repo_id
stringclasses
927 values
file_path
stringlengths
99
214
content
stringlengths
2
4.15M
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0572.yaml
id: GO-2022-0572 modules: - module: github.com/astaxie/beego vulnerable_at: 1.12.3 packages: - package: github.com/astaxie/beego symbols: - Tree.Match derived_symbols: - App.Run - ControllerRegister.FindPolicy - ControllerRegister.FindRouter - ControllerRegister.ServeHTTP - FilterRouter.ValidRouter - InitBeegoBeforeTest - Run - RunWithMiddleWares - TestBeegoInit - adminApp.Run - module: github.com/beego/beego vulnerable_at: 1.12.11 packages: - package: github.com/beego/beego symbols: - Tree.Match derived_symbols: - App.Run - ControllerRegister.FindPolicy - ControllerRegister.FindRouter - ControllerRegister.ServeHTTP - FilterRouter.ValidRouter - InitBeegoBeforeTest - Run - RunWithMiddleWares - TestBeegoInit - adminApp.Run - module: github.com/beego/beego/v2 versions: - introduced: 2.0.0 - fixed: 2.0.3 vulnerable_at: 2.0.1 packages: - package: github.com/beego/beego/v2/server/web symbols: - Tree.Match derived_symbols: - AddNamespace - AddViewPath - Any - AutoPrefix - AutoRouter - BuildTemplate - Compare - CompareNot - Controller.Abort - Controller.CheckXSRFCookie - Controller.CustomAbort - Controller.Delete - Controller.DestroySession - Controller.Get - Controller.GetBool - Controller.GetFile - Controller.GetFloat - Controller.GetInt - Controller.GetInt16 - Controller.GetInt32 - Controller.GetInt64 - Controller.GetInt8 - Controller.GetSecureCookie - Controller.GetString - Controller.GetStrings - Controller.GetUint16 - Controller.GetUint32 - Controller.GetUint64 - Controller.GetUint8 - Controller.Head - Controller.Input - Controller.IsAjax - Controller.Options - Controller.ParseForm - Controller.Patch - Controller.Post - Controller.Put - Controller.Redirect - Controller.Render - Controller.RenderBytes - Controller.RenderString - Controller.SaveToFile - Controller.ServeFormatted - Controller.ServeJSON - Controller.ServeJSONP - Controller.ServeXML - Controller.ServeYAML - Controller.SessionRegenerateID - Controller.SetData - Controller.SetSecureCookie - Controller.Trace - Controller.URLFor - Controller.XSRFFormHTML - Controller.XSRFToken - ControllerRegister.Add - ControllerRegister.AddAuto - ControllerRegister.AddAutoPrefix - ControllerRegister.AddMethod - ControllerRegister.Any - ControllerRegister.Delete - ControllerRegister.FindPolicy - ControllerRegister.FindRouter - ControllerRegister.Get - ControllerRegister.GetContext - ControllerRegister.Handler - ControllerRegister.Head - ControllerRegister.Include - ControllerRegister.InsertFilter - ControllerRegister.InsertFilterChain - ControllerRegister.Options - ControllerRegister.Patch - ControllerRegister.Post - ControllerRegister.Put - ControllerRegister.ServeHTTP - ControllerRegister.URLFor - Date - DateFormat - DateParse - Delete - Exception - ExecuteTemplate - ExecuteViewPathTemplate - FileSystem.Open - FilterRouter.ValidRouter - FlashData.Error - FlashData.Notice - FlashData.Set - FlashData.Store - FlashData.Success - FlashData.Warning - Get - GetConfig - HTML2str - Handler - Head - Htmlquote - Htmlunquote - HttpServer.Any - HttpServer.AutoPrefix - HttpServer.AutoRouter - HttpServer.Delete - HttpServer.Get - HttpServer.Handler - HttpServer.Head - HttpServer.Include - HttpServer.InsertFilter - HttpServer.InsertFilterChain - HttpServer.LogAccess - HttpServer.Options - HttpServer.Patch - HttpServer.Post - HttpServer.PrintTree - HttpServer.Put - HttpServer.RESTRouter - HttpServer.Router - HttpServer.Run - Include - InitBeegoBeforeTest - InsertFilter - InsertFilterChain - LoadAppConfig - LogAccess - MapGet - Namespace.Any - Namespace.AutoPrefix - Namespace.AutoRouter - Namespace.Cond - Namespace.Delete - Namespace.Filter - Namespace.Get - Namespace.Handler - Namespace.Head - Namespace.Include - Namespace.Namespace - Namespace.Options - Namespace.Patch - Namespace.Post - Namespace.Put - Namespace.Router - NewControllerRegister - NewControllerRegisterWithCfg - NewHttpServerWithCfg - NewHttpSever - NewNamespace - NotNil - Options - ParseForm - Patch - Policy - Post - PrintTree - Put - RESTRouter - ReadFromRequest - RenderForm - Router - Run - RunWithMiddleWares - TestBeegoInit - Tree.AddRouter - Tree.AddTree - URLFor - URLMap.GetMap - URLMap.GetMapData - Walk - adminApp.Run - adminController.AdminIndex - adminController.Healthcheck - adminController.ListConf - adminController.ProfIndex - adminController.PrometheusMetrics - adminController.QpsIndex - adminController.TaskStatus - beegoAppConfig.Bool - beegoAppConfig.DefaultBool - beegoAppConfig.SaveConfigFile - beegoAppConfig.Unmarshaler summary: |- Access control bypass via incorrect route lookup in github.com/beego/beego and beego/v2 description: |- An issue was discovered in the route lookup process in beego which attackers to bypass access control. published: 2022-08-22T17:56:17Z cves: - CVE-2021-30080 ghsas: - GHSA-28r6-jm5h-mrgg references: - fix: https://github.com/beego/beego/pull/4459 - fix: https://github.com/beego/beego/commit/d5df5e470d0a8ed291930ae802fd7e6b95226519 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2185.yaml
id: GO-2023-2185 modules: - module: std versions: - fixed: 1.20.11 - introduced: 1.21.0-0 - fixed: 1.21.4 vulnerable_at: 1.21.3 packages: - package: path/filepath goos: - windows symbols: - Clean - volumeNameLen - join derived_symbols: - Abs - Base - Dir - EvalSymlinks - Glob - IsLocal - Join - Rel - Split - VolumeName - Walk - WalkDir - package: internal/safefilepath goos: - windows symbols: - fromFS derived_symbols: - FromFS - module: std versions: - introduced: 1.20.11 - fixed: 1.20.12 - introduced: 1.21.4 - fixed: 1.21.5 vulnerable_at: 1.21.4 packages: - package: path/filepath goos: - windows symbols: - volumeNameLen derived_symbols: - Abs - Base - Clean - Dir - EvalSymlinks - Glob - IsLocal - Join - Rel - Split - VolumeName - Walk - WalkDir summary: Insecure parsing of Windows paths with a \??\ prefix in path/filepath description: |- The filepath package does not recognize paths with a \??\ prefix as special. On Windows, a path beginning with \??\ is a Root Local Device path equivalent to a path beginning with \\?\. Paths with a \??\ prefix may be used to access arbitrary locations on the system. For example, the path \??\c:\x is equivalent to the more common path c:\x. Before fix, Clean could convert a rooted path such as \a\..\??\b into the root local device path \??\b. Clean will now convert this to .\??\b. Similarly, Join(\, ??, b) could convert a seemingly innocent sequence of path elements into the root local device path \??\b. Join will now convert this to \.\??\b. In addition, with fix, IsAbs now correctly reports paths beginning with \??\ as absolute, and VolumeName correctly reports the \??\ prefix as a volume name. UPDATE: Go 1.20.11 and Go 1.21.4 inadvertently changed the definition of the volume name in Windows paths starting with \?, resulting in filepath.Clean(\?\c:) returning \?\c: rather than \?\c:\ (among other effects). The previous behavior has been restored. references: - report: https://go.dev/issue/63713 - fix: https://go.dev/cl/540277 - web: https://groups.google.com/g/golang-announce/c/4tU8LZfBFkY - report: https://go.dev/issue/64028 - fix: https://go.dev/cl/541175 - web: https://groups.google.com/g/golang-dev/c/6ypN5EjibjM/m/KmLVYH_uAgAJ cve_metadata: id: CVE-2023-45283 cwe: 'CWE-41: Improper Resolution of Path Equivalence' references: - http://www.openwall.com/lists/oss-security/2023/12/05/2 - https://security.netapp.com/advisory/ntap-20231214-0008/ review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0962.yaml
id: GO-2022-0962 modules: - module: helm.sh/helm/v3 versions: - fixed: 3.9.4 vulnerable_at: 3.9.3 packages: - package: helm.sh/helm/v3/pkg/strvals symbols: - setIndex derived_symbols: - Parse - ParseFile - ParseInto - ParseIntoFile - ParseIntoString - ParseString - ToYAML summary: Denial of service through string value parsing in helm.sh/helm/v3 description: |- Applications that use the strvals package in the Helm SDK to parse user supplied input can suffer a Denial of Service when that input causes a panic that cannot be recovered from. The strvals package contains a parser that turns strings into Go structures. For example, the Helm client has command line flags like --set, --set-string, and others that enable the user to pass in strings that are merged into the values. The strvals package converts these strings into structures Go can work with. Some string inputs can cause array data structures to be created causing an out of memory panic. The Helm Client will panic with input to --set, --set-string, and other value setting flags that causes an out of memory panic. Helm is not a long running service so the panic will not affect future uses of the Helm client. published: 2022-09-02T15:19:52Z cves: - CVE-2022-36055 ghsas: - GHSA-7hfp-qfw3-5jxh related: - CVE-2022-36049 - GHSA-p2g7-xwvr-rrw3 credits: - Ada Logics in a fuzzing audit sponsored by CNCF references: - advisory: https://github.com/helm/helm/security/advisories/GHSA-7hfp-qfw3-5jxh - fix: https://github.com/helm/helm/commit/10466e3e179cc8cad4b0bb451108d3c442c69fbc - web: https://github.com/helm/helm/releases/tag/v3.9.4 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0050.yaml
id: GO-2020-0050 modules: - module: github.com/russellhaering/goxmldsig versions: - fixed: 1.1.0 vulnerable_at: 0.0.0-20200902171629-2e1fbc2c5593 packages: - package: github.com/russellhaering/goxmldsig symbols: - ValidationContext.findSignature derived_symbols: - ValidationContext.Validate summary: XML digital signature validation bypass in github.com/russellhaering/goxmldsig description: |- Due to the behavior of encoding/xml, a crafted XML document may cause XML Digital Signature validation to be entirely bypassed, causing an unsigned document to appear signed. published: 2021-04-14T20:04:52Z cves: - CVE-2020-15216 ghsas: - GHSA-q547-gmf8-8jr7 related: - CVE-2020-26290 - CVE-2020-27847 - GHSA-2x32-jm95-2cpx - GHSA-m9hp-7r99-94h5 credits: - '@jupenur' references: - fix: https://github.com/russellhaering/goxmldsig/commit/f6188febf0c29d7ffe26a0436212b19cb9615e64 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2043.yaml
id: GO-2023-2043 modules: - module: std versions: - fixed: 1.20.8 - introduced: 1.21.0-0 - fixed: 1.21.1 vulnerable_at: 1.21.0 packages: - package: html/template symbols: - escaper.escapeText - tSpecialTagEnd - indexTagEnd derived_symbols: - Template.Execute - Template.ExecuteTemplate summary: Improper handling of special tags within script contexts in html/template description: |- The html/template package does not apply the proper rules for handling occurrences of "<script", "<!--", and "</script" within JS literals in <script> contexts. This may cause the template parser to improperly consider script contexts to be terminated early, causing actions to be improperly escaped. This could be leveraged to perform an XSS attack. credits: - Takeshi Kaneko (GMO Cybersecurity by Ierae, Inc.) references: - report: https://go.dev/issue/62197 - fix: https://go.dev/cl/526157 - web: https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ cve_metadata: id: CVE-2023-39319 cwe: 'CWE-79: Improper Neutralization of Input During Web Page Generation (''Cross-site Scripting'')' references: - https://security.netapp.com/advisory/ntap-20231020-0009/ - https://security.gentoo.org/glsa/202311-09 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0105.yaml
id: GO-2021-0105 modules: - module: github.com/ethereum/go-ethereum versions: - introduced: 1.9.4 - fixed: 1.9.20 vulnerable_at: 1.9.20-0.20200821114314-b68929caee77 packages: - package: github.com/ethereum/go-ethereum/core/state symbols: - StateDB.createObject derived_symbols: - StateDB.AddBalance - StateDB.CreateAccount - StateDB.GetOrNewStateObject - StateDB.SetBalance - StateDB.SetCode - StateDB.SetNonce - StateDB.SetState - StateDB.SetStorage - StateDB.SubBalance summary: Consensus flaw in github.com/ethereum/go-ethereum description: |- Due to an incorrect state calculation, a specific set of transactions could cause a consensus disagreement, causing users of this package to reject a canonical chain. published: 2021-07-28T18:08:05Z cves: - CVE-2020-26265 ghsas: - GHSA-xw37-57qp-9mm4 credits: - John Youngseok Yang (Software Platform Lab) references: - fix: https://github.com/ethereum/go-ethereum/pull/21080 - fix: https://github.com/ethereum/go-ethereum/commit/87c0ba92136a75db0ab2aba1046d4a9860375d6a review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2875.yaml
id: GO-2024-2875 modules: - module: github.com/requarks/wiki unsupported_versions: - cve_version_range: affected at <= 2.5.302 vulnerable_at: 2.5.303+incompatible summary: Wiki.js Stored XSS through Client Side Template Injection in github.com/requarks/wiki cves: - CVE-2024-34710 references: - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-34710 - fix: https://github.com/requarks/wiki/commit/1238d614e1599fefadd4614ee4b5797a087f50ac - web: https://github.com/requarks/wiki/security/advisories/GHSA-xjcj-p2qv-q3rf source: id: CVE-2024-34710 created: 2024-06-04T15:25:57.702499-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2932.yaml
id: GO-2024-2932 modules: - module: github.com/rancher/rancher non_go_versions: - introduced: 2.7.0 - fixed: 2.7.14 - introduced: 2.8.0 - fixed: 2.8.5 vulnerable_at: 1.6.30 summary: Rancher's RKE1 Encryption Config kept in plain-text within cluster AppliedSpec in github.com/rancher/rancher cves: - CVE-2024-22032 ghsas: - GHSA-q6c7-56cq-g2wm references: - advisory: https://github.com/rancher/rancher/security/advisories/GHSA-q6c7-56cq-g2wm source: id: GHSA-q6c7-56cq-g2wm created: 2024-06-27T15:54:05.57143-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2523.yaml
id: GO-2024-2523 modules: - module: github.com/grafana/grafana non_go_versions: - fixed: 6.7.2 vulnerable_at: 5.4.5+incompatible summary: Grafana stored XSS in github.com/grafana/grafana cves: - CVE-2020-11110 ghsas: - GHSA-xr3x-62qw-vc4w unknown_aliases: - BIT-grafana-2020-11110 references: - advisory: https://github.com/advisories/GHSA-xr3x-62qw-vc4w - advisory: https://nvd.nist.gov/vuln/detail/CVE-2020-11110 - fix: https://github.com/grafana/grafana/commit/fb114a75241aaef4c08581b42509c750738b768a - fix: https://github.com/grafana/grafana/pull/23254 - web: https://github.com/grafana/grafana/blob/master/CHANGELOG.md - web: https://security.netapp.com/advisory/ntap-20200810-0002 source: id: GHSA-xr3x-62qw-vc4w created: 2024-06-14T11:40:12.676807-04:00 review_status: UNREVIEWED unexcluded: EFFECTIVELY_PRIVATE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2718.yaml
