yaml
|
id: GO-2024-2886
modules:
- module: github.com/minio/minio
versions:
- fixed: 0.0.0-20240527191746-e0fe7cc39172
summary: MinIO information disclosure vulnerability in github.com/minio/minio
cves:
- CVE-2024-36107
ghsas:
- GHSA-95fr-cm4m-q5p9
unknown_aliases:
- BIT-minio-2024-36107
- CGA-rq5h-44g8-8973
references:
- advisory: https://github.com/minio/minio/security/advisories/GHSA-95fr-cm4m-q5p9
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-36107
- fix: https://github.com/minio/minio/commit/e0fe7cc391724fc5baa85b45508f425020fe4272
- fix: https://github.com/minio/minio/pull/19810
- web: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/If-Modified-Since
- web: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/If-Unmodified-Since
notes:
- fix: 'github.com/minio/minio: could not add vulnerable_at: cannot auto-guess when fixed version is 0.0.0 pseudo-version'
source:
id: GHSA-95fr-cm4m-q5p9
created: 2024-06-26T14:08:29.094106-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2527.yaml
|
id: GO-2024-2527
modules:
- module: go.etcd.io/etcd
versions:
- fixed: 0.5.0-alpha.5.0.20221102000833-1f054980bc27
non_go_versions:
- introduced: 3.2.22
- fixed: 3.4.22
vulnerable_at: 0.5.0-alpha.5.0.20220915004622-85b640cee793
packages:
- package: go.etcd.io/etcd/pkg/tlsutil
summary: Insecure ciphers are allowed by default in go.etcd.io/etcd
description: |-
The TLS ciphers list supported by etcd contains insecure cipher suites. Users
may specify that an insecure cipher is used via “--cipher-suites” flag. A
list of secure suites is used by default.
ghsas:
- GHSA-5x4g-q5rc-36jp
references:
- advisory: https://github.com/etcd-io/etcd/security/advisories/GHSA-5x4g-q5rc-36jp
source:
id: GHSA-5x4g-q5rc-36jp
created: 2024-06-14T11:40:23.789526-04:00
review_status: REVIEWED
unexcluded: EFFECTIVELY_PRIVATE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2784.yaml
|
id: GO-2024-2784
modules:
- module: github.com/rancher/rancher
versions:
- introduced: 2.0.0+incompatible
unsupported_versions:
- last_affected: 2.0.13
- module: github.com/rancher/rancher
versions:
- introduced: 2.1.0+incompatible
unsupported_versions:
- last_affected: 2.1.8
- module: github.com/rancher/rancher
versions:
- introduced: 2.2.0+incompatible
- fixed: 2.2.2+incompatible
vulnerable_at: 2.2.2-rc9+incompatible
summary: Rancher Recreates Default User With Known Password Despite Deletion in github.com/rancher/rancher
cves:
- CVE-2019-11202
ghsas:
- GHSA-xh8x-j8h3-m5ph
references:
- advisory: https://github.com/advisories/GHSA-xh8x-j8h3-m5ph
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2019-11202
- web: https://forums.rancher.com/t/rancher-release-v2-2-2-addresses-rancher-cve-2019-11202-and-stability-issues/13977
notes:
- fix: 'module merge error: could not merge versions of module github.com/rancher/rancher: introduced and fixed versions must alternate'
- fix: 'github.com/rancher/rancher: could not add vulnerable_at: latest version (1.6.30) is before last introduced version'
source:
id: GHSA-xh8x-j8h3-m5ph
created: 2024-06-26T14:04:33.525939-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2702.yaml
|
id: GO-2024-2702
modules:
- module: github.com/flipped-aurora/gin-vue-admin/server
versions:
- fixed: 0.0.0-20240409100909-b1b7427c6ea6
vulnerable_at: 0.0.0-20240407133540-7bc7c3051067
packages:
- package: github.com/flipped-aurora/gin-vue-admin/server/api/v1/system
symbols:
- AutoCodeApi.AutoPlug
summary: Code injection vulnerability in github.com/flipped-aurora/gin-vue-admin/server
description: |-
Gin-vue-admin has a code injection vulnerability in the backend. In the Plugin
System -> Plugin Template feature, an attacker can perform directory traversal
by manipulating the 'plugName' parameter. They can create specific folders such
as 'api', 'config', 'global', 'model', 'router', 'service', and 'main.go'
function within the specified traversal directory. Moreover, the Go files within
these folders can have arbitrary code inserted based on a specific PoC
parameter.
