repo_id
stringclasses
927 values
file_path
stringlengths
99
214
content
stringlengths
2
4.15M
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0402.yaml
id: GO-2022-0402 modules: - module: github.com/nats-io/jwt versions: - fixed: 1.1.0 vulnerable_at: 1.0.1 packages: - package: github.com/nats-io/jwt symbols: - Export.Validate - Import.Validate - Imports.Validate derived_symbols: - Account.Validate - AccountClaims.Validate - Exports.Validate summary: Panic in NATS JWT decoding in github.com/nats-io/jwt description: |- A malicious account can create and sign a User JWT which causes a panic when decoded by the NATS JWT library. published: 2022-07-01T20:10:43Z cves: - CVE-2020-26521 ghsas: - GHSA-h2fg-54x9-5qhq - GHSA-hmm9-r2m2-qg9w references: - fix: https://github.com/nats-io/jwt/pull/107 - web: https://advisories.nats.io/CVE/CVE-2020-26521.txt review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2471.yaml
id: GO-2024-2471 modules: - module: github.com/cometbft/cometbft versions: - introduced: 0.38.0 - fixed: 0.38.3 vulnerable_at: 0.38.2 packages: - package: github.com/cometbft/cometbft/types symbols: - ConsensusParams.ValidateUpdate summary: Chain halt panic in github.com/cometbft/cometbft description: |- A vulnerability in CometBFT’s validation logic for VoteExtensionsEnableHeight can result in a chain halt when triggered through a governance parameter change proposal on an ABCI2 Application Chain. If a parameter change proposal including a VoteExtensionsEnableHeight modification is passed, nodes running the affected versions may panic, halting the network. ghsas: - GHSA-qr8r-m495-7hc4 credits: - '@dongsam' references: - advisory: https://github.com/cometbft/cometbft/security/advisories/GHSA-qr8r-m495-7hc4 - fix: https://github.com/cometbft/cometbft/commit/5fbc97378b94b0945febe9549399e7c9c5df13ed review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2046.yaml
id: GO-2023-2046 modules: - module: github.com/ethereum/go-ethereum versions: - fixed: 1.12.1 vulnerable_at: 1.12.0 summary: Unbounded memory consumption in github.com/ethereum/go-ethereum cves: - CVE-2023-40591 ghsas: - GHSA-ppjg-v974-84cm references: - advisory: https://github.com/ethereum/go-ethereum/security/advisories/GHSA-ppjg-v974-84cm review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1882.yaml
id: GO-2023-1882 modules: - module: github.com/cometbft/cometbft versions: - introduced: 0.37.1 - fixed: 0.37.2 vulnerable_at: 0.37.1 packages: - package: github.com/cometbft/cometbft/consensus symbols: - PeerState.MarshalJSON summary: Deadlock in github.com/cometbft/cometbft/consensus description: |- An internal modification to the way PeerState is serialized to JSON introduced a deadlock when the new function MarshalJSON is called. This function can be called in two ways. The first is via logs, by setting the consensus logging module to "debug" level (which should not happen in production), and setting the log output format to JSON. The second is via RPC dump_consensus_state. cves: - CVE-2023-34450 ghsas: - GHSA-mvj3-qrqh-cjvr references: - advisory: https://github.com/cometbft/cometbft/security/advisories/GHSA-mvj3-qrqh-cjvr - fix: https://github.com/cometbft/cometbft/pull/524 - fix: https://github.com/cometbft/cometbft/pull/863 - fix: https://github.com/cometbft/cometbft/pull/865 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2879.yaml
