repo_id
stringclasses 927
values | file_path
stringlengths 99
214
| content
stringlengths 2
4.15M
|
|---|---|---|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2505.yaml
|
id: GO-2024-2505
modules:
- module: github.com/hashicorp/consul
versions:
- introduced: 1.2.0
- fixed: 1.6.10
- introduced: 1.7.0
- fixed: 1.7.10
- introduced: 1.8.0
- fixed: 1.8.6
vulnerable_at: 1.8.5
summary: Privilege Escalation in HashiCorp Consul in github.com/hashicorp/consul
cves:
- CVE-2020-28053
ghsas:
- GHSA-6m72-467w-94rh
unknown_aliases:
- BIT-consul-2020-28053
references:
- advisory: https://github.com/advisories/GHSA-6m72-467w-94rh
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2020-28053
- fix: https://github.com/hashicorp/consul/commit/ff5215d882ac51b49c2647aac46b42aa9c890ce3
- fix: https://github.com/hashicorp/consul/pull/9240
- web: https://github.com/hashicorp/consul/blob/master/CHANGELOG.md#186-november-19-2020
- web: https://security.gentoo.org/glsa/202208-09
- web: https://www.hashicorp.com/blog/category/consul
source:
id: GHSA-6m72-467w-94rh
created: 2024-06-14T11:38:32.702692-04:00
review_status: UNREVIEWED
unexcluded: EFFECTIVELY_PRIVATE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0603.yaml
|
id: GO-2022-0603
modules:
- module: gopkg.in/yaml.v3
versions:
- fixed: 3.0.0-20220521103104-8f96da9f5d5e
vulnerable_at: 3.0.0-20220512140231-539c8e751b99
packages:
- package: gopkg.in/yaml.v3
symbols:
- Unmarshal
summary: Panic in gopkg.in/yaml.v3
description: |-
An issue in the Unmarshal function can cause a program to panic when attempting
to deserialize invalid input.
published: 2022-08-22T18:00:47Z
cves:
- CVE-2022-28948
ghsas:
- GHSA-hp87-p4gw-j4gq
references:
- fix: https://github.com/go-yaml/yaml/commit/8f96da9f5d5eff988554c1aae1784627c4bf6754
- web: https://github.com/go-yaml/yaml/issues/666
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1043.yaml
|
id: GO-2022-1043
modules:
- module: github.com/flyteorg/flyteadmin
versions:
- introduced: 1.0.0
- fixed: 1.1.44
vulnerable_at: 1.1.43
packages:
- package: github.com/flyteorg/flyteadmin/auth/config
summary: Hardcoded hashed password in github.com/flyteorg/flyteadmin
description: |-
Default authorization server's configuration settings contain a known hardcoded
hashed password.
Users who enable auth but do not override this setting may unknowingly allow
public traffic in by way of this default password with attackers effectively
impersonating propeller.
cves:
- CVE-2022-39273
ghsas:
- GHSA-67x4-qr35-qvrm
references:
- advisory: https://github.com/advisories/GHSA-67x4-qr35-qvrm
- fix: https://github.com/flyteorg/flyteadmin/pull/478
- web: https://docs.flyte.org/en/latest/deployment/cluster_config/auth_setup.html#oauth2-authorization-server
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1144.yaml
|
id: GO-2022-1144
modules:
- module: std
versions:
- fixed: 1.18.9
- introduced: 1.19.0-0
- fixed: 1.19.4
vulnerable_at: 1.19.3
packages:
- package: net/http
symbols:
- http2serverConn.canonicalHeader
derived_symbols:
- ListenAndServe
- ListenAndServeTLS
- Serve
- ServeTLS
- Server.ListenAndServe
- Server.ListenAndServeTLS
- Server.Serve
- Server.ServeTLS
- http2Server.ServeConn
- module: golang.org/x/net
versions:
- fixed: 0.4.0
vulnerable_at: 0.3.0
packages:
- package: golang.org/x/net/http2
symbols:
- serverConn.canonicalHeader
derived_symbols:
- Server.ServeConn
summary: Excessive memory growth in net/http and golang.org/x/net/http2
description: |-
An attacker can cause excessive memory growth in a Go server accepting HTTP/2
requests.
HTTP/2 server connections contain a cache of HTTP header keys sent by the
client. While the total number of entries in this cache is capped, an attacker
sending very large keys can cause the server to allocate approximately 64 MiB
per open connection.
ghsas:
- GHSA-xrjj-mj9h-534m
credits:
- Josselin Costanzi
references:
- report: https://go.dev/issue/56350
- fix: https://go.dev/cl/455717
- fix: https://go.dev/cl/455635
- web: https://groups.google.com/g/golang-announce/c/L_3rmdT0BMU/m/yZDrXjIiBQAJ
cve_metadata:
id: CVE-2022-41717
cwe: 'CWE 400: Uncontrolled Resource Consumption'
references:
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QBKBAZBIOXZV5QCFHZNSVXULR32XJCYD/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NQGNAXK3YBPMUP3J4TECIRDHFGW37522/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PUM4DIVOLJCBK5ZDP4LJOL24GXT3YSIR/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4SBIUECMLNC572P23DDOKJNKPJVX26SP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PW3XC47AUW5J5M2ULJX7WCCL3B2ETLMT/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q52IQI754YAE4XPR4QBRWPIVZWYGZ4FS/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/56B2FFESRYYP6IY2AZ3UWXLWKZ5IYZN4/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ANIOPUXWIHVRA6CEWXCGOMX3YYS6KFHG/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WPEIZ7AMEJCZXU3FEJZMVRNHQZXX5P3I/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4BUK2ZIAGCULOOYDNH25JPU6JBES5NF2/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7N5GV4CHH6WAGX3GFMDD3COEOVCZ4RI/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/REMHVVIBDNKSRKNOTV7EQSB7CYQWOUOU/
- https://security.gentoo.org/glsa/202311-09
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSVIS6MTMFVBA7JPMRAUNKUOYEVSJYSB/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZSVEMQV5ROY5YW5QE3I57HT3ITWG5GCV/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CHHITS4PUOZAKFIUBQAQZC7JWXMOYE4B/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KEOTKBUPZXHE3F352JBYNTSNRXYLWD6P/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5RSKA2II6QTD4YUKUNDVJQSRYSFC4VFR/
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2583.yaml
|
id: GO-2024-2583
modules:
- module: github.com/edgelesssys/marblerun
versions:
- fixed: 1.4.1
vulnerable_at: 1.4.0
packages:
- package: github.com/edgelesssys/marblerun/marble/premain
symbols:
- GramineActivate
- PreMain
- PreMainEgo
- PreMainMock
- PreMainEx
- ActivateRPC
- package: github.com/edgelesssys/marblerun/coordinator/core
symbols:
- Core.setTTLSConfig
derived_symbols:
- Core.Activate
summary: Encryption bypass in github.com/edgelesssys/marblerun
ghsas:
- GHSA-x5r5-2qrx-rqj8
references:
- advisory: https://github.com/edgelesssys/marblerun/security/advisories/GHSA-x5r5-2qrx-rqj8
- fix: https://github.com/edgelesssys/marblerun/commit/0330ced092253613a07abe7b330ff6ac6fc6e9c6
- fix: https://github.com/edgelesssys/marblerun/commit/e5bcfe32883d22f3d87ffc9400f9fdb5ecbe3200
- web: https://github.com/edgelesssys/marblerun/releases/tag/v1.4.1
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2181.yaml
|
id: GO-2023-2181
modules:
- module: github.com/sigstore/cosign
vulnerable_at: 1.13.1
packages:
- package: github.com/sigstore/cosign/pkg/cosign
symbols:
- FetchSignaturesForReference
- module: github.com/sigstore/cosign/v2
versions:
- fixed: 2.2.1
vulnerable_at: 2.2.0
packages:
- package: github.com/sigstore/cosign/v2/pkg/cosign
symbols:
- FetchSignaturesForReference
summary: Denial of service attack from remote registry in github.com/sigstore/cosign
description: |-
An attacker who controls a remote registry can return a high number of
attestations and/or signatures to cosign. This can cause cosign to enter a long
loop resulting in a denial of service, i.e., endless data attack.
cves:
- CVE-2023-46737
ghsas:
- GHSA-vfp6-jrw2-99g9
references:
- fix: https://github.com/sigstore/cosign/commit/8ac891ff0e29ddc67965423bee8f826219c6eb0f
- web: https://github.com/sigstore/cosign/releases/tag/v2.2.1
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2566.yaml
|
id: GO-2024-2566
modules:
- module: github.com/mattermost/mattermost-server
versions:
- introduced: 9.0.0+incompatible
- fixed: 9.3.0+incompatible
vulnerable_at: 9.3.0-rc2+incompatible
- module: github.com/mattermost/mattermost-server/v5
vulnerable_at: 5.39.3
- module: github.com/mattermost/mattermost-server/v6
vulnerable_at: 6.7.2
- module: github.com/mattermost/mattermost/server/v8
non_go_versions:
- fixed: 8.1.8
vulnerable_at: 8.0.0-20240626145722-59998b0b8473
summary: Mattermost fails to check the required permissions in github.com/mattermost/mattermost-server
cves:
- CVE-2024-24776
ghsas:
- GHSA-r833-w756-h5p2
unknown_aliases:
- BIT-mattermost-2024-24776
- CGA-x56p-7vj3-wq3q
references:
- advisory: https://github.com/advisories/GHSA-r833-w756-h5p2
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-24776
- web: https://mattermost.com/security-updates
source:
id: GHSA-r833-w756-h5p2
created: 2024-06-26T13:56:26.587346-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1881.yaml
|
id: GO-2023-1881
modules:
- module: github.com/cosmos/cosmos-sdk
vulnerable_at: 0.47.3
packages:
- package: github.com/cosmos/cosmos-sdk/x/crisis
summary: The x/crisis package does not charge ConstantFee in github.com/cosmos/cosmos-sdk
description: |-
If a transaction is sent to the x/crisis module to check an invariant, the
ConstantFee parameter of the chain is not charged.
No patch will be released, as the package is planned to be deprecated and
replaced.
ghsas:
- GHSA-w5w5-2882-47pc
references:
- advisory: https://github.com/cosmos/cosmos-sdk/security/advisories/GHSA-w5w5-2882-47pc
- report: https://github.com/cosmos/cosmos-sdk/issues/15706
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1733.yaml
|
id: GO-2023-1733
modules:
- module: github.com/bnb-chain/tss-lib
versions:
- fixed: 1.3.6-0.20230324145555-bb6fb30bd3eb
vulnerable_at: 1.3.5
packages:
- package: github.com/bnb-chain/tss-lib/common
- module: github.com/binance-chain/tss-lib
vulnerable_at: 1.3.0
packages:
- package: github.com/binance-chain/tss-lib/common
summary: |-
Timing attack from non-constant time scalar arithmetic in
github.com/bnb-chain/tss-lib
description: |-
Timing attack from non-constant time scalar arithmetic in
github.com/bnb-chain/tss-lib.
cves:
- CVE-2023-26557
references:
- advisory: https://medium.com/@iofinnet/security-disclosure-for-ecdsa-and-eddsa-threshold-signature-schemes-4e969af7155b
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2483.yaml
|
id: GO-2024-2483
modules:
- module: github.com/grafana/grafana
versions:
- fixed: 6.0.0-beta1+incompatible
vulnerable_at: 5.4.5+incompatible
summary: Grafana XSS via adding a link in General feature in github.com/grafana/grafana
cves:
- CVE-2018-18625
ghsas:
- GHSA-6wh2-8hw7-jw94
references:
- advisory: https://github.com/advisories/GHSA-6wh2-8hw7-jw94
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2018-18625
- fix: https://github.com/grafana/grafana/pull/11813
- fix: https://github.com/grafana/grafana/pull/14984
- web: https://security.netapp.com/advisory/ntap-20200608-0008
source:
id: GHSA-6wh2-8hw7-jw94
created: 2024-06-14T11:37:10.915935-04:00
review_status: UNREVIEWED
unexcluded: EFFECTIVELY_PRIVATE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2872.yaml
|
id: GO-2024-2872
modules:
- module: github.com/bincyber/go-sqlcrypter
versions:
- introduced: 0.1.0
unsupported_versions:
- last_affected: 0.2.0
vulnerable_at: 0.2.0
summary: github.com/bincyber/go-sqlcrypter vulnerable to IV collision
ghsas:
- GHSA-2j6r-9vv4-6gf5
references:
- advisory: https://github.com/advisories/GHSA-2j6r-9vv4-6gf5
- fix: https://github.com/bincyber/go-sqlcrypter/commit/96c73cd2b8fd15c9da9b3eafe62c9a040f6537e8
- fix: https://github.com/bincyber/go-sqlcrypter/pull/128
- report: https://github.com/bincyber/go-sqlcrypter/issues/127
source:
id: GHSA-2j6r-9vv4-6gf5
created: 2024-06-04T14:26:24.203316-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0229.yaml
|
id: GO-2022-0229
modules:
- module: std
versions:
- fixed: 1.12.16
- introduced: 1.13.0-0
- fixed: 1.13.7
vulnerable_at: 1.13.6
packages:
- package: crypto/x509
- module: golang.org/x/crypto
versions:
- fixed: 0.0.0-20200124225646-8b5121be2f68
vulnerable_at: 0.0.0-20200115085410-6d4e4cb37c7d
packages:
- package: golang.org/x/crypto/cryptobyte
summary: Panic in certificate parsing in crypto/x509 and golang.org/x/crypto/cryptobyte
description: |-
On 32-bit architectures, a malformed input to crypto/x509 or the ASN.1 parsing
functions of golang.org/x/crypto/cryptobyte can lead to a panic.
The malformed certificate can be delivered via a crypto/tls connection to a
client, or to a server that accepts client certificates. net/http clients can be
made to crash by an HTTPS server, while net/http servers that accept client
certificates will recover the panic and are unaffected.
published: 2022-07-06T18:23:48Z
cves:
- CVE-2020-7919
ghsas:
- GHSA-cjjc-xp8v-855w
credits:
- Project Wycheproof
references:
- fix: https://go.dev/cl/216680
- fix: https://go.googlesource.com/go/+/b13ce14c4a6aa59b7b041ad2b6eed2d23e15b574
- fix: https://go.dev/cl/216677
- report: https://go.dev/issue/36837
- web: https://groups.google.com/g/golang-announce/c/Hsw4mHYc470
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0203.yaml
|
id: GO-2022-0203
modules:
- module: cmd
versions:
- fixed: 1.9.5
- introduced: 1.10.0-0
- fixed: 1.10.1
vulnerable_at: 1.10.0
packages:
- package: cmd/go
skip_fix: 'TODO: revisit this reason (cant request explicit version of standard library package cmd/go)'
summary: Remote command execution via "go get" command with "-insecure" option in cmd/go
description: |-
The "go get" command is vulnerable to remote code execution.
When the -insecure command-line option is used, "go get" does not validate the
import path (get/vcs.go only checks for "://" anywhere in the string), which
allows remote attackers to execute arbitrary OS commands via a crafted web site.
published: 2022-08-09T23:19:00Z
cves:
- CVE-2018-7187
credits:
- Arthur Khashaev
references:
- fix: https://go.dev/cl/94603
- fix: https://go.googlesource.com/go/+/c941e27e70c3e06e1011d2dd71d72a7a06a9bcbc
- report: https://go.dev/issue/23867
- web: https://groups.google.com/g/golang-announce/c/IkPkOF8JqLs/m/TFBbWHJYAwAJ
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0646.yaml
|
id: GO-2022-0646
modules:
- module: github.com/aws/aws-sdk-go
vulnerable_at: 1.33.21
packages:
- package: github.com/aws/aws-sdk-go/service/s3/s3crypto
symbols:
- NewDecryptionClient
- NewEncryptionClient
summary: Use of risky cryptographic algorithm in github.com/aws/aws-sdk-go
description: |-
The Go AWS S3 Crypto SDK contains vulnerabilities that can permit an attacker
with write access to a bucket to decrypt files in that bucket.
