repo_id
stringclasses
927 values
file_path
stringlengths
99
214
content
stringlengths
2
4.15M
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2505.yaml
id: GO-2024-2505 modules: - module: github.com/hashicorp/consul versions: - introduced: 1.2.0 - fixed: 1.6.10 - introduced: 1.7.0 - fixed: 1.7.10 - introduced: 1.8.0 - fixed: 1.8.6 vulnerable_at: 1.8.5 summary: Privilege Escalation in HashiCorp Consul in github.com/hashicorp/consul cves: - CVE-2020-28053 ghsas: - GHSA-6m72-467w-94rh unknown_aliases: - BIT-consul-2020-28053 references: - advisory: https://github.com/advisories/GHSA-6m72-467w-94rh - advisory: https://nvd.nist.gov/vuln/detail/CVE-2020-28053 - fix: https://github.com/hashicorp/consul/commit/ff5215d882ac51b49c2647aac46b42aa9c890ce3 - fix: https://github.com/hashicorp/consul/pull/9240 - web: https://github.com/hashicorp/consul/blob/master/CHANGELOG.md#186-november-19-2020 - web: https://security.gentoo.org/glsa/202208-09 - web: https://www.hashicorp.com/blog/category/consul source: id: GHSA-6m72-467w-94rh created: 2024-06-14T11:38:32.702692-04:00 review_status: UNREVIEWED unexcluded: EFFECTIVELY_PRIVATE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0603.yaml
id: GO-2022-0603 modules: - module: gopkg.in/yaml.v3 versions: - fixed: 3.0.0-20220521103104-8f96da9f5d5e vulnerable_at: 3.0.0-20220512140231-539c8e751b99 packages: - package: gopkg.in/yaml.v3 symbols: - Unmarshal summary: Panic in gopkg.in/yaml.v3 description: |- An issue in the Unmarshal function can cause a program to panic when attempting to deserialize invalid input. published: 2022-08-22T18:00:47Z cves: - CVE-2022-28948 ghsas: - GHSA-hp87-p4gw-j4gq references: - fix: https://github.com/go-yaml/yaml/commit/8f96da9f5d5eff988554c1aae1784627c4bf6754 - web: https://github.com/go-yaml/yaml/issues/666 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1043.yaml
id: GO-2022-1043 modules: - module: github.com/flyteorg/flyteadmin versions: - introduced: 1.0.0 - fixed: 1.1.44 vulnerable_at: 1.1.43 packages: - package: github.com/flyteorg/flyteadmin/auth/config summary: Hardcoded hashed password in github.com/flyteorg/flyteadmin description: |- Default authorization server's configuration settings contain a known hardcoded hashed password. Users who enable auth but do not override this setting may unknowingly allow public traffic in by way of this default password with attackers effectively impersonating propeller. cves: - CVE-2022-39273 ghsas: - GHSA-67x4-qr35-qvrm references: - advisory: https://github.com/advisories/GHSA-67x4-qr35-qvrm - fix: https://github.com/flyteorg/flyteadmin/pull/478 - web: https://docs.flyte.org/en/latest/deployment/cluster_config/auth_setup.html#oauth2-authorization-server review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1144.yaml
id: GO-2022-1144 modules: - module: std versions: - fixed: 1.18.9 - introduced: 1.19.0-0 - fixed: 1.19.4 vulnerable_at: 1.19.3 packages: - package: net/http symbols: - http2serverConn.canonicalHeader derived_symbols: - ListenAndServe - ListenAndServeTLS - Serve - ServeTLS - Server.ListenAndServe - Server.ListenAndServeTLS - Server.Serve - Server.ServeTLS - http2Server.ServeConn - module: golang.org/x/net versions: - fixed: 0.4.0 vulnerable_at: 0.3.0 packages: - package: golang.org/x/net/http2 symbols: - serverConn.canonicalHeader derived_symbols: - Server.ServeConn summary: Excessive memory growth in net/http and golang.org/x/net/http2 description: |- An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection. ghsas: - GHSA-xrjj-mj9h-534m credits: - Josselin Costanzi references: - report: https://go.dev/issue/56350 - fix: https://go.dev/cl/455717 - fix: https://go.dev/cl/455635 - web: https://groups.google.com/g/golang-announce/c/L_3rmdT0BMU/m/yZDrXjIiBQAJ cve_metadata: id: CVE-2022-41717 cwe: 'CWE 400: Uncontrolled Resource Consumption' references: - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QBKBAZBIOXZV5QCFHZNSVXULR32XJCYD/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NQGNAXK3YBPMUP3J4TECIRDHFGW37522/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PUM4DIVOLJCBK5ZDP4LJOL24GXT3YSIR/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4SBIUECMLNC572P23DDOKJNKPJVX26SP/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PW3XC47AUW5J5M2ULJX7WCCL3B2ETLMT/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q52IQI754YAE4XPR4QBRWPIVZWYGZ4FS/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/56B2FFESRYYP6IY2AZ3UWXLWKZ5IYZN4/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ANIOPUXWIHVRA6CEWXCGOMX3YYS6KFHG/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WPEIZ7AMEJCZXU3FEJZMVRNHQZXX5P3I/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4BUK2ZIAGCULOOYDNH25JPU6JBES5NF2/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7N5GV4CHH6WAGX3GFMDD3COEOVCZ4RI/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/REMHVVIBDNKSRKNOTV7EQSB7CYQWOUOU/ - https://security.gentoo.org/glsa/202311-09 - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSVIS6MTMFVBA7JPMRAUNKUOYEVSJYSB/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZSVEMQV5ROY5YW5QE3I57HT3ITWG5GCV/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CHHITS4PUOZAKFIUBQAQZC7JWXMOYE4B/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KEOTKBUPZXHE3F352JBYNTSNRXYLWD6P/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5RSKA2II6QTD4YUKUNDVJQSRYSFC4VFR/ review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2583.yaml
id: GO-2024-2583 modules: - module: github.com/edgelesssys/marblerun versions: - fixed: 1.4.1 vulnerable_at: 1.4.0 packages: - package: github.com/edgelesssys/marblerun/marble/premain symbols: - GramineActivate - PreMain - PreMainEgo - PreMainMock - PreMainEx - ActivateRPC - package: github.com/edgelesssys/marblerun/coordinator/core symbols: - Core.setTTLSConfig derived_symbols: - Core.Activate summary: Encryption bypass in github.com/edgelesssys/marblerun ghsas: - GHSA-x5r5-2qrx-rqj8 references: - advisory: https://github.com/edgelesssys/marblerun/security/advisories/GHSA-x5r5-2qrx-rqj8 - fix: https://github.com/edgelesssys/marblerun/commit/0330ced092253613a07abe7b330ff6ac6fc6e9c6 - fix: https://github.com/edgelesssys/marblerun/commit/e5bcfe32883d22f3d87ffc9400f9fdb5ecbe3200 - web: https://github.com/edgelesssys/marblerun/releases/tag/v1.4.1 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2181.yaml
id: GO-2023-2181 modules: - module: github.com/sigstore/cosign vulnerable_at: 1.13.1 packages: - package: github.com/sigstore/cosign/pkg/cosign symbols: - FetchSignaturesForReference - module: github.com/sigstore/cosign/v2 versions: - fixed: 2.2.1 vulnerable_at: 2.2.0 packages: - package: github.com/sigstore/cosign/v2/pkg/cosign symbols: - FetchSignaturesForReference summary: Denial of service attack from remote registry in github.com/sigstore/cosign description: |- An attacker who controls a remote registry can return a high number of attestations and/or signatures to cosign. This can cause cosign to enter a long loop resulting in a denial of service, i.e., endless data attack. cves: - CVE-2023-46737 ghsas: - GHSA-vfp6-jrw2-99g9 references: - fix: https://github.com/sigstore/cosign/commit/8ac891ff0e29ddc67965423bee8f826219c6eb0f - web: https://github.com/sigstore/cosign/releases/tag/v2.2.1 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2566.yaml
id: GO-2024-2566 modules: - module: github.com/mattermost/mattermost-server versions: - introduced: 9.0.0+incompatible - fixed: 9.3.0+incompatible vulnerable_at: 9.3.0-rc2+incompatible - module: github.com/mattermost/mattermost-server/v5 vulnerable_at: 5.39.3 - module: github.com/mattermost/mattermost-server/v6 vulnerable_at: 6.7.2 - module: github.com/mattermost/mattermost/server/v8 non_go_versions: - fixed: 8.1.8 vulnerable_at: 8.0.0-20240626145722-59998b0b8473 summary: Mattermost fails to check the required permissions in github.com/mattermost/mattermost-server cves: - CVE-2024-24776 ghsas: - GHSA-r833-w756-h5p2 unknown_aliases: - BIT-mattermost-2024-24776 - CGA-x56p-7vj3-wq3q references: - advisory: https://github.com/advisories/GHSA-r833-w756-h5p2 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-24776 - web: https://mattermost.com/security-updates source: id: GHSA-r833-w756-h5p2 created: 2024-06-26T13:56:26.587346-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1881.yaml
id: GO-2023-1881 modules: - module: github.com/cosmos/cosmos-sdk vulnerable_at: 0.47.3 packages: - package: github.com/cosmos/cosmos-sdk/x/crisis summary: The x/crisis package does not charge ConstantFee in github.com/cosmos/cosmos-sdk description: |- If a transaction is sent to the x/crisis module to check an invariant, the ConstantFee parameter of the chain is not charged. No patch will be released, as the package is planned to be deprecated and replaced. ghsas: - GHSA-w5w5-2882-47pc references: - advisory: https://github.com/cosmos/cosmos-sdk/security/advisories/GHSA-w5w5-2882-47pc - report: https://github.com/cosmos/cosmos-sdk/issues/15706 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1733.yaml
id: GO-2023-1733 modules: - module: github.com/bnb-chain/tss-lib versions: - fixed: 1.3.6-0.20230324145555-bb6fb30bd3eb vulnerable_at: 1.3.5 packages: - package: github.com/bnb-chain/tss-lib/common - module: github.com/binance-chain/tss-lib vulnerable_at: 1.3.0 packages: - package: github.com/binance-chain/tss-lib/common summary: |- Timing attack from non-constant time scalar arithmetic in github.com/bnb-chain/tss-lib description: |- Timing attack from non-constant time scalar arithmetic in github.com/bnb-chain/tss-lib. cves: - CVE-2023-26557 references: - advisory: https://medium.com/@iofinnet/security-disclosure-for-ecdsa-and-eddsa-threshold-signature-schemes-4e969af7155b review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2483.yaml
id: GO-2024-2483 modules: - module: github.com/grafana/grafana versions: - fixed: 6.0.0-beta1+incompatible vulnerable_at: 5.4.5+incompatible summary: Grafana XSS via adding a link in General feature in github.com/grafana/grafana cves: - CVE-2018-18625 ghsas: - GHSA-6wh2-8hw7-jw94 references: - advisory: https://github.com/advisories/GHSA-6wh2-8hw7-jw94 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2018-18625 - fix: https://github.com/grafana/grafana/pull/11813 - fix: https://github.com/grafana/grafana/pull/14984 - web: https://security.netapp.com/advisory/ntap-20200608-0008 source: id: GHSA-6wh2-8hw7-jw94 created: 2024-06-14T11:37:10.915935-04:00 review_status: UNREVIEWED unexcluded: EFFECTIVELY_PRIVATE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2872.yaml
id: GO-2024-2872 modules: - module: github.com/bincyber/go-sqlcrypter versions: - introduced: 0.1.0 unsupported_versions: - last_affected: 0.2.0 vulnerable_at: 0.2.0 summary: github.com/bincyber/go-sqlcrypter vulnerable to IV collision ghsas: - GHSA-2j6r-9vv4-6gf5 references: - advisory: https://github.com/advisories/GHSA-2j6r-9vv4-6gf5 - fix: https://github.com/bincyber/go-sqlcrypter/commit/96c73cd2b8fd15c9da9b3eafe62c9a040f6537e8 - fix: https://github.com/bincyber/go-sqlcrypter/pull/128 - report: https://github.com/bincyber/go-sqlcrypter/issues/127 source: id: GHSA-2j6r-9vv4-6gf5 created: 2024-06-04T14:26:24.203316-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0229.yaml
id: GO-2022-0229 modules: - module: std versions: - fixed: 1.12.16 - introduced: 1.13.0-0 - fixed: 1.13.7 vulnerable_at: 1.13.6 packages: - package: crypto/x509 - module: golang.org/x/crypto versions: - fixed: 0.0.0-20200124225646-8b5121be2f68 vulnerable_at: 0.0.0-20200115085410-6d4e4cb37c7d packages: - package: golang.org/x/crypto/cryptobyte summary: Panic in certificate parsing in crypto/x509 and golang.org/x/crypto/cryptobyte description: |- On 32-bit architectures, a malformed input to crypto/x509 or the ASN.1 parsing functions of golang.org/x/crypto/cryptobyte can lead to a panic. The malformed certificate can be delivered via a crypto/tls connection to a client, or to a server that accepts client certificates. net/http clients can be made to crash by an HTTPS server, while net/http servers that accept client certificates will recover the panic and are unaffected. published: 2022-07-06T18:23:48Z cves: - CVE-2020-7919 ghsas: - GHSA-cjjc-xp8v-855w credits: - Project Wycheproof references: - fix: https://go.dev/cl/216680 - fix: https://go.googlesource.com/go/+/b13ce14c4a6aa59b7b041ad2b6eed2d23e15b574 - fix: https://go.dev/cl/216677 - report: https://go.dev/issue/36837 - web: https://groups.google.com/g/golang-announce/c/Hsw4mHYc470 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0203.yaml
id: GO-2022-0203 modules: - module: cmd versions: - fixed: 1.9.5 - introduced: 1.10.0-0 - fixed: 1.10.1 vulnerable_at: 1.10.0 packages: - package: cmd/go skip_fix: 'TODO: revisit this reason (cant request explicit version of standard library package cmd/go)' summary: Remote command execution via "go get" command with "-insecure" option in cmd/go description: |- The "go get" command is vulnerable to remote code execution. When the -insecure command-line option is used, "go get" does not validate the import path (get/vcs.go only checks for "://" anywhere in the string), which allows remote attackers to execute arbitrary OS commands via a crafted web site. published: 2022-08-09T23:19:00Z cves: - CVE-2018-7187 credits: - Arthur Khashaev references: - fix: https://go.dev/cl/94603 - fix: https://go.googlesource.com/go/+/c941e27e70c3e06e1011d2dd71d72a7a06a9bcbc - report: https://go.dev/issue/23867 - web: https://groups.google.com/g/golang-announce/c/IkPkOF8JqLs/m/TFBbWHJYAwAJ review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0646.yaml