id: GO-2024-2718 modules: - module: github.com/sigstore/cosign vulnerable_at: 1.13.6 - module: github.com/sigstore/cosign/v2 versions: - fixed: 2.2.4 unsupported_versions: - last_affected: 2.2.3 vulnerable_at: 2.2.3 summary: Cosign malicious attachments can cause system-wide denial of service in github.com/sigstore/cosign cves: - CVE-2024-29902 ghsas: - GHSA-88jx-383q-w4qc unknown_aliases: - BIT-cosign-2024-29902 references: - advisory: https://github.com/sigstore/cosign/security/advisories/GHSA-88jx-383q-w4qc - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-29902 - fix: https://github.com/sigstore/cosign/commit/629f5f8fa672973503edde75f84dcd984637629e - web: https://github.com/google/go-containerregistry/blob/a0658aa1d0cc7a7f1bcc4a3af9155335b6943f40/pkg/v1/remote/layer.go#L36-L40 - web: https://github.com/sigstore/cosign/blob/9bc3ee309bf35d2f6e17f5d23f231a3d8bf580bc/pkg/oci/remote/remote.go#L228-L239 - web: https://github.com/sigstore/cosign/releases/tag/v2.2.4 source: id: GHSA-88jx-383q-w4qc created: 2024-06-26T14:00:44.029803-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0326.yaml
id: GO-2022-0326 modules: - module: github.com/sigstore/cosign versions: - fixed: 1.5.2 vulnerable_at: 1.5.1 packages: - package: github.com/sigstore/cosign/pkg/cosign symbols: - VerifyBundle derived_symbols: - VerifyImageAttestations - VerifyImageSignature - VerifyImageSignatures - VerifyLocalImageAttestations - VerifyLocalImageSignatures - package: github.com/sigstore/cosign/pkg/sget symbols: - SecureGet.Do - package: github.com/sigstore/cosign/cmd/cosign/cli/verify symbols: - VerifyAttestationCommand.Exec - VerifyCommand.Exec - PrintVerificationHeader summary: Improper certificate validation in github.com/sigstore/cosign description: |- Cosign can be manipulated to claim that an entry for a signature in the OCI registry exists in the Rekor transparency log even if it does not. This requires the attacker to have pull and push permissions for the signature in OCI. This can happen with both standard signing with a keypair and "keyless signing" with Fulcio certificate authority. cves: - CVE-2022-23649 ghsas: - GHSA-ccxc-vr6p-4858 references: - fix: https://github.com/sigstore/cosign/commit/96d410a6580e4e81d24d112a0855c70ca3fb5b49 - web: https://github.com/sigstore/cosign/releases/tag/v1.5.2 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2581.yaml
id: GO-2024-2581 modules: - module: github.com/treeverse/lakefs versions: - introduced: 0.90.0 - fixed: 1.12.1 vulnerable_at: 1.12.0 summary: |- User with ci:ReadAction permissions and write permissions to one path in a repository may copy objects from any path in the repository in github.com/treeverse/lakefs ghsas: - GHSA-fvv5-h29g-f6w5 references: - advisory: https://github.com/treeverse/lakeFS/security/advisories/GHSA-fvv5-h29g-f6w5 - web: https://github.com/treeverse/lakeFS/commit/56556ee5406fc5425b9302cd08a8d412635fdcd7 source: id: GHSA-fvv5-h29g-f6w5 created: 2024-05-17T16:15:01.346474-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2481.yaml
id: GO-2024-2481 modules: - module: github.com/0xJacky/Nginx-UI non_go_versions: - fixed: 2.0.0-beta.12 vulnerable_at: 1.9.9 summary: |- Nginx-UI vulnerable to arbitrary file write through the Import Certificate feature in github.com/0xJacky/Nginx-UI cves: - CVE-2024-23827 ghsas: - GHSA-xvq9-4vpv-227m references: - advisory: https://github.com/0xJacky/nginx-ui/security/advisories/GHSA-xvq9-4vpv-227m - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-23827 - web: https://github.com/0xJacky/nginx-ui/blob/f20d97a9fdc2a83809498b35b6abc0239ec7fdda/api/certificate/certificate.go#L72 - web: https://github.com/0xJacky/nginx-ui/blob/f20d97a9fdc2a83809498b35b6abc0239ec7fdda/internal/cert/write_file.go#L15 - web: https://github.com/0xJacky/nginx-ui/commit/8581bdd3c6f49ab345b773517ba9173fa7fc6199 source: id: GHSA-xvq9-4vpv-227m created: 2024-06-14T11:37:04.445587-04:00 review_status: UNREVIEWED unexcluded: NOT_IMPORTABLE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2643.yaml
id: GO-2024-2643 modules: - module: github.com/argoproj/argo-cd versions: - introduced: 1.2.0-rc1 vulnerable_at: 1.8.6 packages: - package: github.com/argoproj/argo-cd/server/application symbols: - Server.Create skip_fix: Cannot handle replace directives within the go.mod file. - module: github.com/argoproj/argo-cd/v2 versions: - introduced: 2.0.0 - fixed: 2.8.12 - introduced: 2.9.0 - fixed: 2.9.8 - introduced: 2.10.0 - fixed: 2.10.3 vulnerable_at: 2.10.2 packages: - package: github.com/argoproj/argo-cd/v2/server/application symbols: - Server.Create summary: Bypass manifest during application creation in github.com/argoproj/argo-cd/v2 description: |- An improper validation bug allows users who have create privileges to sync a local manifest during application creation. This allows for bypassing the restriction that the manifests come from some approved git/Helm/OCI source. cves: - CVE-2023-50726 ghsas: - GHSA-g623-jcgg-mhmm unknown_aliases: - BIT-argo-cd-2023-50726 credits: - '@crenshaw-dev' references: - fix: https://github.com/argoproj/argo-cd/commit/3b8f673f06c2d228e01cbc830e5cb57cef008978 - web: https://argo-cd.readthedocs.io/en/latest/operator-manual/rbac review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0097.yaml
id: GO-2021-0097 modules: - module: github.com/dhowden/tag versions: - fixed: 0.0.0-20201120070457-d52dcb253c63 vulnerable_at: 0.0.0-20201119192538-6b18201aa5c5 packages: - package: github.com/dhowden/tag symbols: - readPICFrame - readAPICFrame - readTextWithDescrFrame - metadataMP4.readAtomData derived_symbols: - ReadAtoms - ReadDSFTags - ReadFrom - ReadID3v2Tags summary: Panic due to out-of-bounds read in github.com/dhowden/tag description: |- Due to improper bounds checking, a number of methods can trigger a panic due to attempted out-of-bounds reads. If the package is used to parse user supplied input, this may be used as a vector for a denial of service attack. published: 2021-04-14T20:04:52Z cves: - CVE-2020-29242 - CVE-2020-29243 - CVE-2020-29244 - CVE-2020-29245 ghsas: - GHSA-27mh-3343-6hg5 - GHSA-9wm7-rc47-g56m - GHSA-9xm8-8qvc-vw3p - GHSA-wg79-2cgp-qrjm credits: - '@Jayl1n' references: - fix: https://github.com/dhowden/tag/commit/d52dcb253c63a153632bfee5f269dd411dcd8e96 - web: https://github.com/dhowden/tag/commit/a92213460e4838490ce3066ef11dc823cdc1740e - web: https://github.com/dhowden/tag/commit/4b595ed4fac79f467594aa92f8953f90f817116e - web: https://github.com/dhowden/tag/commit/6b18201aa5c5535511802ddfb4e4117686b4866d review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2729.yaml
id: GO-2024-2729 modules: - module: github.com/openfga/openfga versions: - introduced: 1.5.0 - fixed: 1.5.3 vulnerable_at: 1.5.2 summary: OpenFGA Authorization Bypass in github.com/openfga/openfga cves: - CVE-2024-31452 ghsas: - GHSA-8cph-m685-6v6r references: - advisory: https://github.com/openfga/openfga/security/advisories/GHSA-8cph-m685-6v6r - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-31452 - fix: https://github.com/openfga/openfga/commit/b6a6d99b2bdbf8c3781503989576076289f48ed2 source: id: GHSA-8cph-m685-6v6r created: 2024-05-17T16:13:06.3276-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2721.yaml
id: GO-2024-2721 modules: - module: github.com/tiagorlampert/CHAOS vulnerable_at: 0.0.0-20221223015212-7d5b20ad7e58 packages: - package: github.com/tiagorlampert/CHAOS/presentation/http symbols: - httpController.sendCommandHandler derived_symbols: - NewServer summary: Cross site scripting in github.com/tiagorlampert/CHAOS description: |- A malicious actor may be able to extract a JWT token via malicious "/command" request. This is a form of cross site scripting (XSS). cves: - CVE-2024-31839 ghsas: - GHSA-c5rv-hjjc-jv7m references: - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-31839 - web: https://blog.chebuya.com/posts/remote-code-execution-on-chaos-rat-via-spoofed-agents source: id: GHSA-c5rv-hjjc-jv7m created: 2024-05-08T22:48:36.09641-07:00 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2970.yaml
id: GO-2024-2970 modules: - module: github.com/gogs/gogs unsupported_versions: - last_affected: 0.13.0 vulnerable_at: 0.13.0 summary: Gogs allows deletion of internal files in github.com/gogs/gogs cves: - CVE-2024-39931 ghsas: - GHSA-2vgj-3pvg-xh4w references: - advisory: https://github.com/advisories/GHSA-2vgj-3pvg-xh4w - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-39931 - web: https://github.com/gogs/gogs/releases - web: https://www.sonarsource.com/blog/securing-developer-tools-unpatched-code-vulnerabilities-in-gogs-1 source: id: GHSA-2vgj-3pvg-xh4w created: 2024-07-08T13:24:08.798271-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2795.yaml
id: GO-2024-2795 modules: - module: github.com/mattermost/mattermost-server versions: - introduced: 8.1.0+incompatible - fixed: 8.1.12+incompatible - introduced: 9.4.0+incompatible - fixed: 9.4.5+incompatible - introduced: 9.5.0+incompatible - fixed: 9.5.3+incompatible - introduced: 9.6.0-rc1+incompatible - fixed: 9.6.1+incompatible vulnerable_at: 9.6.1-rc3+incompatible summary: Mattermost crashes web clients via a malformed custom status in github.com/mattermost/mattermost-server cves: - CVE-2024-4182 ghsas: - GHSA-8f99-g2pj-x8w3 references: - advisory: https://github.com/advisories/GHSA-8f99-g2pj-x8w3 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-4182 - web: https://github.com/mattermost/mattermost/commit/41333a0babf565453d89287549bec1e546e75ce7 - web: https://github.com/mattermost/mattermost/commit/6cbab0f7ece104681f73dd12c75d9f22d567125e - web: https://github.com/mattermost/mattermost/commit/a99dadd80c57d376185ca06f8f70919a6f135bc6 - web: https://github.com/mattermost/mattermost/commit/f84f8ed65f6a5faba974426424b684635455a527 - web: https://mattermost.com/security-updates source: id: GHSA-8f99-g2pj-x8w3 created: 2024-06-04T15:27:08.837695-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2575.yaml
id: GO-2024-2575 modules: - module: helm.sh/helm/v3 versions: - fixed: 3.14.2 vulnerable_at: 3.14.1 packages: - package: helm.sh/helm/v3/pkg/plugin symbols: - validatePluginData derived_symbols: - FindPlugins - LoadAll - LoadDir - package: helm.sh/helm/v3/pkg/repo symbols: - loadIndex derived_symbols: - ChartRepository.DownloadIndexFile - ChartRepository.Load - FindChartInAuthAndTLSAndPassRepoURL - FindChartInAuthAndTLSRepoURL - FindChartInAuthRepoURL - FindChartInRepoURL - LoadIndexFile summary: Helm's Missing YAML Content Leads To Panic in helm.sh/helm/v3 cves: - CVE-2024-26147 ghsas: - GHSA-r53h-jv2g-vpx6 unknown_aliases: - BIT-helm-2024-26147 credits: - Jakub Ciolek at AlphaSense references: - advisory: https://github.com/helm/helm/security/advisories/GHSA-r53h-jv2g-vpx6 - fix: https://github.com/helm/helm/commit/bb4cc9125503a923afb7988f3eb478722a8580af source: id: GHSA-r53h-jv2g-vpx6 created: 2024-07-01T14:57:47.79335-04:00 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2611.yaml
id: GO-2024-2611 modules: - module: google.golang.org/protobuf versions: - fixed: 1.33.0 vulnerable_at: 1.32.0 packages: - package: google.golang.org/protobuf/encoding/protojson symbols: - UnmarshalOptions.unmarshal derived_symbols: - Unmarshal - UnmarshalOptions.Unmarshal - package: google.golang.org/protobuf/internal/encoding/json symbols: - Decoder.Read derived_symbols: - Decoder.Peek summary: Infinite loop in JSON unmarshaling in google.golang.org/protobuf description: |- The protojson.Unmarshal function can enter an infinite loop when unmarshaling certain forms of invalid JSON. This condition can occur when unmarshaling into a message which contains a google.protobuf.Any value, or when the UnmarshalOptions.DiscardUnknown option is set. ghsas: - GHSA-8r3f-844c-mc37 references: - fix: https://go.dev/cl/569356 cve_metadata: id: CVE-2024-24786 cwe: 'CWE-1286: Improper Validation of Syntactic Correctness of Input' references: - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDMBHAVSDU2FBDZ45U3A2VLSM35OJ2HU/ - http://www.openwall.com/lists/oss-security/2024/03/08/4 - https://security.netapp.com/advisory/ntap-20240517-0002/ review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1052.yaml
id: GO-2022-1052 modules: - module: github.com/tendermint/tendermint versions: - introduced: 0.34.0 - fixed: 0.34.3 vulnerable_at: 0.34.2 packages: - package: github.com/tendermint/tendermint/evidence symbols: - Pool.Update - Pool.CheckEvidence - package: github.com/tendermint/tendermint/consensus symbols: - State.tryAddVote derived_symbols: - BaseWAL.OnStart - Handshaker.Handshake - Handshaker.ReplayBlocks - Reactor.OnStart - Reactor.SwitchToConsensus - RunReplayFile - State.OnStart - State.OpenWAL - State.ReplayFile - WALGenerateNBlocks - WALWithNBlocks summary: |- Uncontrolled resource consumption during consensus in github.com/tendermint/tendermint description: |- Mishandling of timestamps during consensus process can cause a denial of service. While reaching consensus, different tendermint nodes can observe a different timestamp for a consensus evidence. This mismatch can cause the evidence to be invalid, upon which the node producing the evidence will be asked to generate a new evidence. This new evidence will be the same, which means it will again be rejected by other nodes involved in the consensus. This loop will continue until the peer nodes decide to disconnect from the node producing the evidence. cves: - CVE-2021-21271 ghsas: - GHSA-p658-8693-mhvg credits: - cmwaters (Github) references: - advisory: https://github.com/tendermint/tendermint/security/advisories/GHSA-p658-8693-mhvg - article: https://github.com/tendermint/tendermint/blob/v0.34.3/CHANGELOG.md#v0.34.3 - fix: https://github.com/tendermint/tendermint/commit/a2a6852ab99e4a0f9e79f0ea8c1726e262e25c76 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2912.yaml
id: GO-2024-2912 modules: - module: github.com/docker/cli versions: - fixed: 20.10.9+incompatible vulnerable_at: 20.10.8+incompatible packages: - package: github.com/docker/cli/cli/command symbols: - RegistryAuthenticationPrivilegedFunc - GetDefaultAuthConfig skip_fix: fix error due to incompatible version - package: github.com/docker/cli/cli/command/registry symbols: - runLogin skip_fix: fix error due to incompatible version summary: Docker CLI leaks private registry credentials to registry-1.docker.io in github.com/docker/cli cves: - CVE-2021-41092 ghsas: - GHSA-99pg-grm5-qq3v unknown_aliases: - CGA-f849-gq83-8362 references: - advisory: https://github.com/docker/cli/security/advisories/GHSA-99pg-grm5-qq3v - fix: https://github.com/docker/cli/commit/893e52cf4ba4b048d72e99748e0f86b2767c6c6b source: id: GHSA-99pg-grm5-qq3v created: 2024-07-01T16:01:00.847043-04:00 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0347.yaml
id: GO-2021-0347 modules: - module: std versions: - fixed: 1.16.15 - introduced: 1.17.0-0 - fixed: 1.17.8 vulnerable_at: 1.17.7 packages: - package: regexp symbols: - regexp.Compile skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)' summary: Stack exhaustion when compiling deeply nested expressions in regexp description: |- On 64-bit platforms, an extremely deeply nested expression can cause regexp.Compile to cause goroutine stack exhaustion, forcing the program to exit. Note this applies to very large expressions, on the order of 2MB. published: 2022-05-23T22:15:47Z cves: - CVE-2022-24921 credits: - Juho Nurminen references: - fix: https://go.dev/cl/384616 - fix: https://go.googlesource.com/go/+/452f24ae94f38afa3704d4361d91d51218405c0a - report: https://go.dev/issue/51112 - web: https://groups.google.com/g/golang-announce/c/RP1hfrBYVuk review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0761.yaml