Files encrypted by the V1 EncryptionClient using either the AES-CBC content
cipher or the KMS key wrap algorithm are vulnerable. Users should migrate to the
V1 EncryptionClientV2 API, which will not create vulnerable files. Old files
will remain vulnerable until re-encrypted with the new client.
published: 2022-02-11T23:26:26Z
cves:
- CVE-2020-8911
- CVE-2020-8912
ghsas:
- GHSA-7f33-f4f5-xwgw
- GHSA-f5pg-7wfw-84q9
credits:
- Sophie Schmieg from the Google ISE team
references:
- advisory: https://aws.amazon.com/blogs/developer/updates-to-the-amazon-s3-encryption-client/?s=09
- fix: https://github.com/aws/aws-sdk-go/pull/3403
- fix: https://github.com/aws/aws-sdk-go/commit/ae9b9fd92af132cfd8d879809d8611825ba135f4
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0046.yaml
|
id: GO-2020-0046
modules:
- module: github.com/russellhaering/goxmldsig
versions:
- fixed: 1.1.1
vulnerable_at: 1.1.0
packages:
- package: github.com/russellhaering/goxmldsig
symbols:
- ValidationContext.validateSignature
derived_symbols:
- ValidationContext.Validate
- module: github.com/russellhaering/gosaml2
versions:
- fixed: 0.7.0
vulnerable_at: 0.6.0
packages:
- package: github.com/russellhaering/gosaml2
symbols:
- SAMLServiceProvider.validateAssertionSignatures
derived_symbols:
- SAMLServiceProvider.RetrieveAssertionInfo
- SAMLServiceProvider.ValidateEncodedLogoutRequestPOST
- SAMLServiceProvider.ValidateEncodedLogoutResponsePOST
- SAMLServiceProvider.ValidateEncodedResponse
summary: |-
Panic due to malformed XML digital signature in
github.com/russellhaering/goxmldsig
description: |-
Due to a nil pointer dereference, a malformed XML Digital Signature can cause a
panic during validation. If user supplied signatures are being validated, this
may be used as a denial of service vector.
published: 2021-04-14T20:04:52Z
cves:
- CVE-2020-7711
- CVE-2020-7731
ghsas:
- GHSA-gq5r-cc4w-g8xf
- GHSA-mqqv-chpx-vq25
- GHSA-prjq-f4q3-fvfr
credits:
- '@stevenjohnstone'
references:
- web: https://github.com/russellhaering/goxmldsig/issues/48
- web: https://github.com/russellhaering/gosaml2/issues/59
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2941.yaml
|
id: GO-2024-2941
modules:
- module: github.com/traefik/traefik
vulnerable_at: 1.7.34
- module: github.com/traefik/traefik/v2
versions:
- fixed: 2.11.5
vulnerable_at: 2.11.4
- module: github.com/traefik/traefik/v3
versions:
- fixed: 3.0.3
vulnerable_at: 3.0.2
summary: 'ACME DNS: Azure Identity Libraries Elevation of Privilege Vulnerability in github.com/traefik/traefik'
ghsas:
- GHSA-rvj4-q8q5-8grf
unknown_aliases:
- CGA-p2qq-w8qw-6vjp
- CGA-r7v2-xp2f-mjxf
references:
- advisory: https://github.com/traefik/traefik/security/advisories/GHSA-rvj4-q8q5-8grf
- web: https://github.com/traefik/traefik/releases/tag/v2.11.5
- web: https://github.com/traefik/traefik/releases/tag/v3.0.3
- web: https://nvd.nist.gov/vuln/detail/CVE-2024-35255
source:
id: GHSA-rvj4-q8q5-8grf
created: 2024-06-27T15:53:39.605336-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0024.yaml
|
id: GO-2020-0024
modules:
- module: github.com/btcsuite/go-socks
versions:
- fixed: 0.0.0-20130808000456-233bccbb1abe
vulnerable_at: 0.0.0-20130225212758-6dca7033f514
packages:
- package: github.com/btcsuite/go-socks
symbols:
- proxiedConn.LocalAddr
- proxiedConn.RemoteAddr
- module: github.com/btcsuitereleases/go-socks
versions:
- fixed: 0.0.0-20130808000456-233bccbb1abe
vulnerable_at: 0.0.0-20130225212758-6dca7033f514
packages:
- package: github.com/btcsuitereleases/go-socks
symbols:
- proxiedConn.LocalAddr
- proxiedConn.RemoteAddr
summary: Infinite loop in github.com/btcsuite/go-socks
description: |-
The RemoteAddr and LocalAddr methods on the returned net.Conn may call
themselves, leading to an infinite loop which will crash the program due to a
stack overflow.
published: 2021-04-14T20:04:52Z
ghsas:
- GHSA-gxgj-xjcw-fv9p
references:
- fix: https://github.com/btcsuite/go-socks/commit/233bccbb1abe02f05750f7ace66f5bffdb13defc
cve_metadata:
id: CVE-2013-10005
cwe: 'CWE 400: Uncontrolled Resource Consumption'
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2499.yaml
|
id: GO-2024-2499
modules:
- module: github.com/minio/minio
versions:
- fixed: 0.0.0-20240131185645-0ae4915a9391
summary: |-
Minio unsafe default: Access keys inherit `admin` of root user, allowing
privilege escalation in github.com/minio/minio
cves:
- CVE-2024-24747
ghsas:
- GHSA-xx8w-mq23-29g4
unknown_aliases:
- BIT-minio-2024-24747
references:
- advisory: https://github.com/minio/minio/security/advisories/GHSA-xx8w-mq23-29g4
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-24747
- fix: https://github.com/minio/minio/commit/0ae4915a9391ef4b3ec80f5fcdcf24ee6884e776
- web: https://github.com/minio/minio/releases/tag/RELEASE.2024-01-31T20-20-33Z
notes:
- fix: 'github.com/minio/minio: could not add vulnerable_at: cannot auto-guess when fixed version is 0.0.0 pseudo-version'
source:
id: GHSA-xx8w-mq23-29g4
created: 2024-06-14T11:38:05.147981-04:00
review_status: UNREVIEWED
unexcluded: EFFECTIVELY_PRIVATE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2936.yaml
|
id: GO-2024-2936
modules:
- module: github.com/pocketbase/pocketbase
versions:
- fixed: 0.22.14
vulnerable_at: 0.22.14-rc
packages:
- package: github.com/pocketbase/pocketbase/apis
symbols:
- RecordAuthResponse
- recordAuthApi.authWithPassword
- recordAuthApi.authWithOAuth2
derived_symbols:
- EnrichRecord
- EnrichRecords
- Serve
- package: github.com/pocketbase/pocketbase/models
symbols:
- Record.getNormalizeDataValueForDB
- Record.Get
- Record.Set
derived_symbols:
- NewRecordFromNullStringMap
- NewRecordsFromNullStringMaps
- Record.CleanCopy
- Record.ColumnValueMap
- Record.Email
- Record.EmailVisibility
- Record.FindFileFieldByFile
- Record.GetBool
- Record.GetDateTime
- Record.GetFloat
- Record.GetInt
- Record.GetString
- Record.GetStringSlice
- Record.GetTime
- Record.LastResetSentAt
- Record.LastVerificationSentAt
- Record.Load
- Record.MarshalJSON
- Record.OriginalCopy
- Record.PasswordHash
- Record.PublicExport
- Record.RefreshTokenKey
- Record.ReplaceModifers
- Record.SetEmail
- Record.SetEmailVisibility
- Record.SetLastResetSentAt
- Record.SetLastVerificationSentAt
- Record.SetPassword
- Record.SetTokenKey
- Record.SetUsername
- Record.SetVerified
- Record.TokenKey
- Record.UnknownData
- Record.UnmarshalJSON
- Record.UnmarshalJSONField
- Record.Username
- Record.ValidatePassword
- Record.Verified
- package: github.com/pocketbase/pocketbase/models/schema
symbols:
- AuthFieldNames
- package: github.com/pocketbase/pocketbase/daos
symbols:
- Dao.SyncRecordTableSchema
derived_symbols:
- Dao.CanAccessRecord
- Dao.CreateViewSchema
- Dao.Delete
- Dao.DeleteAdmin
- Dao.DeleteCollection
- Dao.DeleteExternalAuth
- Dao.DeleteOldLogs
- Dao.DeleteParam
- Dao.DeleteRecord
- Dao.DeleteTable
- Dao.DeleteView
- Dao.ExpandRecord
- Dao.ExpandRecords
- Dao.FindAdminByEmail
- Dao.FindAdminById
- Dao.FindAdminByToken
- Dao.FindAllExternalAuthsByRecord
- Dao.FindAuthRecordByEmail
- Dao.FindAuthRecordByToken
- Dao.FindAuthRecordByUsername
- Dao.FindById
- Dao.FindCollectionByNameOrId
- Dao.FindCollectionReferences
- Dao.FindCollectionsByType
- Dao.FindExternalAuthByRecordAndProvider
- Dao.FindFirstExternalAuthByExpr
- Dao.FindFirstRecordByData
- Dao.FindFirstRecordByFilter
- Dao.FindLogById
- Dao.FindParamByKey
- Dao.FindRecordById
- Dao.FindRecordByViewFile
- Dao.FindRecordsByExpr
- Dao.FindRecordsByFilter
- Dao.FindRecordsByIds
- Dao.FindSettings
- Dao.HasTable
- Dao.ImportCollections
- Dao.IsAdminEmailUnique
- Dao.IsCollectionNameUnique
- Dao.IsRecordValueUnique
- Dao.LogsStats
- Dao.RecordQuery
- Dao.RunInTransaction
- Dao.Save
- Dao.SaveAdmin
- Dao.SaveCollection
- Dao.SaveExternalAuth
- Dao.SaveLog
- Dao.SaveParam
- Dao.SaveRecord
- Dao.SaveSettings
- Dao.SaveView
- Dao.SuggestUniqueAuthRecordUsername
- Dao.TableColumns
- Dao.TableIndexes
- Dao.TableInfo
- Dao.TotalAdmins
- Dao.Vacuum
- package: github.com/pocketbase/pocketbase/forms
symbols:
- RecordOAuth2Login.submit
derived_symbols:
- AdminLogin.Submit
- AdminLogin.Validate
- AdminPasswordResetConfirm.Submit
- AdminPasswordResetConfirm.Validate
- AdminPasswordResetRequest.Submit
- AdminPasswordResetRequest.Validate
- AdminUpsert.Submit
- AdminUpsert.Validate
- AppleClientSecretCreate.Submit
- AppleClientSecretCreate.Validate
- BackupCreate.Submit
- BackupCreate.Validate
- BackupUpload.Submit
- BackupUpload.Validate
- CollectionUpsert.Submit
- CollectionUpsert.Validate
- CollectionsImport.Submit
- CollectionsImport.Validate
- NewRecordUpsert
- RealtimeSubscribe.Validate
- RecordEmailChangeConfirm.Submit
- RecordEmailChangeConfirm.Validate
- RecordEmailChangeRequest.Submit
- RecordEmailChangeRequest.Validate
- RecordOAuth2Login.Submit
- RecordOAuth2Login.Validate
- RecordPasswordLogin.Submit
- RecordPasswordLogin.Validate
- RecordPasswordResetConfirm.Submit
- RecordPasswordResetConfirm.Validate
- RecordPasswordResetRequest.Submit
- RecordPasswordResetRequest.Validate
- RecordUpsert.DrySubmit
- RecordUpsert.LoadData
- RecordUpsert.LoadRequest
- RecordUpsert.Submit
- RecordUpsert.Validate
- RecordUpsert.ValidateAndFill
- RecordVerificationConfirm.Submit
- RecordVerificationConfirm.Validate
- RecordVerificationRequest.Submit
- RecordVerificationRequest.Validate
- SettingsUpsert.Submit
- SettingsUpsert.Validate
- TestEmailSend.Submit
- TestEmailSend.Validate
- TestS3Filesystem.Submit
- TestS3Filesystem.Validate
summary: PocketBase performs password auth and OAuth2 unverified email linking in github.com/pocketbase/pocketbase
cves:
- CVE-2024-38351
ghsas:
- GHSA-m93w-4fxv-r35v
references:
- advisory: https://github.com/pocketbase/pocketbase/security/advisories/GHSA-m93w-4fxv-r35v
- fix: https://github.com/pocketbase/pocketbase/commit/58ace5d5e7b9b979490019cf8d1b88491e5daec5
- web: https://github.com/pocketbase/pocketbase/discussions/4355
source:
id: GHSA-m93w-4fxv-r35v
created: 2024-07-01T13:30:10.970751-04:00
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2917.yaml
|
id: GO-2024-2917
modules:
- module: github.com/traefik/traefik
vulnerable_at: 1.7.34
- module: github.com/traefik/traefik/v2
versions:
- fixed: 2.11.4
vulnerable_at: 2.11.3
- module: github.com/traefik/traefik/v3
versions:
- introduced: 3.0.0-beta3
- fixed: 3.0.2
vulnerable_at: 3.0.1
summary: Traefik has unexpected behavior with IPv4-mapped IPv6 addresses in github.com/traefik/traefik
ghsas:
- GHSA-7jmw-8259-q9jx
unknown_aliases:
- CGA-7f28-xcwf-h2wm
- CGA-8pcv-r7p9-7rjm
references:
- advisory: https://github.com/traefik/traefik/security/advisories/GHSA-7jmw-8259-q9jx
- web: https://github.com/traefik/traefik/releases/tag/v2.11.4
- web: https://github.com/traefik/traefik/releases/tag/v3.0.2
- web: https://www.cve.org/CVERecord?id=CVE-2024-24790
source:
id: GHSA-7jmw-8259-q9jx
created: 2024-06-26T14:09:27.817173-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2854.yaml
|
id: GO-2024-2854
modules:
- module: github.com/grafana/grafana
non_go_versions:
- introduced: 8.5.0
- fixed: 8.5.13
- introduced: 9.0.0
- fixed: 9.0.9
- introduced: 9.1.0
- fixed: 9.1.6
vulnerable_at: 5.4.5+incompatible
summary: Grafana folders admin only permission privilege escalation in github.com/grafana/grafana
cves:
- CVE-2022-36062
ghsas:
- GHSA-p978-56hq-r492
unknown_aliases:
- BIT-grafana-2022-36062
references:
- advisory: https://github.com/grafana/grafana/security/advisories/GHSA-p978-56hq-r492
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2022-36062
- web: https://security.netapp.com/advisory/ntap-20221215-0001
source:
id: GHSA-p978-56hq-r492
created: 2024-06-04T14:27:09.594073-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2077.yaml
|
id: GO-2023-2077
modules:
- module: github.com/sagernet/sing
versions:
- fixed: 0.2.12-0.20230925092853-5b05b5c147d9
vulnerable_at: 0.2.12-0.20230921162020-494f88c9b8bf
packages:
- package: github.com/sagernet/sing/protocol/socks
symbols:
- HandleConnection0
derived_symbols:
- HandleConnection
summary: Authentication bypass in github.com/sagernet/sing
cves:
- CVE-2023-43644
ghsas:
- GHSA-r5hm-mp3j-285g
references:
- advisory: https://github.com/SagerNet/sing-box/security/advisories/GHSA-r5hm-mp3j-285g
- fix: https://github.com/SagerNet/sing/commit/5b05b5c147d9650e8accb4441e216c72a61f4859
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0978.yaml
|
id: GO-2022-0978
modules:
- module: github.com/open-policy-agent/opa
versions:
- introduced: 0.40.0
- fixed: 0.44.0
vulnerable_at: 0.43.0
packages:
- package: github.com/open-policy-agent/opa/ast
symbols:
- Compiler.rewriteWithModifiers
- isBuiltinRefOrVar
- queryCompiler.checkDeprecatedBuiltins
- queryCompiler.checkUnsafeBuiltins
- rewriteWithModifier
- rewriteWithModifiersInBody
- validateWith
- validateWithFunctionValue
derived_symbols:
- Args.Copy
- Args.Vars
- Array.Copy
- Array.Foreach
- Array.Iter
- Array.Until
- ArrayComprehension.Copy
- BeforeAfterVisitor.Walk
- Body.Copy
- Body.Vars
- Call.Copy
- CompileModules
- CompileModulesWithOpt
- Compiler.Compile
- Compiler.GetRulesDynamic
- Compiler.GetRulesDynamicWithOpts
- Compiler.PassesTypeCheck
- ContainsClosures
- ContainsComprehensions
- ContainsRefs
- Copy
- Every.Copy
- Every.KeyValueVars
- Expr.Copy
- Expr.CopyWithoutTerms
- Expr.Vars
- GenericTransformer.Transform
- GenericVisitor.Walk
- Head.Copy
- Head.Vars
- Import.Copy
- IsConstant
- JSON
- JSONWithOpt
- Module.Copy
- Module.UnmarshalJSON
- MustCompileModules
- MustCompileModulesWithOpts
- MustJSON
- MustParseBody
- MustParseBodyWithOpts
- MustParseExpr
- MustParseImports
- MustParseModule
- MustParseModuleWithOpts
- MustParsePackage
- MustParseRef
- MustParseRule
- MustParseStatement
- MustParseStatements
- MustParseTerm
- NewGraph
- ObjectComprehension.Copy
- OutputVarsFromBody
- OutputVarsFromExpr
- Package.Copy
- ParseBody
- ParseBodyWithOpts
- ParseExpr
- ParseImports
- ParseModule
- ParseModuleWithOpts
- ParsePackage
- ParseRef
- ParseRule
- ParseStatement
- ParseStatements
- ParseStatementsWithOpts
- ParseTerm
- Parser.Parse
- Pretty
- QueryContext.Copy
- Ref.ConstantPrefix
- Ref.Copy
- Ref.Dynamic
- Ref.Extend
- Ref.OutputVars
- Rule.Copy
- SetComprehension.Copy
- SomeDecl.Copy
- Term.Copy
- Term.Vars
- Transform
- TransformComprehensions
- TransformRefs
- TransformVars
- TreeNode.DepthFirst
- TypeEnv.Get
- Unify
- ValueMap.Copy
- ValueMap.Equal
- ValueMap.Hash
- ValueMap.Iter
- ValueMap.MarshalJSON
- ValueMap.String
- ValueToInterface
- VarVisitor.Walk
- Walk
- WalkBeforeAndAfter
- WalkBodies
- WalkClosures
- WalkExprs
- WalkNodes
- WalkRefs
- WalkRules
- WalkTerms
- WalkVars
- WalkWiths
- With.Copy
- baseDocEqIndex.AllRules
- baseDocEqIndex.Build
- baseDocEqIndex.Lookup
- bodySafetyTransformer.Visit
- comprehensionIndexNestedCandidateVisitor.Walk
- comprehensionIndexRegressionCheckVisitor.Walk
- metadataParser.Parse
- object.Copy
- object.Diff
- object.Filter
- object.Foreach
- object.Intersect
- object.Iter
- object.Map
- object.Merge
- object.MergeWith
- object.Until
- queryCompiler.Compile
- refChecker.Visit
- refindices.Sorted
- refindices.Update
- rewriteNestedHeadVarLocalTransform.Visit
- ruleArgLocalRewriter.Visit
- ruleWalker.Do
- set.Copy
- set.Diff
- set.Foreach
- set.Intersect
- set.Iter
- set.Map
- set.Reduce
- set.Union
- set.Until
- trieNode.Do
- trieNode.Traverse
- trieTraversalResult.Add
- typeChecker.CheckBody
- typeChecker.CheckTypes
summary: Protection bypass in github.com/open-policy-agent/opa
description: |-
Open Policy Agent (OPA) is an open source, general-purpose policy engine. The
Rego compiler provides a (deprecated) WithUnsafeBuiltins function, which allows
users to provide a set of built-in functions that should be deemed unsafe and
rejected by the compiler if encountered in the policy compilation stage.