cves:
- CVE-2024-31457
ghsas:
- GHSA-gv3w-m57p-3wc4
references:
- advisory: https://github.com/flipped-aurora/gin-vue-admin/security/advisories/GHSA-gv3w-m57p-3wc4
- fix: https://github.com/flipped-aurora/gin-vue-admin/commit/b1b7427c6ea6c7a027fa188c6be557f3795e732b
source:
id: GHSA-gv3w-m57p-3wc4
created: 2024-05-17T14:58:48.32303-04:00
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2451.yaml
|
id: GO-2024-2451
modules:
- module: github.com/bincyber/go-sqlcrypter
versions:
- introduced: 0.1.0
vulnerable_at: 0.1.0
packages:
- package: github.com/bincyber/go-sqlcrypter/providers/aesgcm
symbols:
- New
- package: github.com/bincyber/go-sqlcrypter/providers/awskms
symbols:
- New
summary: IV collision in github.com/bincyber/go-sqlcrypter
description: |-
There is a risk of an IV collision using the awskms or aesgcm provider. NIST SP
800-38D section 8.3 states that it is unsafe to encrypt more than 2^32
plaintexts under the same key when using a random IV. The limit could easily be
reached given the use case of database column encryption. Ciphertexts are likely
to be persisted and stored together. IV collision could enable an attacker with
access to the ciphertexts to decrypt all messages encrypted with the affected
key.
The aesgcm provider cannot be fixed without a breaking change, so users should
not encrypt more than 2^32 values with any key. The awskms package can be fixed
without a breaking change by switching to a counter-based IV.
credits:
- '@takeyourhatoff'
references:
- report: https://github.com/bincyber/go-sqlcrypter/issues/127
- web: https://github.com/bincyber/go-sqlcrypter/pull/128
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0054.yaml
|
id: GO-2021-0054
modules:
- module: github.com/tidwall/gjson
versions:
- fixed: 1.6.6
vulnerable_at: 1.6.5
packages:
- package: github.com/tidwall/gjson
symbols:
- unwrap
derived_symbols:
- Get
- GetBytes
- GetMany
- GetManyBytes
- Result.ForEach
- Result.Get
summary: Panic due to improper input validation in ForEach in github.com/tidwall/gjson
description: |-
Due to improper bounds checking, maliciously crafted JSON objects can cause an
out-of-bounds panic. If parsing user input, this may be used as a denial of
service vector.