id: GO-2022-0761 modules: - module: std versions: - fixed: 1.6.3 vulnerable_at: 1.6.2 packages: - package: net/http symbols: - Handler.ServeHTTP - package: net/http/cgi symbols: - ProxyFromEnvironment summary: Improper input validation in net/http and net/http/cgi description: |- An input validation flaw in the CGI components allows the HTTP_PROXY environment variable to be set by the incoming Proxy header, which changes where Go by default proxies all outbound HTTP requests. This environment variable is also used to set the outgoing proxy, enabling an attacker to insert a proxy into outgoing requests of a CGI program. Read more about "httpoxy" here: https://httpoxy.org. published: 2022-08-09T17:05:15Z cves: - CVE-2016-5386 credits: - Dominic Scheirlinck references: - fix: https://go.dev/cl/25010 - fix: https://go.googlesource.com/go/+/b97df54c31d6c4cc2a28a3c83725366d52329223 - report: https://go.dev/issue/16405 - web: https://groups.google.com/g/golang-announce/c/7jZDOQ8f8tM/m/eWRWHnc8CgAJ review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2969.yaml
id: GO-2024-2969 modules: - module: github.com/gogs/gogs vulnerable_at: 0.13.0 summary: CVE-2024-39930 in github.com/gogs/gogs cves: - CVE-2024-39930 references: - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-39930 - web: https://github.com/gogs/gogs/releases - web: https://www.sonarsource.com/blog/securing-developer-tools-unpatched-code-vulnerabilities-in-gogs-1/ source: id: CVE-2024-39930 created: 2024-07-08T13:24:12.021689-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0629.yaml
id: GO-2022-0629 modules: - module: sigs.k8s.io/secrets-store-csi-driver versions: - introduced: 0.0.15 - fixed: 0.0.17 vulnerable_at: 0.0.16 packages: - package: sigs.k8s.io/secrets-store-csi-driver/controllers symbols: - SecretProviderClassPodStatusReconciler.Reconcile - package: sigs.k8s.io/secrets-store-csi-driver/pkg/rotation symbols: - Reconciler.reconcile derived_symbols: - Reconciler.Run - package: sigs.k8s.io/secrets-store-csi-driver/pkg/secrets-store symbols: - nodeServer.NodeUnpublishVolume derived_symbols: - SecretsStore.Run summary: Directory traversal in sigs.k8s.io/secrets-store-csi-driver description: |- Modifying pod status allows host directory traversal. Kubernetes Secrets Store CSI Driver allows an attacker who can modify a SecretProviderClassPodStatus/Status resource the ability to write content to the host filesystem and sync file contents to Kubernetes Secrets. This includes paths under var/lib/kubelet/pods that contain other Kubernetes Secrets. published: 2022-02-15T01:57:18Z cves: - CVE-2020-8568 ghsas: - GHSA-5cgx-vhfp-6cf9 credits: - tam7t (Tommy Murphy) references: - fix: https://github.com/kubernetes-sigs/secrets-store-csi-driver/pull/371 - fix: https://github.com/kubernetes-sigs/secrets-store-csi-driver/commit/c2cbb19e2eef16638fa0523383788a4bc22231fd review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0036.yaml
id: GO-2020-0036 modules: - module: gopkg.in/yaml.v2 versions: - fixed: 2.2.8 vulnerable_at: 2.2.7 packages: - package: gopkg.in/yaml.v2 symbols: - yaml_parser_fetch_more_tokens - yaml_parser_save_simple_key - yaml_parser_remove_simple_key - yaml_parser_decrease_flow_level - yaml_parser_fetch_stream_start - yaml_parser_fetch_value derived_symbols: - Decoder.Decode - Unmarshal - UnmarshalStrict - module: github.com/go-yaml/yaml vulnerable_at: 2.1.0+incompatible packages: - package: github.com/go-yaml/yaml symbols: - yaml_parser_fetch_more_tokens - yaml_parser_save_simple_key - yaml_parser_remove_simple_key - yaml_parser_decrease_flow_level - yaml_parser_fetch_stream_start - yaml_parser_fetch_value derived_symbols: - Decoder.Decode - Unmarshal - UnmarshalStrict summary: Excessive resource consumption in YAML parsing in gopkg.in/yaml.v2 description: |- Due to unbounded aliasing, a crafted YAML file can cause consumption of significant system resources. If parsing user supplied input, this may be used as a denial of service vector. published: 2021-04-14T20:04:52Z cves: - CVE-2019-11254 ghsas: - GHSA-wxc4-f4m6-wwqv references: - fix: https://github.com/go-yaml/yaml/pull/555 - fix: https://github.com/go-yaml/yaml/commit/53403b58ad1b561927d19068c655246f2db79d48 - web: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18496 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0172.yaml
id: GO-2021-0172 modules: - module: std versions: - fixed: 1.6.4 - introduced: 1.7.0-0 - fixed: 1.7.4 vulnerable_at: 1.7.3 packages: - package: mime/multipart symbols: - Reader.readForm skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)' summary: Denial of service when parsing large forms in mime/multipart description: |- When parsing large multipart/form-data, an attacker can cause a HTTP server to open a large number of file descriptors. This may be used as a denial-of-service vector. published: 2022-02-15T23:56:14Z cves: - CVE-2017-1000098 credits: - Simon Rawet references: - fix: https://go.dev/cl/30410 - fix: https://go.googlesource.com/go/+/7478ea5dba7ed02ddffd91c1d17ec8141f7cf184 - report: https://go.dev/issue/16296 - web: https://groups.google.com/g/golang-dev/c/4NdLzS8sls8/m/uIz8QlnIBQAJ review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1534.yaml
id: GO-2023-1534 modules: - module: github.com/pion/dtls/v2 versions: - fixed: 2.2.4 vulnerable_at: 2.2.3 packages: - package: github.com/pion/dtls/v2/pkg/protocol/handshake symbols: - MessageHelloVerifyRequest.Unmarshal derived_symbols: - Handshake.Unmarshal summary: Panic during unmarshal of Hello Verify Request in github.com/pion/dtls/v2 description: |- Unmarshalling a Hello Verify request can panic, which could allow a denial of service. ghsas: - GHSA-4xgv-j62q-h3rj references: - fix: https://github.com/pion/dtls/commit/a50d26c5e4eed2ca87509494ffef2d2ebd22b1eb review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2453.yaml
id: GO-2024-2453 modules: - module: github.com/cloudflare/circl versions: - fixed: 1.3.7 vulnerable_at: 1.3.6 packages: - package: github.com/cloudflare/circl/pke/kyber/internal/common symbols: - Poly.CompressTo summary: Timing side channel in github.com/cloudflare/circl ghsas: - GHSA-9763-4f94-gfch references: - advisory: https://github.com/cloudflare/circl/security/advisories/GHSA-9763-4f94-gfch - fix: https://github.com/cloudflare/circl/commit/75ef91e8a2f438e6ce2b6e620d236add8be1887d - web: https://kyberslash.cr.yp.to/ review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2974.yaml
id: GO-2024-2974 modules: - module: github.com/evmos/evmos non_go_versions: - fixed: 19.0.0 vulnerable_at: 1.1.3 summary: Evmos vulnerable to exploit of smart contract account and vesting in github.com/evmos/evmos cves: - CVE-2024-39696 references: - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-39696 - fix: https://github.com/evmos/evmos/commit/0a620e176617a835ac697eea494afea09185dfaf - web: https://github.com/evmos/evmos/security/advisories/GHSA-q6hg-6m9x-5g9c source: id: CVE-2024-39696 created: 2024-07-08T13:23:28.697883-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2776.yaml
id: GO-2024-2776 modules: - module: github.com/apache/trafficcontrol versions: - introduced: 5.1.0+incompatible - fixed: 5.1.4+incompatible - introduced: 6.0.0+incompatible - fixed: 6.0.1+incompatible vulnerable_at: 6.0.0+incompatible summary: Apache Traffic Control Traffic Ops Vulnerable to LDAP Injection in github.com/apache/trafficcontrol cves: - CVE-2021-43350 ghsas: - GHSA-mg2c-rc36-p594 references: - advisory: https://github.com/advisories/GHSA-mg2c-rc36-p594 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2021-43350 - web: http://www.openwall.com/lists/oss-security/2021/11/11/3 - web: http://www.openwall.com/lists/oss-security/2021/11/11/4 - web: http://www.openwall.com/lists/oss-security/2021/11/17/1 - web: https://trafficcontrol.apache.org/security source: id: GHSA-mg2c-rc36-p594 created: 2024-06-06T16:13:56.758827-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2801.yaml
id: GO-2024-2801 modules: - module: github.com/projectcalico/calico non_go_versions: - fixed: 3.26.5 - introduced: 3.27.0 - fixed: 3.27.3 vulnerable_at: 2.6.12+incompatible summary: Calico privilege escalation vulnerability in github.com/projectcalico/calico cves: - CVE-2024-33522 ghsas: - GHSA-6362-gv4m-53ww unknown_aliases: - CGA-c9f6-83fw-wmpv - CGA-vw5m-65r5-hgf5 references: - advisory: https://github.com/advisories/GHSA-6362-gv4m-53ww - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-33522 - fix: https://github.com/projectcalico/calico/pull/8447 - fix: https://github.com/projectcalico/calico/pull/8517 - report: https://github.com/projectcalico/calico/issues/7981 - web: https://www.tigera.io/security-bulletins-tta-2024-001 source: id: GHSA-6362-gv4m-53ww created: 2024-06-26T14:05:52.596558-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1566.yaml
id: GO-2023-1566 modules: - module: github.com/usememos/memos versions: - fixed: 0.10.4-0.20230211093429-b11d2130a084 vulnerable_at: 0.10.3 packages: - package: github.com/usememos/memos/server symbols: - Server.registerResourcePublicRoutes - Server.registerResourceRoutes derived_symbols: - NewServer summary: Cross site scripting in github.com/usememos/memos description: |- A malicious actor can introduce links starting with a "javascript:" scheme due to insufficient checks on external resources. This can be used as a part of Cross-site Scripting (XSS) attack. cves: - CVE-2022-25978 ghsas: - GHSA-9w8x-5hv5-r6gw credits: - Kahla references: - web: https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMUSEMEMOSMEMOSSERVER-3319070 - fix: https://github.com/usememos/memos/commit/b11d2130a084385eb65c3761a3c841ebe9f81ae8 - report: https://github.com/usememos/memos/issues/1026 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2703.yaml
id: GO-2024-2703 modules: - module: github.com/kopia/kopia versions: - fixed: 0.16.0 vulnerable_at: 0.15.0 summary: |- Kopia: Storage connection credentials written to console on "repository status" CLI command with JSON output in github.com/kopia/kopia ghsas: - GHSA-j5vm-7qcc-2wwg references: - advisory: https://github.com/kopia/kopia/security/advisories/GHSA-j5vm-7qcc-2wwg - fix: https://github.com/kopia/kopia/commit/1d6f852cd6534f4bea978cbdc85c583803d79f77 - fix: https://github.com/kopia/kopia/pull/3589 source: id: GHSA-j5vm-7qcc-2wwg created: 2024-05-17T16:13:46.760398-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0956.yaml
id: GO-2022-0956 modules: - module: gopkg.in/yaml.v2 versions: - fixed: 2.2.4 vulnerable_at: 2.2.3 packages: - package: gopkg.in/yaml.v2 symbols: - decoder.unmarshal - yaml_parser_increase_flow_level - yaml_parser_roll_indent derived_symbols: - Decoder.Decode - Unmarshal - UnmarshalStrict summary: Excessive resource consumption in gopkg.in/yaml.v2 description: |- Parsing malicious or large YAML documents can consume excessive amounts of CPU or memory. published: 2022-08-29T22:15:46Z ghsas: - GHSA-6q6q-88xp-6f2r references: - fix: https://github.com/go-yaml/yaml/commit/f221b8435cfb71e54062f6c6e99e9ade30b124d5 - web: https://github.com/go-yaml/yaml/releases/tag/v2.2.4 cve_metadata: id: CVE-2022-3064 cwe: 'CWE 400: Uncontrolled Resource Consumption' references: - https://lists.debian.org/debian-lts-announce/2023/07/msg00001.html - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTE4ITXXPIWZEQ4HYQCB6N6GZIMWXDAI/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4SBIUECMLNC572P23DDOKJNKPJVX26SP/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PW3XC47AUW5J5M2ULJX7WCCL3B2ETLMT/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYZOKMMVX4SIEHPJW3SJUQGMO5YZCPHC/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XNF4OLYZRQE75EB5TW5N42FSXHBXGWFE/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ANIOPUXWIHVRA6CEWXCGOMX3YYS6KFHG/ review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2666.yaml
id: GO-2024-2666 modules: - module: github.com/cilium/cilium versions: - fixed: 1.13.14 - introduced: 1.14.0 - fixed: 1.14.9 - introduced: 1.15.0 - fixed: 1.15.3 vulnerable_at: 1.15.0 summary: Insecure IPsec transparent encryption in github.com/cilium/cilium cves: - CVE-2024-28860 ghsas: - GHSA-pwqm-x5x6-5586 references: - advisory: https://github.com/cilium/cilium/security/advisories/GHSA-pwqm-x5x6-5586 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1883.yaml
id: GO-2023-1883 modules: - module: github.com/cometbft/cometbft versions: - fixed: 0.37.2 vulnerable_at: 0.37.1 packages: - package: github.com/cometbft/cometbft/mempool/v0 symbols: - CListMempool.resCbFirstTime derived_symbols: - CListMempool.CheckTx - Reactor.ReceiveEnvelope summary: Denial of service via OOM in github.com/cometbft/cometbft description: |- A bug in the CometBFT middleware causes the mempool's two data structures to fall out of sync. This can lead to duplicate transactions that cannot be removed, even after they are committed in a block. The only way to remove the transaction is to restart the node. This can be exploited by an attacker to bring down a node by repeatedly submitting duplicate transactions. cves: - CVE-2023-34451 ghsas: - GHSA-w24w-wp77-qffm references: - advisory: https://github.com/cometbft/cometbft/security/advisories/GHSA-w24w-wp77-qffm - fix: https://github.com/cometbft/cometbft/pull/890 - fix: https://github.com/tendermint/tendermint/pull/2778 notes: - The advisory refers to versions beginning 0.34. The module at those versions requires a replace directive to be usable. There is a fix in 0.34.28. review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1059.yaml
id: GO-2022-1059 modules: - module: golang.org/x/text versions: - fixed: 0.3.8 vulnerable_at: 0.3.7 packages: - package: golang.org/x/text/language symbols: - ParseAcceptLanguage derived_symbols: - MatchStrings summary: |- Denial of service via crafted Accept-Language header in golang.org/x/text/language description: |- An attacker may cause a denial of service by crafting an Accept-Language header which ParseAcceptLanguage will take significant time to parse. ghsas: - GHSA-69ch-w2m2-3vjp credits: - Adam Korczynski (ADA Logics) - OSS-Fuzz references: - report: https://go.dev/issue/56152 - fix: https://go.dev/cl/442235 - web: https://groups.google.com/g/golang-announce/c/-hjNw559_tE/m/KlGTfid5CAAJ cve_metadata: id: CVE-2022-32149 cwe: 'CWE 400: Uncontrolled Resource Consumption' review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0042.yaml
id: GO-2020-0042 modules: - module: github.com/sassoftware/go-rpmutils versions: - fixed: 0.1.0 vulnerable_at: 0.0.0-20200612150239-e314ffa6ce54 packages: - package: github.com/sassoftware/go-rpmutils/cpio symbols: - Extract summary: |- Arbitrary File Write via Archive Extraction (Zip Slip) in github.com/sassoftware/go-rpmutils description: |- Due to improper path sanitization, RPMs containing relative file paths can cause files to be written (or overwritten) outside of the target directory. published: 2021-04-14T20:04:52Z cves: - CVE-2020-7667 ghsas: - GHSA-9423-6c93-gpp8 references: - fix: https://github.com/sassoftware/go-rpmutils/commit/a64058cf21b8aada501bba923c9aab66fb6febf0 - web: https://snyk.io/research/zip-slip-vulnerability review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0988.yaml