A bypass of this protection is possible when using the "with" keyword to mock a
built-in function that isn't taken into account by WithUnsafeBuiltins.
published: 2022-09-13T17:40:16Z
cves:
- CVE-2022-36085
ghsas:
- GHSA-f524-rf33-2jjr
credits:
- anderseknert@
references:
- advisory: https://github.com/open-policy-agent/opa/security/advisories/GHSA-f524-rf33-2jjr
- fix: https://github.com/open-policy-agent/opa/pull/4540
- fix: https://github.com/open-policy-agent/opa/pull/4616
- fix: https://github.com/open-policy-agent/opa/commit/25a597bc3f4985162e7f65f9c36599f4f8f55823
- fix: https://github.com/open-policy-agent/opa/commit/3e8c754ed007b22393cf65e48751ad9f6457fee8
- web: https://github.com/open-policy-agent/opa/releases/tag/v0.43.1
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1713.yaml
|
id: GO-2023-1713
modules:
- module: github.com/sjqzhang/go-fastdfs
versions:
- fixed: 1.4.5-0.20230408141131-61cbff5124c6
vulnerable_at: 1.4.4
packages:
- package: github.com/sjqzhang/go-fastdfs/server
symbols:
- Server.upload
- Server.CrossOrigin
- Server.Download
derived_symbols:
- HttpHandler.ServeHTTP
- Server.ConsumerUpload
- Server.DownloadNormalFileByURI
- Server.Start
- Server.Upload
- Start
summary: Path traversal in github.com/sjqzhang/go-fastdfs
description: |-
An attacker can craft a remote request to upload a file to "/group1/upload" that
uses path traversal to instead write the file contents to an attacker controlled
path on the server.
cves:
- CVE-2023-1800
ghsas:
- GHSA-xq3x-grrj-fj6x
references:
- web: https://github.com/yangyanglo/ForCVE/blob/93a16663cd32a36d37d8a0f0102e1592254d0279/2023-0x05.md
- web: https://vuldb.com/?ctiid.224768
- web: https://vuldb.com/?id.224768
- fix: https://github.com/sjqzhang/go-fastdfs/commit/61cbff5124c61e292994099372b11c06cdb5b80b
- advisory: https://github.com/advisories/GHSA-xq3x-grrj-fj6x
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2616.yaml
|
id: GO-2024-2616
modules:
- module: github.com/IceWhaleTech/CasaOS-UserService
versions:
- fixed: 0.4.7
vulnerable_at: 0.4.6-alpha3
packages:
- package: github.com/IceWhaleTech/CasaOS-UserService/route/v1
symbols:
- GetUserImage
summary: |-
Path traversal and user privilege escalation in
github.com/IceWhaleTech/CasaOS-UserService
description: |-
The UserService API contains a path traversal vulnerability that allows an
attacker to obtain any file on the system, including the user database and
system configuration. This can lead to privilege escalation and compromise of
the system.
cves:
- CVE-2024-24765
ghsas:
- GHSA-h5gf-cmm8-cg7c
credits:
- Cp0204
references:
- advisory: https://github.com/IceWhaleTech/CasaOS-UserService/security/advisories/GHSA-h5gf-cmm8-cg7c
- fix: https://github.com/IceWhaleTech/CasaOS-UserService/commit/3f4558e23c0a9958f9a0e20aabc64aa8fd51840e
- web: https://github.com/IceWhaleTech/CasaOS-UserService/releases/tag/v0.4.7
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0522.yaml
|
id: GO-2022-0522
modules:
- module: std
versions:
- fixed: 1.17.12
- introduced: 1.18.0-0
- fixed: 1.18.4
vulnerable_at: 1.18.3
packages:
- package: path/filepath
symbols:
- Glob
summary: Stack exhaustion on crafted paths in path/filepath
description: |-
Calling Glob on a path which contains a large number of path separators can
cause a panic due to stack exhaustion.
published: 2022-07-20T17:02:29Z
credits:
- Juho Nurminen of Mattermost
references:
- fix: https://go.dev/cl/417066
- fix: https://go.googlesource.com/go/+/ac68c6c683409f98250d34ad282b9e1b0c9095ef
- report: https://go.dev/issue/53416
- web: https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE
cve_metadata:
id: CVE-2022-30632
cwe: 'CWE-674: Uncontrolled Recursion'
description: |-
Uncontrolled recursion in Glob in path/filepath before Go 1.17.12 and Go 1.18.4
allows an attacker to cause a panic due to stack exhaustion via a path
containing a large number of path separators.
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1631.yaml
|
id: GO-2023-1631
modules:
- module: google.golang.org/protobuf
versions:
- introduced: 1.29.0
- fixed: 1.29.1
vulnerable_at: 1.29.0
packages:
- package: google.golang.org/protobuf/encoding/prototext
symbols:
- UnmarshalOptions.unmarshal
derived_symbols:
- Unmarshal
- UnmarshalOptions.Unmarshal
- package: google.golang.org/protobuf/internal/encoding/text
symbols:
- parseNumber
derived_symbols:
- Decoder.Peek
- Decoder.Read
summary: Panic when parsing invalid messages in google.golang.org/protobuf
description: |-
Parsing invalid messages can panic.
Parsing a text-format message which contains a potential number consisting of a
minus sign, one or more characters of whitespace, and no further input will
cause a panic.
ghsas:
- GHSA-hw7c-3rfg-p46j
references:
- fix: https://go.dev/cl/475995
- report: https://github.com/golang/protobuf/issues/1530
cve_metadata:
id: CVE-2023-24535
cwe: 'CWE-125: Out-of-bounds Read'
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0288.yaml
|
id: GO-2022-0288
modules:
- module: std
versions:
- fixed: 1.16.12
- introduced: 1.17.0-0
- fixed: 1.17.5
vulnerable_at: 1.17.4
packages:
- package: net/http
symbols:
- http2serverConn.canonicalHeader
- module: golang.org/x/net
versions:
- fixed: 0.0.0-20211209124913-491a49abca63
vulnerable_at: 0.0.0-20211208012354-db4efeb81f4b
packages:
- package: golang.org/x/net/http2
symbols:
- serverConn.canonicalHeader
derived_symbols:
- Server.ServeConn
summary: Unbounded memory growth in net/http and golang.org/x/net/http2
description: |-
An attacker can cause unbounded memory growth in servers accepting HTTP/2
requests.
published: 2022-07-15T23:08:33Z
cves:
- CVE-2021-44716
ghsas:
- GHSA-vc3p-29h2-gpcp
credits:
- murakmii
references:
- fix: https://go.dev/cl/369794
- report: https://go.dev/issue/50058
- web: https://groups.google.com/g/golang-announce/c/hcmEScgc00k
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0536.yaml
|
id: GO-2022-0536
modules:
- module: std
versions:
- fixed: 1.11.13
- introduced: 1.12.0-0
- fixed: 1.12.8
vulnerable_at: 1.12.7
packages:
- package: net/http
symbols:
- http2serverConn.serve
- http2serverConn.writeFrame
- http2serverConn.scheduleFrameWrite
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
- module: golang.org/x/net
versions:
- fixed: 0.0.0-20190813141303-74dc4d7220e7
vulnerable_at: 0.0.0-20190607181551-461777fb6f67
packages:
- package: golang.org/x/net/http2
symbols:
- serverConn.serve
- serverConn.writeFrame
- serverConn.scheduleFrameWrite
derived_symbols:
- Server.ServeConn
summary: Reset flood in net/http and golang.org/x/net/http
description: |-
Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading
to a denial of service.
Servers that accept direct connections from untrusted clients could be remotely
made to allocate an unlimited amount of memory, until the program crashes. The
attacker opens a number of streams and sends an invalid request over each stream
that should solicit a stream of RST_STREAM frames from the peer. Depending on
how the peer queues the RST_STREAM frames, this can consume excess memory, CPU,
or both.
published: 2022-08-01T22:20:53Z
cves:
- CVE-2019-9512
- CVE-2019-9514
ghsas:
- GHSA-39qc-96h7-956f
- GHSA-hgr8-6h9x-f7q9
credits:
- Jonathan Looney of Netflix
references:
- fix: https://go.dev/cl/190137
- fix: https://go.googlesource.com/go/+/145e193131eb486077b66009beb051aba07c52a5
- report: https://go.dev/issue/33606
- web: https://groups.google.com/g/golang-announce/c/65QixT3tcmg/m/DrFiG6vvCwAJ
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2777.yaml
|
id: GO-2024-2777
modules:
- module: github.com/IBAX-io/go-ibax
versions:
- fixed: 1.4.2
vulnerable_at: 1.4.0
summary: IBAX go-ibax vulnerable to SQL injection in github.com/IBAX-io/go-ibax
cves:
- CVE-2022-3798
ghsas:
- GHSA-mgqh-3qm7-gx82
references:
- advisory: https://github.com/advisories/GHSA-mgqh-3qm7-gx82
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2022-3798
- fix: https://github.com/IBAX-io/go-ibax/commit/b0183d8e550836dc50282ee74ff421ee41b25a37
- report: https://github.com/IBAX-io/go-ibax/issues/2060
- web: https://vuldb.com/?id.212634
source:
id: GHSA-mgqh-3qm7-gx82
created: 2024-06-04T17:59:19.195022-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2732.yaml
|
id: GO-2024-2732
modules:
- module: github.com/evmos/evmos
vulnerable_at: 1.1.3
- module: github.com/evmos/evmos/v2
vulnerable_at: 2.0.2
- module: github.com/evmos/evmos/v3
vulnerable_at: 3.0.3
- module: github.com/evmos/evmos/v4
vulnerable_at: 4.0.2
- module: github.com/evmos/evmos/v5
vulnerable_at: 5.0.1
- module: github.com/evmos/evmos/v6
vulnerable_at: 6.0.4
- module: github.com/evmos/evmos/v7
vulnerable_at: 7.0.0
- module: github.com/evmos/evmos/v8
vulnerable_at: 8.2.3
- module: github.com/evmos/evmos/v9
vulnerable_at: 9.1.0
- module: github.com/evmos/evmos/v10
vulnerable_at: 10.0.1
- module: github.com/evmos/evmos/v11
vulnerable_at: 11.0.2
- module: github.com/evmos/evmos/v12
versions:
- fixed: 12.0.0
vulnerable_at: 12.0.0-rc4
summary: Evmos vulnerable to DOS and transaction fee expropriation through Authz exploit in github.com/evmos/evmos
ghsas:
- GHSA-v6rw-hhgg-wc4x
references:
- advisory: https://github.com/evmos/evmos/security/advisories/GHSA-v6rw-hhgg-wc4x
source:
id: GHSA-v6rw-hhgg-wc4x
created: 2024-06-26T16:27:46.463645-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2826.yaml
|
id: GO-2024-2826
modules:
- module: vitess.io/vitess
versions:
- fixed: 0.17.7
- introduced: 0.18.0
- fixed: 0.18.5
- introduced: 0.19.0
- fixed: 0.19.4
non_go_versions:
- fixed: 17.0.7
- introduced: 18.0.0
- fixed: 18.0.5
- introduced: 19.0.0
- fixed: 19.0.4
vulnerable_at: 0.19.0
packages:
- package: vitess.io/vitess/go/mysql/collations/charset
symbols:
- convertSlow
- Validate
derived_symbols:
- Convert
- ConvertFromBinary
- ConvertFromUTF8
- package: vitess.io/vitess/go/mysql/collations/charset/unicode
symbols:
- Charset_utf16be.EncodeRune
- Charset_utf16be.DecodeRune
- Charset_ucs2.DecodeRune
- Charset_utf32.EncodeRune
- package: vitess.io/vitess/go/vt/vtgate/evalengine
symbols:
- assembler.Fn_REGEXP_REPLACE_slow
- IntroducerExpr.eval
- astCompiler.translateIntroducerExpr
derived_symbols:
- Add
- AggregateEvalTypes
- CoerceTo
- CoerceTypes
- Column.Format
- Column.FormatFast
- Comparison.ApplyTinyWeights
- Comparison.Compare
- Comparison.Less
- Comparison.More
- Comparison.Sort
- Comparison.SortResult
- CompiledExpr.Format
- CompiledExpr.FormatFast
- Divide
- EvalResult.MustBoolean
- EvalResult.String
- EvalResult.ToBoolean
- EvalResult.ToBooleanStrict
- EvalResult.TupleValues
- EvalResult.Value
- ExpressionEnv.Evaluate
- ExpressionEnv.EvaluateVM
- FieldResolver.Column
- Literal.Format
- Literal.FormatFast
- Merger.Init
- Merger.Pop
- Merger.Push
- Multiply
- NewLiteralBinaryFromBit
- NewLiteralDateFromBytes
- NewLiteralDatetimeFromBytes
- NewLiteralDecimalFromBytes
- NewLiteralFloatFromBytes
- NewLiteralIntegralFromBytes
- NewLiteralTimeFromBytes
- NullSafeAdd
- NullsafeCompare
- NullsafeHashcode
- NullsafeHashcode128
- OrderByParams.Compare
- OrderByParams.String
- Sorter.Push
- Sorter.Sorted
- Subtract
- Translate
- TupleBindVariable.Format
- TupleBindVariable.FormatFast
- TupleExpr.Format
- TupleExpr.FormatFast
- UnsupportedCollationError.Error
- UntypedExpr.Compile
- UntypedExpr.Format
- UntypedExpr.FormatFast
- WeightString
- aggregationDecimal.Add
- aggregationDecimal.Max
- aggregationDecimal.Min
- aggregationFloat.Add
- aggregationFloat.Max
- aggregationFloat.Min
- aggregationInt.Add
- aggregationInt.Max
- aggregationInt.Min
- aggregationMinMax.Max
- aggregationMinMax.Min
- aggregationSumAny.Add
- aggregationSumCount.Add
- aggregationUint.Add
- aggregationUint.Max
- aggregationUint.Min
- argError.Error
- assembler.Fn_JSON_KEYS
- assembler.PushLiteral
- errJSONType.Error
- evalBytes.Hash
summary: |-
Denial of service attack by triggering unbounded memory usage in
vitess.io/vitess
description: |-
When executing a query, the vtgate will go into an endless
loop that also keeps consuming memory and eventually will OOM.