id: GO-2024-2879 modules: - module: github.com/dapr/dapr versions: - introduced: 1.13.0 - fixed: 1.13.3 vulnerable_at: 1.13.2 summary: Dapr API Token Exposure in github.com/dapr/dapr cves: - CVE-2024-35223 ghsas: - GHSA-284c-x8m7-9w5h references: - advisory: https://github.com/dapr/dapr/security/advisories/GHSA-284c-x8m7-9w5h - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-35223 - fix: https://github.com/dapr/dapr/commit/e0591e43d0cdfd30a2f2960dce5d9892dc98bc2c - fix: https://github.com/dapr/dapr/pull/7404 - report: https://github.com/dapr/dapr/issues/7344 - web: https://github.com/dapr/dapr/releases/tag/v1.13.3 source: id: GHSA-284c-x8m7-9w5h created: 2024-05-24T19:47:17.904676322Z review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0066.yaml
id: GO-2021-0066 modules: - module: k8s.io/kubernetes versions: - fixed: 1.20.0-alpha.1 vulnerable_at: 1.20.0-alpha.0 packages: - package: k8s.io/kubernetes/pkg/credentialprovider symbols: - readDockerConfigFileFromBytes - readDockerConfigJSONFileFromBytes skip_fix: 'TODO: revisit this reason (reading k8s.io/api/go.mod at revision v0.0.0: unknown revision v0.0.0)' summary: Sensitive information leak via log file in k8s.io/kubernetes description: |- Attempting to read a malformed .dockercfg may cause secrets to be inappropriately logged. published: 2021-04-14T20:04:52Z cves: - CVE-2020-8564 ghsas: - GHSA-8mjg-8c8g-6h85 credits: - '@sfowl' references: - fix: https://github.com/kubernetes/kubernetes/pull/94712 - fix: https://github.com/kubernetes/kubernetes/commit/11793434dac97a49bfed0150b56ac63e5dc34634 - web: https://github.com/kubernetes/kubernetes/issues/95622 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1788.yaml
id: GO-2023-1788 modules: - module: github.com/goreleaser/nfpm/v2 versions: - introduced: 2.0.0 - fixed: 2.29.0 vulnerable_at: 2.28.0 packages: - package: github.com/goreleaser/nfpm/v2 symbols: - ParseWithEnvMapping - WithDefaults derived_symbols: - Config.Validate - Info.Validate - Parse - ParseFile - ParseFileWithEnvMapping - PrepareForPackager - Validate - package: github.com/goreleaser/nfpm/v2/files symbols: - Content.WithFileInfoDefaults - PrepareForPackager - addGlobbedFiles - addTree summary: Incorrect permissions in github.com/goreleaser/nfpm/v2 description: |- When nfpm packages files without additional configuration to enforce its own permissions, the files could be packaged with incorrect permissions (chmod 666 or 777). Anyone who uses nfpm to create packages and does not check or set file permissions before packaging could result in files or folders being packaged with incorrect permissions. cves: - CVE-2023-32698 ghsas: - GHSA-w7jw-q4fg-qc4c credits: - oCHRISo - caarlos0 - djgilcrease references: - fix: https://github.com/goreleaser/nfpm/commit/ed9abdf63d5012cc884f2a83b4ab2b42b3680d30 - web: https://github.com/goreleaser/nfpm/releases/tag/v2.29.0 - advisory: https://github.com/advisories/GHSA-w7jw-q4fg-qc4c review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0980.yaml
id: GO-2022-0980 modules: - module: github.com/hashicorp/consul-template versions: - fixed: 0.27.3 - introduced: 0.28.0 - fixed: 0.28.3 - introduced: 0.29.0 - fixed: 0.29.2 vulnerable_at: 0.29.1 packages: - package: github.com/hashicorp/consul-template/template symbols: - Template.Execute summary: |- Exposure of Vault secrets via error messages in github.com/hashicorp/consul-template description: |- The text of errors returned by Template.Execute can contain Vault secrets, potentially revealing these secrets in logs or error reports. cves: - CVE-2022-38149 ghsas: - GHSA-8449-7gc2-pwrp references: - advisory: https://discuss.hashicorp.com/t/hsec-2022-16-consul-template-may-expose-vault-secrets-when-processing-invalid-input/43215 - fix: https://github.com/hashicorp/consul-template/commit/d6a6f4af219c28e67d847ba0e0b2bea8f5bb9076 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1548.yaml