id: GO-2022-0988 modules: - module: std versions: - introduced: 1.19.0-0 - fixed: 1.19.1 vulnerable_at: 1.19.0 packages: - package: net/url symbols: - URL.JoinPath derived_symbols: - JoinPath summary: Failure to strip relative path components in net/url description: |- JoinPath and URL.JoinPath do not remove ../ path elements appended to a relative path. For example, JoinPath("https://go.dev", "../go") returns the URL "https://go.dev/../go", despite the JoinPath documentation stating that ../ path elements are removed from the result. published: 2022-09-12T20:23:15Z credits: - '@q0jt' references: - web: https://groups.google.com/g/golang-announce/c/x49AQzIVX-s - report: https://go.dev/issue/54385 - fix: https://go.dev/cl/423514 cve_metadata: id: CVE-2022-32190 cwe: 'CWE-22: Improper Limitation of a Pathname to a Restricted Directory (''Path Traversal'')' review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1839.yaml
id: GO-2023-1839 modules: - module: cmd versions: - fixed: 1.19.10 - introduced: 1.20.0-0 - fixed: 1.20.5 vulnerable_at: 1.20.4 packages: - package: cmd/go summary: Code injection via go command with cgo in cmd/go description: |- The go command may generate unexpected code at build time when using cgo. This may result in unexpected behavior when running a go program which uses cgo. This may occur when running an untrusted module which contains directories with newline characters in their names. Modules which are retrieved using the go command, i.e. via "go get", are not affected (modules retrieved using GOPATH-mode, i.e. GO111MODULE=off, may be affected). credits: - Juho Nurminen of Mattermost references: - report: https://go.dev/issue/60167 - fix: https://go.dev/cl/501226 - web: https://groups.google.com/g/golang-announce/c/q5135a9d924/m/j0ZoAJOHAwAJ cve_metadata: id: CVE-2023-29402 cwe: 'CWE-94: Improper Control of Generation of Code (''Code Injection'')' references: - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XBS3IIK6ADV24C5ULQU55QLT2UE762ZX/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NZ2O6YCO2IZMZJELQGZYR2WAUNEDLYV6/ - https://security.gentoo.org/glsa/202311-09 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0069.yaml
id: GO-2021-0069 modules: - module: std versions: - introduced: 1.14.0-0 - fixed: 1.14.12 - introduced: 1.15.0-0 - fixed: 1.15.5 vulnerable_at: 1.15.4 packages: - package: math/big symbols: - nat.divRecursiveStep skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)' summary: Panic during division of very large numbers in math/big description: |- A number of math/big.Int methods can panic when provided large inputs due to a flawed division method. published: 2021-04-14T20:04:52Z cves: - CVE-2020-28362 references: - fix: https://go.dev/cl/269657 - fix: https://go.googlesource.com/go/+/1e1fa5903b760c6714ba17e50bf850b01f49135c - report: https://go.dev/issue/42552 - web: https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2635.yaml
id: GO-2024-2635 modules: - module: github.com/mattermost/mattermost-server versions: - introduced: 9.0.0+incompatible - fixed: 9.4.0+incompatible vulnerable_at: 9.4.0-rc4+incompatible - module: github.com/mattermost/mattermost-server/v5 vulnerable_at: 5.39.3 - module: github.com/mattermost/mattermost-server/v6 vulnerable_at: 6.7.2 - module: github.com/mattermost/mattermost/server/v8 non_go_versions: - fixed: 8.1.9 vulnerable_at: 8.0.0-20240626145722-59998b0b8473 summary: Mattermost incorrectly allows access individual posts in github.com/mattermost/mattermost-server cves: - CVE-2024-1952 ghsas: - GHSA-r4fm-g65h-cr54 unknown_aliases: - CGA-xmgp-mf9v-pph8 references: - advisory: https://github.com/advisories/GHSA-r4fm-g65h-cr54 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-1952 - web: https://mattermost.com/security-updates source: id: GHSA-r4fm-g65h-cr54 created: 2024-06-26T13:58:04.253107-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2529.yaml
id: GO-2024-2529 modules: - module: go.etcd.io/etcd vulnerable_at: 2.3.8+incompatible - module: go.etcd.io/etcd/v3 non_go_versions: - fixed: 3.3.23 - introduced: 3.4.0-rc.0 - fixed: 3.4.10 vulnerable_at: 3.5.14 summary: |- Etcd embed auto compaction retention negative value causing a compaction loop or a crash in go.etcd.io/etcd ghsas: - GHSA-pm3m-32r3-7mfh references: - advisory: https://github.com/etcd-io/etcd/security/advisories/GHSA-pm3m-32r3-7mfh source: id: GHSA-pm3m-32r3-7mfh created: 2024-06-26T16:10:36.366486-04:00 review_status: UNREVIEWED unexcluded: EFFECTIVELY_PRIVATE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2608.yaml
id: GO-2024-2608 modules: - module: github.com/stacklok/minder versions: - fixed: 0.0.33 vulnerable_at: 0.0.32 packages: - package: github.com/stacklok/minder/internal/db symbols: - Queries.GetRepositoryByRepoName - package: github.com/stacklok/minder/internal/controlplane symbols: - Server.GetArtifactByName - Server.GetRepositoryByName - Server.DeleteRepositoryByName derived_symbols: - EntityContextProjectInterceptor - ProjectAuthorizationInterceptor - Server.StartGRPCServer - TokenValidationInterceptor summary: Minder access control bypass in github.com/stacklok/minder description: |- A Minder user can use the endpoints to access any repository in the DB, irrespective of who owns the repo and any permissions that user may have. The DB query used checks by repo owner, repo name and provider name (which is always "github"). These query values are not distinct for the particular user, as long as the user has valid credentials and a provider, they can set the repo owner/name to any value they want and the server will return information on this repo. DeleteRepositoryByName uses the same query and a user can delete another user's repo using this technique. The GetArtifactByName endpoint also uses this DB query. cves: - CVE-2024-27916 ghsas: - GHSA-v627-69v2-xx37 credits: - dmjb references: - advisory: https://github.com/stacklok/minder/security/advisories/GHSA-v627-69v2-xx37 - fix: https://github.com/stacklok/minder/commit/45750b4e9fb2de33365758366e06c19e999bd2eb review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2636.yaml
id: GO-2024-2636 modules: - module: github.com/1Panel-dev/1Panel versions: - fixed: 1.10.1-lts vulnerable_at: 1.10.0-lts summary: 1Panel is vulnerable to command injection in github.com/1Panel-dev/1Panel cves: - CVE-2024-2352 ghsas: - GHSA-x2vg-5wrf-vj6v references: - advisory: https://github.com/advisories/GHSA-x2vg-5wrf-vj6v - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-2352 - fix: https://github.com/1Panel-dev/1Panel/pull/4131 - fix: https://github.com/1Panel-dev/1Panel/pull/4131#issue-2176105990 - fix: https://github.com/1Panel-dev/1Panel/pull/4131/commits/0edd7a9f6f5100aab98a0ea6e5deedff7700396c - web: https://vuldb.com/?ctiid.256304 - web: https://vuldb.com/?id.256304 source: id: GHSA-x2vg-5wrf-vj6v created: 2024-05-17T16:14:46.922117-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1559.yaml
id: GO-2023-1559 modules: - module: github.com/ipfs/go-unixfsnode versions: - fixed: 1.5.2 vulnerable_at: 1.5.1 packages: - package: github.com/ipfs/go-unixfsnode/hamt symbols: - NewUnixFSHAMTShard - bitField derived_symbols: - AttemptHAMTShardFromNode - NewUnixFSHAMTShardWithPreload - _UnixFSHAMTShard.Length - _UnixFSHAMTShard.Lookup - _UnixFSHAMTShard.LookupByNode - _UnixFSHAMTShard.LookupBySegment - _UnixFSHAMTShard.LookupByString - _UnixFSShardedDir__ListItr.Next - package: github.com/ipfs/go-unixfsnode/data/builder symbols: - shard.bitmap - shard.serialize derived_symbols: - BlockSizes - BuildUnixFS - BuildUnixFSDirectory - BuildUnixFSFile - BuildUnixFSRecursive - BuildUnixFSShardedDirectory - BuildUnixFSSymlink - Data - DataType - Fanout - FileSize - FractionalNanoseconds - HashType - Mtime - Permissions - PermissionsString - Seconds - Time summary: Denial of service via HAMT decoding panic in github.com/ipfs/go-unixfsnode description: |- Trying to read malformed HAMT sharded directories can cause panics and virtual memory leaks. If you are reading untrusted user input, an attacker can then trigger a panic. This is caused by a bogus fanout parameter in the HAMT directory nodes. There are no known workarounds (users are advised to upgrade). cves: - CVE-2023-23631 ghsas: - GHSA-4gj3-6r43-3wfc credits: - Jorropo references: - advisory: https://github.com/ipfs/go-unixfsnode/security/advisories/GHSA-4gj3-6r43-3wfc - fix: https://github.com/ipfs/go-unixfsnode/commit/59050ea8bc458ae55246ae09243e6e165923e076 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0047.yaml
id: GO-2020-0047 modules: - module: github.com/RobotsAndPencils/go-saml vulnerable_at: 0.0.0-20170520135329-fb13cb52a46b packages: - package: github.com/RobotsAndPencils/go-saml symbols: - AuthnRequest.Validate - NewAuthnRequest - NewSignedResponse derived_symbols: - ServiceProviderSettings.GetAuthnRequest summary: Weak hash (SHA-1) in github.com/RobotsAndPencils/go-saml description: |- XML Digital Signatures generated and validated using this package use SHA-1, which may allow an attacker to craft inputs which cause hash collisions depending on their control over the input. published: 2021-04-14T20:04:52Z ghsas: - GHSA-5rhg-xhgr-5hfj references: - web: https://github.com/RobotsAndPencils/go-saml/pull/38 cve_metadata: id: CVE-2020-36563 cwe: 'CWE 328: Use of Weak Hash' review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1497.yaml
id: GO-2023-1497 modules: - module: github.com/sylabs/scs-library-client versions: - fixed: 1.3.4 vulnerable_at: 1.3.3 packages: - package: github.com/sylabs/scs-library-client/client symbols: - Client.httpGetRangeRequest derived_symbols: - Client.ConcurrentDownloadImage - Client.UploadImage - module: github.com/sylabs/scs-library-client versions: - introduced: 1.4.0 - fixed: 1.4.2 vulnerable_at: 1.4.1 packages: - package: github.com/sylabs/scs-library-client/client symbols: - Client.legacyDownloadImage derived_symbols: - Client.ConcurrentDownloadImage summary: Leaked user credentials in github.com/sylabs/scs-library-client description: |- When the scs-library-client is used to pull a container image, with authentication, the HTTP Authorization header sent by the client to the library service may be incorrectly leaked to an S3 backing storage provider. cves: - CVE-2022-23538 ghsas: - GHSA-7p8m-22h4-9pj7 references: - fix: https://github.com/sylabs/scs-library-client/commit/68ac4cab5cda0afd8758ff5b5e2e57be6a22fcfa - fix: https://github.com/sylabs/scs-library-client/commit/eebd7caaab310b1fa803e55b8fc1acd9dcd2d00c review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0006.yaml
id: GO-2020-0006 modules: - module: github.com/miekg/dns versions: - fixed: 1.0.4-0.20180125103619-43913f2f4fbd vulnerable_at: 1.0.3 packages: - package: github.com/miekg/dns symbols: - Server.serveTCP derived_symbols: - ActivateAndServe - ListenAndServe - ListenAndServeTLS - Server.ActivateAndServe - Server.ListenAndServe summary: Denial of service via open idle connection in github.com/miekg/dns description: |- An attacker may prevent TCP connections to a Server by opening a connection and leaving it idle, until the connection is closed by the server no other connections will be accepted. published: 2021-04-14T20:04:52Z cves: - CVE-2017-15133 ghsas: - GHSA-p55x-7x9v-q8m4 credits: - Pedro Sampaio references: - fix: https://github.com/miekg/dns/pull/631 - fix: https://github.com/miekg/dns/commit/43913f2f4fbd7dcff930b8a809e709591e4dd79e review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1573.yaml
id: GO-2023-1573 modules: - module: github.com/containerd/containerd versions: - introduced: 1.6.0 - fixed: 1.6.18 vulnerable_at: 1.6.0 packages: - package: github.com/containerd/containerd/images/archive symbols: - onUntarJSON - ImportIndex - module: github.com/containerd/containerd versions: - fixed: 1.5.18 vulnerable_at: 1.5.17 packages: - package: github.com/containerd/containerd/images/archive symbols: - onUntarJSON - ImportIndex summary: Memory exhaustion via OCI image importer in github.com/containerd/containerd description: |- When importing an OCI image, there was no limit on the number of bytes read from the io.Reader passed into ImportIndex. A large number of bytes could be read from this and could cause a denial of service. cves: - CVE-2023-25153 ghsas: - GHSA-259w-8hf6-59c2 credits: - '@AdamKorcz' - '@DavidKorczynski' references: - advisory: https://github.com/containerd/containerd/security/advisories/GHSA-259w-8hf6-59c2 - fix: https://github.com/containerd/containerd/commit/0c314901076a74a7b797a545d2f462285fdbb8c4 - web: https://github.com/containerd/containerd/releases/tag/v1.5.18 - web: https://github.com/containerd/containerd/releases/tag/v1.6.18 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0084.yaml
id: GO-2021-0084 modules: - module: github.com/astaxie/beego versions: - fixed: 1.12.2 vulnerable_at: 1.12.1 packages: - package: github.com/astaxie/beego/session symbols: - FileProvider.SessionRead - FileProvider.SessionRegenerate derived_symbols: - Manager.GetSessionStore - Manager.SessionRegenerateID - Manager.SessionStart fix_links: - https://github.com/beego/beego/commit/f99cbe0fa40936f2f8dd28e70620c559b6e5e2fd summary: Incorrect permissions for critical resource in github.com/astaxie/beego description: |- Session data is stored using permissive permissions, allowing local users with filesystem access to read arbitrary data. published: 2021-04-14T20:04:52Z cves: - CVE-2019-16354 - CVE-2019-16355 ghsas: - GHSA-f6px-w8rh-7r89 - GHSA-hf4p-4j9r-3cvx credits: - '@nicowaisman' references: - fix: https://github.com/beego/beego/pull/3975 - fix: https://github.com/beego/beego/commit/bac2b31afecc65d9a89f9e473b8006c5edc0c8d1 - web: https://github.com/beego/beego/issues/3763 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0100.yaml
id: GO-2021-0100 modules: - module: github.com/containers/storage versions: - fixed: 1.28.1 vulnerable_at: 1.28.1-0.20210316105906-29dc2106ab59 packages: - package: github.com/containers/storage/pkg/archive symbols: - cmdStream derived_symbols: - ApplyLayer - ApplyUncompressedLayer - Archiver.CopyFileWithTar - Archiver.CopyWithTar - Archiver.TarUntar - Archiver.UntarPath - CopyResource - CopyTo - DecompressStream - IsArchivePath - Untar - UntarPath - UntarUncompressed summary: Denial of service via deadlock in github.com/containers/storage description: |- Due to a goroutine deadlock, using github.com/containers/storage/pkg/archive.DecompressStream on a xz archive returns a reader which will hang indefinitely when Close is called. An attacker can use this to cause denial of service if they are able to cause the caller to attempt to decompress an archive they control. published: 2021-07-28T18:08:05Z cves: - CVE-2021-20291 ghsas: - GHSA-7qw8-847f-pggm credits: - Aviv Sasson (Palo Alto Networks) references: - fix: https://github.com/containers/storage/pull/860 - fix: https://github.com/containers/storage/commit/306fcabc964470e4b3b87a43a8f6b7d698209ee1 - web: https://bugzilla.redhat.com/show_bug.cgi?id=1939485 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2024.yaml