id: GO-2022-0646 modules: - module: github.com/aws/aws-sdk-go vulnerable_at: 1.33.21 packages: - package: github.com/aws/aws-sdk-go/service/s3/s3crypto symbols: - NewDecryptionClient - NewEncryptionClient summary: Use of risky cryptographic algorithm in github.com/aws/aws-sdk-go description: |- The Go AWS S3 Crypto SDK contains vulnerabilities that can permit an attacker with write access to a bucket to decrypt files in that bucket. Files encrypted by the V1 EncryptionClient using either the AES-CBC content cipher or the KMS key wrap algorithm are vulnerable. Users should migrate to the V1 EncryptionClientV2 API, which will not create vulnerable files. Old files will remain vulnerable until re-encrypted with the new client. published: 2022-02-11T23:26:26Z cves: - CVE-2020-8911 - CVE-2020-8912 ghsas: - GHSA-7f33-f4f5-xwgw - GHSA-f5pg-7wfw-84q9 credits: - Sophie Schmieg from the Google ISE team references: - advisory: https://aws.amazon.com/blogs/developer/updates-to-the-amazon-s3-encryption-client/?s=09 - fix: https://github.com/aws/aws-sdk-go/pull/3403 - fix: https://github.com/aws/aws-sdk-go/commit/ae9b9fd92af132cfd8d879809d8611825ba135f4 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0046.yaml
id: GO-2020-0046 modules: - module: github.com/russellhaering/goxmldsig versions: - fixed: 1.1.1 vulnerable_at: 1.1.0 packages: - package: github.com/russellhaering/goxmldsig symbols: - ValidationContext.validateSignature derived_symbols: - ValidationContext.Validate - module: github.com/russellhaering/gosaml2 versions: - fixed: 0.7.0 vulnerable_at: 0.6.0 packages: - package: github.com/russellhaering/gosaml2 symbols: - SAMLServiceProvider.validateAssertionSignatures derived_symbols: - SAMLServiceProvider.RetrieveAssertionInfo - SAMLServiceProvider.ValidateEncodedLogoutRequestPOST - SAMLServiceProvider.ValidateEncodedLogoutResponsePOST - SAMLServiceProvider.ValidateEncodedResponse summary: |- Panic due to malformed XML digital signature in github.com/russellhaering/goxmldsig description: |- Due to a nil pointer dereference, a malformed XML Digital Signature can cause a panic during validation. If user supplied signatures are being validated, this may be used as a denial of service vector. published: 2021-04-14T20:04:52Z cves: - CVE-2020-7711 - CVE-2020-7731 ghsas: - GHSA-gq5r-cc4w-g8xf - GHSA-mqqv-chpx-vq25 - GHSA-prjq-f4q3-fvfr credits: - '@stevenjohnstone' references: - web: https://github.com/russellhaering/goxmldsig/issues/48 - web: https://github.com/russellhaering/gosaml2/issues/59 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2941.yaml
id: GO-2024-2941 modules: - module: github.com/traefik/traefik vulnerable_at: 1.7.34 - module: github.com/traefik/traefik/v2 versions: - fixed: 2.11.5 vulnerable_at: 2.11.4 - module: github.com/traefik/traefik/v3 versions: - fixed: 3.0.3 vulnerable_at: 3.0.2 summary: 'ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik' ghsas: - GHSA-rvj4-q8q5-8grf unknown_aliases: - CGA-p2qq-w8qw-6vjp - CGA-r7v2-xp2f-mjxf references: - advisory: https://github.com/traefik/traefik/security/advisories/GHSA-rvj4-q8q5-8grf - web: https://github.com/traefik/traefik/releases/tag/v2.11.5 - web: https://github.com/traefik/traefik/releases/tag/v3.0.3 - web: https://nvd.nist.gov/vuln/detail/CVE-2024-35255 source: id: GHSA-rvj4-q8q5-8grf created: 2024-06-27T15:53:39.605336-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0024.yaml
id: GO-2020-0024 modules: - module: github.com/btcsuite/go-socks versions: - fixed: 0.0.0-20130808000456-233bccbb1abe vulnerable_at: 0.0.0-20130225212758-6dca7033f514 packages: - package: github.com/btcsuite/go-socks symbols: - proxiedConn.LocalAddr - proxiedConn.RemoteAddr - module: github.com/btcsuitereleases/go-socks versions: - fixed: 0.0.0-20130808000456-233bccbb1abe vulnerable_at: 0.0.0-20130225212758-6dca7033f514 packages: - package: github.com/btcsuitereleases/go-socks symbols: - proxiedConn.LocalAddr - proxiedConn.RemoteAddr summary: Infinite loop in github.com/btcsuite/go-socks description: |- The RemoteAddr and LocalAddr methods on the returned net.Conn may call themselves, leading to an infinite loop which will crash the program due to a stack overflow. published: 2021-04-14T20:04:52Z ghsas: - GHSA-gxgj-xjcw-fv9p references: - fix: https://github.com/btcsuite/go-socks/commit/233bccbb1abe02f05750f7ace66f5bffdb13defc cve_metadata: id: CVE-2013-10005 cwe: 'CWE 400: Uncontrolled Resource Consumption' review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2499.yaml
id: GO-2024-2499 modules: - module: github.com/minio/minio versions: - fixed: 0.0.0-20240131185645-0ae4915a9391 summary: |- Minio unsafe default: Access keys inherit `admin` of root user, allowing privilege escalation in github.com/minio/minio cves: - CVE-2024-24747 ghsas: - GHSA-xx8w-mq23-29g4 unknown_aliases: - BIT-minio-2024-24747 references: - advisory: https://github.com/minio/minio/security/advisories/GHSA-xx8w-mq23-29g4 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-24747 - fix: https://github.com/minio/minio/commit/0ae4915a9391ef4b3ec80f5fcdcf24ee6884e776 - web: https://github.com/minio/minio/releases/tag/RELEASE.2024-01-31T20-20-33Z notes: - fix: 'github.com/minio/minio: could not add vulnerable_at: cannot auto-guess when fixed version is 0.0.0 pseudo-version' source: id: GHSA-xx8w-mq23-29g4 created: 2024-06-14T11:38:05.147981-04:00 review_status: UNREVIEWED unexcluded: EFFECTIVELY_PRIVATE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2936.yaml
id: GO-2024-2936 modules: - module: github.com/pocketbase/pocketbase versions: - fixed: 0.22.14 vulnerable_at: 0.22.14-rc packages: - package: github.com/pocketbase/pocketbase/apis symbols: - RecordAuthResponse - recordAuthApi.authWithPassword - recordAuthApi.authWithOAuth2 derived_symbols: - EnrichRecord - EnrichRecords - Serve - package: github.com/pocketbase/pocketbase/models symbols: - Record.getNormalizeDataValueForDB - Record.Get - Record.Set derived_symbols: - NewRecordFromNullStringMap - NewRecordsFromNullStringMaps - Record.CleanCopy - Record.ColumnValueMap - Record.Email - Record.EmailVisibility - Record.FindFileFieldByFile - Record.GetBool - Record.GetDateTime - Record.GetFloat - Record.GetInt - Record.GetString - Record.GetStringSlice - Record.GetTime - Record.LastResetSentAt - Record.LastVerificationSentAt - Record.Load - Record.MarshalJSON - Record.OriginalCopy - Record.PasswordHash - Record.PublicExport - Record.RefreshTokenKey - Record.ReplaceModifers - Record.SetEmail - Record.SetEmailVisibility - Record.SetLastResetSentAt - Record.SetLastVerificationSentAt - Record.SetPassword - Record.SetTokenKey - Record.SetUsername - Record.SetVerified - Record.TokenKey - Record.UnknownData - Record.UnmarshalJSON - Record.UnmarshalJSONField - Record.Username - Record.ValidatePassword - Record.Verified - package: github.com/pocketbase/pocketbase/models/schema symbols: - AuthFieldNames - package: github.com/pocketbase/pocketbase/daos symbols: - Dao.SyncRecordTableSchema derived_symbols: - Dao.CanAccessRecord - Dao.CreateViewSchema - Dao.Delete - Dao.DeleteAdmin - Dao.DeleteCollection - Dao.DeleteExternalAuth - Dao.DeleteOldLogs - Dao.DeleteParam - Dao.DeleteRecord - Dao.DeleteTable - Dao.DeleteView - Dao.ExpandRecord - Dao.ExpandRecords - Dao.FindAdminByEmail - Dao.FindAdminById - Dao.FindAdminByToken - Dao.FindAllExternalAuthsByRecord - Dao.FindAuthRecordByEmail - Dao.FindAuthRecordByToken - Dao.FindAuthRecordByUsername - Dao.FindById - Dao.FindCollectionByNameOrId - Dao.FindCollectionReferences - Dao.FindCollectionsByType - Dao.FindExternalAuthByRecordAndProvider - Dao.FindFirstExternalAuthByExpr - Dao.FindFirstRecordByData - Dao.FindFirstRecordByFilter - Dao.FindLogById - Dao.FindParamByKey - Dao.FindRecordById - Dao.FindRecordByViewFile - Dao.FindRecordsByExpr - Dao.FindRecordsByFilter - Dao.FindRecordsByIds - Dao.FindSettings - Dao.HasTable - Dao.ImportCollections - Dao.IsAdminEmailUnique - Dao.IsCollectionNameUnique - Dao.IsRecordValueUnique - Dao.LogsStats - Dao.RecordQuery - Dao.RunInTransaction - Dao.Save - Dao.SaveAdmin - Dao.SaveCollection - Dao.SaveExternalAuth - Dao.SaveLog - Dao.SaveParam - Dao.SaveRecord - Dao.SaveSettings - Dao.SaveView - Dao.SuggestUniqueAuthRecordUsername - Dao.TableColumns - Dao.TableIndexes - Dao.TableInfo - Dao.TotalAdmins - Dao.Vacuum - package: github.com/pocketbase/pocketbase/forms symbols: - RecordOAuth2Login.submit derived_symbols: - AdminLogin.Submit - AdminLogin.Validate - AdminPasswordResetConfirm.Submit - AdminPasswordResetConfirm.Validate - AdminPasswordResetRequest.Submit - AdminPasswordResetRequest.Validate - AdminUpsert.Submit - AdminUpsert.Validate - AppleClientSecretCreate.Submit - AppleClientSecretCreate.Validate - BackupCreate.Submit - BackupCreate.Validate - BackupUpload.Submit - BackupUpload.Validate - CollectionUpsert.Submit - CollectionUpsert.Validate - CollectionsImport.Submit - CollectionsImport.Validate - NewRecordUpsert - RealtimeSubscribe.Validate - RecordEmailChangeConfirm.Submit - RecordEmailChangeConfirm.Validate - RecordEmailChangeRequest.Submit - RecordEmailChangeRequest.Validate - RecordOAuth2Login.Submit - RecordOAuth2Login.Validate - RecordPasswordLogin.Submit - RecordPasswordLogin.Validate - RecordPasswordResetConfirm.Submit - RecordPasswordResetConfirm.Validate - RecordPasswordResetRequest.Submit - RecordPasswordResetRequest.Validate - RecordUpsert.DrySubmit - RecordUpsert.LoadData - RecordUpsert.LoadRequest - RecordUpsert.Submit - RecordUpsert.Validate - RecordUpsert.ValidateAndFill - RecordVerificationConfirm.Submit - RecordVerificationConfirm.Validate - RecordVerificationRequest.Submit - RecordVerificationRequest.Validate - SettingsUpsert.Submit - SettingsUpsert.Validate - TestEmailSend.Submit - TestEmailSend.Validate - TestS3Filesystem.Submit - TestS3Filesystem.Validate summary: PocketBase performs password auth and OAuth2 unverified email linking in github.com/pocketbase/pocketbase cves: - CVE-2024-38351 ghsas: - GHSA-m93w-4fxv-r35v references: - advisory: https://github.com/pocketbase/pocketbase/security/advisories/GHSA-m93w-4fxv-r35v - fix: https://github.com/pocketbase/pocketbase/commit/58ace5d5e7b9b979490019cf8d1b88491e5daec5 - web: https://github.com/pocketbase/pocketbase/discussions/4355 source: id: GHSA-m93w-4fxv-r35v created: 2024-07-01T13:30:10.970751-04:00 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2917.yaml
id: GO-2024-2917 modules: - module: github.com/traefik/traefik vulnerable_at: 1.7.34 - module: github.com/traefik/traefik/v2 versions: - fixed: 2.11.4 vulnerable_at: 2.11.3 - module: github.com/traefik/traefik/v3 versions: - introduced: 3.0.0-beta3 - fixed: 3.0.2 vulnerable_at: 3.0.1 summary: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik ghsas: - GHSA-7jmw-8259-q9jx unknown_aliases: - CGA-7f28-xcwf-h2wm - CGA-8pcv-r7p9-7rjm references: - advisory: https://github.com/traefik/traefik/security/advisories/GHSA-7jmw-8259-q9jx - web: https://github.com/traefik/traefik/releases/tag/v2.11.4 - web: https://github.com/traefik/traefik/releases/tag/v3.0.2 - web: https://www.cve.org/CVERecord?id=CVE-2024-24790 source: id: GHSA-7jmw-8259-q9jx created: 2024-06-26T14:09:27.817173-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2854.yaml
id: GO-2024-2854 modules: - module: github.com/grafana/grafana non_go_versions: - introduced: 8.5.0 - fixed: 8.5.13 - introduced: 9.0.0 - fixed: 9.0.9 - introduced: 9.1.0 - fixed: 9.1.6 vulnerable_at: 5.4.5+incompatible summary: Grafana folders admin only permission privilege escalation in github.com/grafana/grafana cves: - CVE-2022-36062 ghsas: - GHSA-p978-56hq-r492 unknown_aliases: - BIT-grafana-2022-36062 references: - advisory: https://github.com/grafana/grafana/security/advisories/GHSA-p978-56hq-r492 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2022-36062 - web: https://security.netapp.com/advisory/ntap-20221215-0001 source: id: GHSA-p978-56hq-r492 created: 2024-06-04T14:27:09.594073-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2077.yaml
id: GO-2023-2077 modules: - module: github.com/sagernet/sing versions: - fixed: 0.2.12-0.20230925092853-5b05b5c147d9 vulnerable_at: 0.2.12-0.20230921162020-494f88c9b8bf packages: - package: github.com/sagernet/sing/protocol/socks symbols: - HandleConnection0 derived_symbols: - HandleConnection summary: Authentication bypass in github.com/sagernet/sing cves: - CVE-2023-43644 ghsas: - GHSA-r5hm-mp3j-285g references: - advisory: https://github.com/SagerNet/sing-box/security/advisories/GHSA-r5hm-mp3j-285g - fix: https://github.com/SagerNet/sing/commit/5b05b5c147d9650e8accb4441e216c72a61f4859 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0978.yaml