id: GO-2023-1548 modules: - module: github.com/argoproj/argo-cd/v2 versions: - introduced: 2.6.0-rc1 - fixed: 2.6.1 vulnerable_at: 2.6.0 packages: - package: github.com/argoproj/argo-cd/v2/util/argo symbols: - validateRepo derived_symbols: - ValidateRepo summary: Repository access credential leak in github.com/argoproj/argo-cd/v2 description: |- Argo CD has an output sanitization bug which leaks repository access credentials in error messages. These error messages are visible to the user, and they are logged. The error message is visible when a user attempts to create or update an Application via the Argo CD API (and therefor the UI or CLI). The user must have "applications, create" or "applications, update" RBAC access to reach the code which may produce the error. The user is not guaranteed to be able to trigger the error message. They may attempt to spam the API with requests to trigger a rate limit error from the upstream repository. If the user has "repositories, update" access, they may edit an existing repository to introduce a URL typo or otherwise force an error message. cves: - CVE-2023-25163 ghsas: - GHSA-mv6w-j4xc-qpfw credits: - James Callahan references: - advisory: https://github.com/argoproj/argo-cd/security/advisories/GHSA-mv6w-j4xc-qpfw - report: https://github.com/argoproj/argo-cd/issues/12309 - fix: https://github.com/argoproj/argo-cd/pull/12320 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2948.yaml
id: GO-2024-2948 modules: - module: github.com/hashicorp/go-getter versions: - fixed: 1.7.5 vulnerable_at: 1.7.4 packages: - package: github.com/hashicorp/go-getter symbols: - GitGetter.clone - findRemoteDefaultBranch derived_symbols: - Client.ChecksumFromFile - Client.Get - FolderStorage.Get - Get - GetAny - GetFile - GitGetter.Get - GitGetter.GetFile - HttpGetter.Get summary: Code Execution on Git update in github.com/hashicorp/go-getter description: |- A crafted request can execute Git update on an existing maliciously modified Git Configuration. This can potentially lead to arbitrary code execution. When performing a Git operation, the library will try to clone the given repository to a specified destination. Cloning initializes a git config in the provided destination. An attacker may alter the Git config after the cloning step to set an arbitrary Git configuration to achieve code execution. cves: - CVE-2024-6257 ghsas: - GHSA-xfhp-jf8p-mh5w references: - advisory: https://github.com/advisories/GHSA-xfhp-jf8p-mh5w - fix: https://github.com/hashicorp/go-getter/commit/268c11cae8cf0d9374783e06572679796abe9ce9 - web: https://discuss.hashicorp.com/t/hcsec-2024-13-hashicorp-go-getter-vulnerable-to-code-execution-on-git-update-via-git-config-manipulation/68081 source: id: GHSA-xfhp-jf8p-mh5w created: 2024-06-26T13:09:53.132489-07:00 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2921.yaml
id: GO-2024-2921 modules: - module: github.com/hashicorp/vault versions: - introduced: 0.11.0 - fixed: 1.16.3 - introduced: 1.17.0-rc1 - fixed: 1.17.0 non_go_versions: - fixed: 1.15.9 vulnerable_at: 1.17.0-rc1 summary: |- HashiCorp Vault Incorrectly Validated JSON Web Tokens (JWT) Audience Claims in github.com/hashicorp/vault cves: - CVE-2024-5798 ghsas: - GHSA-32cj-5wx4-gq8p unknown_aliases: - BIT-vault-2024-5798 references: - advisory: https://github.com/advisories/GHSA-32cj-5wx4-gq8p - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-5798 - web: https://discuss.hashicorp.com/t/hcsec-2024-11-vault-incorrectly-validated-json-web-tokens-jwt-audience-claims/67770 notes: - manually removed 'introduced: 1.16.0-rc1' to fix overlapping versions source: id: GHSA-32cj-5wx4-gq8p created: 2024-07-01T13:30:14.94375-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2723.yaml