id: GO-2023-2024 modules: - module: github.com/libp2p/go-libp2p versions: - fixed: 0.27.4 vulnerable_at: 0.27.3 packages: - package: github.com/libp2p/go-libp2p/core/record symbols: - ConsumeEnvelope - package: github.com/libp2p/go-libp2p/p2p/protocol/identify symbols: - idService.consumeMessage derived_symbols: - idService.IdentifyConn - idService.IdentifyWait - netNotifiee.Connected summary: Out-of-memory vulnerability in github.com/libp2p/go-libp2p description: |- A malicious actor can store an arbitrary amount of data in the memory of a remote node by sending the node a message with a signed peer record. Signed peer records from randomly generated peers can be sent by a malicious actor. This memory does not get garbage collected and so the remote node can run out of memory (OOM). cves: - CVE-2023-40583 ghsas: - GHSA-gcq9-qqwx-rgj3 credits: - Marten Seemann references: - advisory: https://github.com/libp2p/go-libp2p/security/advisories/GHSA-gcq9-qqwx-rgj3 - fix: https://github.com/libp2p/go-libp2p/commit/45d3c6fff662ddd6938982e7e9309ad5fa2ad8dd review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0060.yaml
id: GO-2021-0060 modules: - module: github.com/russellhaering/gosaml2 versions: - fixed: 0.6.0 vulnerable_at: 0.5.0 packages: - package: github.com/russellhaering/gosaml2 symbols: - parseResponse derived_symbols: - SAMLServiceProvider.RetrieveAssertionInfo - SAMLServiceProvider.ValidateEncodedLogoutRequestPOST - SAMLServiceProvider.ValidateEncodedLogoutResponsePOST - SAMLServiceProvider.ValidateEncodedResponse summary: Authentication bypass in github.com/russellhaering/gosaml2 description: |- Due to the behavior of encoding/xml, a crafted XML document may cause XML Digital Signature validation to be entirely bypassed, causing an unsigned document to appear signed. published: 2021-04-14T20:04:52Z cves: - CVE-2020-29509 ghsas: - GHSA-xhqq-x44f-9fgg credits: - Juho Nurminen references: - fix: https://github.com/russellhaering/gosaml2/commit/42606dafba60c58c458f14f75c4c230459672ab9 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2927.yaml
id: GO-2024-2927 modules: - module: github.com/evmos/evmos vulnerable_at: 1.1.3 - module: github.com/evmos/evmos/v2 vulnerable_at: 2.0.2 - module: github.com/evmos/evmos/v3 vulnerable_at: 3.0.3 - module: github.com/evmos/evmos/v4 vulnerable_at: 4.0.2 - module: github.com/evmos/evmos/v5 vulnerable_at: 5.0.1 - module: github.com/evmos/evmos/v6 vulnerable_at: 6.0.4 - module: github.com/evmos/evmos/v7 vulnerable_at: 7.0.0 - module: github.com/evmos/evmos/v8 vulnerable_at: 8.2.3 - module: github.com/evmos/evmos/v9 vulnerable_at: 9.1.0 - module: github.com/evmos/evmos/v10 vulnerable_at: 10.0.1 - module: github.com/evmos/evmos/v11 vulnerable_at: 11.0.2 - module: github.com/evmos/evmos/v12 vulnerable_at: 12.1.6 - module: github.com/evmos/evmos/v13 vulnerable_at: 13.0.2 - module: github.com/evmos/evmos/v14 vulnerable_at: 14.1.0 - module: github.com/evmos/evmos/v15 vulnerable_at: 15.0.0 - module: github.com/evmos/evmos/v16 vulnerable_at: 16.0.4 - module: github.com/evmos/evmos/v17 vulnerable_at: 17.0.1 - module: github.com/evmos/evmos/v18 versions: - fixed: 18.0.0 summary: Evmos is missing create validator check in github.com/evmos/evmos cves: - CVE-2024-37159 references: - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-37159 - fix: https://github.com/evmos/evmos/commit/b2a09ca66613d8b04decd3f2dcba8e1e77709dcb - web: https://github.com/evmos/evmos/security/advisories/GHSA-pxv8-qhrh-jc7v notes: - fix: 'github.com/evmos/evmos/v18: could not add vulnerable_at: could not find tagged version between introduced and fixed' source: id: CVE-2024-37159 created: 2024-06-27T15:54:26.419866-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2933.yaml
id: GO-2024-2933 modules: - module: github.com/bazelbuild/intellij unsupported_versions: - cve_version_range: 'affected from 0 before 2024.06.04.0.2 (default: unaffected)' vulnerable_at: 2021.12.13+incompatible summary: Improper trust check in Bazel Build intellij plugin in github.com/bazelbuild/intellij cves: - CVE-2024-5899 references: - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-5899 - web: https://github.com/bazelbuild/intellij/releases/tag/v2024.06.04-aswb-stable - web: https://github.com/bazelbuild/intellij/security/advisories/GHSA-hh9f-wmhw-46vg source: id: CVE-2024-5899 created: 2024-06-27T15:54:02.860699-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0345.yaml
id: GO-2022-0345 modules: - module: github.com/containers/buildah versions: - fixed: 1.22.0 vulnerable_at: 1.21.0 packages: - package: github.com/containers/buildah/chroot symbols: - RunUsingChroot summary: Environment variable leakage in github.com/containers/buildah description: |- The RunUsingChroot function unintentionally propagates environment variables from the current process to the child process. published: 2022-07-15T23:30:21Z cves: - CVE-2021-3602 ghsas: - GHSA-7638-r9r3-rmjj references: - fix: https://github.com/containers/buildah/commit/a468ce0ffd347035d53ee0e26c205ef604097fb0 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0070.yaml
id: GO-2021-0070 modules: - module: github.com/opencontainers/runc versions: - fixed: 0.1.0 vulnerable_at: 0.0.9 packages: - package: github.com/opencontainers/runc/libcontainer/user symbols: - GetExecUser derived_symbols: - GetExecUserPath summary: Privilege escalation in github.com/opencontainers/runc description: |- GetExecUser in the github.com/opencontainers/runc/libcontainer/user package will improperly interpret numeric UIDs as usernames. If the method is used without verifying that usernames are formatted as expected, it may allow a user to gain unexpected privileges. published: 2021-04-14T20:04:52Z cves: - CVE-2016-3697 ghsas: - GHSA-q3j5-32m5-58c2 references: - fix: https://github.com/opencontainers/runc/pull/708 - fix: https://github.com/opencontainers/runc/commit/69af385de62ea68e2e608335cffbb0f4aa3db091 - web: https://github.com/docker/docker/issues/21436 - web: http://rhn.redhat.com/errata/RHSA-2016-1034.html - web: http://rhn.redhat.com/errata/RHSA-2016-2634.html - web: https://security.gentoo.org/glsa/201612-28 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0071.yaml
id: GO-2021-0071 modules: - module: github.com/lxc/lxd versions: - fixed: 0.0.0-20151004155856-19c6961cc101 vulnerable_at: 0.0.0-20151004071337-96e120e828e4 packages: - package: github.com/lxc/lxd/shared symbols: - IdmapSet.doUidshiftIntoContainer skip_fix: 'TODO: Revisit this reason (Fix causes error containing cannot find module providing package github.com/chai2010/gettext-go/gettext - possibly an issue with lack of go.mod file in affected version)' summary: Race condition in github.com/lxc/lxd description: |- A race between chown and chmod operations during a container filesystem shift may allow a user who can modify the filesystem to chmod an arbitrary path of their choice, rather than the expected path. published: 2021-04-14T20:04:52Z cves: - CVE-2015-1340 ghsas: - GHSA-8mpq-fmr3-6jxv credits: - Seth Arnold references: - fix: https://github.com/lxc/lxd/commit/19c6961cc1012c8a529f20807328a9357f5034f4 - web: https://bugs.launchpad.net/ubuntu/+source/lxd/+bug/1502270 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1717.yaml
id: GO-2023-1717 modules: - module: vitess.io/vitess versions: - fixed: 0.16.1 vulnerable_at: 0.16.0 packages: - package: vitess.io/vitess/go/vt/vtorc/inst symbols: - ReadKeyspace derived_symbols: - GetDurabilityPolicy - ReadTopologyInstance - ReadTopologyInstanceBufferable - SwitchPrimary - package: vitess.io/vitess/go/vt/topo symbols: - Server.CreateKeyspace - Server.GetKeyspace derived_symbols: - Server.CreateShard - Server.FindAllShardsInKeyspace - Server.GetKeyspaceDurability - Server.GetOnlyShard - Server.GetOrCreateShard - Server.GetServingShards - Server.GetShardNames - Server.InitTablet - Server.ResolveShardWildcard summary: Improper handling of keyspaces in vitess.io/vitess description: |- Users can create a keyspace containing '/'. Future attempts to view keyspaces from some tools (including VTAdmin and "vtctldclient GetKeyspaces") receive an error. cves: - CVE-2023-29194 ghsas: - GHSA-735r-hv67-g38f credits: - '@AdamKorcz' - '@ajm188' references: - advisory: https://github.com/vitessio/vitess/security/advisories/GHSA-735r-hv67-g38f - fix: https://github.com/vitessio/vitess/commit/adf10196760ad0b3991a7aa7a8580a544e6ddf88 - fix: https://github.com/vitessio/vitess/commits/v0.16.1/ review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1988.yaml
id: GO-2023-1988 modules: - module: golang.org/x/net versions: - fixed: 0.13.0 vulnerable_at: 0.12.0 packages: - package: golang.org/x/net/html symbols: - render1 derived_symbols: - Render summary: Improper rendering of text nodes in golang.org/x/net/html description: |- Text nodes not in the HTML namespace are incorrectly literally rendered, causing text which should be escaped to not be. This could lead to an XSS attack. ghsas: - GHSA-2wrh-6pvc-2jm9 references: - report: https://go.dev/issue/61615 - fix: https://go.dev/cl/514896 cve_metadata: id: CVE-2023-3978 cwe: 'CWE-79: Improper Neutralization of Input During Web Page Generation (''Cross-site Scripting'')' review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2665.yaml
id: GO-2024-2665 modules: - module: github.com/zitadel/zitadel non_go_versions: - fixed: 2.42.17 - introduced: 2.43.0 - fixed: 2.43.11 - introduced: 2.44.0 - fixed: 2.44.7 - introduced: 2.45.0 - fixed: 2.45.5 - introduced: 2.46.0 - fixed: 2.46.5 - introduced: 2.47.0 - fixed: 2.47.8 - introduced: 2.48.0 - fixed: 2.48.3 vulnerable_at: 1.87.5 summary: |- ZITADEL's Improper Content-Type Validation Leads to Account Takeover via Stored XSS + CSP Bypass in github.com/zitadel/zitadel cves: - CVE-2024-29891 ghsas: - GHSA-hr5w-cwwq-2v4m references: - advisory: https://github.com/zitadel/zitadel/security/advisories/GHSA-hr5w-cwwq-2v4m - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-29891 - web: https://github.com/zitadel/zitadel/releases/tag/v2.42.17 - web: https://github.com/zitadel/zitadel/releases/tag/v2.43.11 - web: https://github.com/zitadel/zitadel/releases/tag/v2.44.7 - web: https://github.com/zitadel/zitadel/releases/tag/v2.45.5 - web: https://github.com/zitadel/zitadel/releases/tag/v2.46.5 - web: https://github.com/zitadel/zitadel/releases/tag/v2.47.8 - web: https://github.com/zitadel/zitadel/releases/tag/v2.48.3 source: id: GHSA-hr5w-cwwq-2v4m created: 2024-06-04T15:37:16.762486-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2456.yaml
id: GO-2024-2456 modules: - module: gopkg.in/src-d/go-git.v4 versions: - introduced: 4.7.1 vulnerable_at: 4.13.1 - module: github.com/go-git/go-git/v5 versions: - introduced: 5.0.0 - fixed: 5.11.0 vulnerable_at: 5.10.1 packages: - package: github.com/go-git/go-git/v5 symbols: - checkFastForwardUpdate - isFastForward - InitWithOptions - Repository.CreateTag - Worktree.PullContext - Worktree.createBranch - Worktree.checkoutFileSymlink derived_symbols: - AddOptions.Validate - Blame - BlameResult.String - Clone - CloneContext - CommitOptions.Validate - CreateTagOptions.Validate - GrepOptions.Validate - GrepResult.String - Init - NoMatchingRefSpecError.Error - Open - PlainClone - PlainCloneContext - PlainInit - PlainInitWithOptions - PlainOpen - PlainOpenWithOptions - Remote.Fetch - Remote.FetchContext - Remote.List - Remote.ListContext - Remote.Push - Remote.PushContext - Remote.String - Repository.BlobObject - Repository.BlobObjects - Repository.Branch - Repository.Branches - Repository.CommitObject - Repository.CommitObjects - Repository.Config - Repository.ConfigScoped - Repository.CreateBranch - Repository.CreateRemote - Repository.CreateRemoteAnonymous - Repository.DeleteBranch - Repository.DeleteObject - Repository.DeleteRemote - Repository.DeleteTag - Repository.Fetch - Repository.FetchContext - Repository.Grep - Repository.Head - Repository.Log - Repository.Notes - Repository.Object - Repository.Objects - Repository.Prune - Repository.Push - Repository.PushContext - Repository.Reference - Repository.References - Repository.Remote - Repository.Remotes - Repository.RepackObjects - Repository.ResolveRevision - Repository.SetConfig - Repository.Tag - Repository.TagObject - Repository.TagObjects - Repository.Tags - Repository.TreeObject - Repository.TreeObjects - ResetOptions.Validate - Status.String - Submodule.Init - Submodule.Repository - Submodule.Status - Submodule.Update - Submodule.UpdateContext - SubmoduleStatus.String - Submodules.Init - Submodules.Status - Submodules.Update - Submodules.UpdateContext - SubmodulesStatus.String - Worktree.Add - Worktree.AddGlob - Worktree.AddWithOptions - Worktree.Checkout - Worktree.Clean - Worktree.Commit - Worktree.Grep - Worktree.Move - Worktree.Pull - Worktree.Remove - Worktree.RemoveGlob - Worktree.Reset - Worktree.ResetSparsely - Worktree.Status - Worktree.Submodule - Worktree.Submodules - buildTreeHelper.BuildTree - package: github.com/go-git/go-git/v5/config symbols: - RemoteConfig.Validate - Branch.Validate derived_symbols: - Config.Unmarshal - Config.Validate - LoadConfig - ReadConfig - package: github.com/go-git/go-git/v5/plumbing/object symbols: - getFileStatsFromFilePatches derived_symbols: - Commit.Stats - Commit.StatsContext - Patch.Stats - package: github.com/go-git/go-git/v5/storage/filesystem symbols: - NewStorageWithOptions derived_symbols: - ConfigStorage.Config - ConfigStorage.SetConfig - ModuleStorage.Module - NewStorage - ObjectStorage.EncodedObject - package: github.com/go-git/go-git/v5/storage/filesystem/dotgit symbols: - DotGit.Alternates summary: |- Path traversal and RCE in github.com/go-git/go-git/v5 and gopkg.in/src-d/go-git.v4 cves: - CVE-2023-49569 ghsas: - GHSA-449p-3h89-pw88 credits: - Ionut Lalu references: - advisory: https://nvd.nist.gov/vuln/detail/CVE-2023-49569 notes: - Symbols were obtained by looking at every change between 5.10.1 and 5.11.0. review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2821.yaml
id: GO-2024-2821 modules: - module: github.com/stacklok/minder versions: - fixed: 0.0.48 vulnerable_at: 0.0.47 packages: - package: github.com/stacklok/minder/internal/controlplane symbols: - Server.HandleGitHubWebHook - Server.StartHTTPServer summary: Denial of Service from untrusted requests in github.com/stacklok/minder description: |- HandleGithubWebhook is susceptible to a denial of service attack from an untrusted HTTP request. An untrusted request can cause the server to allocate large amounts of memory resulting in a denial of service. cves: - CVE-2024-34084 ghsas: - GHSA-9c5w-9q3f-3hv7 credits: - '@AdamKorcz and @DavidKorczynski' references: - advisory: https://github.com/stacklok/minder/security/advisories/GHSA-9c5w-9q3f-3hv7 - fix: https://github.com/stacklok/minder/commit/3e5a527d2f1b535159206161d1d519602c75bd0d - web: https://github.com/stacklok/minder/blob/ee66f6c0763212503c898cfefb65ce1450c7f5ac/internal/controlplane/handlers_githubwebhooks.go#L213-L218 - web: https://github.com/stacklok/minder/blob/ee66f6c0763212503c898cfefb65ce1450c7f5ac/internal/controlplane/handlers_githubwebhooks.go#L337-L342 - web: https://github.com/stacklok/minder/blob/ee66f6c0763212503c898cfefb65ce1450c7f5ac/internal/controlplane/handlers_githubwebhooks.go#L367-L377 - web: https://github.com/stacklok/minder/blob/ee66f6c0763212503c898cfefb65ce1450c7f5ac/internal/controlplane/handlers_githubwebhooks_test.go#L278-L283 source: id: GHSA-9c5w-9q3f-3hv7 created: 2024-05-08T14:06:25.679756-07:00 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2331.yaml