This causes a denial of service.
cves:
- CVE-2024-32886
ghsas:
- GHSA-649x-hxfx-57j2
credits:
- '@dbussink, @mattrobenolt, and @vmg'
references:
- advisory: https://github.com/vitessio/vitess/security/advisories/GHSA-649x-hxfx-57j2
- fix: https://github.com/vitessio/vitess/commit/2fd5ba1dbf6e9b32fdfdaf869d130066b1b5c0df
- fix: https://github.com/vitessio/vitess/commit/9df4b66550e46b5d7079e21ed0e1b0f49f92b055
- fix: https://github.com/vitessio/vitess/commit/c46dc5b6a4329a10589ca928392218d96031ac8d
- fix: https://github.com/vitessio/vitess/commit/d438adf7e34a6cf00fe441db80842ec669a99202
- web: https://github.com/vitessio/vitess/blob/8f6cfaaa643a08dc111395a75a2d250ee746cfa8/go/mysql/collations/charset/convert.go#L73-L79
- web: https://github.com/vitessio/vitess/blob/8f6cfaaa643a08dc111395a75a2d250ee746cfa8/go/mysql/collations/charset/unicode/utf16.go#L69-L71
source:
id: GHSA-649x-hxfx-57j2
created: 2024-05-10T11:07:07.249403-07:00
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1842.yaml
|
id: GO-2023-1842
modules:
- module: cmd
versions:
- fixed: 1.19.10
- introduced: 1.20.0-0
- fixed: 1.20.5
vulnerable_at: 1.20.4
packages:
- package: cmd/go
- package: cmd/cgo
summary: |-
Improper sanitization of LDFLAGS with embedded spaces in go command with cgo in
cmd/go
description: |-
The go command may execute arbitrary code at build time when using cgo. This may
occur when running "go get" on a malicious module, or when running any other
command which builds untrusted code. This is can by triggered by linker flags,
specified via a "#cgo LDFLAGS" directive.
Flags containing embedded spaces are mishandled, allowing disallowed flags to be
smuggled through the LDFLAGS sanitization by including them in the argument of
another flag. This only affects usage of the gccgo compiler.
credits:
- Juho Nurminen of Mattermost
references:
- report: https://go.dev/issue/60306
- fix: https://go.dev/cl/501224
- web: https://groups.google.com/g/golang-announce/c/q5135a9d924/m/j0ZoAJOHAwAJ
cve_metadata:
id: CVE-2023-29405
cwe: 'CWE-88: Improper Neutralization of Argument Delimiters in a Command (''Argument Injection'')'
references:
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XBS3IIK6ADV24C5ULQU55QLT2UE762ZX/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NZ2O6YCO2IZMZJELQGZYR2WAUNEDLYV6/
- https://security.gentoo.org/glsa/202311-09
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0322.yaml
|
id: GO-2022-0322
modules:
- module: github.com/prometheus/client_golang
versions:
- fixed: 1.11.1
vulnerable_at: 1.11.0
packages:
- package: github.com/prometheus/client_golang/prometheus/promhttp
symbols:
- sanitizeMethod
derived_symbols:
- Handler
- HandlerFor
- InstrumentHandlerCounter
- InstrumentHandlerDuration
- InstrumentHandlerRequestSize
- InstrumentHandlerResponseSize
- InstrumentHandlerTimeToWriteHeader
- InstrumentMetricHandler
- InstrumentRoundTripperCounter
- InstrumentRoundTripperDuration
- flusherDelegator.Flush
- readerFromDelegator.ReadFrom
- responseWriterDelegator.Write
- responseWriterDelegator.WriteHeader
summary: Uncontrolled resource consumption in github.com/prometheus/client_golang
description: |-
The Prometheus client_golang HTTP server is vulnerable to a denial of service
attack when handling requests with non-standard HTTP methods.
In order to be affected, an instrumented software must use any of the
promhttp.InstrumentHandler* middleware except RequestsInFlight; not filter any
specific methods (e.g GET) before middleware; pass a metric with a "method"
label name to a middleware; and not have any firewall/LB/proxy that filters away
requests with unknown "method".
published: 2022-07-15T23:29:02Z
cves:
- CVE-2022-21698
ghsas:
- GHSA-cg3q-j54f-5p7p
related:
- CVE-2023-25151
- CVE-2023-45142
- GHSA-5r5m-65gx-7vrh
- GHSA-rcjv-mgp8-qvmr
references:
- fix: https://github.com/prometheus/client_golang/pull/962
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2557.yaml
|
id: GO-2024-2557
modules:
- module: github.com/greenpau/caddy-security
unsupported_versions:
- last_affected: 1.1.23
vulnerable_at: 1.1.29
summary: Insufficient Session Expiration in github.com/greenpau/caddy-security
cves:
- CVE-2024-21492
ghsas:
- GHSA-vp66-gf7w-9m4x
references:
- advisory: https://github.com/advisories/GHSA-vp66-gf7w-9m4x
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-21492
- report: https://github.com/greenpau/caddy-security/issues/272
- web: https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy
- web: https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-5920787
source:
id: GHSA-vp66-gf7w-9m4x
created: 2024-06-14T11:41:43.266028-04:00
review_status: UNREVIEWED
unexcluded: EFFECTIVELY_PRIVATE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2856.yaml
|
id: GO-2024-2856
modules:
- module: github.com/grafana/grafana
non_go_versions:
- introduced: 9.2.0
- fixed: 9.2.4
vulnerable_at: 5.4.5+incompatible
summary: Grafana Race condition allowing privilege escalation in github.com/grafana/grafana
cves:
- CVE-2022-39328
ghsas:
- GHSA-vqc4-mpj8-jxch
unknown_aliases:
- BIT-grafana-2022-39328
references:
- advisory: https://github.com/grafana/grafana/security/advisories/GHSA-vqc4-mpj8-jxch
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2022-39328
- web: https://security.netapp.com/advisory/ntap-20221215-0003
source:
id: GHSA-vqc4-mpj8-jxch
created: 2024-06-04T14:27:03.429541-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2479.yaml
|
id: GO-2024-2479
modules:
- module: goauthentik.io
non_go_versions:
- fixed: 2023.8.7
- introduced: 2023.10.0
- fixed: 2023.10.7
vulnerable_at: 0.0.0-20240614153308-6e98c9a6a9f4
summary: Authentik vulnerable to PKCE downgrade attack in goauthentik.io
cves:
- CVE-2024-23647
ghsas:
- GHSA-mrx3-gxjx-hjqj
references:
- advisory: https://github.com/goauthentik/authentik/security/advisories/GHSA-mrx3-gxjx-hjqj
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-23647
- web: https://github.com/goauthentik/authentik/commit/38e04ae12720e5d81b4f7ac77997eb8d1275d31a
source:
id: GHSA-mrx3-gxjx-hjqj
created: 2024-06-14T11:36:48.687986-04:00
review_status: UNREVIEWED
unexcluded: EFFECTIVELY_PRIVATE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2571.yaml
|
id: GO-2024-2571
modules:
- module: github.com/cosmos/cosmos-sdk
versions:
- fixed: 0.47.9
- introduced: 0.50.0
- fixed: 0.50.4
vulnerable_at: 0.50.3
packages:
- package: github.com/cosmos/cosmos-sdk/baseapp
symbols:
- NewDefaultProposalHandler
- DefaultProposalHandler.PrepareProposalHandler
derived_symbols:
- NewBaseApp
summary: Invalid block proposal in github.com/cosmos/cosmos-sdk
ghsas:
- GHSA-2557-x9mg-76w8
credits:
- '@gitferry, @SebastianElvis, and @vitsalis'
references:
- advisory: https://github.com/advisories/GHSA-2557-x9mg-76w8
- fix: https://github.com/cosmos/cosmos-sdk/commit/fe32bcc1d65412c9b5737672956f0638c729ab7d
- web: https://github.com/cosmos/cosmos-sdk/releases/tag/v0.47.9
- web: https://github.com/cosmos/cosmos-sdk/releases/tag/v0.50.4
source:
id: GHSA-2557-x9mg-76w8
created: 2024-05-20T20:16:52.629560977Z
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2509.yaml
|
id: GO-2024-2509
modules:
- module: github.com/hashicorp/vault
versions:
- introduced: 1.6.0
- fixed: 1.6.2
vulnerable_at: 1.6.1
summary: Improper Authentication in HashiCorp Vault in github.com/hashicorp/vault
cves:
- CVE-2021-3282
ghsas:
- GHSA-rq95-xf66-j689
unknown_aliases:
- BIT-vault-2021-3282
references:
- advisory: https://github.com/advisories/GHSA-rq95-xf66-j689
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2021-3282
- fix: https://github.com/hashicorp/vault/commit/09f9068e22f762da123160233518b440e00bdb3b
- web: https://discuss.hashicorp.com/t/hcsec-2021-04-vault-enterprise-s-dr-secondaries-allowed-raft-peer-removal-without-authentication/20337
- web: https://security.gentoo.org/glsa/202207-01
source:
id: GHSA-rq95-xf66-j689
created: 2024-06-14T11:38:45.419225-04:00
review_status: UNREVIEWED
unexcluded: EFFECTIVELY_PRIVATE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1269.yaml
|
id: GO-2023-1269
modules:
- module: github.com/ipld/go-ipld-prime
versions:
- fixed: 0.19.0
vulnerable_at: 0.18.0
packages:
- package: github.com/ipld/go-ipld-prime/codec/dagjson
symbols:
- Marshal
derived_symbols:
- Encode
- EncodeOptions.Encode
summary: Panic in encoding in github.com/ipld/go-ipld-prime
description: |-
Encoding data using the 'json' codec which contains a 'Bytes' type Node will
cause the encoder to panic. The decoder is not impacted. If the codec is used to
encode user supplied data, this may be used as a vector for a denial of service
attack.
cves:
- CVE-2023-22460
ghsas:
- GHSA-c653-6hhg-9x92
credits:
- '@hacdias'
references:
- advisory: https://github.com/ipld/go-ipld-prime/security/advisories/GHSA-c653-6hhg-9x92
- fix: https://github.com/ipld/go-ipld-prime/pull/472
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0587.yaml
|
id: GO-2022-0587
modules:
- module: github.com/open-policy-agent/opa
versions:
- fixed: 0.40.0
vulnerable_at: 0.39.0
packages:
- package: github.com/open-policy-agent/opa/ast
symbols:
- Parser.parseSome
- Parser.parseEvery
derived_symbols:
- CompileModules
- CompileModulesWithOpt
- MustCompileModules
- MustCompileModulesWithOpts
- MustParseBody
- MustParseBodyWithOpts
- MustParseExpr
- MustParseImports
- MustParseModule
- MustParseModuleWithOpts
- MustParsePackage
- MustParseRef
- MustParseRule
- MustParseStatement
- MustParseStatements
- MustParseTerm
- ParseBody
- ParseBodyWithOpts
- ParseExpr
- ParseImports
- ParseModule
- ParseModuleWithOpts
- ParsePackage
- ParseRef
- ParseRule
- ParseStatement
- ParseStatements
- ParseStatementsWithOpts
- ParseTerm
- Parser.Parse
- metadataParser.Parse
summary: Out of bounds memory access in github.com/open-policy-agent/opa
description: |-
An issue in ast.Parser in Open Policy Agent causes the application to
incorrectly interpret expressions, allowing a Denial of Service (DoS) via
triggering out-of-range memory access.
published: 2022-05-20T00:00:26Z
cves:
- CVE-2022-28946
ghsas:
- GHSA-x7f3-62pm-9p38
credits:
- Norbert Szetei of Doyensec
references:
- fix: https://github.com/open-policy-agent/opa/pull/4548
- fix: https://github.com/open-policy-agent/opa/commit/e9d3828db670cbe11129885f37f08cbf04935264
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2615.yaml
|
id: GO-2024-2615
modules:
- module: github.com/IceWhaleTech/CasaOS-UserService
versions:
- introduced: 0.4.4-3-alpha1
- fixed: 0.4.7
vulnerable_at: 0.4.6-alpha3
packages:
- package: github.com/IceWhaleTech/CasaOS-UserService/route/v1
symbols:
- PutUserInfo
- PostUserLogin
summary: Username enumeration in github.com/IceWhaleTech/CasaOS-UserService
description: |-
CasaOS-UserService is vulnerable to a username enumeration issue, when an
attacker can enumerate the CasaOS username using the application response. If
the username is incorrect, the application gives the error 'User does not
exist'. If the password is incorrect, the application gives the error 'Invalid
password'.
cves:
- CVE-2024-24766
ghsas:
- GHSA-c967-2652-gfjm
credits:
- DrDark1999
references:
- advisory: https://github.com/IceWhaleTech/CasaOS-UserService/security/advisories/GHSA-c967-2652-gfjm
- fix: https://github.com/IceWhaleTech/CasaOS-UserService/commit/c75063d7ca5800948e9c09c0a6efe9809b5d39f7
- web: https://github.com/IceWhaleTech/CasaOS-UserService/releases/tag/v0.4.7
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0235.yaml
|
id: GO-2021-0235
modules:
- module: std
versions:
- fixed: 1.14.14
- introduced: 1.15.0-0
- fixed: 1.15.7
vulnerable_at: 1.15.6
packages:
- package: crypto/elliptic
symbols:
- p224Contract
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
summary: Incorrect operations on the P-224 curve in crypto/elliptic
description: |-
The P224() Curve implementation can in rare circumstances generate incorrect
outputs, including returning invalid points from ScalarMult.
published: 2022-02-17T17:34:14Z
cves:
- CVE-2021-3114
credits:
- The elliptic-curve-differential-fuzzer project running on OSS-Fuzz
- Philippe Antoine (Catena cyber)
references:
- fix: https://go.dev/cl/284779
- fix: https://go.googlesource.com/go/+/d95ca9138026cbe40e0857d76a81a16d03230871
- report: https://go.dev/issue/43786
- web: https://groups.google.com/g/golang-announce/c/mperVMGa98w
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2162.yaml
|
id: GO-2023-2162
modules:
- module: github.com/flyteorg/flyteadmin
versions:
- fixed: 1.1.124
vulnerable_at: 1.1.123
packages:
- package: github.com/flyteorg/flyteadmin/pkg/common
symbols:
- NewSortParameter
summary: SQL Injection in List Endpoints in github.com/flyteorg/flyteadmin
description: |-
A malicious user can send a REST request to a List endpoint with filters that
contain custom SQL statements. This can result in SQL injection.
cves:
- CVE-2023-41891
ghsas:
- GHSA-r847-6w6h-r8g4
credits:
- '@Sanjana-Sarda'
references:
- fix: https://github.com/flyteorg/flyteadmin/commit/b3177ef70f068e908140b8a4a9913dfa74f289fd
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2612.yaml
|
id: GO-2024-2612
modules:
- module: github.com/gvalkov/tailon
unsupported_versions:
- cve_version_range: 'affected at 4.50 (default: unaffected)'
vulnerable_at: 1.1.0
summary: Artica Proxy Loopback Services Remotely Accessible Unauthenticated in github.com/gvalkov/tailon
cves:
- CVE-2024-2056
credits:
- Jim Becher of KoreLogic, Inc.