id: GO-2022-0978 modules: - module: github.com/open-policy-agent/opa versions: - introduced: 0.40.0 - fixed: 0.44.0 vulnerable_at: 0.43.0 packages: - package: github.com/open-policy-agent/opa/ast symbols: - Compiler.rewriteWithModifiers - isBuiltinRefOrVar - queryCompiler.checkDeprecatedBuiltins - queryCompiler.checkUnsafeBuiltins - rewriteWithModifier - rewriteWithModifiersInBody - validateWith - validateWithFunctionValue derived_symbols: - Args.Copy - Args.Vars - Array.Copy - Array.Foreach - Array.Iter - Array.Until - ArrayComprehension.Copy - BeforeAfterVisitor.Walk - Body.Copy - Body.Vars - Call.Copy - CompileModules - CompileModulesWithOpt - Compiler.Compile - Compiler.GetRulesDynamic - Compiler.GetRulesDynamicWithOpts - Compiler.PassesTypeCheck - ContainsClosures - ContainsComprehensions - ContainsRefs - Copy - Every.Copy - Every.KeyValueVars - Expr.Copy - Expr.CopyWithoutTerms - Expr.Vars - GenericTransformer.Transform - GenericVisitor.Walk - Head.Copy - Head.Vars - Import.Copy - IsConstant - JSON - JSONWithOpt - Module.Copy - Module.UnmarshalJSON - MustCompileModules - MustCompileModulesWithOpts - MustJSON - MustParseBody - MustParseBodyWithOpts - MustParseExpr - MustParseImports - MustParseModule - MustParseModuleWithOpts - MustParsePackage - MustParseRef - MustParseRule - MustParseStatement - MustParseStatements - MustParseTerm - NewGraph - ObjectComprehension.Copy - OutputVarsFromBody - OutputVarsFromExpr - Package.Copy - ParseBody - ParseBodyWithOpts - ParseExpr - ParseImports - ParseModule - ParseModuleWithOpts - ParsePackage - ParseRef - ParseRule - ParseStatement - ParseStatements - ParseStatementsWithOpts - ParseTerm - Parser.Parse - Pretty - QueryContext.Copy - Ref.ConstantPrefix - Ref.Copy - Ref.Dynamic - Ref.Extend - Ref.OutputVars - Rule.Copy - SetComprehension.Copy - SomeDecl.Copy - Term.Copy - Term.Vars - Transform - TransformComprehensions - TransformRefs - TransformVars - TreeNode.DepthFirst - TypeEnv.Get - Unify - ValueMap.Copy - ValueMap.Equal - ValueMap.Hash - ValueMap.Iter - ValueMap.MarshalJSON - ValueMap.String - ValueToInterface - VarVisitor.Walk - Walk - WalkBeforeAndAfter - WalkBodies - WalkClosures - WalkExprs - WalkNodes - WalkRefs - WalkRules - WalkTerms - WalkVars - WalkWiths - With.Copy - baseDocEqIndex.AllRules - baseDocEqIndex.Build - baseDocEqIndex.Lookup - bodySafetyTransformer.Visit - comprehensionIndexNestedCandidateVisitor.Walk - comprehensionIndexRegressionCheckVisitor.Walk - metadataParser.Parse - object.Copy - object.Diff - object.Filter - object.Foreach - object.Intersect - object.Iter - object.Map - object.Merge - object.MergeWith - object.Until - queryCompiler.Compile - refChecker.Visit - refindices.Sorted - refindices.Update - rewriteNestedHeadVarLocalTransform.Visit - ruleArgLocalRewriter.Visit - ruleWalker.Do - set.Copy - set.Diff - set.Foreach - set.Intersect - set.Iter - set.Map - set.Reduce - set.Union - set.Until - trieNode.Do - trieNode.Traverse - trieTraversalResult.Add - typeChecker.CheckBody - typeChecker.CheckTypes summary: Protection bypass in github.com/open-policy-agent/opa description: |- Open Policy Agent (OPA) is an open source, general-purpose policy engine. The Rego compiler provides a (deprecated) WithUnsafeBuiltins function, which allows users to provide a set of built-in functions that should be deemed unsafe and rejected by the compiler if encountered in the policy compilation stage. A bypass of this protection is possible when using the "with" keyword to mock a built-in function that isn't taken into account by WithUnsafeBuiltins. published: 2022-09-13T17:40:16Z cves: - CVE-2022-36085 ghsas: - GHSA-f524-rf33-2jjr credits: - anderseknert@ references: - advisory: https://github.com/open-policy-agent/opa/security/advisories/GHSA-f524-rf33-2jjr - fix: https://github.com/open-policy-agent/opa/pull/4540 - fix: https://github.com/open-policy-agent/opa/pull/4616 - fix: https://github.com/open-policy-agent/opa/commit/25a597bc3f4985162e7f65f9c36599f4f8f55823 - fix: https://github.com/open-policy-agent/opa/commit/3e8c754ed007b22393cf65e48751ad9f6457fee8 - web: https://github.com/open-policy-agent/opa/releases/tag/v0.43.1 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1713.yaml
id: GO-2023-1713 modules: - module: github.com/sjqzhang/go-fastdfs versions: - fixed: 1.4.5-0.20230408141131-61cbff5124c6 vulnerable_at: 1.4.4 packages: - package: github.com/sjqzhang/go-fastdfs/server symbols: - Server.upload - Server.CrossOrigin - Server.Download derived_symbols: - HttpHandler.ServeHTTP - Server.ConsumerUpload - Server.DownloadNormalFileByURI - Server.Start - Server.Upload - Start summary: Path traversal in github.com/sjqzhang/go-fastdfs description: |- An attacker can craft a remote request to upload a file to "/group1/upload" that uses path traversal to instead write the file contents to an attacker controlled path on the server. cves: - CVE-2023-1800 ghsas: - GHSA-xq3x-grrj-fj6x references: - web: https://github.com/yangyanglo/ForCVE/blob/93a16663cd32a36d37d8a0f0102e1592254d0279/2023-0x05.md - web: https://vuldb.com/?ctiid.224768 - web: https://vuldb.com/?id.224768 - fix: https://github.com/sjqzhang/go-fastdfs/commit/61cbff5124c61e292994099372b11c06cdb5b80b - advisory: https://github.com/advisories/GHSA-xq3x-grrj-fj6x review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2616.yaml
id: GO-2024-2616 modules: - module: github.com/IceWhaleTech/CasaOS-UserService versions: - fixed: 0.4.7 vulnerable_at: 0.4.6-alpha3 packages: - package: github.com/IceWhaleTech/CasaOS-UserService/route/v1 symbols: - GetUserImage summary: |- Path traversal and user privilege escalation in github.com/IceWhaleTech/CasaOS-UserService description: |- The UserService API contains a path traversal vulnerability that allows an attacker to obtain any file on the system, including the user database and system configuration. This can lead to privilege escalation and compromise of the system. cves: - CVE-2024-24765 ghsas: - GHSA-h5gf-cmm8-cg7c credits: - Cp0204 references: - advisory: https://github.com/IceWhaleTech/CasaOS-UserService/security/advisories/GHSA-h5gf-cmm8-cg7c - fix: https://github.com/IceWhaleTech/CasaOS-UserService/commit/3f4558e23c0a9958f9a0e20aabc64aa8fd51840e - web: https://github.com/IceWhaleTech/CasaOS-UserService/releases/tag/v0.4.7 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0522.yaml
id: GO-2022-0522 modules: - module: std versions: - fixed: 1.17.12 - introduced: 1.18.0-0 - fixed: 1.18.4 vulnerable_at: 1.18.3 packages: - package: path/filepath symbols: - Glob summary: Stack exhaustion on crafted paths in path/filepath description: |- Calling Glob on a path which contains a large number of path separators can cause a panic due to stack exhaustion. published: 2022-07-20T17:02:29Z credits: - Juho Nurminen of Mattermost references: - fix: https://go.dev/cl/417066 - fix: https://go.googlesource.com/go/+/ac68c6c683409f98250d34ad282b9e1b0c9095ef - report: https://go.dev/issue/53416 - web: https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE cve_metadata: id: CVE-2022-30632 cwe: 'CWE-674: Uncontrolled Recursion' description: |- Uncontrolled recursion in Glob in path/filepath before Go 1.17.12 and Go 1.18.4 allows an attacker to cause a panic due to stack exhaustion via a path containing a large number of path separators. review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1631.yaml
id: GO-2023-1631 modules: - module: google.golang.org/protobuf versions: - introduced: 1.29.0 - fixed: 1.29.1 vulnerable_at: 1.29.0 packages: - package: google.golang.org/protobuf/encoding/prototext symbols: - UnmarshalOptions.unmarshal derived_symbols: - Unmarshal - UnmarshalOptions.Unmarshal - package: google.golang.org/protobuf/internal/encoding/text symbols: - parseNumber derived_symbols: - Decoder.Peek - Decoder.Read summary: Panic when parsing invalid messages in google.golang.org/protobuf description: |- Parsing invalid messages can panic. Parsing a text-format message which contains a potential number consisting of a minus sign, one or more characters of whitespace, and no further input will cause a panic. ghsas: - GHSA-hw7c-3rfg-p46j references: - fix: https://go.dev/cl/475995 - report: https://github.com/golang/protobuf/issues/1530 cve_metadata: id: CVE-2023-24535 cwe: 'CWE-125: Out-of-bounds Read' review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0288.yaml
id: GO-2022-0288 modules: - module: std versions: - fixed: 1.16.12 - introduced: 1.17.0-0 - fixed: 1.17.5 vulnerable_at: 1.17.4 packages: - package: net/http symbols: - http2serverConn.canonicalHeader - module: golang.org/x/net versions: - fixed: 0.0.0-20211209124913-491a49abca63 vulnerable_at: 0.0.0-20211208012354-db4efeb81f4b packages: - package: golang.org/x/net/http2 symbols: - serverConn.canonicalHeader derived_symbols: - Server.ServeConn summary: Unbounded memory growth in net/http and golang.org/x/net/http2 description: |- An attacker can cause unbounded memory growth in servers accepting HTTP/2 requests. published: 2022-07-15T23:08:33Z cves: - CVE-2021-44716 ghsas: - GHSA-vc3p-29h2-gpcp credits: - murakmii references: - fix: https://go.dev/cl/369794 - report: https://go.dev/issue/50058 - web: https://groups.google.com/g/golang-announce/c/hcmEScgc00k review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0536.yaml
id: GO-2022-0536 modules: - module: std versions: - fixed: 1.11.13 - introduced: 1.12.0-0 - fixed: 1.12.8 vulnerable_at: 1.12.7 packages: - package: net/http symbols: - http2serverConn.serve - http2serverConn.writeFrame - http2serverConn.scheduleFrameWrite skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)' - module: golang.org/x/net versions: - fixed: 0.0.0-20190813141303-74dc4d7220e7 vulnerable_at: 0.0.0-20190607181551-461777fb6f67 packages: - package: golang.org/x/net/http2 symbols: - serverConn.serve - serverConn.writeFrame - serverConn.scheduleFrameWrite derived_symbols: - Server.ServeConn summary: Reset flood in net/http and golang.org/x/net/http description: |- Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. Servers that accept direct connections from untrusted clients could be remotely made to allocate an unlimited amount of memory, until the program crashes. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both. published: 2022-08-01T22:20:53Z cves: - CVE-2019-9512 - CVE-2019-9514 ghsas: - GHSA-39qc-96h7-956f - GHSA-hgr8-6h9x-f7q9 credits: - Jonathan Looney of Netflix references: - fix: https://go.dev/cl/190137 - fix: https://go.googlesource.com/go/+/145e193131eb486077b66009beb051aba07c52a5 - report: https://go.dev/issue/33606 - web: https://groups.google.com/g/golang-announce/c/65QixT3tcmg/m/DrFiG6vvCwAJ review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2777.yaml
id: GO-2024-2777 modules: - module: github.com/IBAX-io/go-ibax versions: - fixed: 1.4.2 vulnerable_at: 1.4.0 summary: IBAX go-ibax vulnerable to SQL injection in github.com/IBAX-io/go-ibax cves: - CVE-2022-3798 ghsas: - GHSA-mgqh-3qm7-gx82 references: - advisory: https://github.com/advisories/GHSA-mgqh-3qm7-gx82 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2022-3798 - fix: https://github.com/IBAX-io/go-ibax/commit/b0183d8e550836dc50282ee74ff421ee41b25a37 - report: https://github.com/IBAX-io/go-ibax/issues/2060 - web: https://vuldb.com/?id.212634 source: id: GHSA-mgqh-3qm7-gx82 created: 2024-06-04T17:59:19.195022-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2732.yaml
id: GO-2024-2732 modules: - module: github.com/evmos/evmos vulnerable_at: 1.1.3 - module: github.com/evmos/evmos/v2 vulnerable_at: 2.0.2 - module: github.com/evmos/evmos/v3 vulnerable_at: 3.0.3 - module: github.com/evmos/evmos/v4 vulnerable_at: 4.0.2 - module: github.com/evmos/evmos/v5 vulnerable_at: 5.0.1 - module: github.com/evmos/evmos/v6 vulnerable_at: 6.0.4 - module: github.com/evmos/evmos/v7 vulnerable_at: 7.0.0 - module: github.com/evmos/evmos/v8 vulnerable_at: 8.2.3 - module: github.com/evmos/evmos/v9 vulnerable_at: 9.1.0 - module: github.com/evmos/evmos/v10 vulnerable_at: 10.0.1 - module: github.com/evmos/evmos/v11 vulnerable_at: 11.0.2 - module: github.com/evmos/evmos/v12 versions: - fixed: 12.0.0 vulnerable_at: 12.0.0-rc4 summary: Evmos vulnerable to DOS and transaction fee expropriation through Authz exploit in github.com/evmos/evmos ghsas: - GHSA-v6rw-hhgg-wc4x references: - advisory: https://github.com/evmos/evmos/security/advisories/GHSA-v6rw-hhgg-wc4x source: id: GHSA-v6rw-hhgg-wc4x created: 2024-06-26T16:27:46.463645-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2826.yaml
id: GO-2024-2826 modules: - module: vitess.io/vitess versions: - fixed: 0.17.7 - introduced: 0.18.0 - fixed: 0.18.5 - introduced: 0.19.0 - fixed: 0.19.4 non_go_versions: - fixed: 17.0.7 - introduced: 18.0.0 - fixed: 18.0.5 - introduced: 19.0.0 - fixed: 19.0.4 vulnerable_at: 0.19.0 packages: - package: vitess.io/vitess/go/mysql/collations/charset symbols: - convertSlow - Validate derived_symbols: - Convert - ConvertFromBinary - ConvertFromUTF8 - package: vitess.io/vitess/go/mysql/collations/charset/unicode symbols: - Charset_utf16be.EncodeRune - Charset_utf16be.DecodeRune - Charset_ucs2.DecodeRune - Charset_utf32.EncodeRune - package: vitess.io/vitess/go/vt/vtgate/evalengine symbols: - assembler.Fn_REGEXP_REPLACE_slow - IntroducerExpr.eval - astCompiler.translateIntroducerExpr derived_symbols: - Add - AggregateEvalTypes - CoerceTo - CoerceTypes - Column.Format - Column.FormatFast - Comparison.ApplyTinyWeights - Comparison.Compare - Comparison.Less - Comparison.More - Comparison.Sort - Comparison.SortResult - CompiledExpr.Format - CompiledExpr.FormatFast - Divide - EvalResult.MustBoolean - EvalResult.String - EvalResult.ToBoolean - EvalResult.ToBooleanStrict - EvalResult.TupleValues - EvalResult.Value - ExpressionEnv.Evaluate - ExpressionEnv.EvaluateVM - FieldResolver.Column - Literal.Format - Literal.FormatFast - Merger.Init - Merger.Pop - Merger.Push - Multiply - NewLiteralBinaryFromBit - NewLiteralDateFromBytes - NewLiteralDatetimeFromBytes - NewLiteralDecimalFromBytes - NewLiteralFloatFromBytes - NewLiteralIntegralFromBytes - NewLiteralTimeFromBytes - NullSafeAdd - NullsafeCompare - NullsafeHashcode - NullsafeHashcode128 - OrderByParams.Compare - OrderByParams.String - Sorter.Push - Sorter.Sorted - Subtract - Translate - TupleBindVariable.Format - TupleBindVariable.FormatFast - TupleExpr.Format - TupleExpr.FormatFast - UnsupportedCollationError.Error - UntypedExpr.Compile - UntypedExpr.Format - UntypedExpr.FormatFast - WeightString - aggregationDecimal.Add - aggregationDecimal.Max - aggregationDecimal.Min - aggregationFloat.Add - aggregationFloat.Max - aggregationFloat.Min - aggregationInt.Add - aggregationInt.Max - aggregationInt.Min - aggregationMinMax.Max - aggregationMinMax.Min - aggregationSumAny.Add - aggregationSumCount.Add - aggregationUint.Add - aggregationUint.Max - aggregationUint.Min - argError.Error - assembler.Fn_JSON_KEYS - assembler.PushLiteral - errJSONType.Error - evalBytes.Hash summary: |- Denial of service attack by triggering unbounded memory usage in vitess.io/vitess description: |- When executing a query, the vtgate will go into an endless loop that also keeps consuming memory and eventually will OOM. This causes a denial of service. cves: - CVE-2024-32886 ghsas: - GHSA-649x-hxfx-57j2 credits: - '@dbussink, @mattrobenolt, and @vmg' references: - advisory: https://github.com/vitessio/vitess/security/advisories/GHSA-649x-hxfx-57j2 - fix: https://github.com/vitessio/vitess/commit/2fd5ba1dbf6e9b32fdfdaf869d130066b1b5c0df - fix: https://github.com/vitessio/vitess/commit/9df4b66550e46b5d7079e21ed0e1b0f49f92b055 - fix: https://github.com/vitessio/vitess/commit/c46dc5b6a4329a10589ca928392218d96031ac8d - fix: https://github.com/vitessio/vitess/commit/d438adf7e34a6cf00fe441db80842ec669a99202 - web: https://github.com/vitessio/vitess/blob/8f6cfaaa643a08dc111395a75a2d250ee746cfa8/go/mysql/collations/charset/convert.go#L73-L79 - web: https://github.com/vitessio/vitess/blob/8f6cfaaa643a08dc111395a75a2d250ee746cfa8/go/mysql/collations/charset/unicode/utf16.go#L69-L71 source: id: GHSA-649x-hxfx-57j2 created: 2024-05-10T11:07:07.249403-07:00 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1842.yaml