id: GO-2023-2331 modules: - module: go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc versions: - fixed: 0.46.0 vulnerable_at: 0.45.0 packages: - package: go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc symbols: - StreamClientInterceptor - UnaryClientInterceptor - UnaryServerInterceptor - spanInfo - StreamServerInterceptor summary: |- Denial of service in go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc description: |- The grpc Unary Server Interceptor created by the otelgrpc package added the labels net.peer.sock.addr and net.peer.sock.port with unbounded cardinality. This can lead to the server's potential memory exhaustion when many malicious requests are sent. This leads to a denial-of-service. cves: - CVE-2023-47108 ghsas: - GHSA-8pgv-569h-w5rw references: - advisory: https://github.com/open-telemetry/opentelemetry-go-contrib/security/advisories/GHSA-8pgv-569h-w5rw - fix: https://github.com/open-telemetry/opentelemetry-go-contrib/commit/b44dfc9092b157625a5815cb437583cee663333b - fix: https://github.com/open-telemetry/opentelemetry-go-contrib/pull/4322 - web: https://pkg.go.dev/go.opentelemetry.io/otel/metric/noop#NewMeterProvider source: id: GHSA-8pgv-569h-w5rw created: 2024-06-26T17:06:54.775224-07:00 review_status: REVIEWED unexcluded: DEPENDENT_VULNERABILITY
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0588.yaml
id: GO-2022-0588 modules: - module: github.com/microcosm-cc/bluemonday versions: - fixed: 1.0.16 vulnerable_at: 1.0.15 packages: - package: github.com/microcosm-cc/bluemonday symbols: - Policy.AllowElements - Policy.AllowElementsMatching derived_symbols: - Policy.AllowLists - Policy.AllowTables - UGCPolicy summary: |- Cross-site scripting via leaked style elements in github.com/microcosm-cc/bluemonday description: |- The bluemonday HTML sanitizer can leak the contents of a "style" element into HTML output, potentially causing XSS vulnerabilities. The default bluemonday sanitization policies are not vulnerable. Only user-defined policies allowing "select", "style", and "option" elements are affected. Permitting the "style" element in policies is hazardous, because bluemonday does not contain a CSS sanitizer. Newer versions of bluemonday suppress "style" and "script" elements even when allowed by a policy unless the policy explicitly requests unsafe processing. published: 2022-08-15T18:02:24Z cves: - CVE-2021-42576 ghsas: - GHSA-x95h-979x-cf3j references: - fix: https://github.com/microcosm-cc/bluemonday/commit/c788a2a4d42e081ad54a31368478820bb4a42fb4 - web: https://docs.google.com/document/d/11SoX296sMS0XoQiQbpxc5pNxSdbJKDJkm5BDv0zrX50/ review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1083.yaml
id: GO-2022-1083 modules: - module: github.com/free5gc/aper vulnerable_at: 1.0.4 packages: - package: github.com/free5gc/aper symbols: - GetBitString derived_symbols: - GetBitsValue - Marshal - MarshalWithParams - Unmarshal - UnmarshalWithParams summary: Panic on malformed messages in github.com/free5gc/aper description: |- A malformed message can crash the free5gc/amf and free5gc/ngap decoders via an index-out-of-range panic in aper.GetBitString. cves: - CVE-2022-43677 ghsas: - GHSA-59hj-62f5-fgmc credits: - '@fisherwky' references: - report: https://github.com/free5gc/free5gc/issues/402 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2972.yaml
id: GO-2024-2972 modules: - module: github.com/gogs/gogs unsupported_versions: - last_affected: 0.13.0 vulnerable_at: 0.13.0 summary: Gogs allows argument injection during the tagging of a new release in github.com/gogs/gogs cves: - CVE-2024-39933 ghsas: - GHSA-8mm6-wmpp-mmm3 references: - advisory: https://github.com/advisories/GHSA-8mm6-wmpp-mmm3 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-39933 - web: https://www.sonarsource.com/blog/securing-developer-tools-unpatched-code-vulnerabilities-in-gogs-1 source: id: GHSA-8mm6-wmpp-mmm3 created: 2024-07-08T13:24:01.718651-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2794.yaml
id: GO-2024-2794 modules: - module: github.com/mattermost/mattermost-server versions: - introduced: 8.1.0+incompatible - fixed: 8.1.12+incompatible - introduced: 9.5.0+incompatible - fixed: 9.5.3+incompatible - introduced: 9.6.0-rc1+incompatible - fixed: 9.6.1+incompatible vulnerable_at: 9.6.1-rc3+incompatible summary: Mattermost fails to fully validate role changes in github.com/mattermost/mattermost-server cves: - CVE-2024-4198 ghsas: - GHSA-5qx9-9ffj-5r8f references: - advisory: https://github.com/advisories/GHSA-5qx9-9ffj-5r8f - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-4198 - web: https://github.com/mattermost/mattermost/commit/3d6d8a7c1f7105558fe266a1b379859a4dba4e9b - web: https://github.com/mattermost/mattermost/commit/408ce4a82bb55ce27801f7044d9b3b49e82c47ed - web: https://github.com/mattermost/mattermost/commit/fba5b8e348feada9b21290369c3598ccd5c04424 - web: https://mattermost.com/security-updates source: id: GHSA-5qx9-9ffj-5r8f created: 2024-06-04T15:27:15.679327-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2689.yaml
id: GO-2024-2689 modules: - module: go.temporal.io/server versions: - fixed: 1.20.5 - introduced: 1.21.0 - fixed: 1.21.6 - introduced: 1.22.0-rc1 - fixed: 1.22.7 vulnerable_at: 1.22.6 summary: Temporal Server Denial of Service in go.temporal.io/server cves: - CVE-2024-2689 ghsas: - GHSA-wmxc-v39r-p9wf references: - advisory: https://github.com/advisories/GHSA-wmxc-v39r-p9wf - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-2689 - web: https://github.com/temporalio/temporal/commit/2099dfd945accbf794404c3b8d990d109de19f06 - web: https://github.com/temporalio/temporal/commit/679e3dc2ca8bd39e02c760f686cc8807f817bbfd - web: https://github.com/temporalio/temporal/commit/f1fab97129f964dcca17d1f7c344f38666d1ee5f - web: https://github.com/temporalio/temporal/releases source: id: GHSA-wmxc-v39r-p9wf created: 2024-05-17T16:14:10.920801-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0192.yaml
id: GO-2022-0192 modules: - module: golang.org/x/net versions: - fixed: 0.0.0-20180925071336-cf3bd585ca2a vulnerable_at: 0.0.0-20180921000356-2f5d2388922f packages: - package: golang.org/x/net/html symbols: - parser.resetInsertionMode derived_symbols: - Parse - ParseFragment summary: Incorrect parsing of nested templates in golang.org/x/net/html description: |- The Parse function can panic on some invalid inputs. For example, the Parse function panics on the input "<math><template><mo><template>". published: 2022-07-01T20:11:34Z cves: - CVE-2018-17142 ghsas: - GHSA-2wp2-chmh-r934 credits: - '@tr3ee' references: - fix: https://go.dev/cl/136875 - fix: https://go.googlesource.com/net/+/cf3bd585ca2a5a21b057abd8be7eea2204af89d0 - report: https://go.dev/issue/27702 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0019.yaml
id: GO-2020-0019 modules: - module: github.com/gorilla/websocket versions: - fixed: 1.4.1 vulnerable_at: 1.4.0 packages: - package: github.com/gorilla/websocket symbols: - Conn.advanceFrame - messageReader.Read derived_symbols: - Conn.Close - Conn.NextReader - Conn.NextWriter - Conn.ReadJSON - Conn.ReadMessage - Conn.WriteControl - Conn.WriteJSON - Conn.WriteMessage - Conn.WritePreparedMessage - Dialer.Dial - Dialer.DialContext - NewClient - NewPreparedMessage - ReadJSON - Subprotocols - Upgrade - Upgrader.Upgrade - WriteJSON - flateReadWrapper.Read - flateWriteWrapper.Close - flateWriteWrapper.Write - httpProxyDialer.Dial - messageWriter.Close - messageWriter.ReadFrom - messageWriter.Write - messageWriter.WriteString - netDialerFunc.Dial - proxy_direct.Dial - proxy_envOnce.Get - proxy_socks5.Dial - truncWriter.Write summary: Integer overflow in github.com/gorilla/websocket description: |- An attacker can craft malicious WebSocket frames that cause an integer overflow in a variable which tracks the number of bytes remaining. This may cause the server or client to get stuck attempting to read frames in a loop, which can be used as a denial of service vector. published: 2021-04-14T20:04:52Z cves: - CVE-2020-27813 ghsas: - GHSA-3xh2-74w9-5vxm - GHSA-jf24-p9p9-4rjh credits: - Max Justicz references: - fix: https://github.com/gorilla/websocket/pull/537 - fix: https://github.com/gorilla/websocket/commit/5b740c29263eb386f33f265561c8262522f19d37 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2687.yaml
id: GO-2024-2687 modules: - module: std versions: - fixed: 1.21.9 - introduced: 1.22.0-0 - fixed: 1.22.2 vulnerable_at: 1.22.1 packages: - package: net/http symbols: - http2Framer.readMetaFrame derived_symbols: - CanonicalHeaderKey - Client.CloseIdleConnections - Client.Do - Client.Get - Client.Head - Client.Post - Client.PostForm - Cookie.String - Cookie.Valid - Dir.Open - Error - Get - HandlerFunc.ServeHTTP - Head - Header.Add - Header.Del - Header.Get - Header.Set - Header.Values - Header.Write - Header.WriteSubset - ListenAndServe - ListenAndServeTLS - NewRequest - NewRequestWithContext - NotFound - ParseTime - Post - PostForm - ProxyFromEnvironment - ReadRequest - ReadResponse - Redirect - Request.AddCookie - Request.BasicAuth - Request.FormFile - Request.FormValue - Request.MultipartReader - Request.ParseForm - Request.ParseMultipartForm - Request.PostFormValue - Request.Referer - Request.SetBasicAuth - Request.UserAgent - Request.Write - Request.WriteProxy - Response.Cookies - Response.Location - Response.Write - ResponseController.EnableFullDuplex - ResponseController.Flush - ResponseController.Hijack - ResponseController.SetReadDeadline - ResponseController.SetWriteDeadline - Serve - ServeContent - ServeFile - ServeMux.ServeHTTP - ServeTLS - Server.Close - Server.ListenAndServe - Server.ListenAndServeTLS - Server.Serve - Server.ServeTLS - Server.SetKeepAlivesEnabled - Server.Shutdown - SetCookie - Transport.CancelRequest - Transport.Clone - Transport.CloseIdleConnections - Transport.RoundTrip - body.Close - body.Read - bodyEOFSignal.Close - bodyEOFSignal.Read - bodyLocked.Read - bufioFlushWriter.Write - cancelTimerBody.Close - cancelTimerBody.Read - checkConnErrorWriter.Write - chunkWriter.Write - connReader.Read - connectMethodKey.String - expectContinueReader.Close - expectContinueReader.Read - extraHeader.Write - fileHandler.ServeHTTP - fileTransport.RoundTrip - globalOptionsHandler.ServeHTTP - gzipReader.Close - gzipReader.Read - http2ClientConn.Close - http2ClientConn.Ping - http2ClientConn.RoundTrip - http2ClientConn.Shutdown - http2ConnectionError.Error - http2ErrCode.String - http2FrameHeader.String - http2FrameType.String - http2FrameWriteRequest.String - http2Framer.ReadFrame - http2Framer.WriteContinuation - http2Framer.WriteData - http2Framer.WriteDataPadded - http2Framer.WriteGoAway - http2Framer.WriteHeaders - http2Framer.WritePing - http2Framer.WritePriority - http2Framer.WritePushPromise - http2Framer.WriteRSTStream - http2Framer.WriteRawFrame - http2Framer.WriteSettings - http2Framer.WriteSettingsAck - http2Framer.WriteWindowUpdate - http2GoAwayError.Error - http2Server.ServeConn - http2Setting.String - http2SettingID.String - http2SettingsFrame.ForeachSetting - http2StreamError.Error - http2Transport.CloseIdleConnections - http2Transport.NewClientConn - http2Transport.RoundTrip - http2Transport.RoundTripOpt - http2bufferedWriter.Flush - http2bufferedWriter.Write - http2chunkWriter.Write - http2clientConnPool.GetClientConn - http2connError.Error - http2dataBuffer.Read - http2duplicatePseudoHeaderError.Error - http2gzipReader.Close - http2gzipReader.Read - http2headerFieldNameError.Error - http2headerFieldValueError.Error - http2noDialClientConnPool.GetClientConn - http2noDialH2RoundTripper.RoundTrip - http2pipe.Read - http2priorityWriteScheduler.CloseStream - http2priorityWriteScheduler.OpenStream - http2pseudoHeaderError.Error - http2requestBody.Close - http2requestBody.Read - http2responseWriter.Flush - http2responseWriter.FlushError - http2responseWriter.Push - http2responseWriter.SetReadDeadline - http2responseWriter.SetWriteDeadline - http2responseWriter.Write - http2responseWriter.WriteHeader - http2responseWriter.WriteString - http2roundRobinWriteScheduler.OpenStream - http2serverConn.CloseConn - http2serverConn.Flush - http2stickyErrWriter.Write - http2transportResponseBody.Close - http2transportResponseBody.Read - http2writeData.String - initALPNRequest.ServeHTTP - loggingConn.Close - loggingConn.Read - loggingConn.Write - maxBytesReader.Close - maxBytesReader.Read - onceCloseListener.Close - persistConn.Read - persistConnWriter.ReadFrom - persistConnWriter.Write - populateResponse.Write - populateResponse.WriteHeader - readTrackingBody.Close - readTrackingBody.Read - readWriteCloserBody.Read - redirectHandler.ServeHTTP - response.Flush - response.FlushError - response.Hijack - response.ReadFrom - response.Write - response.WriteHeader - response.WriteString - serverHandler.ServeHTTP - socksDialer.DialWithConn - socksUsernamePassword.Authenticate - stringWriter.WriteString - timeoutHandler.ServeHTTP - timeoutWriter.Write - timeoutWriter.WriteHeader - transportReadFromServerError.Error - module: golang.org/x/net versions: - fixed: 0.23.0 vulnerable_at: 0.22.0 packages: - package: golang.org/x/net/http2 symbols: - Framer.readMetaFrame derived_symbols: - ClientConn.Close - ClientConn.Ping - ClientConn.RoundTrip - ClientConn.Shutdown - ConfigureServer - ConfigureTransport - ConfigureTransports - ConnectionError.Error - ErrCode.String - FrameHeader.String - FrameType.String - FrameWriteRequest.String - Framer.ReadFrame - Framer.WriteContinuation - Framer.WriteData - Framer.WriteDataPadded - Framer.WriteGoAway - Framer.WriteHeaders - Framer.WritePing - Framer.WritePriority - Framer.WritePushPromise - Framer.WriteRSTStream - Framer.WriteRawFrame - Framer.WriteSettings - Framer.WriteSettingsAck - Framer.WriteWindowUpdate - GoAwayError.Error - ReadFrameHeader - Server.ServeConn - Setting.String - SettingID.String - SettingsFrame.ForeachSetting - StreamError.Error - Transport.CloseIdleConnections - Transport.NewClientConn - Transport.RoundTrip - Transport.RoundTripOpt - bufferedWriter.Flush - bufferedWriter.Write - chunkWriter.Write - clientConnPool.GetClientConn - connError.Error - dataBuffer.Read - duplicatePseudoHeaderError.Error - gzipReader.Close - gzipReader.Read - headerFieldNameError.Error - headerFieldValueError.Error - noDialClientConnPool.GetClientConn - noDialH2RoundTripper.RoundTrip - pipe.Read - priorityWriteScheduler.CloseStream - priorityWriteScheduler.OpenStream - pseudoHeaderError.Error - requestBody.Close - requestBody.Read - responseWriter.Flush - responseWriter.FlushError - responseWriter.Push - responseWriter.SetReadDeadline - responseWriter.SetWriteDeadline - responseWriter.Write - responseWriter.WriteHeader - responseWriter.WriteString - roundRobinWriteScheduler.OpenStream - serverConn.CloseConn - serverConn.Flush - stickyErrWriter.Write - transportResponseBody.Close - transportResponseBody.Read - writeData.String summary: HTTP/2 CONTINUATION flood in net/http description: |- An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection. ghsas: - GHSA-4v7x-pqxf-cx7m credits: - Bartek Nowotarski (https://nowotarski.info/) references: - report: https://go.dev/issue/65051 - fix: https://go.dev/cl/576155 - web: https://groups.google.com/g/golang-announce/c/YgW0sx8mN3M cve_metadata: id: CVE-2023-45288 cwe: 'CWE-400: Uncontrolled Resource Consumption' references: - https://security.netapp.com/advisory/ntap-20240419-0009/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QRYFHIQ6XRKRYBI2F5UESH67BJBQXUPT/ - http://www.openwall.com/lists/oss-security/2024/04/05/4 - http://www.openwall.com/lists/oss-security/2024/04/03/16 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2871.yaml