published: 2021-04-14T20:04:52Z
cves:
- CVE-2020-36067
ghsas:
- GHSA-p64j-r5f4-pwwx
credits:
- '@toptotu'
references:
- fix: https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b
- web: https://github.com/tidwall/gjson/issues/196
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2981.yaml
|
id: GO-2024-2981
modules:
- module: github.com/openclarity/kubeclarity/backend
versions:
- fixed: 0.0.0-20240711173334-1d1178840703
summary: SQL Injection in the KubeClarity REST API in github.com/openclarity/kubeclarity/backend
cves:
- CVE-2024-39909
ghsas:
- GHSA-5248-h45p-9pgw
references:
- advisory: https://github.com/openclarity/kubeclarity/security/advisories/GHSA-5248-h45p-9pgw
- web: https://github.com/openclarity/kubeclarity/blob/main/backend/pkg/database/id_view.go#L79
- web: https://github.com/openclarity/kubeclarity/commit/1d1178840703a72d9082b7fc4aea0a3326c5d294
notes:
- fix: 'github.com/openclarity/kubeclarity/backend: could not add vulnerable_at: cannot auto-guess when fixed version is 0.0.0 pseudo-version'
source:
id: GHSA-5248-h45p-9pgw
created: 2024-07-12T16:33:34.102123356Z
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0758.yaml
|
id: GO-2022-0758
modules:
- module: github.com/sigstore/cosign
versions:
- fixed: 1.10.1
vulnerable_at: 1.10.0
packages:
- package: github.com/sigstore/cosign/cmd/cosign/cli/verify
symbols:
- VerifyAttestationCommand.Exec
summary: Improper verification of signature attestations in github.com/sigstore/cosign
cves:
- CVE-2022-35929
ghsas:
- GHSA-vjxv-45g9-9296
references:
- advisory: https://github.com/sigstore/cosign/security/advisories/GHSA-vjxv-45g9-9296
- fix: https://github.com/sigstore/cosign/commit/c5fda01a8ff33ca981f45a9f13e7fb6bd2080b94
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0236.yaml
|
id: GO-2022-0236
modules:
- module: std
versions:
- fixed: 1.15.12
- introduced: 1.16.0-0
- fixed: 1.16.4
vulnerable_at: 1.16.3
packages:
- package: net/http
symbols:
- http2clientStream.writeRequest
- http2isConnectionCloseRequest
- isProtocolSwitchHeader
- shouldClose
- module: golang.org/x/net
versions:
- fixed: 0.0.0-20210428140749-89ef3d95e781
vulnerable_at: 0.0.0-20210427231257-85d9c07bbe3a
packages:
- package: golang.org/x/net/http/httpguts
symbols:
- headerValueContainsToken
derived_symbols:
- HeaderValuesContainsToken
summary: Panic due to large headers in net/http and golang.org/x/net/http/httpguts
description: |-
A malicious HTTP server or client can cause the net/http client or server to
panic.
ReadRequest and ReadResponse can hit an unrecoverable panic when reading a very
large header (over 7MB on 64-bit architectures, or over 4MB on 32-bit ones).
Transport and Client are vulnerable and the program can be made to crash by a
malicious server. Server is not vulnerable by default, but can be if the default
max header of 1MB is overridden by setting Server.MaxHeaderBytes to a higher
value, in which case the program can be made to crash by a malicious client.
This also affects golang.org/x/net/http2/h2c and HeaderValuesContainsToken in
golang.org/x/net/http/httpguts.
published: 2022-07-15T23:04:18Z
cves:
- CVE-2021-31525
ghsas:
- GHSA-h86h-8ppg-mxmh
credits:
- Guido Vranken
references:
- fix: https://go.dev/cl/313069
- fix: https://go.googlesource.com/net/+/89ef3d95e781148a0951956029c92a211477f7f9
- report: https://go.dev/issue/45710
- web: https://groups.google.com/g/golang-announce/c/cu9SP4eSXMc
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2602.yaml
|
id: GO-2024-2602
modules:
- module: github.com/coder/coder
vulnerable_at: 0.27.3
packages:
- package: github.com/coder/coder/coderd
symbols:
- Api.userOIDC
- API.New
- module: github.com/coder/coder/v2
versions:
- fixed: 2.6.1
- introduced: 2.7.0
- fixed: 2.7.3
- introduced: 2.8.0
- fixed: 2.8.4
vulnerable_at: 2.8.3
packages:
- package: github.com/coder/coder/v2/coderd
symbols:
- Api.userOIDC
- Api.New
summary: Incorrect email domain verification in github.com/coder/coder
description: |-
A vulnerability in Coder's OIDC authentication could allow an attacker to bypass
the CODER_OIDC_EMAIL_DOMAIN verification and create an account with an email not
in the allowlist. Deployments are only affected if the OIDC provider allows
users to create accounts on the provider (such as public providers like
google.com). During OIDC registration, the user's email was improperly validated
against the allowed CODER_OIDC_EMAIL_DOMAINs.