id: GO-2023-1842 modules: - module: cmd versions: - fixed: 1.19.10 - introduced: 1.20.0-0 - fixed: 1.20.5 vulnerable_at: 1.20.4 packages: - package: cmd/go - package: cmd/cgo summary: |- Improper sanitization of LDFLAGS with embedded spaces in go command with cgo in cmd/go description: |- The go command may execute arbitrary code at build time when using cgo. This may occur when running "go get" on a malicious module, or when running any other command which builds untrusted code. This is can by triggered by linker flags, specified via a "#cgo LDFLAGS" directive. Flags containing embedded spaces are mishandled, allowing disallowed flags to be smuggled through the LDFLAGS sanitization by including them in the argument of another flag. This only affects usage of the gccgo compiler. credits: - Juho Nurminen of Mattermost references: - report: https://go.dev/issue/60306 - fix: https://go.dev/cl/501224 - web: https://groups.google.com/g/golang-announce/c/q5135a9d924/m/j0ZoAJOHAwAJ cve_metadata: id: CVE-2023-29405 cwe: 'CWE-88: Improper Neutralization of Argument Delimiters in a Command (''Argument Injection'')' references: - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XBS3IIK6ADV24C5ULQU55QLT2UE762ZX/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NZ2O6YCO2IZMZJELQGZYR2WAUNEDLYV6/ - https://security.gentoo.org/glsa/202311-09 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0322.yaml
id: GO-2022-0322 modules: - module: github.com/prometheus/client_golang versions: - fixed: 1.11.1 vulnerable_at: 1.11.0 packages: - package: github.com/prometheus/client_golang/prometheus/promhttp symbols: - sanitizeMethod derived_symbols: - Handler - HandlerFor - InstrumentHandlerCounter - InstrumentHandlerDuration - InstrumentHandlerRequestSize - InstrumentHandlerResponseSize - InstrumentHandlerTimeToWriteHeader - InstrumentMetricHandler - InstrumentRoundTripperCounter - InstrumentRoundTripperDuration - flusherDelegator.Flush - readerFromDelegator.ReadFrom - responseWriterDelegator.Write - responseWriterDelegator.WriteHeader summary: Uncontrolled resource consumption in github.com/prometheus/client_golang description: |- The Prometheus client_golang HTTP server is vulnerable to a denial of service attack when handling requests with non-standard HTTP methods. In order to be affected, an instrumented software must use any of the promhttp.InstrumentHandler* middleware except RequestsInFlight; not filter any specific methods (e.g GET) before middleware; pass a metric with a "method" label name to a middleware; and not have any firewall/LB/proxy that filters away requests with unknown "method". published: 2022-07-15T23:29:02Z cves: - CVE-2022-21698 ghsas: - GHSA-cg3q-j54f-5p7p related: - CVE-2023-25151 - CVE-2023-45142 - GHSA-5r5m-65gx-7vrh - GHSA-rcjv-mgp8-qvmr references: - fix: https://github.com/prometheus/client_golang/pull/962 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2557.yaml
id: GO-2024-2557 modules: - module: github.com/greenpau/caddy-security unsupported_versions: - last_affected: 1.1.23 vulnerable_at: 1.1.29 summary: Insufficient Session Expiration in github.com/greenpau/caddy-security cves: - CVE-2024-21492 ghsas: - GHSA-vp66-gf7w-9m4x references: - advisory: https://github.com/advisories/GHSA-vp66-gf7w-9m4x - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-21492 - report: https://github.com/greenpau/caddy-security/issues/272 - web: https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy - web: https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-5920787 source: id: GHSA-vp66-gf7w-9m4x created: 2024-06-14T11:41:43.266028-04:00 review_status: UNREVIEWED unexcluded: EFFECTIVELY_PRIVATE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2856.yaml
id: GO-2024-2856 modules: - module: github.com/grafana/grafana non_go_versions: - introduced: 9.2.0 - fixed: 9.2.4 vulnerable_at: 5.4.5+incompatible summary: Grafana Race condition allowing privilege escalation in github.com/grafana/grafana cves: - CVE-2022-39328 ghsas: - GHSA-vqc4-mpj8-jxch unknown_aliases: - BIT-grafana-2022-39328 references: - advisory: https://github.com/grafana/grafana/security/advisories/GHSA-vqc4-mpj8-jxch - advisory: https://nvd.nist.gov/vuln/detail/CVE-2022-39328 - web: https://security.netapp.com/advisory/ntap-20221215-0003 source: id: GHSA-vqc4-mpj8-jxch created: 2024-06-04T14:27:03.429541-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2479.yaml
id: GO-2024-2479 modules: - module: goauthentik.io non_go_versions: - fixed: 2023.8.7 - introduced: 2023.10.0 - fixed: 2023.10.7 vulnerable_at: 0.0.0-20240614153308-6e98c9a6a9f4 summary: Authentik vulnerable to PKCE downgrade attack in goauthentik.io cves: - CVE-2024-23647 ghsas: - GHSA-mrx3-gxjx-hjqj references: - advisory: https://github.com/goauthentik/authentik/security/advisories/GHSA-mrx3-gxjx-hjqj - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-23647 - web: https://github.com/goauthentik/authentik/commit/38e04ae12720e5d81b4f7ac77997eb8d1275d31a source: id: GHSA-mrx3-gxjx-hjqj created: 2024-06-14T11:36:48.687986-04:00 review_status: UNREVIEWED unexcluded: EFFECTIVELY_PRIVATE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2571.yaml
id: GO-2024-2571 modules: - module: github.com/cosmos/cosmos-sdk versions: - fixed: 0.47.9 - introduced: 0.50.0 - fixed: 0.50.4 vulnerable_at: 0.50.3 packages: - package: github.com/cosmos/cosmos-sdk/baseapp symbols: - NewDefaultProposalHandler - DefaultProposalHandler.PrepareProposalHandler derived_symbols: - NewBaseApp summary: Invalid block proposal in github.com/cosmos/cosmos-sdk ghsas: - GHSA-2557-x9mg-76w8 credits: - '@gitferry, @SebastianElvis, and @vitsalis' references: - advisory: https://github.com/advisories/GHSA-2557-x9mg-76w8 - fix: https://github.com/cosmos/cosmos-sdk/commit/fe32bcc1d65412c9b5737672956f0638c729ab7d - web: https://github.com/cosmos/cosmos-sdk/releases/tag/v0.47.9 - web: https://github.com/cosmos/cosmos-sdk/releases/tag/v0.50.4 source: id: GHSA-2557-x9mg-76w8 created: 2024-05-20T20:16:52.629560977Z review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2509.yaml
id: GO-2024-2509 modules: - module: github.com/hashicorp/vault versions: - introduced: 1.6.0 - fixed: 1.6.2 vulnerable_at: 1.6.1 summary: Improper Authentication in HashiCorp Vault in github.com/hashicorp/vault cves: - CVE-2021-3282 ghsas: - GHSA-rq95-xf66-j689 unknown_aliases: - BIT-vault-2021-3282 references: - advisory: https://github.com/advisories/GHSA-rq95-xf66-j689 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2021-3282 - fix: https://github.com/hashicorp/vault/commit/09f9068e22f762da123160233518b440e00bdb3b - web: https://discuss.hashicorp.com/t/hcsec-2021-04-vault-enterprise-s-dr-secondaries-allowed-raft-peer-removal-without-authentication/20337 - web: https://security.gentoo.org/glsa/202207-01 source: id: GHSA-rq95-xf66-j689 created: 2024-06-14T11:38:45.419225-04:00 review_status: UNREVIEWED unexcluded: EFFECTIVELY_PRIVATE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1269.yaml
id: GO-2023-1269 modules: - module: github.com/ipld/go-ipld-prime versions: - fixed: 0.19.0 vulnerable_at: 0.18.0 packages: - package: github.com/ipld/go-ipld-prime/codec/dagjson symbols: - Marshal derived_symbols: - Encode - EncodeOptions.Encode summary: Panic in encoding in github.com/ipld/go-ipld-prime description: |- Encoding data using the 'json' codec which contains a 'Bytes' type Node will cause the encoder to panic. The decoder is not impacted. If the codec is used to encode user supplied data, this may be used as a vector for a denial of service attack. cves: - CVE-2023-22460 ghsas: - GHSA-c653-6hhg-9x92 credits: - '@hacdias' references: - advisory: https://github.com/ipld/go-ipld-prime/security/advisories/GHSA-c653-6hhg-9x92 - fix: https://github.com/ipld/go-ipld-prime/pull/472 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0587.yaml
id: GO-2022-0587 modules: - module: github.com/open-policy-agent/opa versions: - fixed: 0.40.0 vulnerable_at: 0.39.0 packages: - package: github.com/open-policy-agent/opa/ast symbols: - Parser.parseSome - Parser.parseEvery derived_symbols: - CompileModules - CompileModulesWithOpt - MustCompileModules - MustCompileModulesWithOpts - MustParseBody - MustParseBodyWithOpts - MustParseExpr - MustParseImports - MustParseModule - MustParseModuleWithOpts - MustParsePackage - MustParseRef - MustParseRule - MustParseStatement - MustParseStatements - MustParseTerm - ParseBody - ParseBodyWithOpts - ParseExpr - ParseImports - ParseModule - ParseModuleWithOpts - ParsePackage - ParseRef - ParseRule - ParseStatement - ParseStatements - ParseStatementsWithOpts - ParseTerm - Parser.Parse - metadataParser.Parse summary: Out of bounds memory access in github.com/open-policy-agent/opa description: |- An issue in ast.Parser in Open Policy Agent causes the application to incorrectly interpret expressions, allowing a Denial of Service (DoS) via triggering out-of-range memory access. published: 2022-05-20T00:00:26Z cves: - CVE-2022-28946 ghsas: - GHSA-x7f3-62pm-9p38 credits: - Norbert Szetei of Doyensec references: - fix: https://github.com/open-policy-agent/opa/pull/4548 - fix: https://github.com/open-policy-agent/opa/commit/e9d3828db670cbe11129885f37f08cbf04935264 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2615.yaml
id: GO-2024-2615 modules: - module: github.com/IceWhaleTech/CasaOS-UserService versions: - introduced: 0.4.4-3-alpha1 - fixed: 0.4.7 vulnerable_at: 0.4.6-alpha3 packages: - package: github.com/IceWhaleTech/CasaOS-UserService/route/v1 symbols: - PutUserInfo - PostUserLogin summary: Username enumeration in github.com/IceWhaleTech/CasaOS-UserService description: |- CasaOS-UserService is vulnerable to a username enumeration issue, when an attacker can enumerate the CasaOS username using the application response. If the username is incorrect, the application gives the error 'User does not exist'. If the password is incorrect, the application gives the error 'Invalid password'. cves: - CVE-2024-24766 ghsas: - GHSA-c967-2652-gfjm credits: - DrDark1999 references: - advisory: https://github.com/IceWhaleTech/CasaOS-UserService/security/advisories/GHSA-c967-2652-gfjm - fix: https://github.com/IceWhaleTech/CasaOS-UserService/commit/c75063d7ca5800948e9c09c0a6efe9809b5d39f7 - web: https://github.com/IceWhaleTech/CasaOS-UserService/releases/tag/v0.4.7 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0235.yaml
id: GO-2021-0235 modules: - module: std versions: - fixed: 1.14.14 - introduced: 1.15.0-0 - fixed: 1.15.7 vulnerable_at: 1.15.6 packages: - package: crypto/elliptic symbols: - p224Contract skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)' summary: Incorrect operations on the P-224 curve in crypto/elliptic description: |- The P224() Curve implementation can in rare circumstances generate incorrect outputs, including returning invalid points from ScalarMult. published: 2022-02-17T17:34:14Z cves: - CVE-2021-3114 credits: - The elliptic-curve-differential-fuzzer project running on OSS-Fuzz - Philippe Antoine (Catena cyber) references: - fix: https://go.dev/cl/284779 - fix: https://go.googlesource.com/go/+/d95ca9138026cbe40e0857d76a81a16d03230871 - report: https://go.dev/issue/43786 - web: https://groups.google.com/g/golang-announce/c/mperVMGa98w review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2162.yaml
id: GO-2023-2162 modules: - module: github.com/flyteorg/flyteadmin versions: - fixed: 1.1.124 vulnerable_at: 1.1.123 packages: - package: github.com/flyteorg/flyteadmin/pkg/common symbols: - NewSortParameter summary: SQL Injection in List Endpoints in github.com/flyteorg/flyteadmin description: |- A malicious user can send a REST request to a List endpoint with filters that contain custom SQL statements. This can result in SQL injection. cves: - CVE-2023-41891 ghsas: - GHSA-r847-6w6h-r8g4 credits: - '@Sanjana-Sarda' references: - fix: https://github.com/flyteorg/flyteadmin/commit/b3177ef70f068e908140b8a4a9913dfa74f289fd review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2612.yaml
id: GO-2024-2612 modules: - module: github.com/gvalkov/tailon unsupported_versions: - cve_version_range: 'affected at 4.50 (default: unaffected)' vulnerable_at: 1.1.0 summary: Artica Proxy Loopback Services Remotely Accessible Unauthenticated in github.com/gvalkov/tailon cves: - CVE-2024-2056 credits: - Jim Becher of KoreLogic, Inc. - Jaggar Henry of KoreLogic, Inc. references: - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-2056 - web: http://seclists.org/fulldisclosure/2024/Mar/14 - web: https://github.com/gvalkov/tailon#security - web: https://korelogic.com/Resources/Advisories/KL-001-2024-004.txt source: id: CVE-2024-2056 created: 2024-06-06T16:15:26.949858-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2937.yaml
id: GO-2024-2937 modules: - module: golang.org/x/image versions: - fixed: 0.18.0 vulnerable_at: 0.17.0 packages: - package: golang.org/x/image/tiff symbols: - decoder.decode derived_symbols: - Decode summary: Panic when parsing invalid palette-color images in golang.org/x/image description: |- Parsing a corrupt or malicious image with invalid color indices can cause a panic. ghsas: - GHSA-9phm-fm57-rhg8 related: - CVE-2023-36308 credits: - John Wright <jsw@google.com> references: - fix: https://go.dev/cl/588115 - report: https://go.dev/issue/67624 cve_metadata: id: CVE-2024-24792 cwe: 'CWE-125: Out-of-bounds Read' source: id: go-security-team created: 2024-06-18T13:47:44.577511-07:00 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2819.yaml