- Jaggar Henry of KoreLogic, Inc.
references:
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-2056
- web: http://seclists.org/fulldisclosure/2024/Mar/14
- web: https://github.com/gvalkov/tailon#security
- web: https://korelogic.com/Resources/Advisories/KL-001-2024-004.txt
source:
id: CVE-2024-2056
created: 2024-06-06T16:15:26.949858-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2937.yaml
|
id: GO-2024-2937
modules:
- module: golang.org/x/image
versions:
- fixed: 0.18.0
vulnerable_at: 0.17.0
packages:
- package: golang.org/x/image/tiff
symbols:
- decoder.decode
derived_symbols:
- Decode
summary: Panic when parsing invalid palette-color images in golang.org/x/image
description: |-
Parsing a corrupt or malicious image with invalid color indices can cause a
panic.
ghsas:
- GHSA-9phm-fm57-rhg8
related:
- CVE-2023-36308
credits:
- John Wright <jsw@google.com>
references:
- fix: https://go.dev/cl/588115
- report: https://go.dev/issue/67624
cve_metadata:
id: CVE-2024-24792
cwe: 'CWE-125: Out-of-bounds Read'
source:
id: go-security-team
created: 2024-06-18T13:47:44.577511-07:00
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2819.yaml
|
id: GO-2024-2819
modules:
- module: github.com/ethereum/go-ethereum
versions:
- fixed: 1.13.15
vulnerable_at: 1.13.14
summary: Denial of Service in github.com/ethereum/go-ethereum
description: |-
A vulnerable node can be made to consume very large amounts of memory when
handling specially crafted p2p messages sent from an attacker node. This can
result in a denial of service as the node runs out of memory.
cves:
- CVE-2024-32972
ghsas:
- GHSA-4xc9-8hmq-j652
credits:
- DongHan Kim
references:
- advisory: https://github.com/advisories/GHSA-4xc9-8hmq-j652
source:
id: GHSA-4xc9-8hmq-j652
created: 2024-05-08T13:36:16.906049-07:00
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0028.yaml
|
id: GO-2020-0028
modules:
- module: github.com/miekg/dns
versions:
- fixed: 1.0.10
vulnerable_at: 1.0.9
packages:
- package: github.com/miekg/dns
symbols:
- setTA
derived_symbols:
- NewRR
- ParseZone
- ReadRR
summary: Denial of service via malformed zone file in github.com/miekg/dns
description: |-
Due to a nil pointer dereference, parsing a malformed zone file containing TA
records may cause a panic. If parsing user supplied input, this may be used as a
denial of service vector.
published: 2021-04-14T20:04:52Z
cves:
- CVE-2018-17419
ghsas:
- GHSA-9jcx-pr2f-qvq5
credits:
- '@tr3ee'
references:
- fix: https://github.com/miekg/dns/commit/501e858f679edecd4a38a86317ce50271014a80d
- report: https://github.com/miekg/dns/issues/742
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0178.yaml
|
id: GO-2021-0178
modules:
- module: std
versions:
- introduced: 1.1.0-0
- fixed: 1.8.4
- introduced: 1.9.0-0
- fixed: 1.9.1
vulnerable_at: 1.9.0
packages:
- package: net/smtp
symbols:
- plainAuth.Start
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
summary: Cleartext transmission of credentials in net/smtp
description: |-
SMTP clients using net/smtp can use the PLAIN authentication scheme on network
connections not secured with TLS, exposing passwords to man-in-the-middle SMTP
servers.
published: 2022-01-07T20:35:00Z
cves:
- CVE-2017-15042
credits:
- Stevie Johnstone
references:
- fix: https://go.dev/cl/68170
- fix: https://go.googlesource.com/go/+/ec3b6131de8f9c9c25283260c95c616c74f6d790
- report: https://go.dev/issue/22134
- web: https://groups.google.com/g/golang-dev/c/RinSE3EiJBI/m/kYL7zb07AgAJ
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2638.yaml
|
id: GO-2024-2638
modules:
- module: github.com/cosmos/cosmos-sdk
versions:
- introduced: 0.50.0
- fixed: 0.50.5
vulnerable_at: 0.50.4
packages:
- package: github.com/cosmos/cosmos-sdk/baseapp
symbols:
- ValidateVoteExtensions
summary: |-
ValidateVoteExtensions function in Cosmos SDK may allow incorrect voting
power assumptions in github.com/cosmos/cosmos-sdk
description: |-
The default ValidateVoteExtensions helper function infers total voting power
based on the injected VoteExtension, which are injected by the proposer.
If your chain utilizes the ValidateVoteExtensions helper in ProcessProposal, a
dishonest proposer can potentially mutate voting power of each validator it
includes in the injected VoteExtension, which could have potentially unexpected
or negative consequences on modified state. Additional validation on injected
VoteExtension data was added to confirm voting power against the state machine.
ghsas:
- GHSA-95rx-m9m5-m94v
references:
- advisory: https://github.com/cosmos/cosmos-sdk/security/advisories/GHSA-95rx-m9m5-m94v
- fix: https://github.com/cosmos/cosmos-sdk/commit/4467110df40797ebe916c23ebfd45c9ee7583897
- web: https://github.com/cosmos/cosmos-sdk/releases/tag/v0.50.5
source:
id: GHSA-95rx-m9m5-m94v
created: 2024-05-10T15:59:33.780326-04:00
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2559.yaml
|
id: GO-2024-2559
modules:
- module: github.com/greenpau/caddy-security
unsupported_versions:
- last_affected: 1.1.23
vulnerable_at: 1.1.29
summary: Cross-site Scripting in github.com/greenpau/caddy-security
cves:
- CVE-2024-21496
ghsas:
- GHSA-ff72-ff42-c3gw
references:
- advisory: https://github.com/advisories/GHSA-ff72-ff42-c3gw
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-21496
- report: https://github.com/greenpau/caddy-security/issues/267
- web: https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy
- web: https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-6249860
source:
id: GHSA-ff72-ff42-c3gw
created: 2024-06-14T11:41:53.201238-04:00
review_status: UNREVIEWED
unexcluded: EFFECTIVELY_PRIVATE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2478.yaml
|
id: GO-2024-2478
modules:
- module: blitiri.com.ar/go/chasquid
versions:
- fixed: 1.13.0
vulnerable_at: 1.11.1
summary: |-
chasquid HTTP Request/Response Smuggling vulnerability in
github.com/albertito/chasquid in blitiri.com.ar/go/chasquid
cves:
- CVE-2023-52354
ghsas:
- GHSA-g4x3-mfpj-f335
references:
- advisory: https://github.com/advisories/GHSA-g4x3-mfpj-f335
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2023-52354
- fix: https://github.com/albertito/chasquid/commit/a996106eeebe81a292ecba838c7503cac7493e74
- report: https://github.com/albertito/chasquid/issues/47
- web: https://blitiri.com.ar/p/chasquid/relnotes/#113-2023-12-24
source:
id: GHSA-g4x3-mfpj-f335
created: 2024-06-26T16:14:26.250749-04:00
review_status: UNREVIEWED
unexcluded: EFFECTIVELY_PRIVATE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0027.yaml
|
id: GO-2020-0027
modules:
- module: github.com/google/fscrypt
versions:
- fixed: 0.2.4
vulnerable_at: 0.2.4-0.20180823175935-d4d88e16b54e
packages:
- package: github.com/google/fscrypt/pam
symbols:
- NewHandle
- Handle.StopAsPamUser
- Handle.StartAsPamUser
- package: github.com/google/fscrypt/security
symbols:
- SetProcessPrivileges
- setUids
- setGids
- setGroups
derived_symbols:
- FindKey
- InsertKey
- RemoveKey
- UserKeyringID
summary: Privilege escalation in github.com/google/fscrypt
description: |-
After dropping and then elevating process privileges euid, guid, and groups are
not properly restored to their original values, allowing an unprivileged user to
gain membership in the root group.
published: 2021-04-14T20:04:52Z
cves:
- CVE-2018-6558
ghsas:
- GHSA-qj26-7grj-whg3
references:
- fix: https://github.com/google/fscrypt/commit/3022c1603d968c22f147b4a2c49c4637dd1be91b
- web: https://github.com/google/fscrypt/issues/77
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0015.yaml
|
id: GO-2020-0015
modules:
- module: golang.org/x/text
versions:
- fixed: 0.3.3
vulnerable_at: 0.3.2
packages:
- package: golang.org/x/text/encoding/unicode
symbols:
- utf16Decoder.Transform
derived_symbols:
- bomOverride.Transform
- package: golang.org/x/text/transform
symbols:
- String
summary: Infinite loop when decoding some inputs in golang.org/x/text
description: |-
An attacker could provide a single byte to a UTF16 decoder instantiated with
UseBOM or ExpectBOM to trigger an infinite loop if the String function on the
Decoder is called, or the Decoder is passed to transform.String. If used to
parse user supplied input, this may be used as a denial of service vector.
published: 2021-04-14T20:04:52Z
cves:
- CVE-2020-14040
ghsas:
- GHSA-5rcv-m4m3-hfh7
credits:
- '@abacabadabacaba'
- Anton Gyllenberg
references:
- fix: https://go.dev/cl/238238
- fix: https://go.googlesource.com/text/+/23ae387dee1f90d29a23c0e87ee0b46038fbed0e
- report: https://go.dev/issue/39491
- web: https://groups.google.com/g/golang-announce/c/bXVeAmGOqz0
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2637.yaml
|
id: GO-2024-2637
modules:
- module: github.com/zitadel/zitadel
non_go_versions:
- fixed: 2.44.3
- introduced: 2.45.0
- fixed: 2.45.1
vulnerable_at: 1.87.5
summary: Account Takeover via Session Fixation in Zitadel [Bypassing MFA] in github.com/zitadel/zitadel
cves:
- CVE-2024-28197
ghsas:
- GHSA-mq4x-r2w3-j7mr
references:
- advisory: https://github.com/zitadel/zitadel/security/advisories/GHSA-mq4x-r2w3-j7mr
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-28197
- fix: https://github.com/zitadel/zitadel/commit/d4c553b75a214e41299af010ef4b26174a0f802c
- fix: https://github.com/zitadel/zitadel/commit/e82cb51eb819c6cdba8123c9c34c5739b46b29eb
source:
id: GHSA-mq4x-r2w3-j7mr
created: 2024-06-04T15:37:28.977324-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2982.yaml
|
id: GO-2024-2982
modules:
- module: github.com/hashicorp/vault
versions:
- introduced: 1.16.0-rc1
- fixed: 1.16.3
- introduced: 1.17.0-rc1
- fixed: 1.17.2
non_go_versions:
- fixed: 1.15.12
vulnerable_at: 1.17.1
summary: |-
Hashicorp Vault vulnerable to Improper Check or Handling of Exceptional
Conditions in github.com/hashicorp/vault
cves:
- CVE-2024-6468
ghsas:
- GHSA-2qmw-pvf7-4mw6
references:
- advisory: https://github.com/advisories/GHSA-2qmw-pvf7-4mw6
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-6468
- web: https://discuss.hashicorp.com/t/hcsec-2024-14-vault-vulnerable-to-denial-of-service-when-setting-a-proxy-protocol-behavior/68518
source:
id: GHSA-2qmw-pvf7-4mw6
created: 2024-07-12T16:33:28.734714977Z
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2727.yaml
|
id: GO-2024-2727
modules:
- module: github.com/edgelesssys/constellation
vulnerable_at: 0.0.0
- module: github.com/edgelesssys/constellation/v2
versions:
- fixed: 2.16.3
vulnerable_at: 2.16.2
summary: Constellation has pods exposed to peers in VPC in github.com/edgelesssys/constellation
ghsas:
- GHSA-g8fc-vrcg-8vjg
references:
- advisory: https://github.com/edgelesssys/constellation/security/advisories/GHSA-g8fc-vrcg-8vjg
- web: https://github.com/cilium/cilium/issues/25626
source:
id: GHSA-g8fc-vrcg-8vjg
created: 2024-06-26T16:27:47.516471-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2413.yaml
|
id: GO-2023-2413
modules:
- module: github.com/elastic/beats/v7
versions:
- fixed: 7.17.16
vulnerable_at: 7.17.15
packages:
- package: github.com/elastic/beats/v7/libbeat/processors/script/javascript
symbols:
- session.runProcessFunc
derived_symbols:
- jsProcessor.Run
summary: Sensitive information logged in github.com/elastic/beats/v7
cves:
- CVE-2023-49922
ghsas:
- GHSA-hj4r-2c9c-29h3
references:
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2023-49922
- fix: https://github.com/elastic/beats/commit/9bd7de84ab9c31bb4e1c0a348a7b7c26817a0996
- web: https://discuss.elastic.co/t/beats-and-elastic-agent-8-11-3-7-17-16-security-update-esa-2023-30/349180
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1861.yaml
|
id: GO-2023-1861
modules:
- module: github.com/cosmos/cosmos-sdk
versions:
- fixed: 0.46.13
- introduced: 0.47.0
- fixed: 0.47.3
vulnerable_at: 0.47.2
packages:
- package: github.com/cosmos/cosmos-sdk/x/auth/vesting/types
symbols:
- MsgCreatePeriodicVestingAccount.ValidateBasic
summary: Cosmos "Barberry" vulnerability in github.com/cosmos/cosmos-sdk
description: The cosmos-sdk module is affected by the vulnerability codenamed "Barberry".
ghsas:
- GHSA-j2cr-jc39-wpx5
- GHSA-w44m-8mv2-v78h
references:
- advisory: https://forum.cosmos.network/t/cosmos-sdk-security-advisory-barberry/10825
- fix: https://github.com/cosmos/cosmos-sdk/pull/16466
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0076.yaml
|
id: GO-2021-0076
modules:
- module: github.com/evanphx/json-patch
versions:
- fixed: 0.5.2
- introduced: 3.0.0+incompatible
- fixed: 3.0.1-0.20180525145409-4c9aadca8f89+incompatible
vulnerable_at: 3.0.1-0.20180510154552-9f095e073247+incompatible
packages:
- package: github.com/evanphx/json-patch
symbols:
- partialArray.add
derived_symbols:
- Patch.Apply
- Patch.ApplyIndent
summary: Out-of-bounds write in github.com/evanphx/json-patch
description: |-
A malicious JSON patch can cause a panic due to an out-of-bounds write attempt.