cves:
- CVE-2024-27918
ghsas:
- GHSA-7cc2-r658-7xpf
credits:
- arcz
- maxammann
references:
- advisory: https://github.com/coder/coder/security/advisories/GHSA-7cc2-r658-7xpf
- fix: https://github.com/coder/coder/commit/1171ce7add017481d28441575024209ac160ecb0
- fix: https://github.com/coder/coder/commit/2ba84911f8b02605e5958d5e4a2fe3979ec50b31
- fix: https://github.com/coder/coder/commit/2d37eb42e7db656e343fe1f36de5ab1a1a62f4fb
- fix: https://github.com/coder/coder/commit/4439a920e454a82565e445e4376c669e3b89591c
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1159.yaml
|
id: GO-2022-1159
modules:
- module: github.com/containers/podman/v4
versions:
- introduced: 4.1.0-rc1
vulnerable_at: 4.3.1
packages:
- package: github.com/containers/podman/v4/pkg/bindings/images
symbols:
- Build
- nTar
summary: Path traversal in github.com/containers/podman/v4
description: |-
The local path and the lowest subdirectory may be disclosed due to incorrect
absolute path traversal, resulting in an impact to confidentiality.
cves:
- CVE-2022-4123
ghsas:
- GHSA-rprg-4v7q-87v7
credits:
- Sage McTaggart
references:
- report: https://bugzilla.redhat.com/show_bug.cgi?id=2144989
- web: https://github.com/containers/podman/pull/13531
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0346.yaml
|
id: GO-2022-0346
modules:
- module: github.com/quay/claircore
versions:
- fixed: 1.1.0
vulnerable_at: 1.1.0-rc.0
packages:
- package: github.com/quay/claircore/rpm
symbols:
- Scanner.Scan
summary: Path traversal in github.com/quay/claircore
description: |-
A maliciously crafted RPM file can cause the Scanner.Scan function to write
files with arbitrary contents to arbitrary locations on the local filestem.
published: 2022-07-15T23:30:27Z
cves:
- CVE-2021-3762
ghsas:
- GHSA-mq47-6wwv-v79w
references:
- fix: https://github.com/quay/claircore/pull/478
- fix: https://github.com/quay/claircore/commit/691f2023a1720a0579e688b69a2f4bfe1f4b7821
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2918.yaml
|
id: GO-2024-2918
modules:
- module: github.com/Azure/azure-sdk-for-go/sdk/azidentity
versions:
- fixed: 1.6.0
vulnerable_at: 1.6.0-beta.4
packages:
- package: github.com/Azure/azure-sdk-for-go/sdk/azidentity
symbols:
- managedIdentityClient.createServiceFabricAuthRequest
- managedIdentityClient.createIMDSAuthRequest
- managedIdentityClient.createAzureMLAuthRequest
- managedIdentityClient.createAccessToken
- managedIdentityClient.createCloudShellAuthRequest
- newManagedIdentityClient
- managedIdentityClient.createAppServiceAuthRequest
- managedIdentityClient.getAzureArcSecretKey
- managedIdentityClient.authenticate
- managedIdentityClient.createAzureArcAuthRequest
derived_symbols:
- AzurePipelinesCredential.GetToken
- ChainedTokenCredential.GetToken
- ClientAssertionCredential.GetToken
- ClientCertificateCredential.GetToken
- ClientSecretCredential.GetToken
- DefaultAzureCredential.GetToken
- EnvironmentCredential.GetToken
- ManagedIdentityCredential.GetToken
- NewDefaultAzureCredential
- NewManagedIdentityCredential
- OnBehalfOfCredential.GetToken
- WorkloadIdentityCredential.GetToken
- confidentialClient.GetToken
summary: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/Azure/azure-sdk-for-go/sdk/azidentity
cves:
- CVE-2024-35255
ghsas:
- GHSA-m5vv-6r4h-3vj9
references:
- advisory: https://github.com/advisories/GHSA-m5vv-6r4h-3vj9