id: GO-2024-2819 modules: - module: github.com/ethereum/go-ethereum versions: - fixed: 1.13.15 vulnerable_at: 1.13.14 summary: Denial of Service in github.com/ethereum/go-ethereum description: |- A vulnerable node can be made to consume very large amounts of memory when handling specially crafted p2p messages sent from an attacker node. This can result in a denial of service as the node runs out of memory. cves: - CVE-2024-32972 ghsas: - GHSA-4xc9-8hmq-j652 credits: - DongHan Kim references: - advisory: https://github.com/advisories/GHSA-4xc9-8hmq-j652 source: id: GHSA-4xc9-8hmq-j652 created: 2024-05-08T13:36:16.906049-07:00 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0028.yaml
id: GO-2020-0028 modules: - module: github.com/miekg/dns versions: - fixed: 1.0.10 vulnerable_at: 1.0.9 packages: - package: github.com/miekg/dns symbols: - setTA derived_symbols: - NewRR - ParseZone - ReadRR summary: Denial of service via malformed zone file in github.com/miekg/dns description: |- Due to a nil pointer dereference, parsing a malformed zone file containing TA records may cause a panic. If parsing user supplied input, this may be used as a denial of service vector. published: 2021-04-14T20:04:52Z cves: - CVE-2018-17419 ghsas: - GHSA-9jcx-pr2f-qvq5 credits: - '@tr3ee' references: - fix: https://github.com/miekg/dns/commit/501e858f679edecd4a38a86317ce50271014a80d - report: https://github.com/miekg/dns/issues/742 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0178.yaml
id: GO-2021-0178 modules: - module: std versions: - introduced: 1.1.0-0 - fixed: 1.8.4 - introduced: 1.9.0-0 - fixed: 1.9.1 vulnerable_at: 1.9.0 packages: - package: net/smtp symbols: - plainAuth.Start skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)' summary: Cleartext transmission of credentials in net/smtp description: |- SMTP clients using net/smtp can use the PLAIN authentication scheme on network connections not secured with TLS, exposing passwords to man-in-the-middle SMTP servers. published: 2022-01-07T20:35:00Z cves: - CVE-2017-15042 credits: - Stevie Johnstone references: - fix: https://go.dev/cl/68170 - fix: https://go.googlesource.com/go/+/ec3b6131de8f9c9c25283260c95c616c74f6d790 - report: https://go.dev/issue/22134 - web: https://groups.google.com/g/golang-dev/c/RinSE3EiJBI/m/kYL7zb07AgAJ review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2638.yaml
id: GO-2024-2638 modules: - module: github.com/cosmos/cosmos-sdk versions: - introduced: 0.50.0 - fixed: 0.50.5 vulnerable_at: 0.50.4 packages: - package: github.com/cosmos/cosmos-sdk/baseapp symbols: - ValidateVoteExtensions summary: |- ValidateVoteExtensions function in Cosmos SDK may allow incorrect voting power assumptions in github.com/cosmos/cosmos-sdk description: |- The default ValidateVoteExtensions helper function infers total voting power based on the injected VoteExtension, which are injected by the proposer. If your chain utilizes the ValidateVoteExtensions helper in ProcessProposal, a dishonest proposer can potentially mutate voting power of each validator it includes in the injected VoteExtension, which could have potentially unexpected or negative consequences on modified state. Additional validation on injected VoteExtension data was added to confirm voting power against the state machine. ghsas: - GHSA-95rx-m9m5-m94v references: - advisory: https://github.com/cosmos/cosmos-sdk/security/advisories/GHSA-95rx-m9m5-m94v - fix: https://github.com/cosmos/cosmos-sdk/commit/4467110df40797ebe916c23ebfd45c9ee7583897 - web: https://github.com/cosmos/cosmos-sdk/releases/tag/v0.50.5 source: id: GHSA-95rx-m9m5-m94v created: 2024-05-10T15:59:33.780326-04:00 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2559.yaml
id: GO-2024-2559 modules: - module: github.com/greenpau/caddy-security unsupported_versions: - last_affected: 1.1.23 vulnerable_at: 1.1.29 summary: Cross-site Scripting in github.com/greenpau/caddy-security cves: - CVE-2024-21496 ghsas: - GHSA-ff72-ff42-c3gw references: - advisory: https://github.com/advisories/GHSA-ff72-ff42-c3gw - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-21496 - report: https://github.com/greenpau/caddy-security/issues/267 - web: https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy - web: https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-6249860 source: id: GHSA-ff72-ff42-c3gw created: 2024-06-14T11:41:53.201238-04:00 review_status: UNREVIEWED unexcluded: EFFECTIVELY_PRIVATE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2478.yaml
id: GO-2024-2478 modules: - module: blitiri.com.ar/go/chasquid versions: - fixed: 1.13.0 vulnerable_at: 1.11.1 summary: |- chasquid HTTP Request/Response Smuggling vulnerability in github.com/albertito/chasquid in blitiri.com.ar/go/chasquid cves: - CVE-2023-52354 ghsas: - GHSA-g4x3-mfpj-f335 references: - advisory: https://github.com/advisories/GHSA-g4x3-mfpj-f335 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2023-52354 - fix: https://github.com/albertito/chasquid/commit/a996106eeebe81a292ecba838c7503cac7493e74 - report: https://github.com/albertito/chasquid/issues/47 - web: https://blitiri.com.ar/p/chasquid/relnotes/#113-2023-12-24 source: id: GHSA-g4x3-mfpj-f335 created: 2024-06-26T16:14:26.250749-04:00 review_status: UNREVIEWED unexcluded: EFFECTIVELY_PRIVATE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0027.yaml
id: GO-2020-0027 modules: - module: github.com/google/fscrypt versions: - fixed: 0.2.4 vulnerable_at: 0.2.4-0.20180823175935-d4d88e16b54e packages: - package: github.com/google/fscrypt/pam symbols: - NewHandle - Handle.StopAsPamUser - Handle.StartAsPamUser - package: github.com/google/fscrypt/security symbols: - SetProcessPrivileges - setUids - setGids - setGroups derived_symbols: - FindKey - InsertKey - RemoveKey - UserKeyringID summary: Privilege escalation in github.com/google/fscrypt description: |- After dropping and then elevating process privileges euid, guid, and groups are not properly restored to their original values, allowing an unprivileged user to gain membership in the root group. published: 2021-04-14T20:04:52Z cves: - CVE-2018-6558 ghsas: - GHSA-qj26-7grj-whg3 references: - fix: https://github.com/google/fscrypt/commit/3022c1603d968c22f147b4a2c49c4637dd1be91b - web: https://github.com/google/fscrypt/issues/77 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0015.yaml
id: GO-2020-0015 modules: - module: golang.org/x/text versions: - fixed: 0.3.3 vulnerable_at: 0.3.2 packages: - package: golang.org/x/text/encoding/unicode symbols: - utf16Decoder.Transform derived_symbols: - bomOverride.Transform - package: golang.org/x/text/transform symbols: - String summary: Infinite loop when decoding some inputs in golang.org/x/text description: |- An attacker could provide a single byte to a UTF16 decoder instantiated with UseBOM or ExpectBOM to trigger an infinite loop if the String function on the Decoder is called, or the Decoder is passed to transform.String. If used to parse user supplied input, this may be used as a denial of service vector. published: 2021-04-14T20:04:52Z cves: - CVE-2020-14040 ghsas: - GHSA-5rcv-m4m3-hfh7 credits: - '@abacabadabacaba' - Anton Gyllenberg references: - fix: https://go.dev/cl/238238 - fix: https://go.googlesource.com/text/+/23ae387dee1f90d29a23c0e87ee0b46038fbed0e - report: https://go.dev/issue/39491 - web: https://groups.google.com/g/golang-announce/c/bXVeAmGOqz0 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2637.yaml
id: GO-2024-2637 modules: - module: github.com/zitadel/zitadel non_go_versions: - fixed: 2.44.3 - introduced: 2.45.0 - fixed: 2.45.1 vulnerable_at: 1.87.5 summary: Account Takeover via Session Fixation in Zitadel [Bypassing MFA] in github.com/zitadel/zitadel cves: - CVE-2024-28197 ghsas: - GHSA-mq4x-r2w3-j7mr references: - advisory: https://github.com/zitadel/zitadel/security/advisories/GHSA-mq4x-r2w3-j7mr - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-28197 - fix: https://github.com/zitadel/zitadel/commit/d4c553b75a214e41299af010ef4b26174a0f802c - fix: https://github.com/zitadel/zitadel/commit/e82cb51eb819c6cdba8123c9c34c5739b46b29eb source: id: GHSA-mq4x-r2w3-j7mr created: 2024-06-04T15:37:28.977324-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2982.yaml
id: GO-2024-2982 modules: - module: github.com/hashicorp/vault versions: - introduced: 1.16.0-rc1 - fixed: 1.16.3 - introduced: 1.17.0-rc1 - fixed: 1.17.2 non_go_versions: - fixed: 1.15.12 vulnerable_at: 1.17.1 summary: |- Hashicorp Vault vulnerable to Improper Check or Handling of Exceptional Conditions in github.com/hashicorp/vault cves: - CVE-2024-6468 ghsas: - GHSA-2qmw-pvf7-4mw6 references: - advisory: https://github.com/advisories/GHSA-2qmw-pvf7-4mw6 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-6468 - web: https://discuss.hashicorp.com/t/hcsec-2024-14-vault-vulnerable-to-denial-of-service-when-setting-a-proxy-protocol-behavior/68518 source: id: GHSA-2qmw-pvf7-4mw6 created: 2024-07-12T16:33:28.734714977Z review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2727.yaml
id: GO-2024-2727 modules: - module: github.com/edgelesssys/constellation vulnerable_at: 0.0.0 - module: github.com/edgelesssys/constellation/v2 versions: - fixed: 2.16.3 vulnerable_at: 2.16.2 summary: Constellation has pods exposed to peers in VPC in github.com/edgelesssys/constellation ghsas: - GHSA-g8fc-vrcg-8vjg references: - advisory: https://github.com/edgelesssys/constellation/security/advisories/GHSA-g8fc-vrcg-8vjg - web: https://github.com/cilium/cilium/issues/25626 source: id: GHSA-g8fc-vrcg-8vjg created: 2024-06-26T16:27:47.516471-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2413.yaml
id: GO-2023-2413 modules: - module: github.com/elastic/beats/v7 versions: - fixed: 7.17.16 vulnerable_at: 7.17.15 packages: - package: github.com/elastic/beats/v7/libbeat/processors/script/javascript symbols: - session.runProcessFunc derived_symbols: - jsProcessor.Run summary: Sensitive information logged in github.com/elastic/beats/v7 cves: - CVE-2023-49922 ghsas: - GHSA-hj4r-2c9c-29h3 references: - advisory: https://nvd.nist.gov/vuln/detail/CVE-2023-49922 - fix: https://github.com/elastic/beats/commit/9bd7de84ab9c31bb4e1c0a348a7b7c26817a0996 - web: https://discuss.elastic.co/t/beats-and-elastic-agent-8-11-3-7-17-16-security-update-esa-2023-30/349180 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1861.yaml
id: GO-2023-1861 modules: - module: github.com/cosmos/cosmos-sdk versions: - fixed: 0.46.13 - introduced: 0.47.0 - fixed: 0.47.3 vulnerable_at: 0.47.2 packages: - package: github.com/cosmos/cosmos-sdk/x/auth/vesting/types symbols: - MsgCreatePeriodicVestingAccount.ValidateBasic summary: Cosmos "Barberry" vulnerability in github.com/cosmos/cosmos-sdk description: The cosmos-sdk module is affected by the vulnerability codenamed "Barberry". ghsas: - GHSA-j2cr-jc39-wpx5 - GHSA-w44m-8mv2-v78h references: - advisory: https://forum.cosmos.network/t/cosmos-sdk-security-advisory-barberry/10825 - fix: https://github.com/cosmos/cosmos-sdk/pull/16466 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0076.yaml
id: GO-2021-0076 modules: - module: github.com/evanphx/json-patch versions: - fixed: 0.5.2 - introduced: 3.0.0+incompatible - fixed: 3.0.1-0.20180525145409-4c9aadca8f89+incompatible vulnerable_at: 3.0.1-0.20180510154552-9f095e073247+incompatible packages: - package: github.com/evanphx/json-patch symbols: - partialArray.add derived_symbols: - Patch.Apply - Patch.ApplyIndent summary: Out-of-bounds write in github.com/evanphx/json-patch description: |- A malicious JSON patch can cause a panic due to an out-of-bounds write attempt. This can be used as a denial of service vector if exposed to arbitrary user input. published: 2021-04-14T20:04:52Z cves: - CVE-2018-14632 ghsas: - GHSA-gxhv-3hwf-wjp9 references: - fix: https://github.com/evanphx/json-patch/pull/57 - fix: https://github.com/evanphx/json-patch/commit/4c9aadca8f89e349c999f04e28199e96e81aba03 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2793.yaml
id: GO-2024-2793 modules: - module: github.com/mattermost/mattermost-server versions: - introduced: 8.1.0+incompatible - fixed: 8.1.12+incompatible - introduced: 9.5.0+incompatible - fixed: 9.5.3+incompatible vulnerable_at: 9.5.3-rc3+incompatible summary: Mattermost allows team admins to promote guests to team admins in github.com/mattermost/mattermost-server cves: - CVE-2024-4195 ghsas: - GHSA-5fh7-7mw7-mmx5 references: - advisory: https://github.com/advisories/GHSA-5fh7-7mw7-mmx5 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-4195 - web: https://github.com/mattermost/mattermost/commit/1e3497e0595bb4f9908c94dd9d4685d48556b7e8 - web: https://github.com/mattermost/mattermost/commit/f0872dd4e4ba34f061aa6982a71c7c29532aac2e - web: https://mattermost.com/security-updates source: id: GHSA-5fh7-7mw7-mmx5 created: 2024-06-04T15:27:22.651742-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2814.yaml
id: GO-2024-2814 modules: - module: github.com/pterodactyl/wings versions: - fixed: 1.11.12 vulnerable_at: 1.11.11 summary: Pterodactyl Wings vulnerable to Arbitrary File Write/Read in github.com/pterodactyl/wings cves: - CVE-2024-34066 ghsas: - GHSA-gqmf-jqgv-v8fw references: - advisory: https://github.com/pterodactyl/wings/security/advisories/GHSA-gqmf-jqgv-v8fw - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-34066 - fix: https://github.com/pterodactyl/wings/commit/5415f8ae07f533623bd8169836dd7e0b933964de source: id: GHSA-gqmf-jqgv-v8fw created: 2024-05-17T16:09:43.792794-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0245.yaml