This can be used as a denial of service vector if exposed to arbitrary user
input.
published: 2021-04-14T20:04:52Z
cves:
- CVE-2018-14632
ghsas:
- GHSA-gxhv-3hwf-wjp9
references:
- fix: https://github.com/evanphx/json-patch/pull/57
- fix: https://github.com/evanphx/json-patch/commit/4c9aadca8f89e349c999f04e28199e96e81aba03
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2793.yaml
|
id: GO-2024-2793
modules:
- module: github.com/mattermost/mattermost-server
versions:
- introduced: 8.1.0+incompatible
- fixed: 8.1.12+incompatible
- introduced: 9.5.0+incompatible
- fixed: 9.5.3+incompatible
vulnerable_at: 9.5.3-rc3+incompatible
summary: Mattermost allows team admins to promote guests to team admins in github.com/mattermost/mattermost-server
cves:
- CVE-2024-4195
ghsas:
- GHSA-5fh7-7mw7-mmx5
references:
- advisory: https://github.com/advisories/GHSA-5fh7-7mw7-mmx5
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-4195
- web: https://github.com/mattermost/mattermost/commit/1e3497e0595bb4f9908c94dd9d4685d48556b7e8
- web: https://github.com/mattermost/mattermost/commit/f0872dd4e4ba34f061aa6982a71c7c29532aac2e
- web: https://mattermost.com/security-updates
source:
id: GHSA-5fh7-7mw7-mmx5
created: 2024-06-04T15:27:22.651742-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2814.yaml
|
id: GO-2024-2814
modules:
- module: github.com/pterodactyl/wings
versions:
- fixed: 1.11.12
vulnerable_at: 1.11.11
summary: Pterodactyl Wings vulnerable to Arbitrary File Write/Read in github.com/pterodactyl/wings
cves:
- CVE-2024-34066
ghsas:
- GHSA-gqmf-jqgv-v8fw
references:
- advisory: https://github.com/pterodactyl/wings/security/advisories/GHSA-gqmf-jqgv-v8fw
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-34066
- fix: https://github.com/pterodactyl/wings/commit/5415f8ae07f533623bd8169836dd7e0b933964de
source:
id: GHSA-gqmf-jqgv-v8fw
created: 2024-05-17T16:09:43.792794-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0245.yaml
|
id: GO-2021-0245
modules:
- module: std
versions:
- fixed: 1.15.15
- introduced: 1.16.0-0
- fixed: 1.16.7
vulnerable_at: 1.16.6
packages:
- package: net/http/httputil
symbols:
- ReverseProxy.ServeHTTP
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
summary: Panic in ReverseProxy in net/http/httputil
description: |-
ReverseProxy can panic after encountering a problem copying a proxied response
body.
published: 2022-02-17T17:32:24Z
cves:
- CVE-2021-36221
credits:
- Andrew Crump
references:
- fix: https://go.dev/cl/333191
- fix: https://go.googlesource.com/go/+/b7a85e0003cedb1b48a1fd3ae5b746ec6330102e
- web: https://groups.google.com/g/golang-announce/c/uHACNfXAZqk
- report: https://go.dev/issue/46866
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2861.yaml
|
id: GO-2024-2861
modules:
- module: sigs.k8s.io/azurefile-csi-driver
versions:
- fixed: 1.29.4
- introduced: 1.30.0
- fixed: 1.30.1
vulnerable_at: 1.30.0
summary: azure-file-csi-driver leaks service account tokens in the logs in sigs.k8s.io/azurefile-csi-driver
cves:
- CVE-2024-3744
ghsas:
- GHSA-qjqg-4wg7-957h
references:
- advisory: https://github.com/advisories/GHSA-qjqg-4wg7-957h
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-3744
- web: http://www.openwall.com/lists/oss-security/2024/05/09/4
- web: https://github.com/kubernetes-sigs/azurefile-csi-driver/commit/a1b7446de942136419f07394efeef804523f87ae
- web: https://github.com/kubernetes-sigs/azurefile-csi-driver/commit/e11ff3dc2c03894cde692213308f9991e7bbd5bf
- web: https://github.com/kubernetes/kubernetes/issues/124759
- web: https://groups.google.com/g/kubernetes-security-announce/c/hcgZE2MQo1A/m/Y4C6q-CYAgAJ
source:
id: GHSA-qjqg-4wg7-957h
created: 2024-06-26T14:07:32.476769-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2508.yaml
|
id: GO-2024-2508
modules:
- module: github.com/hashicorp/vault
versions:
- introduced: 1.5.0
- fixed: 1.5.6
- introduced: 1.6.0
- fixed: 1.6.1
vulnerable_at: 1.6.0
summary: Enumeration of users in HashiCorp Vault in github.com/hashicorp/vault
cves:
- CVE-2020-35177
ghsas:
- GHSA-rpgp-9hmg-j25x
unknown_aliases:
- BIT-vault-2020-35177
references:
- advisory: https://github.com/advisories/GHSA-rpgp-9hmg-j25x
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2020-35177
- fix: https://github.com/hashicorp/vault/pull/10537
- web: https://discuss.hashicorp.com/t/hcsec-2020-25-vault-s-ldap-auth-method-allows-user-enumeration/18984
- web: https://github.com/hashicorp/vault/blob/master/CHANGELOG.md#161
source:
id: GHSA-rpgp-9hmg-j25x
created: 2024-06-14T11:38:39.105424-04:00
review_status: UNREVIEWED
unexcluded: EFFECTIVELY_PRIVATE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2913.yaml
|
id: GO-2024-2913
modules:
- module: github.com/docker/docker
versions:
- fixed: 20.10.9+incompatible
vulnerable_at: 20.10.8+incompatible
packages:
- package: github.com/docker/docker/pkg/chrootarchive
symbols:
- untarHandler
skip_fix: fix error due to incompatible versions
- module: github.com/moby/moby
versions:
- fixed: 20.10.9+incompatible
vulnerable_at: 20.10.8+incompatible
packages:
- package: github.com/moby/moby/pkg/chrootarchive
symbols:
- untarHandler
skip_fix: fix error due to incompatible versions
summary: Unexpected chmod of host files via 'docker cp' in Moby Docker Engine in github.com/docker/docker
cves:
- CVE-2021-41089
ghsas:
- GHSA-v994-f8vw-g7j4
references:
- advisory: https://github.com/moby/moby/security/advisories/GHSA-v994-f8vw-g7j4
- fix: https://github.com/moby/moby/commit/bce32e5c93be4caf1a592582155b9cb837fc129a
source:
id: GHSA-v994-f8vw-g7j4
created: 2024-07-01T14:35:32.733244-04:00
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1705.yaml
|
id: GO-2023-1705
modules:
- module: std
versions:
- fixed: 1.19.8
- introduced: 1.20.0-0
- fixed: 1.20.3
vulnerable_at: 1.20.2
packages:
- package: mime/multipart
symbols:
- Reader.readForm
- mimeHeaderSize
- newPart
- Part.populateHeaders
- Reader.NextPart
- Reader.NextRawPart
- Reader.nextPart
- readMIMEHeader
derived_symbols:
- Reader.ReadForm
- package: net/textproto
symbols:
- readMIMEHeader
derived_symbols:
- Reader.ReadMIMEHeader
summary: Excessive resource consumption in net/http, net/textproto and mime/multipart
description: |-
Multipart form parsing can consume large amounts of CPU and memory when
processing form inputs containing very large numbers of parts.
This stems from several causes:
1. mime/multipart.Reader.ReadForm limits the total memory a parsed multipart
form can consume. ReadForm can undercount the amount of memory consumed, leading
it to accept larger inputs than intended.
2. Limiting total memory does not account for increased pressure on the garbage
collector from large numbers of small allocations in forms with many parts.
3. ReadForm can allocate a large number of short-lived buffers, further
increasing pressure on the garbage collector.
The combination of these factors can permit an attacker to cause an program that
parses multipart forms to consume large amounts of CPU and memory, potentially
resulting in a denial of service. This affects programs that use
mime/multipart.Reader.ReadForm, as well as form parsing in the net/http package
with the Request methods FormFile, FormValue, ParseMultipartForm, and
PostFormValue.
With fix, ReadForm now does a better job of estimating the memory consumption of
parsed forms, and performs many fewer short-lived allocations.
In addition, the fixed mime/multipart.Reader imposes the following limits on the
size of parsed forms:
1. Forms parsed with ReadForm may contain no more than 1000 parts. This limit
may be adjusted with the environment variable GODEBUG=multipartmaxparts=.
2. Form parts parsed with NextPart and NextRawPart may contain no more than
10,000 header fields. In addition, forms parsed with ReadForm may contain no
more than 10,000 header fields across all parts. This limit may be adjusted with
the environment variable GODEBUG=multipartmaxheaders=.
credits:
- Jakob Ackermann (@das7pad)
references:
- report: https://go.dev/issue/59153
- fix: https://go.dev/cl/482076
- fix: https://go.dev/cl/482075
- fix: https://go.dev/cl/482077
- web: https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8
cve_metadata:
id: CVE-2023-24536
cwe: 'CWE-400: Uncontrolled Resource Consumption'
references:
- https://security.netapp.com/advisory/ntap-20230526-0007/
- https://security.gentoo.org/glsa/202311-09
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1859.yaml
|
id: GO-2023-1859
modules:
- module: github.com/lestrrat-go/jwx
versions:
- fixed: 1.2.26
vulnerable_at: 1.2.25
packages:
- package: github.com/lestrrat-go/jwx/jwe/internal/aescbc
symbols:
- unpad
derived_symbols:
- Hmac.Open
- module: github.com/lestrrat-go/jwx/v2
versions:
- fixed: 2.0.11-0.20230614080639-c8b6bec919a1
vulnerable_at: 2.0.10
packages:
- package: github.com/lestrrat-go/jwx/v2/jwe/internal/aescbc
symbols:
- unpad
derived_symbols:
- Hmac.Open
summary: Padding oracle vulnerability in github.com/lestrrat-go/jwx
description: |-
AES-CBC decryption is vulnerable to a timing attack which may permit an attacker
to recover the plaintext of JWE data.
ghsas:
- GHSA-rm8v-mxj3-5rmq
references:
- fix: https://github.com/lestrrat-go/jwx/commit/6c41e3822485fc7e11dd70b4b0524b075d66b103
- fix: https://github.com/lestrrat-go/jwx/commit/d9ddbc8e5009cfdd8c28413390b67afa7f576dd6
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1037.yaml
|
id: GO-2022-1037
modules:
- module: std
versions:
- fixed: 1.18.7
- introduced: 1.19.0-0
- fixed: 1.19.2
vulnerable_at: 1.19.1
packages:
- package: archive/tar
symbols:
- Reader.next
- parsePAX
- Writer.writePAXHeader
derived_symbols:
- Reader.Next
- Writer.WriteHeader
summary: Unbounded memory consumption when reading headers in archive/tar
description: |-
Reader.Read does not set a limit on the maximum size of file headers. A
maliciously crafted archive could cause Read to allocate unbounded amounts of
memory, potentially causing resource exhaustion or panics. After fix,
Reader.Read limits the maximum size of header blocks to 1 MiB.
credits:
- Adam Korczynski (ADA Logics)
- OSS-Fuzz
references:
- report: https://go.dev/issue/54853
- fix: https://go.dev/cl/439355
- web: https://groups.google.com/g/golang-announce/c/xtuG5faxtaU
cve_metadata:
id: CVE-2022-2879
cwe: 'CWE 400: Uncontrolled Resource Consumption'
references:
- https://security.gentoo.org/glsa/202311-09
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2800.yaml
|
id: GO-2024-2800
modules:
- module: github.com/hashicorp/go-getter
versions:
- introduced: 1.5.9
- fixed: 1.7.4
vulnerable_at: 1.7.3
packages:
- package: github.com/hashicorp/go-getter
symbols:
- GitGetter.clone
- findRemoteDefaultBranch
derived_symbols:
- Client.ChecksumFromFile
- Client.Get
- FolderStorage.Get
- Get
- GetAny
- GetFile
- GitGetter.Get
- GitGetter.GetFile
- HttpGetter.Get
summary: Argument injection when fetching remote default Git branches in github.com/hashicorp/go-getter
description: |-
When go-getter is performing a Git operation, go-getter will try to clone the
given repository. If a Git reference is not passed along with the Git url,
go-getter will then try to check the remote repository's HEAD reference of its
default branch by passing arguments to the Git binary on the host it is
executing on.
An attacker may format a Git URL in order to inject additional Git arguments to
the Git call.
cves:
- CVE-2024-3817
ghsas:
- GHSA-q64h-39hv-4cf7
references:
- advisory: https://github.com/advisories/GHSA-q64h-39hv-4cf7
- fix: https://github.com/hashicorp/go-getter/commit/268c11cae8cf0d9374783e06572679796abe9ce9
- web: https://discuss.hashicorp.com/t/hcsec-2024-09-hashicorp-go-getter-vulnerable-to-argument-injection-when-fetching-remote-default-git-branches/66040
source:
id: GHSA-q64h-39hv-4cf7
created: 2024-05-10T15:59:32.195034-04:00
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0211.yaml
|
id: GO-2022-0211
modules:
- module: std
versions:
- fixed: 1.11.13
- introduced: 1.12.0-0
- fixed: 1.12.8
vulnerable_at: 1.12.7
packages:
- package: net/url
symbols:
- parseHost
- URL.Hostname
- URL.Port
summary: Incorrect parsing validation in net/url
description: |-
The url.Parse function accepts URLs with malformed hosts, such that the Host
field can have arbitrary suffixes that appear in neither Hostname() nor Port(),
allowing authorization bypasses in certain applications.
published: 2022-07-01T20:15:30Z
cves:
- CVE-2019-14809
credits:
- Julian Hector
- Nikolai Krein from Cure53
- Adi Cohen (adico.me)
references:
- fix: https://go.dev/cl/189258
- fix: https://go.googlesource.com/go/+/61bb56ad63992a3199acc55b2537c8355ef887b6
- report: https://go.dev/issue/29098
- web: https://groups.google.com/g/golang-announce/c/65QixT3tcmg
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2958.yaml
|
id: GO-2024-2958
modules:
- module: github.com/gorilla/schema
versions:
- fixed: 1.4.1
vulnerable_at: 1.4.0
packages:
- package: github.com/gorilla/schema
symbols:
- NewDecoder
- Decoder.decode
derived_symbols:
- Decoder.Decode
summary: Potential memory exhaustion attack due to sparse slice deserialization in github.com/gorilla/schema
cves:
- CVE-2024-37298
ghsas:
- GHSA-3669-72x9-r9p3
unknown_aliases:
- CGA-qch5-pg6h-qrrg
credits:
- '@AlexVasiluta'
references:
- advisory: https://github.com/gorilla/schema/security/advisories/GHSA-3669-72x9-r9p3
- fix: https://github.com/gorilla/schema/commit/cd59f2f12cbdfa9c06aa63e425d1fe4a806967ff
- web: https://github.com/gorilla/schema/blob/main/decoder.go#L223
source:
id: GHSA-3669-72x9-r9p3
created: 2024-07-02T11:03:24.924951-04:00
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2592.yaml
|
id: GO-2024-2592
modules:
- module: github.com/mattermost/mattermost-server
versions:
- introduced: 9.2.0+incompatible
- fixed: 9.2.5+incompatible
- introduced: 9.3.0+incompatible
- fixed: 9.3.1+incompatible
vulnerable_at: 9.3.1-rc2+incompatible
- module: github.com/mattermost/mattermost-server/v5
vulnerable_at: 5.39.3
- module: github.com/mattermost/mattermost-server/v6
vulnerable_at: 6.7.2
- module: github.com/mattermost/mattermost/server/v8
non_go_versions:
- fixed: 8.1.9
vulnerable_at: 8.0.0-20240626184126-817e18414e41
summary: Mattermost allows attackers access to posts in channels they are not a member of in github.com/mattermost/mattermost-server
cves:
- CVE-2024-1942
ghsas:
- GHSA-hwjf-4667-gqwx
unknown_aliases:
- CGA-xvq7-x2jj-6hg4
references:
- advisory: https://github.com/advisories/GHSA-hwjf-4667-gqwx
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-1942
- web: https://mattermost.com/security-updates
source:
id: GHSA-hwjf-4667-gqwx
created: 2024-06-26T16:07:03.779047-04:00
review_status: UNREVIEWED
unexcluded: EFFECTIVELY_PRIVATE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2788.yaml
|
id: GO-2024-2788
modules:
- module: github.com/zitadel/zitadel
non_go_versions:
- fixed: 2.50.0
vulnerable_at: 1.87.5
summary: ZITADEL's Improper Lockout Mechanism Leads to MFA Bypass in github.com/zitadel/zitadel
cves:
- CVE-2024-32868
ghsas:
- GHSA-7j7j-66cv-m239
references:
- advisory: https://github.com/zitadel/zitadel/security/advisories/GHSA-7j7j-66cv-m239
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-32868
- web: https://github.com/zitadel/zitadel/releases/tag/v2.50.0
source:
id: GHSA-7j7j-66cv-m239
created: 2024-06-04T15:27:35.033721-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2978.yaml
|
id: GO-2024-2978
modules:
- module: google.golang.org/grpc
versions:
- introduced: 1.64.0
- fixed: 1.64.1
vulnerable_at: 1.64.0
packages:
- package: google.golang.org/grpc/metadata
symbols:
- MD.String
summary: |-
Private tokens could appear in logs if context containing gRPC metadata is
logged in google.golang.org/grpc
description: |
If applications print or log a context containing gRPC metadata, the
output will contain all the metadata, which may include private
information. This represents a potential PII concern.