id: GO-2024-2871 modules: - module: github.com/stacklok/minder versions: - fixed: 0.0.50 vulnerable_at: 0.0.49 summary: |- Stacklok Minder vulnerable to denial of service from maliciously crafted templates in github.com/stacklok/minder cves: - CVE-2024-35194 ghsas: - GHSA-crgc-2583-rw27 references: - advisory: https://github.com/stacklok/minder/security/advisories/GHSA-crgc-2583-rw27 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-35194 - fix: https://github.com/stacklok/minder/commit/fe321d345b4f738de6a06b13207addc72b59f892 source: id: GHSA-crgc-2583-rw27 created: 2024-06-04T14:26:26.747786-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2632.yaml
id: GO-2024-2632 modules: - module: github.com/lestrrat-go/jwx versions: - fixed: 1.2.29 vulnerable_at: 1.2.28 packages: - package: github.com/lestrrat-go/jwx/jwe symbols: - uncompress - Decrypt derived_symbols: - Message.Decrypt - module: github.com/lestrrat-go/jwx/v2 versions: - fixed: 2.0.21 vulnerable_at: 2.0.20 packages: - package: github.com/lestrrat-go/jwx/v2/jwe symbols: - uncompress - Decrypt - Settings - decryptCtx.decryptContent summary: |- JWX vulnerable to a denial of service attack using compressed JWE message in github.com/lestrrat-go/jwx description: |- An attacker with a trusted public key may cause a Denial-of-Service (DoS) condition by crafting a malicious JSON Web Encryption (JWE) token with an exceptionally high compression ratio. When this token is processed by the recipient, it results in significant memory allocation and processing time during decompression. cves: - CVE-2024-28122 ghsas: - GHSA-hj3v-m684-v259 references: - advisory: https://github.com/lestrrat-go/jwx/security/advisories/GHSA-hj3v-m684-v259 - fix: https://github.com/lestrrat-go/jwx/commit/d01027d74c7376d66037a10f4f64af9af26a7e34 - fix: https://github.com/lestrrat-go/jwx/commit/d43f2ceb7f0c13714dfe8854d6439766e86faa76 - web: https://github.com/lestrrat-go/jwx/releases/tag/v1.2.29 - web: https://github.com/lestrrat-go/jwx/releases/tag/v2.0.21 source: id: GHSA-hj3v-m684-v259 created: 2024-05-17T15:43:27.61183-04:00 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1535.yaml
id: GO-2023-1535 modules: - module: github.com/pion/dtls/v2 versions: - fixed: 2.2.4 vulnerable_at: 2.2.3 packages: - package: github.com/pion/dtls/v2/pkg/protocol/handshake symbols: - MessageServerHello.Unmarshal derived_symbols: - Handshake.Unmarshal summary: Panic during unmarshal of Server Hello in github.com/pion/dtls/v2 description: Unmarshalling a Server Hello can panic, which could allow a denial of service. ghsas: - GHSA-hxp2-xqf3-v83h references: - fix: https://github.com/pion/dtls/commit/7a14903448b70069fd9e02adf210ca23083c56d2 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0355.yaml
id: GO-2022-0355 modules: - module: github.com/valyala/fasthttp versions: - fixed: 1.34.0 vulnerable_at: 1.33.0 packages: - package: github.com/valyala/fasthttp symbols: - FS.NewRequestHandler derived_symbols: - AppendBrotliBytes - AppendBrotliBytesLevel - AppendDeflateBytes - AppendDeflateBytesLevel - AppendGunzipBytes - AppendGzipBytes - AppendGzipBytesLevel - AppendHTTPDate - AppendInflateBytes - AppendUnbrotliBytes - Args.WriteTo - Client.CloseIdleConnections - Client.Do - Client.DoDeadline - Client.DoRedirects - Client.DoTimeout - Client.Get - Client.GetDeadline - Client.GetTimeout - Client.Post - Cookie.AppendBytes - Cookie.Cookie - Cookie.Parse - Cookie.ParseBytes - Cookie.String - Cookie.WriteTo - Dial - DialDualStack - DialDualStackTimeout - DialTimeout - Do - DoDeadline - DoRedirects - DoTimeout - FSHandler - FileLastModified - GenerateTestCertificate - Get - GetDeadline - GetTimeout - HostClient.CloseIdleConnections - HostClient.Do - HostClient.DoDeadline - HostClient.DoRedirects - HostClient.DoTimeout - HostClient.Get - HostClient.GetDeadline - HostClient.GetTimeout - HostClient.Post - LBClient.Do - LBClient.DoDeadline - LBClient.DoTimeout - ListenAndServe - ListenAndServeTLS - ListenAndServeTLSEmbed - ListenAndServeUNIX - NewStreamReader - ParseByteRange - ParseHTTPDate - ParseIPv4 - PipelineClient.Do - PipelineClient.DoDeadline - PipelineClient.DoTimeout - PipelineClient.PendingRequests - Post - Request.Body - Request.BodyGunzip - Request.BodyInflate - Request.BodyUnbrotli - Request.BodyWriteTo - Request.ContinueReadBody - Request.ContinueReadBodyStream - Request.Host - Request.MultipartForm - Request.PostArgs - Request.Read - Request.ReadBody - Request.ReadLimitBody - Request.SetBodyStreamWriter - Request.SetHost - Request.SetHostBytes - Request.String - Request.SwapBody - Request.URI - Request.Write - Request.WriteTo - RequestCtx.FormFile - RequestCtx.FormValue - RequestCtx.Host - RequestCtx.IfModifiedSince - RequestCtx.MultipartForm - RequestCtx.Path - RequestCtx.PostArgs - RequestCtx.PostBody - RequestCtx.QueryArgs - RequestCtx.Redirect - RequestCtx.RedirectBytes - RequestCtx.SendFile - RequestCtx.SendFileBytes - RequestCtx.SetBodyStreamWriter - RequestCtx.String - RequestCtx.URI - RequestHeader.Add - RequestHeader.AddBytesK - RequestHeader.AddBytesKV - RequestHeader.AddBytesV - RequestHeader.Read - RequestHeader.ReadTrailer - RequestHeader.Set - RequestHeader.SetByteRange - RequestHeader.SetBytesK - RequestHeader.SetBytesKV - RequestHeader.SetBytesV - RequestHeader.SetCanonical - RequestHeader.SetReferer - RequestHeader.SetRefererBytes - RequestHeader.Write - Response.Body - Response.BodyGunzip - Response.BodyInflate - Response.BodyUnbrotli - Response.BodyWriteTo - Response.Read - Response.ReadBody - Response.ReadLimitBody - Response.SendFile - Response.SetBodyStreamWriter - Response.String - Response.SwapBody - Response.Write - Response.WriteDeflate - Response.WriteDeflateLevel - Response.WriteGzip - Response.WriteGzipLevel - Response.WriteTo - ResponseHeader.Add - ResponseHeader.AddBytesK - ResponseHeader.AddBytesKV - ResponseHeader.AddBytesV - ResponseHeader.AppendBytes - ResponseHeader.Cookie - ResponseHeader.DelClientCookie - ResponseHeader.DelClientCookieBytes - ResponseHeader.Header - ResponseHeader.Read - ResponseHeader.ReadTrailer - ResponseHeader.Set - ResponseHeader.SetBytesK - ResponseHeader.SetBytesKV - ResponseHeader.SetBytesV - ResponseHeader.SetCanonical - ResponseHeader.SetContentRange - ResponseHeader.SetCookie - ResponseHeader.SetLastModified - ResponseHeader.String - ResponseHeader.Write - ResponseHeader.WriteTo - SaveMultipartFile - Serve - ServeConn - ServeFile - ServeFileBytes - ServeFileBytesUncompressed - ServeFileUncompressed - ServeTLS - ServeTLSEmbed - Server.AppendCert - Server.AppendCertEmbed - Server.ListenAndServe - Server.ListenAndServeTLS - Server.ListenAndServeTLSEmbed - Server.ListenAndServeUNIX - Server.Serve - Server.ServeConn - Server.ServeTLS - Server.ServeTLSEmbed - Server.Shutdown - TCPDialer.Dial - TCPDialer.DialDualStack - TCPDialer.DialDualStackTimeout - TCPDialer.DialTimeout - URI.Parse - URI.Update - URI.UpdateBytes - URI.WriteTo - WriteBrotli - WriteBrotliLevel - WriteDeflate - WriteDeflateLevel - WriteGunzip - WriteGzip - WriteGzipLevel - WriteInflate - WriteMultipartForm - WriteUnbrotli - bigFileReader.Read - bigFileReader.WriteTo - ctxLogger.Printf - firstByteReader.Read - flushWriter.Write - fsFile.NewReader - fsSmallFileReader.WriteTo - hijackConn.Close - hijackConn.Read - perIPConn.Close - perIPConnCounter.Unregister - pipelineConnClient.Do - pipelineConnClient.DoDeadline - pipelineConnClient.PendingRequests - requestStream.Read - statsWriter.Write - tcpKeepaliveListener.Accept - workerPool.Serve summary: Path traversal in github.com/valyala/fasthttp description: |- The fasthttp.FS request handler is vulnerable to directory traversal attacks on Windows systems, and can serve files from outside the provided root directory. URL path normalization does not handle Windows path separators (backslashes), permitting an attacker to construct requests with relative paths. published: 2022-07-27T20:26:59Z cves: - CVE-2022-21221 ghsas: - GHSA-fx95-883v-4q4h credits: - egovorukhin references: - fix: https://github.com/valyala/fasthttp/commit/6b5bc7bb304975147b4af68df54ac214ed2554c1 - web: https://github.com/valyala/fasthttp/issues/1226 - web: https://github.com/valyala/fasthttp/releases/tag/v1.34.0 - web: https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMVALYALAFASTHTTP-2407866 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2764.yaml
id: GO-2024-2764 modules: - module: github.com/rancher/rancher versions: - introduced: 2.0.0+incompatible - fixed: 2.1.6+incompatible vulnerable_at: 2.1.6-rc5+incompatible summary: |- Rancher Project Members Have Continued Access to Namespaces After Being Removed From Them in github.com/rancher/rancher cves: - CVE-2019-6287 ghsas: - GHSA-6r7x-4q7g-h83j references: - advisory: https://github.com/advisories/GHSA-6r7x-4q7g-h83j - advisory: https://nvd.nist.gov/vuln/detail/CVE-2019-6287 - report: https://github.com/rancher/rancher/issues/17244 - report: https://github.com/rancher/rancher/issues/17724 - web: https://forums.rancher.com/t/rancher-release-v2-1-6/13148 - web: https://forums.rancher.com/t/rancher-security-announcement-cve-2018-20321-and-cve-2019-6287/13149 - web: https://rancher.com/blog/2019/2019-01-29-explaining-security-vulnerabilities-addressed-in-rancher-v2-1-6-and-v2-0-11 source: id: GHSA-6r7x-4q7g-h83j created: 2024-06-04T15:28:51.235603-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2836.yaml
id: GO-2024-2836 modules: - module: github.com/cea-hpc/sshproxy versions: - fixed: 1.6.3 vulnerable_at: 1.6.2 summary: sshproxy vulnerable to SSH option injection in github.com/cea-hpc/sshproxy cves: - CVE-2024-34713 ghsas: - GHSA-jmqp-37m5-49wh references: - advisory: https://github.com/cea-hpc/sshproxy/security/advisories/GHSA-jmqp-37m5-49wh - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-34713 - fix: https://github.com/cea-hpc/sshproxy/commit/3b8bccc874dc4ca2c80c956cad65722abb46f0b9 - fix: https://github.com/cea-hpc/sshproxy/commit/f7eabd05d5f0f951e160293692327cad9a7d9580 source: id: GHSA-jmqp-37m5-49wh created: 2024-05-17T16:09:33.514363-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1213.yaml
id: GO-2022-1213 modules: - module: github.com/go-macaron/csrf versions: - fixed: 0.0.0-20180426211050-dadd1711a617 vulnerable_at: 0.0.0-20170207230724-428b7c62d7d0 packages: - package: github.com/go-macaron/csrf symbols: - Generate skip_fix: 'TODO: revisit this reason (cannot find module providing package github.com/Unknwon/com)' summary: Insecure generation of cookies in github.com/go-macaron/csrf description: |- The Options.Secure value is ignored, and cookies created by Generate never have the secure attribute. cves: - CVE-2018-25060 ghsas: - GHSA-hhxg-px5h-jc32 references: - fix: https://github.com/go-macaron/csrf/pull/7 - fix: https://github.com/go-macaron/csrf/commit/dadd1711a617000b70e5e408a76531b73187031c review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1990.yaml
id: GO-2023-1990 modules: - module: golang.org/x/image versions: - fixed: 0.10.0 vulnerable_at: 0.9.0 packages: - package: golang.org/x/image/tiff symbols: - newDecoder derived_symbols: - Decode - DecodeConfig summary: |- Excessive CPU consumption when decoding 0-height images in golang.org/x/image/tiff description: |- A maliciously-crafted image can cause excessive CPU consumption in decoding. A tiled image with a height of 0 and a very large width can cause excessive CPU consumption, despite the image size (width * height) appearing to be zero. ghsas: - GHSA-j3p8-6mrq-6g7h credits: - Philippe Antoine (Catena cyber) references: - report: https://go.dev/issue/61581 - fix: https://go.dev/cl/514897 cve_metadata: id: CVE-2023-29407 cwe: 'CWE-834: Excessive Iteration' references: - https://security.netapp.com/advisory/ntap-20230831-0009/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KO54NBDUJXKAZNGCFOEYL2LKK2RQP6K6/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWH6Q7NVM4MV3GWFEU4PA67AWZHVFJQ2/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XZTEP6JYILRBNDTNWTEQ5D4QUUVQBESK/ review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2886.yaml
id: GO-2024-2886 modules: - module: github.com/minio/minio versions: - fixed: 0.0.0-20240527191746-e0fe7cc39172 summary: MinIO information disclosure vulnerability in github.com/minio/minio cves: - CVE-2024-36107 ghsas: - GHSA-95fr-cm4m-q5p9 unknown_aliases: - BIT-minio-2024-36107 - CGA-rq5h-44g8-8973 references: - advisory: https://github.com/minio/minio/security/advisories/GHSA-95fr-cm4m-q5p9 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-36107 - fix: https://github.com/minio/minio/commit/e0fe7cc391724fc5baa85b45508f425020fe4272 - fix: https://github.com/minio/minio/pull/19810 - web: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/If-Modified-Since - web: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/If-Unmodified-Since notes: - fix: 'github.com/minio/minio: could not add vulnerable_at: cannot auto-guess when fixed version is 0.0.0 pseudo-version' source: id: GHSA-95fr-cm4m-q5p9 created: 2024-06-26T14:08:29.094106-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2527.yaml
id: GO-2024-2527 modules: - module: go.etcd.io/etcd versions: - fixed: 0.5.0-alpha.5.0.20221102000833-1f054980bc27 non_go_versions: - introduced: 3.2.22 - fixed: 3.4.22 vulnerable_at: 0.5.0-alpha.5.0.20220915004622-85b640cee793 packages: - package: go.etcd.io/etcd/pkg/tlsutil summary: Insecure ciphers are allowed by default in go.etcd.io/etcd description: |- The TLS ciphers list supported by etcd contains insecure cipher suites. Users may specify that an insecure cipher is used via “--cipher-suites” flag. A list of secure suites is used by default. ghsas: - GHSA-5x4g-q5rc-36jp references: - advisory: https://github.com/etcd-io/etcd/security/advisories/GHSA-5x4g-q5rc-36jp source: id: GHSA-5x4g-q5rc-36jp created: 2024-06-14T11:40:23.789526-04:00 review_status: REVIEWED unexcluded: EFFECTIVELY_PRIVATE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2784.yaml