id: GO-2021-0245 modules: - module: std versions: - fixed: 1.15.15 - introduced: 1.16.0-0 - fixed: 1.16.7 vulnerable_at: 1.16.6 packages: - package: net/http/httputil symbols: - ReverseProxy.ServeHTTP skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)' summary: Panic in ReverseProxy in net/http/httputil description: |- ReverseProxy can panic after encountering a problem copying a proxied response body. published: 2022-02-17T17:32:24Z cves: - CVE-2021-36221 credits: - Andrew Crump references: - fix: https://go.dev/cl/333191 - fix: https://go.googlesource.com/go/+/b7a85e0003cedb1b48a1fd3ae5b746ec6330102e - web: https://groups.google.com/g/golang-announce/c/uHACNfXAZqk - report: https://go.dev/issue/46866 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2861.yaml
id: GO-2024-2861 modules: - module: sigs.k8s.io/azurefile-csi-driver versions: - fixed: 1.29.4 - introduced: 1.30.0 - fixed: 1.30.1 vulnerable_at: 1.30.0 summary: azure-file-csi-driver leaks service account tokens in the logs in sigs.k8s.io/azurefile-csi-driver cves: - CVE-2024-3744 ghsas: - GHSA-qjqg-4wg7-957h references: - advisory: https://github.com/advisories/GHSA-qjqg-4wg7-957h - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-3744 - web: http://www.openwall.com/lists/oss-security/2024/05/09/4 - web: https://github.com/kubernetes-sigs/azurefile-csi-driver/commit/a1b7446de942136419f07394efeef804523f87ae - web: https://github.com/kubernetes-sigs/azurefile-csi-driver/commit/e11ff3dc2c03894cde692213308f9991e7bbd5bf - web: https://github.com/kubernetes/kubernetes/issues/124759 - web: https://groups.google.com/g/kubernetes-security-announce/c/hcgZE2MQo1A/m/Y4C6q-CYAgAJ source: id: GHSA-qjqg-4wg7-957h created: 2024-06-26T14:07:32.476769-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2508.yaml
id: GO-2024-2508 modules: - module: github.com/hashicorp/vault versions: - introduced: 1.5.0 - fixed: 1.5.6 - introduced: 1.6.0 - fixed: 1.6.1 vulnerable_at: 1.6.0 summary: Enumeration of users in HashiCorp Vault in github.com/hashicorp/vault cves: - CVE-2020-35177 ghsas: - GHSA-rpgp-9hmg-j25x unknown_aliases: - BIT-vault-2020-35177 references: - advisory: https://github.com/advisories/GHSA-rpgp-9hmg-j25x - advisory: https://nvd.nist.gov/vuln/detail/CVE-2020-35177 - fix: https://github.com/hashicorp/vault/pull/10537 - web: https://discuss.hashicorp.com/t/hcsec-2020-25-vault-s-ldap-auth-method-allows-user-enumeration/18984 - web: https://github.com/hashicorp/vault/blob/master/CHANGELOG.md#161 source: id: GHSA-rpgp-9hmg-j25x created: 2024-06-14T11:38:39.105424-04:00 review_status: UNREVIEWED unexcluded: EFFECTIVELY_PRIVATE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2913.yaml
id: GO-2024-2913 modules: - module: github.com/docker/docker versions: - fixed: 20.10.9+incompatible vulnerable_at: 20.10.8+incompatible packages: - package: github.com/docker/docker/pkg/chrootarchive symbols: - untarHandler skip_fix: fix error due to incompatible versions - module: github.com/moby/moby versions: - fixed: 20.10.9+incompatible vulnerable_at: 20.10.8+incompatible packages: - package: github.com/moby/moby/pkg/chrootarchive symbols: - untarHandler skip_fix: fix error due to incompatible versions summary: Unexpected chmod of host files via 'docker cp' in Moby Docker Engine in github.com/docker/docker cves: - CVE-2021-41089 ghsas: - GHSA-v994-f8vw-g7j4 references: - advisory: https://github.com/moby/moby/security/advisories/GHSA-v994-f8vw-g7j4 - fix: https://github.com/moby/moby/commit/bce32e5c93be4caf1a592582155b9cb837fc129a source: id: GHSA-v994-f8vw-g7j4 created: 2024-07-01T14:35:32.733244-04:00 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1705.yaml
id: GO-2023-1705 modules: - module: std versions: - fixed: 1.19.8 - introduced: 1.20.0-0 - fixed: 1.20.3 vulnerable_at: 1.20.2 packages: - package: mime/multipart symbols: - Reader.readForm - mimeHeaderSize - newPart - Part.populateHeaders - Reader.NextPart - Reader.NextRawPart - Reader.nextPart - readMIMEHeader derived_symbols: - Reader.ReadForm - package: net/textproto symbols: - readMIMEHeader derived_symbols: - Reader.ReadMIMEHeader summary: Excessive resource consumption in net/http, net/textproto and mime/multipart description: |- Multipart form parsing can consume large amounts of CPU and memory when processing form inputs containing very large numbers of parts. This stems from several causes: 1. mime/multipart.Reader.ReadForm limits the total memory a parsed multipart form can consume. ReadForm can undercount the amount of memory consumed, leading it to accept larger inputs than intended. 2. Limiting total memory does not account for increased pressure on the garbage collector from large numbers of small allocations in forms with many parts. 3. ReadForm can allocate a large number of short-lived buffers, further increasing pressure on the garbage collector. The combination of these factors can permit an attacker to cause an program that parses multipart forms to consume large amounts of CPU and memory, potentially resulting in a denial of service. This affects programs that use mime/multipart.Reader.ReadForm, as well as form parsing in the net/http package with the Request methods FormFile, FormValue, ParseMultipartForm, and PostFormValue. With fix, ReadForm now does a better job of estimating the memory consumption of parsed forms, and performs many fewer short-lived allocations. In addition, the fixed mime/multipart.Reader imposes the following limits on the size of parsed forms: 1. Forms parsed with ReadForm may contain no more than 1000 parts. This limit may be adjusted with the environment variable GODEBUG=multipartmaxparts=. 2. Form parts parsed with NextPart and NextRawPart may contain no more than 10,000 header fields. In addition, forms parsed with ReadForm may contain no more than 10,000 header fields across all parts. This limit may be adjusted with the environment variable GODEBUG=multipartmaxheaders=. credits: - Jakob Ackermann (@das7pad) references: - report: https://go.dev/issue/59153 - fix: https://go.dev/cl/482076 - fix: https://go.dev/cl/482075 - fix: https://go.dev/cl/482077 - web: https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8 cve_metadata: id: CVE-2023-24536 cwe: 'CWE-400: Uncontrolled Resource Consumption' references: - https://security.netapp.com/advisory/ntap-20230526-0007/ - https://security.gentoo.org/glsa/202311-09 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1859.yaml
id: GO-2023-1859 modules: - module: github.com/lestrrat-go/jwx versions: - fixed: 1.2.26 vulnerable_at: 1.2.25 packages: - package: github.com/lestrrat-go/jwx/jwe/internal/aescbc symbols: - unpad derived_symbols: - Hmac.Open - module: github.com/lestrrat-go/jwx/v2 versions: - fixed: 2.0.11-0.20230614080639-c8b6bec919a1 vulnerable_at: 2.0.10 packages: - package: github.com/lestrrat-go/jwx/v2/jwe/internal/aescbc symbols: - unpad derived_symbols: - Hmac.Open summary: Padding oracle vulnerability in github.com/lestrrat-go/jwx description: |- AES-CBC decryption is vulnerable to a timing attack which may permit an attacker to recover the plaintext of JWE data. ghsas: - GHSA-rm8v-mxj3-5rmq references: - fix: https://github.com/lestrrat-go/jwx/commit/6c41e3822485fc7e11dd70b4b0524b075d66b103 - fix: https://github.com/lestrrat-go/jwx/commit/d9ddbc8e5009cfdd8c28413390b67afa7f576dd6 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1037.yaml
id: GO-2022-1037 modules: - module: std versions: - fixed: 1.18.7 - introduced: 1.19.0-0 - fixed: 1.19.2 vulnerable_at: 1.19.1 packages: - package: archive/tar symbols: - Reader.next - parsePAX - Writer.writePAXHeader derived_symbols: - Reader.Next - Writer.WriteHeader summary: Unbounded memory consumption when reading headers in archive/tar description: |- Reader.Read does not set a limit on the maximum size of file headers. A maliciously crafted archive could cause Read to allocate unbounded amounts of memory, potentially causing resource exhaustion or panics. After fix, Reader.Read limits the maximum size of header blocks to 1 MiB. credits: - Adam Korczynski (ADA Logics) - OSS-Fuzz references: - report: https://go.dev/issue/54853 - fix: https://go.dev/cl/439355 - web: https://groups.google.com/g/golang-announce/c/xtuG5faxtaU cve_metadata: id: CVE-2022-2879 cwe: 'CWE 400: Uncontrolled Resource Consumption' references: - https://security.gentoo.org/glsa/202311-09 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2800.yaml
id: GO-2024-2800 modules: - module: github.com/hashicorp/go-getter versions: - introduced: 1.5.9 - fixed: 1.7.4 vulnerable_at: 1.7.3 packages: - package: github.com/hashicorp/go-getter symbols: - GitGetter.clone - findRemoteDefaultBranch derived_symbols: - Client.ChecksumFromFile - Client.Get - FolderStorage.Get - Get - GetAny - GetFile - GitGetter.Get - GitGetter.GetFile - HttpGetter.Get summary: Argument injection when fetching remote default Git branches in github.com/hashicorp/go-getter description: |- When go-getter is performing a Git operation, go-getter will try to clone the given repository. If a Git reference is not passed along with the Git url, go-getter will then try to check the remote repository's HEAD reference of its default branch by passing arguments to the Git binary on the host it is executing on. An attacker may format a Git URL in order to inject additional Git arguments to the Git call. cves: - CVE-2024-3817 ghsas: - GHSA-q64h-39hv-4cf7 references: - advisory: https://github.com/advisories/GHSA-q64h-39hv-4cf7 - fix: https://github.com/hashicorp/go-getter/commit/268c11cae8cf0d9374783e06572679796abe9ce9 - web: https://discuss.hashicorp.com/t/hcsec-2024-09-hashicorp-go-getter-vulnerable-to-argument-injection-when-fetching-remote-default-git-branches/66040 source: id: GHSA-q64h-39hv-4cf7 created: 2024-05-10T15:59:32.195034-04:00 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0211.yaml
id: GO-2022-0211 modules: - module: std versions: - fixed: 1.11.13 - introduced: 1.12.0-0 - fixed: 1.12.8 vulnerable_at: 1.12.7 packages: - package: net/url symbols: - parseHost - URL.Hostname - URL.Port summary: Incorrect parsing validation in net/url description: |- The url.Parse function accepts URLs with malformed hosts, such that the Host field can have arbitrary suffixes that appear in neither Hostname() nor Port(), allowing authorization bypasses in certain applications. published: 2022-07-01T20:15:30Z cves: - CVE-2019-14809 credits: - Julian Hector - Nikolai Krein from Cure53 - Adi Cohen (adico.me) references: - fix: https://go.dev/cl/189258 - fix: https://go.googlesource.com/go/+/61bb56ad63992a3199acc55b2537c8355ef887b6 - report: https://go.dev/issue/29098 - web: https://groups.google.com/g/golang-announce/c/65QixT3tcmg review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2958.yaml
id: GO-2024-2958 modules: - module: github.com/gorilla/schema versions: - fixed: 1.4.1 vulnerable_at: 1.4.0 packages: - package: github.com/gorilla/schema symbols: - NewDecoder - Decoder.decode derived_symbols: - Decoder.Decode summary: Potential memory exhaustion attack due to sparse slice deserialization in github.com/gorilla/schema cves: - CVE-2024-37298 ghsas: - GHSA-3669-72x9-r9p3 unknown_aliases: - CGA-qch5-pg6h-qrrg credits: - '@AlexVasiluta' references: - advisory: https://github.com/gorilla/schema/security/advisories/GHSA-3669-72x9-r9p3 - fix: https://github.com/gorilla/schema/commit/cd59f2f12cbdfa9c06aa63e425d1fe4a806967ff - web: https://github.com/gorilla/schema/blob/main/decoder.go#L223 source: id: GHSA-3669-72x9-r9p3 created: 2024-07-02T11:03:24.924951-04:00 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2592.yaml
id: GO-2024-2592 modules: - module: github.com/mattermost/mattermost-server versions: - introduced: 9.2.0+incompatible - fixed: 9.2.5+incompatible - introduced: 9.3.0+incompatible - fixed: 9.3.1+incompatible vulnerable_at: 9.3.1-rc2+incompatible - module: github.com/mattermost/mattermost-server/v5 vulnerable_at: 5.39.3 - module: github.com/mattermost/mattermost-server/v6 vulnerable_at: 6.7.2 - module: github.com/mattermost/mattermost/server/v8 non_go_versions: - fixed: 8.1.9 vulnerable_at: 8.0.0-20240626184126-817e18414e41 summary: Mattermost allows attackers access to posts in channels they are not a member of in github.com/mattermost/mattermost-server cves: - CVE-2024-1942 ghsas: - GHSA-hwjf-4667-gqwx unknown_aliases: - CGA-xvq7-x2jj-6hg4 references: - advisory: https://github.com/advisories/GHSA-hwjf-4667-gqwx - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-1942 - web: https://mattermost.com/security-updates source: id: GHSA-hwjf-4667-gqwx created: 2024-06-26T16:07:03.779047-04:00 review_status: UNREVIEWED unexcluded: EFFECTIVELY_PRIVATE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2788.yaml
id: GO-2024-2788 modules: - module: github.com/zitadel/zitadel non_go_versions: - fixed: 2.50.0 vulnerable_at: 1.87.5 summary: ZITADEL's Improper Lockout Mechanism Leads to MFA Bypass in github.com/zitadel/zitadel cves: - CVE-2024-32868 ghsas: - GHSA-7j7j-66cv-m239 references: - advisory: https://github.com/zitadel/zitadel/security/advisories/GHSA-7j7j-66cv-m239 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-32868 - web: https://github.com/zitadel/zitadel/releases/tag/v2.50.0 source: id: GHSA-7j7j-66cv-m239 created: 2024-06-04T15:27:35.033721-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2978.yaml
id: GO-2024-2978 modules: - module: google.golang.org/grpc versions: - introduced: 1.64.0 - fixed: 1.64.1 vulnerable_at: 1.64.0 packages: - package: google.golang.org/grpc/metadata symbols: - MD.String summary: |- Private tokens could appear in logs if context containing gRPC metadata is logged in google.golang.org/grpc description: | If applications print or log a context containing gRPC metadata, the output will contain all the metadata, which may include private information. This represents a potential PII concern. ghsas: - GHSA-xr7q-jx4m-x55m references: - advisory: https://github.com/grpc/grpc-go/security/advisories/GHSA-xr7q-jx4m-x55m - fix: https://github.com/grpc/grpc-go/commit/ab292411ddc0f3b7a7786754d1fe05264c3021eb source: id: GHSA-xr7q-jx4m-x55m created: 2024-07-08T13:23:23.725948-04:00 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2445.yaml