ghsas:
- GHSA-xr7q-jx4m-x55m
references:
- advisory: https://github.com/grpc/grpc-go/security/advisories/GHSA-xr7q-jx4m-x55m
- fix: https://github.com/grpc/grpc-go/commit/ab292411ddc0f3b7a7786754d1fe05264c3021eb
source:
id: GHSA-xr7q-jx4m-x55m
created: 2024-07-08T13:23:23.725948-04:00
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2445.yaml
|
id: GO-2024-2445
modules:
- module: github.com/gravitational/teleport
non_go_versions:
- fixed: 12.4.31
- introduced: 13.0.0
- fixed: 13.4.13
- introduced: 14.0.0
- fixed: 14.2.4
vulnerable_at: 3.2.17+incompatible
summary: SFTP is possible on the Proxy server for any user with SFTP access in github.com/gravitational/teleport
ghsas:
- GHSA-c9v7-wmwj-vf6x
references:
- advisory: https://github.com/gravitational/teleport/security/advisories/GHSA-c9v7-wmwj-vf6x
- fix: https://github.com/gravitational/teleport/commit/1c77fc49944ebcded32bbdd77c3e1f4f8a1c130d
- fix: https://github.com/gravitational/teleport/pull/36136
source:
id: GHSA-c9v7-wmwj-vf6x
created: 2024-06-14T11:35:27.699279-04:00
review_status: UNREVIEWED
unexcluded: EFFECTIVELY_PRIVATE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2576.yaml
|
id: GO-2024-2576
modules:
- module: github.com/devfile/registry-support/registry-library
non_go_versions:
- fixed: 0.0.0-20240206
vulnerable_at: 0.0.0-20240530183941-9de6fb93aed6
summary: 'registry-support: decompress can delete files outside scope via relative paths in github.com/devfile/registry-support/registry-library'
cves:
- CVE-2024-1485
ghsas:
- GHSA-84xv-jfrm-h4gm
references:
- advisory: https://github.com/advisories/GHSA-84xv-jfrm-h4gm
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-1485
- web: https://access.redhat.com/security/cve/CVE-2024-1485
- web: https://bugzilla.redhat.com/show_bug.cgi?id=2264106
- web: https://github.com/devfile/registry-support/commit/0e44b9ca6d03fac4fc3f77d37656d56dc5defe0d
- web: https://github.com/devfile/registry-support/pull/197
source:
id: GHSA-84xv-jfrm-h4gm
created: 2024-06-04T15:37:44.246541-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2580.yaml
|
id: GO-2024-2580
modules:
- module: github.com/apache/incubator-answer
versions:
- fixed: 1.2.5
vulnerable_at: 1.2.5-RC2
summary: Apache Answer Race Condition vulnerability in github.com/apache/incubator-answer
cves:
- CVE-2024-26578
ghsas:
- GHSA-9q24-hwmc-797x
references:
- advisory: https://github.com/advisories/GHSA-9q24-hwmc-797x
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-26578
- web: http://www.openwall.com/lists/oss-security/2024/02/22/3
- web: https://lists.apache.org/thread/ko0ksnznt2484lxt0zts2ygr82ldkhcb
source:
id: GHSA-9q24-hwmc-797x
created: 2024-05-17T16:15:02.863423-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2599.yaml
|
id: GO-2024-2599
modules:
- module: std
versions:
- fixed: 1.21.8
- introduced: 1.22.0-0
- fixed: 1.22.1
vulnerable_at: 1.22.0
packages:
- package: net/textproto
symbols:
- Reader.readLineSlice
- Reader.readContinuedLineSlice
derived_symbols:
- Reader.ReadCodeLine
- Reader.ReadContinuedLine
- Reader.ReadContinuedLineBytes
- Reader.ReadDotLines
- Reader.ReadLine
- Reader.ReadLineBytes
- Reader.ReadMIMEHeader
- Reader.ReadResponse
summary: Memory exhaustion in multipart form parsing in net/textproto and net/http
description: |-
When parsing a multipart form (either explicitly with Request.ParseMultipartForm
or implicitly with Request.FormValue, Request.PostFormValue, or
Request.FormFile), limits on the total size of the parsed form were not applied
to the memory consumed while reading a single form line. This permits a
maliciously crafted input containing very long lines to cause allocation of
arbitrarily large amounts of memory, potentially leading to memory exhaustion.
With fix, the ParseMultipartForm function now correctly limits the maximum size
of form lines.
credits:
- Bartek Nowotarski
references:
- report: https://go.dev/issue/65383
- fix: https://go.dev/cl/569341
- web: https://groups.google.com/g/golang-announce/c/5pwGVUPoMbg
cve_metadata:
id: CVE-2023-45290
cwe: 'CWE-400: Uncontrolled Resource Consumption'
references:
- https://security.netapp.com/advisory/ntap-20240329-0004/
- http://www.openwall.com/lists/oss-security/2024/03/08/4
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1611.yaml
|
id: GO-2023-1611
modules:
- module: github.com/gookit/goutil
versions:
- fixed: 0.6.7
vulnerable_at: 0.6.6
packages:
- package: github.com/gookit/goutil/fsutil
symbols:
- Unzip
summary: Path traversal in github.com/gookit/goutil
description: |-
fsutil.Unzip is vulnerable to path traversal attacks due to improper validation
of paths.
cves:
- CVE-2023-27475
ghsas:
- GHSA-fx2v-qfhr-4chv
credits:
- '@cokeBeer'
references:
- advisory: https://github.com/gookit/goutil/security/advisories/GHSA-fx2v-qfhr-4chv
- fix: https://github.com/gookit/goutil/commit/d7b94fede71f018f129f7d21feb58c895d28dadc
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2458.yaml
|
id: GO-2024-2458
modules:
- module: github.com/cri-o/cri-o
versions:
- fixed: 1.27.3
- introduced: 1.28.0
- fixed: 1.28.3
- introduced: 1.29.0
- fixed: 1.29.1
vulnerable_at: 1.29.0
summary: CRI-O's pods can break out of resource confinement on cgroupv2 in github.com/cri-o/cri-o
cves:
- CVE-2023-6476
ghsas:
- GHSA-p4rx-7wvg-fwrc
references:
- advisory: https://github.com/cri-o/cri-o/security/advisories/GHSA-p4rx-7wvg-fwrc
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2023-6476
- fix: https://github.com/cri-o/cri-o/commit/75effcb1a25851a736e82dba1f7d8cee93ee159e
- fix: https://github.com/cri-o/cri-o/pull/4479
- web: https://access.redhat.com/errata/RHSA-2024:0195
- web: https://access.redhat.com/errata/RHSA-2024:0207
- web: https://access.redhat.com/security/cve/CVE-2023-6476
- web: https://bugzilla.redhat.com/show_bug.cgi?id=2253994
- web: https://github.com/cri-o/cri-o/blob/main/pkg/config/workloads.go#L103-L107
source:
id: GHSA-p4rx-7wvg-fwrc
created: 2024-06-14T11:36:01.32545-04:00
review_status: UNREVIEWED
unexcluded: EFFECTIVELY_PRIVATE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0081.yaml
|
id: GO-2021-0081
modules:
- module: github.com/containers/image
versions:
- fixed: 2.0.2-0.20190802080134-634605d06e73+incompatible
vulnerable_at: 2.0.1+incompatible
packages:
- package: github.com/containers/image/docker
symbols:
- dockerClient.getBearerToken
derived_symbols:
- CheckAuth
- GetRepositoryTags
- Image.GetRepositoryTags
- NewReference
- ParseReference
- SearchRegistry
- dockerImageDestination.PutBlob
- dockerImageDestination.PutManifest
- dockerImageDestination.PutSignatures
- dockerImageDestination.SupportsSignatures
- dockerImageDestination.TryReusingBlob
- dockerImageSource.GetBlob
- dockerImageSource.GetManifest
- dockerImageSource.GetSignatures
- dockerReference.DeleteImage
- dockerReference.NewImage
- dockerReference.NewImageDestination
- dockerReference.NewImageSource
- dockerReference.PolicyConfigurationIdentity
- dockerTransport.ParseReference
summary: Insufficiently Protected Credentials in github.com/containers/image
description: |-
The HTTP client used to connect to the container registry authorization service
explicitly disables TLS verification, allowing an attacker that is able to MITM
the connection to steal credentials.
published: 2021-04-14T20:04:52Z
cves:
- CVE-2019-10214
ghsas:
- GHSA-85p9-j7c9-v4gr
references:
- fix: https://github.com/containers/image/pull/669
- fix: https://github.com/containers/image/commit/634605d06e738aec8332bcfd69162e7509ac7aaf
- web: https://github.com/containers/image/issues/654
- web: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10214
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0524.yaml
|
id: GO-2022-0524
modules:
- module: std
versions:
- fixed: 1.17.12
- introduced: 1.18.0-0
- fixed: 1.18.4
vulnerable_at: 1.18.3
packages:
- package: compress/gzip
symbols:
- Reader.Read
summary: Stack exhaustion when reading certain archives in compress/gzip
description: |-
Calling Reader.Read on an archive containing a large number of concatenated
0-length compressed files can cause a panic due to stack exhaustion.
published: 2022-07-20T20:52:11Z
references:
- fix: https://go.dev/cl/417067
- fix: https://go.googlesource.com/go/+/b2b8872c876201eac2d0707276c6999ff3eb185e
- report: https://go.dev/issue/53168
- web: https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE
cve_metadata:
id: CVE-2022-30631
cwe: 'CWE-674: Uncontrolled Recursion'
description: |-
Uncontrolled recursion in Reader.Read in compress/gzip before Go 1.17.12 and Go
1.18.4 allows an attacker to cause a panic due to stack exhaustion via an
archive containing a large number of concatenated 0-length compressed files.
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0237.yaml
|
id: GO-2021-0237
modules:
- module: github.com/AndrewBurian/powermux
versions:
- fixed: 1.1.1
vulnerable_at: 1.1.0
packages:
- package: github.com/AndrewBurian/powermux
symbols:
- Route.execute
derived_symbols:
- ServeMux.Handler
- ServeMux.HandlerAndMiddleware
- ServeMux.ServeHTTP
summary: Open redirect in github.com/AndrewBurian/powermux
description: |-
Attackers may be able to craft phishing links and other open redirects by
exploiting PowerMux's trailing slash redirection feature. This may lead to users
being redirected to untrusted sites after following an attacker crafted link.
published: 2022-01-11T17:18:11Z
cves:
- CVE-2021-32721
ghsas:
- GHSA-mj9r-wwm8-7q52
references:
- fix: https://github.com/AndrewBurian/powermux/pull/42
- fix: https://github.com/AndrewBurian/powermux/commit/5e60a8a0372b35a898796c2697c40e8daabed8e9
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0755.yaml
|
id: GO-2022-0755
modules:
- module: github.com/rancher/rancher
versions:
- fixed: 2.2.5-rc6.0.20190621200032-0ddffe484adc+incompatible
vulnerable_at: 2.2.5-rc6.0.20190621195844-88e9e38dc862+incompatible
packages:
- package: github.com/rancher/rancher/server
symbols:
- Start
skip_fix: 'TODO: revisit this reason (multiple cannot find module providing package errors)'
- package: github.com/rancher/rancher/pkg/clusterrouter
symbols:
- Router.ServeHTTP
skip_fix: 'TODO: revisit this reason (multiple cannot find module providing package errors)'
summary: Cross-site request forgery in github.com/rancher/rancher
description: |-
Rancher 2 is vulnerable to a Cross-Site Websocket Hijacking attack that allows
an exploiter to gain access to clusters managed by Rancher.
published: 2021-05-18T15:42:40Z
cves:
- CVE-2019-13209
ghsas:
- GHSA-xhg2-rvm8-w2jh
credits:
- Matt Belisle
- Alex Stevenson at Workiva
references:
- advisory: https://github.com/advisories/GHSA-xhg2-rvm8-w2jh
- fix: https://github.com/rancher/rancher/commit/0ddffe484adccb9e37d9432e8e625d8ebbfb0088
- web: https://forums.rancher.com/t/rancher-release-v2-2-5-addresses-rancher-cve-2019-13209/14801
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0007.yaml
|
id: GO-2020-0007
modules:
- module: github.com/seccomp/libseccomp-golang
versions:
- fixed: 0.9.1-0.20170424173420-06e7a29f36a3
vulnerable_at: 0.9.1-0.20170424173400-fc0298087f32
packages:
- package: github.com/seccomp/libseccomp-golang
symbols:
- ScmpFilter.addRuleGeneric
derived_symbols:
- ScmpFilter.AddRule
- ScmpFilter.AddRuleConditional
- ScmpFilter.AddRuleConditionalExact
- ScmpFilter.AddRuleExact
summary: Improper input validation in github.com/seccomp/libseccomp-golang
description: |-
Filters containing rules with multiple syscall arguments are improperly
constructed, such that all arguments are required to match rather than any of
the arguments (AND is used rather than OR). These filters can be bypassed by
only specifying a subset of the arguments due to this behavior.
published: 2021-04-14T20:04:52Z
cves:
- CVE-2017-18367
ghsas:
- GHSA-58v3-j75h-xr49
credits:
- '@ihac'
references:
- fix: https://github.com/seccomp/libseccomp-golang/commit/06e7a29f36a34b8cf419aeb87b979ee508e58f9e
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1039.yaml
|
id: GO-2022-1039
modules:
- module: std
versions:
- fixed: 1.18.7
- introduced: 1.19.0-0
- fixed: 1.19.2
vulnerable_at: 1.19.1
packages:
- package: regexp/syntax
symbols:
- parser.push
- parser.repeat
- parser.factor
- parse
derived_symbols:
- Parse
summary: Memory exhaustion when compiling regular expressions in regexp/syntax
description: |-
Programs which compile regular expressions from untrusted sources may be
vulnerable to memory exhaustion or denial of service.
The parsed regexp representation is linear in the size of the input, but in some
cases the constant factor can be as high as 40,000, making relatively small
regexps consume much larger amounts of memory.
After fix, each regexp being parsed is limited to a 256 MB memory footprint.
Regular expressions whose representation would use more space than that are
rejected. Normal use of regular expressions is unaffected.
credits:
- Adam Korczynski (ADA Logics)
- OSS-Fuzz
references:
- report: https://go.dev/issue/55949
- fix: https://go.dev/cl/439356
- web: https://groups.google.com/g/golang-announce/c/xtuG5faxtaU
cve_metadata:
id: CVE-2022-41715
cwe: 'CWE 400: Uncontrolled Resource Consumption'
references:
- https://security.gentoo.org/glsa/202311-09
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2520.yaml
|
id: GO-2024-2520
modules:
- module: github.com/grafana/grafana
non_go_versions:
- fixed: 7.1.0-beta1
vulnerable_at: 5.4.5+incompatible
summary: Grafana XSS via a query alias for the ElasticSearch datasource in github.com/grafana/grafana
cves:
- CVE-2020-24303
ghsas:
- GHSA-mvpr-q6rh-8vrp
unknown_aliases:
- BIT-grafana-2020-24303
references:
- advisory: https://github.com/advisories/GHSA-mvpr-q6rh-8vrp
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2020-24303
- fix: https://github.com/grafana/grafana/pull/25401
- web: https://github.com/grafana/grafana/blob/master/CHANGELOG.md#710-beta-1-2020-07-01
- web: https://security.netapp.com/advisory/ntap-20201123-0002
source:
id: GHSA-mvpr-q6rh-8vrp
created: 2024-06-14T11:39:55.698815-04:00
review_status: UNREVIEWED
unexcluded: NOT_IMPORTABLE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1155.yaml
|
id: GO-2022-1155
modules:
- module: github.com/ipfs/go-merkledag
versions:
- introduced: 0.4.0
- fixed: 0.8.1
vulnerable_at: 0.7.0
packages:
- package: github.com/ipfs/go-merkledag
symbols:
- ProtoNode.SetCidBuilder
- ProtoNode.marshalImmutable
- ProtoNode.AddRawLink
- ProtoNode.UnmarshalJSON
- ProtoNode.Cid
- ProtoNode.RawData
- ProtoNode.Multihash
- ProtoNode.SetLinks
derived_symbols:
- ProtoNode.AddNodeLink
- ProtoNode.AsBool
- ProtoNode.AsBytes
- ProtoNode.AsFloat
- ProtoNode.AsInt
- ProtoNode.AsLink
- ProtoNode.AsString
- ProtoNode.EncodeProtobuf
- ProtoNode.IsAbsent
- ProtoNode.IsNull
- ProtoNode.Kind
- ProtoNode.Length
- ProtoNode.ListIterator
- ProtoNode.Loggable
- ProtoNode.LookupByIndex
- ProtoNode.LookupByNode
- ProtoNode.LookupBySegment
- ProtoNode.LookupByString
- ProtoNode.MapIterator
- ProtoNode.Marshal
- ProtoNode.Size
- ProtoNode.Stat
- ProtoNode.String
- ProtoNode.UpdateNodeLink
summary: Panic in github.com/ipfs/go-merkledag
description: |-
A ProtoNode may be modified in such a way as to cause various encode errors
which will trigger a panic on common method calls that don't allow for error
returns.