- fix: https://github.com/Azure/azure-sdk-for-go/commit/50774cd9709905523136fb05e8c85a50e8984499
- web: https://github.com/AzureAD/microsoft-authentication-library-for-dotnet/issues/4806#issuecomment-2178960340
- web: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35255
source:
id: GHSA-m5vv-6r4h-3vj9
created: 2024-07-01T16:01:15.242669-04:00
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2116.yaml
|
id: GO-2023-2116
modules:
- module: github.com/gofiber/fiber/v2
versions:
- fixed: 2.50.0
vulnerable_at: 2.49.2
packages:
- package: github.com/gofiber/fiber/v2/middleware/csrf
symbols:
- configDefault
- New
- CsrfFromParam
- CsrfFromForm
- CsrfFromCookie
- CsrfFromHeader
- CsrfFromQuery
- newManager
- manager.getRaw
- manager.setRaw
summary: CSRF token validation vulnerability in github.com/gofiber/fiber/v2
description: |-
A cross-site request forgery vulnerability can allow an attacker to obtain
tokens and forge malicious requests on behalf of a user. This can lead to
unauthorized actions being taken on the user's behalf, potentially compromising
the security and integrity of the application.
The vulnerability is caused by improper validation and enforcement of CSRF
tokens within the application. The CSRF token is validated against tokens in
storage but was is not tied to the original requestor that generated it,
allowing for token reuse.
cves:
- CVE-2023-45141
ghsas:
- GHSA-mv73-f69x-444p
references:
- advisory: https://github.com/gofiber/fiber/security/advisories/GHSA-mv73-f69x-444p
- fix: https://github.com/gofiber/fiber/commit/8c3916dbf4ad2ed427d02c6eb63ae8b2fa8f019a
- fix: https://github.com/gofiber/fiber/commit/b50d91d58ecdff2a330bf07950244b6c4caf65b1
notes:
- There is a closely related vulnerability (GO-2023-2115), and it is not clear which fix applies to which vulnerability, so I have marked both fixes as applying to both vulnerabilities.
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2597.yaml
|
id: GO-2024-2597
modules:
- module: github.com/authzed/spicedb
versions:
- fixed: 1.29.2
vulnerable_at: 1.29.1
summary: Integer overflow in chunking helper causes dispatching to miss elements or panic in github.com/authzed/spicedb
cves:
- CVE-2024-27101
ghsas:
- GHSA-h3m7-rqc4-7h9p
references:
- advisory: https://github.com/authzed/spicedb/security/advisories/GHSA-h3m7-rqc4-7h9p
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-27101
- fix: https://github.com/authzed/spicedb/commit/ef443c442b96909694390324a99849b0407007fe
source:
id: GHSA-h3m7-rqc4-7h9p
created: 2024-05-17T16:14:59.533653-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2670.yaml
|
id: GO-2024-2670
modules:
- module: github.com/hashicorp/nomad
versions:
- introduced: 0.7.0
- fixed: 1.4.11
- introduced: 1.5.0
- fixed: 1.5.6
vulnerable_at: 1.5.5
summary: ACL security vulnerability in github.com/hashicorp/nomad
description: |-
An ACL policy using a block without label can be applied to unexpected resources
in Nomad, a distributed, highly available scheduler designed for effortless
operations and management of applications.
cves:
- CVE-2023-3072
ghsas:
- GHSA-rpvr-38xv-xvxq
credits:
- anonymous4ACL24
references:
- web: https://discuss.hashicorp.com/t/hcsec-2023-20-nomad-acl-policies-without-label-are-applied-to-unexpected-resources/56270
review_status: REVIEWED
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.