id: GO-2024-2445 modules: - module: github.com/gravitational/teleport non_go_versions: - fixed: 12.4.31 - introduced: 13.0.0 - fixed: 13.4.13 - introduced: 14.0.0 - fixed: 14.2.4 vulnerable_at: 3.2.17+incompatible summary: SFTP is possible on the Proxy server for any user with SFTP access in github.com/gravitational/teleport ghsas: - GHSA-c9v7-wmwj-vf6x references: - advisory: https://github.com/gravitational/teleport/security/advisories/GHSA-c9v7-wmwj-vf6x - fix: https://github.com/gravitational/teleport/commit/1c77fc49944ebcded32bbdd77c3e1f4f8a1c130d - fix: https://github.com/gravitational/teleport/pull/36136 source: id: GHSA-c9v7-wmwj-vf6x created: 2024-06-14T11:35:27.699279-04:00 review_status: UNREVIEWED unexcluded: EFFECTIVELY_PRIVATE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2576.yaml
id: GO-2024-2576 modules: - module: github.com/devfile/registry-support/registry-library non_go_versions: - fixed: 0.0.0-20240206 vulnerable_at: 0.0.0-20240530183941-9de6fb93aed6 summary: 'registry-support: decompress can delete files outside scope via relative paths in github.com/devfile/registry-support/registry-library' cves: - CVE-2024-1485 ghsas: - GHSA-84xv-jfrm-h4gm references: - advisory: https://github.com/advisories/GHSA-84xv-jfrm-h4gm - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-1485 - web: https://access.redhat.com/security/cve/CVE-2024-1485 - web: https://bugzilla.redhat.com/show_bug.cgi?id=2264106 - web: https://github.com/devfile/registry-support/commit/0e44b9ca6d03fac4fc3f77d37656d56dc5defe0d - web: https://github.com/devfile/registry-support/pull/197 source: id: GHSA-84xv-jfrm-h4gm created: 2024-06-04T15:37:44.246541-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2580.yaml
id: GO-2024-2580 modules: - module: github.com/apache/incubator-answer versions: - fixed: 1.2.5 vulnerable_at: 1.2.5-RC2 summary: Apache Answer Race Condition vulnerability in github.com/apache/incubator-answer cves: - CVE-2024-26578 ghsas: - GHSA-9q24-hwmc-797x references: - advisory: https://github.com/advisories/GHSA-9q24-hwmc-797x - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-26578 - web: http://www.openwall.com/lists/oss-security/2024/02/22/3 - web: https://lists.apache.org/thread/ko0ksnznt2484lxt0zts2ygr82ldkhcb source: id: GHSA-9q24-hwmc-797x created: 2024-05-17T16:15:02.863423-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2599.yaml
id: GO-2024-2599 modules: - module: std versions: - fixed: 1.21.8 - introduced: 1.22.0-0 - fixed: 1.22.1 vulnerable_at: 1.22.0 packages: - package: net/textproto symbols: - Reader.readLineSlice - Reader.readContinuedLineSlice derived_symbols: - Reader.ReadCodeLine - Reader.ReadContinuedLine - Reader.ReadContinuedLineBytes - Reader.ReadDotLines - Reader.ReadLine - Reader.ReadLineBytes - Reader.ReadMIMEHeader - Reader.ReadResponse summary: Memory exhaustion in multipart form parsing in net/textproto and net/http description: |- When parsing a multipart form (either explicitly with Request.ParseMultipartForm or implicitly with Request.FormValue, Request.PostFormValue, or Request.FormFile), limits on the total size of the parsed form were not applied to the memory consumed while reading a single form line. This permits a maliciously crafted input containing very long lines to cause allocation of arbitrarily large amounts of memory, potentially leading to memory exhaustion. With fix, the ParseMultipartForm function now correctly limits the maximum size of form lines. credits: - Bartek Nowotarski references: - report: https://go.dev/issue/65383 - fix: https://go.dev/cl/569341 - web: https://groups.google.com/g/golang-announce/c/5pwGVUPoMbg cve_metadata: id: CVE-2023-45290 cwe: 'CWE-400: Uncontrolled Resource Consumption' references: - https://security.netapp.com/advisory/ntap-20240329-0004/ - http://www.openwall.com/lists/oss-security/2024/03/08/4 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1611.yaml
id: GO-2023-1611 modules: - module: github.com/gookit/goutil versions: - fixed: 0.6.7 vulnerable_at: 0.6.6 packages: - package: github.com/gookit/goutil/fsutil symbols: - Unzip summary: Path traversal in github.com/gookit/goutil description: |- fsutil.Unzip is vulnerable to path traversal attacks due to improper validation of paths. cves: - CVE-2023-27475 ghsas: - GHSA-fx2v-qfhr-4chv credits: - '@cokeBeer' references: - advisory: https://github.com/gookit/goutil/security/advisories/GHSA-fx2v-qfhr-4chv - fix: https://github.com/gookit/goutil/commit/d7b94fede71f018f129f7d21feb58c895d28dadc review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2458.yaml
id: GO-2024-2458 modules: - module: github.com/cri-o/cri-o versions: - fixed: 1.27.3 - introduced: 1.28.0 - fixed: 1.28.3 - introduced: 1.29.0 - fixed: 1.29.1 vulnerable_at: 1.29.0 summary: CRI-O's pods can break out of resource confinement on cgroupv2 in github.com/cri-o/cri-o cves: - CVE-2023-6476 ghsas: - GHSA-p4rx-7wvg-fwrc references: - advisory: https://github.com/cri-o/cri-o/security/advisories/GHSA-p4rx-7wvg-fwrc - advisory: https://nvd.nist.gov/vuln/detail/CVE-2023-6476 - fix: https://github.com/cri-o/cri-o/commit/75effcb1a25851a736e82dba1f7d8cee93ee159e - fix: https://github.com/cri-o/cri-o/pull/4479 - web: https://access.redhat.com/errata/RHSA-2024:0195 - web: https://access.redhat.com/errata/RHSA-2024:0207 - web: https://access.redhat.com/security/cve/CVE-2023-6476 - web: https://bugzilla.redhat.com/show_bug.cgi?id=2253994 - web: https://github.com/cri-o/cri-o/blob/main/pkg/config/workloads.go#L103-L107 source: id: GHSA-p4rx-7wvg-fwrc created: 2024-06-14T11:36:01.32545-04:00 review_status: UNREVIEWED unexcluded: EFFECTIVELY_PRIVATE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0081.yaml
id: GO-2021-0081 modules: - module: github.com/containers/image versions: - fixed: 2.0.2-0.20190802080134-634605d06e73+incompatible vulnerable_at: 2.0.1+incompatible packages: - package: github.com/containers/image/docker symbols: - dockerClient.getBearerToken derived_symbols: - CheckAuth - GetRepositoryTags - Image.GetRepositoryTags - NewReference - ParseReference - SearchRegistry - dockerImageDestination.PutBlob - dockerImageDestination.PutManifest - dockerImageDestination.PutSignatures - dockerImageDestination.SupportsSignatures - dockerImageDestination.TryReusingBlob - dockerImageSource.GetBlob - dockerImageSource.GetManifest - dockerImageSource.GetSignatures - dockerReference.DeleteImage - dockerReference.NewImage - dockerReference.NewImageDestination - dockerReference.NewImageSource - dockerReference.PolicyConfigurationIdentity - dockerTransport.ParseReference summary: Insufficiently Protected Credentials in github.com/containers/image description: |- The HTTP client used to connect to the container registry authorization service explicitly disables TLS verification, allowing an attacker that is able to MITM the connection to steal credentials. published: 2021-04-14T20:04:52Z cves: - CVE-2019-10214 ghsas: - GHSA-85p9-j7c9-v4gr references: - fix: https://github.com/containers/image/pull/669 - fix: https://github.com/containers/image/commit/634605d06e738aec8332bcfd69162e7509ac7aaf - web: https://github.com/containers/image/issues/654 - web: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10214 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0524.yaml
id: GO-2022-0524 modules: - module: std versions: - fixed: 1.17.12 - introduced: 1.18.0-0 - fixed: 1.18.4 vulnerable_at: 1.18.3 packages: - package: compress/gzip symbols: - Reader.Read summary: Stack exhaustion when reading certain archives in compress/gzip description: |- Calling Reader.Read on an archive containing a large number of concatenated 0-length compressed files can cause a panic due to stack exhaustion. published: 2022-07-20T20:52:11Z references: - fix: https://go.dev/cl/417067 - fix: https://go.googlesource.com/go/+/b2b8872c876201eac2d0707276c6999ff3eb185e - report: https://go.dev/issue/53168 - web: https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE cve_metadata: id: CVE-2022-30631 cwe: 'CWE-674: Uncontrolled Recursion' description: |- Uncontrolled recursion in Reader.Read in compress/gzip before Go 1.17.12 and Go 1.18.4 allows an attacker to cause a panic due to stack exhaustion via an archive containing a large number of concatenated 0-length compressed files. review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0237.yaml
id: GO-2021-0237 modules: - module: github.com/AndrewBurian/powermux versions: - fixed: 1.1.1 vulnerable_at: 1.1.0 packages: - package: github.com/AndrewBurian/powermux symbols: - Route.execute derived_symbols: - ServeMux.Handler - ServeMux.HandlerAndMiddleware - ServeMux.ServeHTTP summary: Open redirect in github.com/AndrewBurian/powermux description: |- Attackers may be able to craft phishing links and other open redirects by exploiting PowerMux's trailing slash redirection feature. This may lead to users being redirected to untrusted sites after following an attacker crafted link. published: 2022-01-11T17:18:11Z cves: - CVE-2021-32721 ghsas: - GHSA-mj9r-wwm8-7q52 references: - fix: https://github.com/AndrewBurian/powermux/pull/42 - fix: https://github.com/AndrewBurian/powermux/commit/5e60a8a0372b35a898796c2697c40e8daabed8e9 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0755.yaml
id: GO-2022-0755 modules: - module: github.com/rancher/rancher versions: - fixed: 2.2.5-rc6.0.20190621200032-0ddffe484adc+incompatible vulnerable_at: 2.2.5-rc6.0.20190621195844-88e9e38dc862+incompatible packages: - package: github.com/rancher/rancher/server symbols: - Start skip_fix: 'TODO: revisit this reason (multiple cannot find module providing package errors)' - package: github.com/rancher/rancher/pkg/clusterrouter symbols: - Router.ServeHTTP skip_fix: 'TODO: revisit this reason (multiple cannot find module providing package errors)' summary: Cross-site request forgery in github.com/rancher/rancher description: |- Rancher 2 is vulnerable to a Cross-Site Websocket Hijacking attack that allows an exploiter to gain access to clusters managed by Rancher. published: 2021-05-18T15:42:40Z cves: - CVE-2019-13209 ghsas: - GHSA-xhg2-rvm8-w2jh credits: - Matt Belisle - Alex Stevenson at Workiva references: - advisory: https://github.com/advisories/GHSA-xhg2-rvm8-w2jh - fix: https://github.com/rancher/rancher/commit/0ddffe484adccb9e37d9432e8e625d8ebbfb0088 - web: https://forums.rancher.com/t/rancher-release-v2-2-5-addresses-rancher-cve-2019-13209/14801 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0007.yaml
id: GO-2020-0007 modules: - module: github.com/seccomp/libseccomp-golang versions: - fixed: 0.9.1-0.20170424173420-06e7a29f36a3 vulnerable_at: 0.9.1-0.20170424173400-fc0298087f32 packages: - package: github.com/seccomp/libseccomp-golang symbols: - ScmpFilter.addRuleGeneric derived_symbols: - ScmpFilter.AddRule - ScmpFilter.AddRuleConditional - ScmpFilter.AddRuleConditionalExact - ScmpFilter.AddRuleExact summary: Improper input validation in github.com/seccomp/libseccomp-golang description: |- Filters containing rules with multiple syscall arguments are improperly constructed, such that all arguments are required to match rather than any of the arguments (AND is used rather than OR). These filters can be bypassed by only specifying a subset of the arguments due to this behavior. published: 2021-04-14T20:04:52Z cves: - CVE-2017-18367 ghsas: - GHSA-58v3-j75h-xr49 credits: - '@ihac' references: - fix: https://github.com/seccomp/libseccomp-golang/commit/06e7a29f36a34b8cf419aeb87b979ee508e58f9e review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1039.yaml
id: GO-2022-1039 modules: - module: std versions: - fixed: 1.18.7 - introduced: 1.19.0-0 - fixed: 1.19.2 vulnerable_at: 1.19.1 packages: - package: regexp/syntax symbols: - parser.push - parser.repeat - parser.factor - parse derived_symbols: - Parse summary: Memory exhaustion when compiling regular expressions in regexp/syntax description: |- Programs which compile regular expressions from untrusted sources may be vulnerable to memory exhaustion or denial of service. The parsed regexp representation is linear in the size of the input, but in some cases the constant factor can be as high as 40,000, making relatively small regexps consume much larger amounts of memory. After fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Normal use of regular expressions is unaffected. credits: - Adam Korczynski (ADA Logics) - OSS-Fuzz references: - report: https://go.dev/issue/55949 - fix: https://go.dev/cl/439356 - web: https://groups.google.com/g/golang-announce/c/xtuG5faxtaU cve_metadata: id: CVE-2022-41715 cwe: 'CWE 400: Uncontrolled Resource Consumption' references: - https://security.gentoo.org/glsa/202311-09 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2520.yaml
id: GO-2024-2520 modules: - module: github.com/grafana/grafana non_go_versions: - fixed: 7.1.0-beta1 vulnerable_at: 5.4.5+incompatible summary: Grafana XSS via a query alias for the ElasticSearch datasource in github.com/grafana/grafana cves: - CVE-2020-24303 ghsas: - GHSA-mvpr-q6rh-8vrp unknown_aliases: - BIT-grafana-2020-24303 references: - advisory: https://github.com/advisories/GHSA-mvpr-q6rh-8vrp - advisory: https://nvd.nist.gov/vuln/detail/CVE-2020-24303 - fix: https://github.com/grafana/grafana/pull/25401 - web: https://github.com/grafana/grafana/blob/master/CHANGELOG.md#710-beta-1-2020-07-01 - web: https://security.netapp.com/advisory/ntap-20201123-0002 source: id: GHSA-mvpr-q6rh-8vrp created: 2024-06-14T11:39:55.698815-04:00 review_status: UNREVIEWED unexcluded: NOT_IMPORTABLE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1155.yaml