id: GO-2024-2784 modules: - module: github.com/rancher/rancher versions: - introduced: 2.0.0+incompatible unsupported_versions: - last_affected: 2.0.13 - module: github.com/rancher/rancher versions: - introduced: 2.1.0+incompatible unsupported_versions: - last_affected: 2.1.8 - module: github.com/rancher/rancher versions: - introduced: 2.2.0+incompatible - fixed: 2.2.2+incompatible vulnerable_at: 2.2.2-rc9+incompatible summary: Rancher Recreates Default User With Known Password Despite Deletion in github.com/rancher/rancher cves: - CVE-2019-11202 ghsas: - GHSA-xh8x-j8h3-m5ph references: - advisory: https://github.com/advisories/GHSA-xh8x-j8h3-m5ph - advisory: https://nvd.nist.gov/vuln/detail/CVE-2019-11202 - web: https://forums.rancher.com/t/rancher-release-v2-2-2-addresses-rancher-cve-2019-11202-and-stability-issues/13977 notes: - fix: 'module merge error: could not merge versions of module github.com/rancher/rancher: introduced and fixed versions must alternate' - fix: 'github.com/rancher/rancher: could not add vulnerable_at: latest version (1.6.30) is before last introduced version' source: id: GHSA-xh8x-j8h3-m5ph created: 2024-06-26T14:04:33.525939-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2702.yaml
id: GO-2024-2702 modules: - module: github.com/flipped-aurora/gin-vue-admin/server versions: - fixed: 0.0.0-20240409100909-b1b7427c6ea6 vulnerable_at: 0.0.0-20240407133540-7bc7c3051067 packages: - package: github.com/flipped-aurora/gin-vue-admin/server/api/v1/system symbols: - AutoCodeApi.AutoPlug summary: Code injection vulnerability in github.com/flipped-aurora/gin-vue-admin/server description: |- Gin-vue-admin has a code injection vulnerability in the backend. In the Plugin System -> Plugin Template feature, an attacker can perform directory traversal by manipulating the 'plugName' parameter. They can create specific folders such as 'api', 'config', 'global', 'model', 'router', 'service', and 'main.go' function within the specified traversal directory. Moreover, the Go files within these folders can have arbitrary code inserted based on a specific PoC parameter. cves: - CVE-2024-31457 ghsas: - GHSA-gv3w-m57p-3wc4 references: - advisory: https://github.com/flipped-aurora/gin-vue-admin/security/advisories/GHSA-gv3w-m57p-3wc4 - fix: https://github.com/flipped-aurora/gin-vue-admin/commit/b1b7427c6ea6c7a027fa188c6be557f3795e732b source: id: GHSA-gv3w-m57p-3wc4 created: 2024-05-17T14:58:48.32303-04:00 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2451.yaml
id: GO-2024-2451 modules: - module: github.com/bincyber/go-sqlcrypter versions: - introduced: 0.1.0 vulnerable_at: 0.1.0 packages: - package: github.com/bincyber/go-sqlcrypter/providers/aesgcm symbols: - New - package: github.com/bincyber/go-sqlcrypter/providers/awskms symbols: - New summary: IV collision in github.com/bincyber/go-sqlcrypter description: |- There is a risk of an IV collision using the awskms or aesgcm provider. NIST SP 800-38D section 8.3 states that it is unsafe to encrypt more than 2^32 plaintexts under the same key when using a random IV. The limit could easily be reached given the use case of database column encryption. Ciphertexts are likely to be persisted and stored together. IV collision could enable an attacker with access to the ciphertexts to decrypt all messages encrypted with the affected key. The aesgcm provider cannot be fixed without a breaking change, so users should not encrypt more than 2^32 values with any key. The awskms package can be fixed without a breaking change by switching to a counter-based IV. credits: - '@takeyourhatoff' references: - report: https://github.com/bincyber/go-sqlcrypter/issues/127 - web: https://github.com/bincyber/go-sqlcrypter/pull/128 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0054.yaml
id: GO-2021-0054 modules: - module: github.com/tidwall/gjson versions: - fixed: 1.6.6 vulnerable_at: 1.6.5 packages: - package: github.com/tidwall/gjson symbols: - unwrap derived_symbols: - Get - GetBytes - GetMany - GetManyBytes - Result.ForEach - Result.Get summary: Panic due to improper input validation in ForEach in github.com/tidwall/gjson description: |- Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector. published: 2021-04-14T20:04:52Z cves: - CVE-2020-36067 ghsas: - GHSA-p64j-r5f4-pwwx credits: - '@toptotu' references: - fix: https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b - web: https://github.com/tidwall/gjson/issues/196 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2981.yaml
id: GO-2024-2981 modules: - module: github.com/openclarity/kubeclarity/backend versions: - fixed: 0.0.0-20240711173334-1d1178840703 summary: SQL Injection in the KubeClarity REST API in github.com/openclarity/kubeclarity/backend cves: - CVE-2024-39909 ghsas: - GHSA-5248-h45p-9pgw references: - advisory: https://github.com/openclarity/kubeclarity/security/advisories/GHSA-5248-h45p-9pgw - web: https://github.com/openclarity/kubeclarity/blob/main/backend/pkg/database/id_view.go#L79 - web: https://github.com/openclarity/kubeclarity/commit/1d1178840703a72d9082b7fc4aea0a3326c5d294 notes: - fix: 'github.com/openclarity/kubeclarity/backend: could not add vulnerable_at: cannot auto-guess when fixed version is 0.0.0 pseudo-version' source: id: GHSA-5248-h45p-9pgw created: 2024-07-12T16:33:34.102123356Z review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0758.yaml
id: GO-2022-0758 modules: - module: github.com/sigstore/cosign versions: - fixed: 1.10.1 vulnerable_at: 1.10.0 packages: - package: github.com/sigstore/cosign/cmd/cosign/cli/verify symbols: - VerifyAttestationCommand.Exec summary: Improper verification of signature attestations in github.com/sigstore/cosign cves: - CVE-2022-35929 ghsas: - GHSA-vjxv-45g9-9296 references: - advisory: https://github.com/sigstore/cosign/security/advisories/GHSA-vjxv-45g9-9296 - fix: https://github.com/sigstore/cosign/commit/c5fda01a8ff33ca981f45a9f13e7fb6bd2080b94 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0236.yaml
id: GO-2022-0236 modules: - module: std versions: - fixed: 1.15.12 - introduced: 1.16.0-0 - fixed: 1.16.4 vulnerable_at: 1.16.3 packages: - package: net/http symbols: - http2clientStream.writeRequest - http2isConnectionCloseRequest - isProtocolSwitchHeader - shouldClose - module: golang.org/x/net versions: - fixed: 0.0.0-20210428140749-89ef3d95e781 vulnerable_at: 0.0.0-20210427231257-85d9c07bbe3a packages: - package: golang.org/x/net/http/httpguts symbols: - headerValueContainsToken derived_symbols: - HeaderValuesContainsToken summary: Panic due to large headers in net/http and golang.org/x/net/http/httpguts description: |- A malicious HTTP server or client can cause the net/http client or server to panic. ReadRequest and ReadResponse can hit an unrecoverable panic when reading a very large header (over 7MB on 64-bit architectures, or over 4MB on 32-bit ones). Transport and Client are vulnerable and the program can be made to crash by a malicious server. Server is not vulnerable by default, but can be if the default max header of 1MB is overridden by setting Server.MaxHeaderBytes to a higher value, in which case the program can be made to crash by a malicious client. This also affects golang.org/x/net/http2/h2c and HeaderValuesContainsToken in golang.org/x/net/http/httpguts. published: 2022-07-15T23:04:18Z cves: - CVE-2021-31525 ghsas: - GHSA-h86h-8ppg-mxmh credits: - Guido Vranken references: - fix: https://go.dev/cl/313069 - fix: https://go.googlesource.com/net/+/89ef3d95e781148a0951956029c92a211477f7f9 - report: https://go.dev/issue/45710 - web: https://groups.google.com/g/golang-announce/c/cu9SP4eSXMc review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2602.yaml
id: GO-2024-2602 modules: - module: github.com/coder/coder vulnerable_at: 0.27.3 packages: - package: github.com/coder/coder/coderd symbols: - Api.userOIDC - API.New - module: github.com/coder/coder/v2 versions: - fixed: 2.6.1 - introduced: 2.7.0 - fixed: 2.7.3 - introduced: 2.8.0 - fixed: 2.8.4 vulnerable_at: 2.8.3 packages: - package: github.com/coder/coder/v2/coderd symbols: - Api.userOIDC - Api.New summary: Incorrect email domain verification in github.com/coder/coder description: |- A vulnerability in Coder's OIDC authentication could allow an attacker to bypass the CODER_OIDC_EMAIL_DOMAIN verification and create an account with an email not in the allowlist. Deployments are only affected if the OIDC provider allows users to create accounts on the provider (such as public providers like google.com). During OIDC registration, the user's email was improperly validated against the allowed CODER_OIDC_EMAIL_DOMAINs. cves: - CVE-2024-27918 ghsas: - GHSA-7cc2-r658-7xpf credits: - arcz - maxammann references: - advisory: https://github.com/coder/coder/security/advisories/GHSA-7cc2-r658-7xpf - fix: https://github.com/coder/coder/commit/1171ce7add017481d28441575024209ac160ecb0 - fix: https://github.com/coder/coder/commit/2ba84911f8b02605e5958d5e4a2fe3979ec50b31 - fix: https://github.com/coder/coder/commit/2d37eb42e7db656e343fe1f36de5ab1a1a62f4fb - fix: https://github.com/coder/coder/commit/4439a920e454a82565e445e4376c669e3b89591c review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1159.yaml
id: GO-2022-1159 modules: - module: github.com/containers/podman/v4 versions: - introduced: 4.1.0-rc1 vulnerable_at: 4.3.1 packages: - package: github.com/containers/podman/v4/pkg/bindings/images symbols: - Build - nTar summary: Path traversal in github.com/containers/podman/v4 description: |- The local path and the lowest subdirectory may be disclosed due to incorrect absolute path traversal, resulting in an impact to confidentiality. cves: - CVE-2022-4123 ghsas: - GHSA-rprg-4v7q-87v7 credits: - Sage McTaggart references: - report: https://bugzilla.redhat.com/show_bug.cgi?id=2144989 - web: https://github.com/containers/podman/pull/13531 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0346.yaml
id: GO-2022-0346 modules: - module: github.com/quay/claircore versions: - fixed: 1.1.0 vulnerable_at: 1.1.0-rc.0 packages: - package: github.com/quay/claircore/rpm symbols: - Scanner.Scan summary: Path traversal in github.com/quay/claircore description: |- A maliciously crafted RPM file can cause the Scanner.Scan function to write files with arbitrary contents to arbitrary locations on the local filestem. published: 2022-07-15T23:30:27Z cves: - CVE-2021-3762 ghsas: - GHSA-mq47-6wwv-v79w references: - fix: https://github.com/quay/claircore/pull/478 - fix: https://github.com/quay/claircore/commit/691f2023a1720a0579e688b69a2f4bfe1f4b7821 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2918.yaml
id: GO-2024-2918 modules: - module: github.com/Azure/azure-sdk-for-go/sdk/azidentity versions: - fixed: 1.6.0 vulnerable_at: 1.6.0-beta.4 packages: - package: github.com/Azure/azure-sdk-for-go/sdk/azidentity symbols: - managedIdentityClient.createServiceFabricAuthRequest - managedIdentityClient.createIMDSAuthRequest - managedIdentityClient.createAzureMLAuthRequest - managedIdentityClient.createAccessToken - managedIdentityClient.createCloudShellAuthRequest - newManagedIdentityClient - managedIdentityClient.createAppServiceAuthRequest - managedIdentityClient.getAzureArcSecretKey - managedIdentityClient.authenticate - managedIdentityClient.createAzureArcAuthRequest derived_symbols: - AzurePipelinesCredential.GetToken - ChainedTokenCredential.GetToken - ClientAssertionCredential.GetToken - ClientCertificateCredential.GetToken - ClientSecretCredential.GetToken - DefaultAzureCredential.GetToken - EnvironmentCredential.GetToken - ManagedIdentityCredential.GetToken - NewDefaultAzureCredential - NewManagedIdentityCredential - OnBehalfOfCredential.GetToken - WorkloadIdentityCredential.GetToken - confidentialClient.GetToken summary: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/Azure/azure-sdk-for-go/sdk/azidentity cves: - CVE-2024-35255 ghsas: - GHSA-m5vv-6r4h-3vj9 references: - advisory: https://github.com/advisories/GHSA-m5vv-6r4h-3vj9 - fix: https://github.com/Azure/azure-sdk-for-go/commit/50774cd9709905523136fb05e8c85a50e8984499 - web: https://github.com/AzureAD/microsoft-authentication-library-for-dotnet/issues/4806#issuecomment-2178960340 - web: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35255 source: id: GHSA-m5vv-6r4h-3vj9 created: 2024-07-01T16:01:15.242669-04:00 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2116.yaml
id: GO-2023-2116 modules: - module: github.com/gofiber/fiber/v2 versions: - fixed: 2.50.0 vulnerable_at: 2.49.2 packages: - package: github.com/gofiber/fiber/v2/middleware/csrf symbols: - configDefault - New - CsrfFromParam - CsrfFromForm - CsrfFromCookie - CsrfFromHeader - CsrfFromQuery - newManager - manager.getRaw - manager.setRaw summary: CSRF token validation vulnerability in github.com/gofiber/fiber/v2 description: |- A cross-site request forgery vulnerability can allow an attacker to obtain tokens and forge malicious requests on behalf of a user. This can lead to unauthorized actions being taken on the user's behalf, potentially compromising the security and integrity of the application. The vulnerability is caused by improper validation and enforcement of CSRF tokens within the application. The CSRF token is validated against tokens in storage but was is not tied to the original requestor that generated it, allowing for token reuse. cves: - CVE-2023-45141 ghsas: - GHSA-mv73-f69x-444p references: - advisory: https://github.com/gofiber/fiber/security/advisories/GHSA-mv73-f69x-444p - fix: https://github.com/gofiber/fiber/commit/8c3916dbf4ad2ed427d02c6eb63ae8b2fa8f019a - fix: https://github.com/gofiber/fiber/commit/b50d91d58ecdff2a330bf07950244b6c4caf65b1 notes: - There is a closely related vulnerability (GO-2023-2115), and it is not clear which fix applies to which vulnerability, so I have marked both fixes as applying to both vulnerabilities. review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2597.yaml
id: GO-2024-2597 modules: - module: github.com/authzed/spicedb versions: - fixed: 1.29.2 vulnerable_at: 1.29.1 summary: Integer overflow in chunking helper causes dispatching to miss elements or panic in github.com/authzed/spicedb cves: - CVE-2024-27101 ghsas: - GHSA-h3m7-rqc4-7h9p references: - advisory: https://github.com/authzed/spicedb/security/advisories/GHSA-h3m7-rqc4-7h9p - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-27101 - fix: https://github.com/authzed/spicedb/commit/ef443c442b96909694390324a99849b0407007fe source: id: GHSA-h3m7-rqc4-7h9p created: 2024-05-17T16:14:59.533653-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2670.yaml
id: GO-2024-2670 modules: - module: github.com/hashicorp/nomad versions: - introduced: 0.7.0 - fixed: 1.4.11 - introduced: 1.5.0 - fixed: 1.5.6 vulnerable_at: 1.5.5 summary: ACL security vulnerability in github.com/hashicorp/nomad description: |- An ACL policy using a block without label can be applied to unexpected resources in Nomad, a distributed, highly available scheduler designed for effortless operations and management of applications. cves: - CVE-2023-3072 ghsas: - GHSA-rpvr-38xv-xvxq credits: - anonymous4ACL24 references: - web: https://discuss.hashicorp.com/t/hcsec-2023-20-nomad-acl-policies-without-label-are-applied-to-unexpected-resources/56270 review_status: REVIEWED