Additionally, use of the ProtoNode.SetCidBuilder() method to set non-functioning
CidBuilder (such as one that refers to a multihash where an implementation of
that hash function is not available) may cause the same methods to panic as a
new CID is required but cannot be created.
cves:
- CVE-2022-23495
ghsas:
- GHSA-x39j-h85h-3f46
credits:
- '@mrd0ll4r (https://github.com/mrd0ll4r)'
references:
- advisory: https://github.com/ipfs/go-merkledag/security/advisories/GHSA-x39j-h85h-3f46
- report: https://github.com/ipfs/kubo/issues/9297
- report: https://github.com/ipfs/go-merkledag/issues/90
- fix: https://github.com/ipfs/go-merkledag/pull/91
- fix: https://github.com/ipfs/go-merkledag/pull/92
- fix: https://github.com/ipfs/go-merkledag/pull/93
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2920.yaml
|
id: GO-2024-2920
modules:
- module: github.com/vektah/gqlparser
vulnerable_at: 1.3.1
packages:
- package: github.com/vektah/gqlparser/parser
symbols:
- parser.parseDirectives
derived_symbols:
- ParseQuery
- ParseSchema
- ParseSchemas
- module: github.com/vektah/gqlparser/v2
versions:
- fixed: 2.5.14
vulnerable_at: 2.5.13
packages:
- package: github.com/vektah/gqlparser/v2/parser
symbols:
- parser.parseDirectives
derived_symbols:
- ParseQuery
- ParseSchema
- ParseSchemas
summary: Denial of service vulnerability via the parseDirectives function in github.com/vektah/gqlparser
description: |-
An issue in vektah gqlparser open-source-library allows a remote
attacker to cause a denial of service via a crafted script to the
parseDirectives function.
cves:
- CVE-2023-49559
ghsas:
- GHSA-2hmf-46v7-v6fx
unknown_aliases:
- CGA-28jv-3vhj-mh4f
- CGA-f2h6-vhfv-9wfh
- CGA-pq49-565p-4jxc
- CGA-qxv7-23p6-xhwj
- CGA-r238-8h2v-2g64
- CGA-vq2h-9hfx-rqr4
references:
- advisory: https://github.com/advisories/GHSA-2hmf-46v7-v6fx
- fix: https://github.com/vektah/gqlparser/commit/36a3658873bf5a107f42488dfc392949cdd02977
- web: https://gist.github.com/uvzz/d3ed9d4532be16ec1040a2cf3dfec8d1
- web: https://github.com/99designs/gqlgen/issues/3118
- web: https://github.com/vektah/gqlparser/blob/master/parser/query.go#L316
source:
id: GHSA-2hmf-46v7-v6fx
created: 2024-07-01T13:30:21.392218-04:00
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1004.yaml
|
id: GO-2022-1004
modules:
- module: github.com/theupdateframework/go-tuf
versions:
- fixed: 0.3.2
vulnerable_at: 0.3.1
packages:
- package: github.com/theupdateframework/go-tuf/verify
symbols:
- DB.VerifySignatures
derived_symbols:
- DB.Unmarshal
- DB.UnmarshalIgnoreExpired
- DB.UnmarshalTrusted
- DB.Verify
- DB.VerifyIgnoreExpiredCheck
summary: Improper handling of keys in github.com/theupdateframework/go-tuf
description: |-
An attacker with the ability to insert public keys into a TUF repository can
cause clients to accept a staged change that has not been signed by the correct
threshold of signatures.
ghsas:
- GHSA-3633-5h82-39pq
references:
- advisory: https://github.com/advisories/GHSA-3633-5h82-39pq
- fix: https://github.com/theupdateframework/go-tuf/pull/369
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2877.yaml
|
id: GO-2024-2877
modules:
- module: github.com/argoproj/argo-cd
unsupported_versions:
- last_affected: 1.8.7
vulnerable_at: 1.8.6
- module: github.com/argoproj/argo-cd/v2
versions:
- fixed: 2.8.19
- introduced: 2.9.0-rc1
- fixed: 2.9.15
- introduced: 2.10.0-rc1
- fixed: 2.10.10
- introduced: 2.11.0-rc1
- fixed: 2.11.1
vulnerable_at: 2.11.0
summary: |-
ArgoCD Vulnerable to Use of Risky or Missing Cryptographic Algorithms in Redis
Cache in github.com/argoproj/argo-cd
cves:
- CVE-2024-31989
ghsas:
- GHSA-9766-5277-j5hr
unknown_aliases:
- BIT-argo-cd-2024-31989
references:
- advisory: https://github.com/argoproj/argo-cd/security/advisories/GHSA-9766-5277-j5hr
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-31989
- fix: https://github.com/argoproj/argo-cd/commit/2de0ceade243039c120c28374016c04ff9590d1d
- fix: https://github.com/argoproj/argo-cd/commit/35a7d6c7fa1534aceba763d6a68697f36c12e678
- fix: https://github.com/argoproj/argo-cd/commit/4e2fe302c3352a0012ecbe7f03476b0e07f7fc6c
- fix: https://github.com/argoproj/argo-cd/commit/53570cbd143bced49d4376d6e31bd9c7bd2659ff
- fix: https://github.com/argoproj/argo-cd/commit/6ef7b62a0f67e74b4aac2aee31c98ae49dd95d12
- fix: https://github.com/argoproj/argo-cd/commit/9552034a80070a93a161bfa330359585f3b85f07
- fix: https://github.com/argoproj/argo-cd/commit/bdd889d43969ba738ddd15e1f674d27964048994
- fix: https://github.com/argoproj/argo-cd/commit/f1a449e83ee73f8f14d441563b6a31b504f8d8b0
source:
id: GHSA-9766-5277-j5hr
created: 2024-06-04T14:25:44.461912-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2754.yaml
|
id: GO-2024-2754
modules:
- module: k8s.io/kubernetes
versions:
- fixed: 1.17.13
- introduced: 1.18.0
- fixed: 1.18.10
- introduced: 1.19.0
- fixed: 1.19.3
vulnerable_at: 1.19.3-rc.0
summary: Sensitive Information leak via Log File in Kubernetes in k8s.io/kubernetes
cves:
- CVE-2020-8566
ghsas:
- GHSA-5x96-j797-5qqw
references:
- advisory: https://github.com/advisories/GHSA-5x96-j797-5qqw
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2020-8566
- web: https://bugzilla.redhat.com/show_bug.cgi?id=1886640
- web: https://github.com/kubernetes/kubernetes/issues/95624
- web: https://github.com/kubernetes/kubernetes/pull/95245
- web: https://github.com/kubernetes/kubernetes/pull/95245/commits/e91ec4fad3366d2dee020919f7c2a0d7b52fd3ea
- web: https://groups.google.com/g/kubernetes-announce/c/ScdmyORnPDk
- web: https://groups.google.com/g/kubernetes-security-discuss/c/vm-HcrFUOCs/m/36utxAM5CwAJ
- web: https://security.netapp.com/advisory/ntap-20210122-0006
source:
id: GHSA-5x96-j797-5qqw
created: 2024-05-17T16:12:22.166508-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2589.yaml
|
id: GO-2024-2589
modules:
- module: github.com/mattermost/mattermost-server
versions:
- introduced: 9.2.0+incompatible
- fixed: 9.2.5+incompatible
- introduced: 9.3.0+incompatible
- fixed: 9.3.1+incompatible
vulnerable_at: 9.3.1-rc2+incompatible
- module: github.com/mattermost/mattermost-server/v5
vulnerable_at: 5.39.3
- module: github.com/mattermost/mattermost-server/v6
vulnerable_at: 6.7.2
- module: github.com/mattermost/mattermost/server/v8
non_go_versions:
- fixed: 8.1.9
vulnerable_at: 8.0.0-20240626184126-817e18414e41
summary: Mattermost denial of service through long emoji value in github.com/mattermost/mattermost-server
cves:
- CVE-2024-24988
ghsas:
- GHSA-6mx3-9qfh-77gj
unknown_aliases:
- CGA-hxgx-rg66-hvqr
references:
- advisory: https://github.com/advisories/GHSA-6mx3-9qfh-77gj
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-24988
- web: https://mattermost.com/security-updates
source:
id: GHSA-6mx3-9qfh-77gj
created: 2024-06-26T16:08:34.50613-04:00
review_status: UNREVIEWED
unexcluded: EFFECTIVELY_PRIVATE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0444.yaml
|
id: GO-2022-0444
modules:
- module: github.com/theupdateframework/go-tuf
versions:
- fixed: 0.3.0
vulnerable_at: 0.2.0
packages:
- package: github.com/theupdateframework/go-tuf/client
symbols:
- Client.Update
- Client.UpdateRoots
- Client.downloadMetaFromSnapshot
- Client.downloadMetaFromTimestamp
- Client.decodeRoot
- Client.decodeTargets
- Client.decodeTimestamp
derived_symbols:
- Client.Download
- Client.Init
- Client.Target
- package: github.com/theupdateframework/go-tuf/util
symbols:
- TimestampFileMetaEqual
summary: Version rollback attack in github.com/theupdateframework/go-tuf
description: |-
The TUF client is vulnerable to rollback attacks, in which an attacker causes a
client to install software older than the software the client previously knew to
be available.
published: 2022-07-01T20:07:44Z
cves:
- CVE-2022-29173
ghsas:
- GHSA-66x3-6cw3-v5gj
references:
- fix: https://github.com/theupdateframework/go-tuf/commit/ed6788e710fc3093a7ecc2d078bf734c0f200d8d
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1600.yaml
|
id: GO-2023-1600
modules:
- module: github.com/kitabisa/teler-waf
versions:
- fixed: 0.2.0
vulnerable_at: 0.1.2
packages:
- package: github.com/kitabisa/teler-waf
symbols:
- Teler.checkCommonWebAttack
derived_symbols:
- Teler.Analyze
- Teler.HandlerFuncWithNext
summary: Arbitrary code execution in github.com/kitabisa/teler-waf
description: |-
Improper handling of payload with special characters, such as CR/LF and
horizontal tab, can lead to execution of arbitrary JavaScript code.
cves:
- CVE-2023-26047
ghsas:
- GHSA-p2pf-g8cq-3gq5
references:
- advisory: https://github.com/advisories/GHSA-p2pf-g8cq-3gq5
- fix: https://github.com/kitabisa/teler-waf/commit/6e1b0e19b8adc1bbc3513a986025d4adf88d59f8
- web: https://github.com/kitabisa/teler-waf/releases/tag/v0.2.0
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2328.yaml
|
id: GO-2023-2328
modules:
- module: github.com/go-resty/resty/v2
versions:
- introduced: 2.10.0
- fixed: 2.11.0
vulnerable_at: 2.10.0
packages:
- package: github.com/go-resty/resty/v2
symbols:
- handleRequestBody
derived_symbols:
- Backoff
- Request.Delete
- Request.Execute
- Request.Get
- Request.Head
- Request.Options
- Request.Patch
- Request.Post
- Request.Put
- Request.Send
summary: HTTP request body disclosure in github.com/go-resty/resty/v2
description: |-
A race condition in go-resty can result in HTTP request body disclosure across
requests.
This condition can be triggered by calling sync.Pool.Put with the same
*bytes.Buffer more than once, when request retries are enabled and a retry
occurs. The call to sync.Pool.Get will then return a bytes.Buffer that hasn't
had bytes.Buffer.Reset called on it. This dirty buffer will contain the HTTP
request body from an unrelated request, and go-resty will append the current
HTTP request body to it, sending two bodies in one request.
The sync.Pool in question is defined at package level scope, so a completely
unrelated server could receive the request body.
ghsas:
- GHSA-xwh9-gc39-5298
credits:
- Logan Attwood (@lattwood)
references:
- report: https://github.com/go-resty/resty/issues/743
- report: https://github.com/go-resty/resty/issues/739
- fix: https://github.com/go-resty/resty/pull/745
- fix: https://github.com/go-resty/resty/commit/577fed8730d79f583eb48dfc81674164e1fc471e
cve_metadata:
id: CVE-2023-45286
cwe: 'CWE-200: Exposure of Sensitive Information to an Unauthorized Actor'
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0384.yaml
|
id: GO-2022-0384
modules:
- module: helm.sh/helm/v3
versions:
- fixed: 3.6.1
vulnerable_at: 3.6.0
packages:
- package: helm.sh/helm/v3/pkg/downloader
symbols:
- ChartDownloader.ResolveChartVersion
derived_symbols:
- ChartDownloader.DownloadTo
- Manager.Build
- Manager.Update
summary: Repository credentials passed to alternate domain in helm.sh/helm/v3
description: |-
The username and password credentials associated with a Helm repository can be
passed to another domain referenced by that Helm repository.
If the index.yaml for a Helm repository is hosted on one domain and references a
chart archive on a different domain, Helm will provide the credentials for the
index.yaml's domain when fetching those archives.
published: 2022-07-15T23:29:45Z
cves:
- CVE-2021-32690
ghsas:
- GHSA-56hp-xqp3-w2jf
- GHSA-7jr6-prv4-5wf5
references:
- advisory: https://github.com/advisories/GHSA-56hp-xqp3-w2jf
- fix: https://github.com/helm/helm/commit/61d8e8c4a6f95540c15c6a65f36a6dd0a45e7a2f
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1597.yaml
|
id: GO-2023-1597
modules:
- module: github.com/kitabisa/teler-waf
versions:
- fixed: 0.1.1
vulnerable_at: 0.1.0
packages:
- package: github.com/kitabisa/teler-waf
symbols:
- Teler.checkCustomRules
derived_symbols:
- Teler.Analyze
- Teler.HandlerFuncWithNext
summary: Cross site scripting in github.com/kitabisa/teler-waf
description: |-
Improper sanitization and filtering of HTML entities in user input can lead to
cross-site scripting (XSS) attacks where arbitrary JavaScript code is executed
in the browser.
cves:
- CVE-2023-26046
ghsas:
- GHSA-9f95-hhg4-pg4f
references:
- fix: https://github.com/kitabisa/teler-waf/commit/d1d49cfddfa3ec2adad962870f14b85cd1aaf739
- web: https://github.com/kitabisa/teler-waf/releases/tag/v0.1.1
- advisory: https://github.com/advisories/GHSA-9f95-hhg4-pg4f
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0048.yaml
|
id: GO-2020-0048
modules:
- module: github.com/antchfx/xmlquery
versions:
- fixed: 1.3.1
vulnerable_at: 1.3.0
packages:
- package: github.com/antchfx/xmlquery
symbols:
- LoadURL
summary: Denial of service in github.com/antchfx/xmlquery
description: |-
LoadURL does not check the Content-Type of loaded resources, which can cause a
panic due to nil pointer deference if the loaded resource is not XML. If user
supplied URLs are loaded, this may be used as a denial of service vector.
published: 2021-04-14T20:04:52Z
cves:
- CVE-2020-25614
ghsas:
- GHSA-93m7-c69f-5cfj
credits:
- '@dwisiswant0'
references:
- fix: https://github.com/antchfx/xmlquery/commit/5648b2f39e8d5d3fc903c45a4f1274829df71821
- web: https://github.com/antchfx/xmlquery/issues/39
review_status: REVIEWED
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.