id: GO-2022-1155 modules: - module: github.com/ipfs/go-merkledag versions: - introduced: 0.4.0 - fixed: 0.8.1 vulnerable_at: 0.7.0 packages: - package: github.com/ipfs/go-merkledag symbols: - ProtoNode.SetCidBuilder - ProtoNode.marshalImmutable - ProtoNode.AddRawLink - ProtoNode.UnmarshalJSON - ProtoNode.Cid - ProtoNode.RawData - ProtoNode.Multihash - ProtoNode.SetLinks derived_symbols: - ProtoNode.AddNodeLink - ProtoNode.AsBool - ProtoNode.AsBytes - ProtoNode.AsFloat - ProtoNode.AsInt - ProtoNode.AsLink - ProtoNode.AsString - ProtoNode.EncodeProtobuf - ProtoNode.IsAbsent - ProtoNode.IsNull - ProtoNode.Kind - ProtoNode.Length - ProtoNode.ListIterator - ProtoNode.Loggable - ProtoNode.LookupByIndex - ProtoNode.LookupByNode - ProtoNode.LookupBySegment - ProtoNode.LookupByString - ProtoNode.MapIterator - ProtoNode.Marshal - ProtoNode.Size - ProtoNode.Stat - ProtoNode.String - ProtoNode.UpdateNodeLink summary: Panic in github.com/ipfs/go-merkledag description: |- A ProtoNode may be modified in such a way as to cause various encode errors which will trigger a panic on common method calls that don't allow for error returns. Additionally, use of the ProtoNode.SetCidBuilder() method to set non-functioning CidBuilder (such as one that refers to a multihash where an implementation of that hash function is not available) may cause the same methods to panic as a new CID is required but cannot be created. cves: - CVE-2022-23495 ghsas: - GHSA-x39j-h85h-3f46 credits: - '@mrd0ll4r (https://github.com/mrd0ll4r)' references: - advisory: https://github.com/ipfs/go-merkledag/security/advisories/GHSA-x39j-h85h-3f46 - report: https://github.com/ipfs/kubo/issues/9297 - report: https://github.com/ipfs/go-merkledag/issues/90 - fix: https://github.com/ipfs/go-merkledag/pull/91 - fix: https://github.com/ipfs/go-merkledag/pull/92 - fix: https://github.com/ipfs/go-merkledag/pull/93 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2920.yaml
id: GO-2024-2920 modules: - module: github.com/vektah/gqlparser vulnerable_at: 1.3.1 packages: - package: github.com/vektah/gqlparser/parser symbols: - parser.parseDirectives derived_symbols: - ParseQuery - ParseSchema - ParseSchemas - module: github.com/vektah/gqlparser/v2 versions: - fixed: 2.5.14 vulnerable_at: 2.5.13 packages: - package: github.com/vektah/gqlparser/v2/parser symbols: - parser.parseDirectives derived_symbols: - ParseQuery - ParseSchema - ParseSchemas summary: Denial of service vulnerability via the parseDirectives function in github.com/vektah/gqlparser description: |- An issue in vektah gqlparser open-source-library allows a remote attacker to cause a denial of service via a crafted script to the parseDirectives function. cves: - CVE-2023-49559 ghsas: - GHSA-2hmf-46v7-v6fx unknown_aliases: - CGA-28jv-3vhj-mh4f - CGA-f2h6-vhfv-9wfh - CGA-pq49-565p-4jxc - CGA-qxv7-23p6-xhwj - CGA-r238-8h2v-2g64 - CGA-vq2h-9hfx-rqr4 references: - advisory: https://github.com/advisories/GHSA-2hmf-46v7-v6fx - fix: https://github.com/vektah/gqlparser/commit/36a3658873bf5a107f42488dfc392949cdd02977 - web: https://gist.github.com/uvzz/d3ed9d4532be16ec1040a2cf3dfec8d1 - web: https://github.com/99designs/gqlgen/issues/3118 - web: https://github.com/vektah/gqlparser/blob/master/parser/query.go#L316 source: id: GHSA-2hmf-46v7-v6fx created: 2024-07-01T13:30:21.392218-04:00 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1004.yaml
id: GO-2022-1004 modules: - module: github.com/theupdateframework/go-tuf versions: - fixed: 0.3.2 vulnerable_at: 0.3.1 packages: - package: github.com/theupdateframework/go-tuf/verify symbols: - DB.VerifySignatures derived_symbols: - DB.Unmarshal - DB.UnmarshalIgnoreExpired - DB.UnmarshalTrusted - DB.Verify - DB.VerifyIgnoreExpiredCheck summary: Improper handling of keys in github.com/theupdateframework/go-tuf description: |- An attacker with the ability to insert public keys into a TUF repository can cause clients to accept a staged change that has not been signed by the correct threshold of signatures. ghsas: - GHSA-3633-5h82-39pq references: - advisory: https://github.com/advisories/GHSA-3633-5h82-39pq - fix: https://github.com/theupdateframework/go-tuf/pull/369 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2877.yaml
id: GO-2024-2877 modules: - module: github.com/argoproj/argo-cd unsupported_versions: - last_affected: 1.8.7 vulnerable_at: 1.8.6 - module: github.com/argoproj/argo-cd/v2 versions: - fixed: 2.8.19 - introduced: 2.9.0-rc1 - fixed: 2.9.15 - introduced: 2.10.0-rc1 - fixed: 2.10.10 - introduced: 2.11.0-rc1 - fixed: 2.11.1 vulnerable_at: 2.11.0 summary: |- ArgoCD Vulnerable to Use of Risky or Missing Cryptographic Algorithms in Redis Cache in github.com/argoproj/argo-cd cves: - CVE-2024-31989 ghsas: - GHSA-9766-5277-j5hr unknown_aliases: - BIT-argo-cd-2024-31989 references: - advisory: https://github.com/argoproj/argo-cd/security/advisories/GHSA-9766-5277-j5hr - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-31989 - fix: https://github.com/argoproj/argo-cd/commit/2de0ceade243039c120c28374016c04ff9590d1d - fix: https://github.com/argoproj/argo-cd/commit/35a7d6c7fa1534aceba763d6a68697f36c12e678 - fix: https://github.com/argoproj/argo-cd/commit/4e2fe302c3352a0012ecbe7f03476b0e07f7fc6c - fix: https://github.com/argoproj/argo-cd/commit/53570cbd143bced49d4376d6e31bd9c7bd2659ff - fix: https://github.com/argoproj/argo-cd/commit/6ef7b62a0f67e74b4aac2aee31c98ae49dd95d12 - fix: https://github.com/argoproj/argo-cd/commit/9552034a80070a93a161bfa330359585f3b85f07 - fix: https://github.com/argoproj/argo-cd/commit/bdd889d43969ba738ddd15e1f674d27964048994 - fix: https://github.com/argoproj/argo-cd/commit/f1a449e83ee73f8f14d441563b6a31b504f8d8b0 source: id: GHSA-9766-5277-j5hr created: 2024-06-04T14:25:44.461912-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2754.yaml
id: GO-2024-2754 modules: - module: k8s.io/kubernetes versions: - fixed: 1.17.13 - introduced: 1.18.0 - fixed: 1.18.10 - introduced: 1.19.0 - fixed: 1.19.3 vulnerable_at: 1.19.3-rc.0 summary: Sensitive Information leak via Log File in Kubernetes in k8s.io/kubernetes cves: - CVE-2020-8566 ghsas: - GHSA-5x96-j797-5qqw references: - advisory: https://github.com/advisories/GHSA-5x96-j797-5qqw - advisory: https://nvd.nist.gov/vuln/detail/CVE-2020-8566 - web: https://bugzilla.redhat.com/show_bug.cgi?id=1886640 - web: https://github.com/kubernetes/kubernetes/issues/95624 - web: https://github.com/kubernetes/kubernetes/pull/95245 - web: https://github.com/kubernetes/kubernetes/pull/95245/commits/e91ec4fad3366d2dee020919f7c2a0d7b52fd3ea - web: https://groups.google.com/g/kubernetes-announce/c/ScdmyORnPDk - web: https://groups.google.com/g/kubernetes-security-discuss/c/vm-HcrFUOCs/m/36utxAM5CwAJ - web: https://security.netapp.com/advisory/ntap-20210122-0006 source: id: GHSA-5x96-j797-5qqw created: 2024-05-17T16:12:22.166508-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2589.yaml
id: GO-2024-2589 modules: - module: github.com/mattermost/mattermost-server versions: - introduced: 9.2.0+incompatible - fixed: 9.2.5+incompatible - introduced: 9.3.0+incompatible - fixed: 9.3.1+incompatible vulnerable_at: 9.3.1-rc2+incompatible - module: github.com/mattermost/mattermost-server/v5 vulnerable_at: 5.39.3 - module: github.com/mattermost/mattermost-server/v6 vulnerable_at: 6.7.2 - module: github.com/mattermost/mattermost/server/v8 non_go_versions: - fixed: 8.1.9 vulnerable_at: 8.0.0-20240626184126-817e18414e41 summary: Mattermost denial of service through long emoji value in github.com/mattermost/mattermost-server cves: - CVE-2024-24988 ghsas: - GHSA-6mx3-9qfh-77gj unknown_aliases: - CGA-hxgx-rg66-hvqr references: - advisory: https://github.com/advisories/GHSA-6mx3-9qfh-77gj - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-24988 - web: https://mattermost.com/security-updates source: id: GHSA-6mx3-9qfh-77gj created: 2024-06-26T16:08:34.50613-04:00 review_status: UNREVIEWED unexcluded: EFFECTIVELY_PRIVATE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0444.yaml
id: GO-2022-0444 modules: - module: github.com/theupdateframework/go-tuf versions: - fixed: 0.3.0 vulnerable_at: 0.2.0 packages: - package: github.com/theupdateframework/go-tuf/client symbols: - Client.Update - Client.UpdateRoots - Client.downloadMetaFromSnapshot - Client.downloadMetaFromTimestamp - Client.decodeRoot - Client.decodeTargets - Client.decodeTimestamp derived_symbols: - Client.Download - Client.Init - Client.Target - package: github.com/theupdateframework/go-tuf/util symbols: - TimestampFileMetaEqual summary: Version rollback attack in github.com/theupdateframework/go-tuf description: |- The TUF client is vulnerable to rollback attacks, in which an attacker causes a client to install software older than the software the client previously knew to be available. published: 2022-07-01T20:07:44Z cves: - CVE-2022-29173 ghsas: - GHSA-66x3-6cw3-v5gj references: - fix: https://github.com/theupdateframework/go-tuf/commit/ed6788e710fc3093a7ecc2d078bf734c0f200d8d review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1600.yaml
id: GO-2023-1600 modules: - module: github.com/kitabisa/teler-waf versions: - fixed: 0.2.0 vulnerable_at: 0.1.2 packages: - package: github.com/kitabisa/teler-waf symbols: - Teler.checkCommonWebAttack derived_symbols: - Teler.Analyze - Teler.HandlerFuncWithNext summary: Arbitrary code execution in github.com/kitabisa/teler-waf description: |- Improper handling of payload with special characters, such as CR/LF and horizontal tab, can lead to execution of arbitrary JavaScript code. cves: - CVE-2023-26047 ghsas: - GHSA-p2pf-g8cq-3gq5 references: - advisory: https://github.com/advisories/GHSA-p2pf-g8cq-3gq5 - fix: https://github.com/kitabisa/teler-waf/commit/6e1b0e19b8adc1bbc3513a986025d4adf88d59f8 - web: https://github.com/kitabisa/teler-waf/releases/tag/v0.2.0 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2328.yaml
id: GO-2023-2328 modules: - module: github.com/go-resty/resty/v2 versions: - introduced: 2.10.0 - fixed: 2.11.0 vulnerable_at: 2.10.0 packages: - package: github.com/go-resty/resty/v2 symbols: - handleRequestBody derived_symbols: - Backoff - Request.Delete - Request.Execute - Request.Get - Request.Head - Request.Options - Request.Patch - Request.Post - Request.Put - Request.Send summary: HTTP request body disclosure in github.com/go-resty/resty/v2 description: |- A race condition in go-resty can result in HTTP request body disclosure across requests. This condition can be triggered by calling sync.Pool.Put with the same *bytes.Buffer more than once, when request retries are enabled and a retry occurs. The call to sync.Pool.Get will then return a bytes.Buffer that hasn't had bytes.Buffer.Reset called on it. This dirty buffer will contain the HTTP request body from an unrelated request, and go-resty will append the current HTTP request body to it, sending two bodies in one request. The sync.Pool in question is defined at package level scope, so a completely unrelated server could receive the request body. ghsas: - GHSA-xwh9-gc39-5298 credits: - Logan Attwood (@lattwood) references: - report: https://github.com/go-resty/resty/issues/743 - report: https://github.com/go-resty/resty/issues/739 - fix: https://github.com/go-resty/resty/pull/745 - fix: https://github.com/go-resty/resty/commit/577fed8730d79f583eb48dfc81674164e1fc471e cve_metadata: id: CVE-2023-45286 cwe: 'CWE-200: Exposure of Sensitive Information to an Unauthorized Actor' review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0384.yaml
id: GO-2022-0384 modules: - module: helm.sh/helm/v3 versions: - fixed: 3.6.1 vulnerable_at: 3.6.0 packages: - package: helm.sh/helm/v3/pkg/downloader symbols: - ChartDownloader.ResolveChartVersion derived_symbols: - ChartDownloader.DownloadTo - Manager.Build - Manager.Update summary: Repository credentials passed to alternate domain in helm.sh/helm/v3 description: |- The username and password credentials associated with a Helm repository can be passed to another domain referenced by that Helm repository. If the index.yaml for a Helm repository is hosted on one domain and references a chart archive on a different domain, Helm will provide the credentials for the index.yaml's domain when fetching those archives. published: 2022-07-15T23:29:45Z cves: - CVE-2021-32690 ghsas: - GHSA-56hp-xqp3-w2jf - GHSA-7jr6-prv4-5wf5 references: - advisory: https://github.com/advisories/GHSA-56hp-xqp3-w2jf - fix: https://github.com/helm/helm/commit/61d8e8c4a6f95540c15c6a65f36a6dd0a45e7a2f review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1597.yaml
id: GO-2023-1597 modules: - module: github.com/kitabisa/teler-waf versions: - fixed: 0.1.1 vulnerable_at: 0.1.0 packages: - package: github.com/kitabisa/teler-waf symbols: - Teler.checkCustomRules derived_symbols: - Teler.Analyze - Teler.HandlerFuncWithNext summary: Cross site scripting in github.com/kitabisa/teler-waf description: |- Improper sanitization and filtering of HTML entities in user input can lead to cross-site scripting (XSS) attacks where arbitrary JavaScript code is executed in the browser. cves: - CVE-2023-26046 ghsas: - GHSA-9f95-hhg4-pg4f references: - fix: https://github.com/kitabisa/teler-waf/commit/d1d49cfddfa3ec2adad962870f14b85cd1aaf739 - web: https://github.com/kitabisa/teler-waf/releases/tag/v0.1.1 - advisory: https://github.com/advisories/GHSA-9f95-hhg4-pg4f review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0048.yaml
id: GO-2020-0048 modules: - module: github.com/antchfx/xmlquery versions: - fixed: 1.3.1 vulnerable_at: 1.3.0 packages: - package: github.com/antchfx/xmlquery symbols: - LoadURL summary: Denial of service in github.com/antchfx/xmlquery description: |- LoadURL does not check the Content-Type of loaded resources, which can cause a panic due to nil pointer deference if the loaded resource is not XML. If user supplied URLs are loaded, this may be used as a denial of service vector. published: 2021-04-14T20:04:52Z cves: - CVE-2020-25614 ghsas: - GHSA-93m7-c69f-5cfj credits: - '@dwisiswant0' references: - fix: https://github.com/antchfx/xmlquery/commit/5648b2f39e8d5d3fc903c45a4f1274829df71821 - web: https://github.com/antchfx/xmlquery/issues/39 review_status: REVIEWED