id: GO-2024-2723 modules: - module: github.com/apache/solr-operator versions: - introduced: 0.3.0 - fixed: 0.8.1 vulnerable_at: 0.8.0 summary: |- Apache Solr Operator liveness and readiness probes may leak basic auth credentials in github.com/apache/solr-operator cves: - CVE-2024-31391 ghsas: - GHSA-g9qx-25vj-rf53 references: - advisory: https://github.com/advisories/GHSA-g9qx-25vj-rf53 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-31391 - web: http://www.openwall.com/lists/oss-security/2024/04/12/7 - web: https://lists.apache.org/thread/w7011s78lzywzwyszvy4d8zm99ybt8c7 source: id: GHSA-g9qx-25vj-rf53 created: 2024-05-17T16:13:13.550401-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2536.yaml
id: GO-2024-2536 modules: - module: github.com/rancher/norman versions: - fixed: 0.0.0-20240207153100-3bb70b772b52 vulnerable_at: 0.0.0-20240131191507-a182097c0229 packages: - package: github.com/rancher/norman/urlbuilder symbols: - GetHost - ParseRequestURL derived_symbols: - New - package: github.com/rancher/norman/api/writer symbols: - HTMLResponseWriter.Write summary: Cross-site scripting in public API in github.com/rancher/norman cves: - CVE-2023-32193 ghsas: - GHSA-r8f4-hv23-6qp6 credits: - diego95root - kujalamathias references: - advisory: https://github.com/rancher/norman/security/advisories/GHSA-r8f4-hv23-6qp6 - fix: https://github.com/rancher/norman/commit/3bb70b772b52297feac64f5fdeb1b13c06c37e39 - fix: https://github.com/rancher/norman/commit/7b2b467995e6dfab6d4a5dee8dffc15033ae8269 - fix: https://github.com/rancher/norman/commit/a6a6cf5696088c32002953d36b75bdcc84f2399e - fix: https://github.com/rancher/norman/commit/bd13c653293b9b5e0b37e8a6ccd1c3277f4623ed - fix: https://github.com/rancher/norman/commit/cb54924f25c7666511a913cd41834299ef22dba4 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0417.yaml
id: GO-2022-0417 modules: - module: github.com/containers/buildah versions: - fixed: 1.25.0 vulnerable_at: 1.24.0 packages: - package: github.com/containers/buildah symbols: - setupCapAdd - setupCapDrop derived_symbols: - Builder.Run - package: github.com/containers/buildah/chroot symbols: - setCapabilities summary: Incorrect default permissions in github.com/containers/buildah description: |- Containers are created with non-empty inheritable Linux process capabilities, permitting programs with inheritable file capabilities to elevate those capabilities to the permitted set during execve(2). This bug does not affect the container security sandbox, as the inheritable set never contains more capabilities than are included in the container's bounding set. published: 2022-07-01T20:08:10Z cves: - CVE-2022-27651 ghsas: - GHSA-c3g4-w6cv-6v7h references: - fix: https://github.com/containers/buildah/commit/e7e55c988c05dd74005184ceb64f097a0cfe645b - web: https://bugzilla.redhat.com/show_bug.cgi?id=2066840 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2796.yaml
id: GO-2024-2796 modules: - module: github.com/mattermost/mattermost-server versions: - introduced: 8.1.0+incompatible - fixed: 8.1.12+incompatible - introduced: 9.5.0+incompatible - fixed: 9.5.3+incompatible - introduced: 9.6.0-rc1+incompatible - fixed: 9.6.1+incompatible vulnerable_at: 9.6.1-rc3+incompatible summary: Mattermost fails to limit the size of a request path in github.com/mattermost/mattermost-server cves: - CVE-2024-22091 ghsas: - GHSA-p2wq-4ggp-45f3 references: - advisory: https://github.com/advisories/GHSA-p2wq-4ggp-45f3 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-22091 - web: https://github.com/mattermost/mattermost/commit/13049d8b16b195f98246dff4812b5f64c1e5a627 - web: https://github.com/mattermost/mattermost/commit/49e7c477246e31c7a0bd85c1043599121755b260 - web: https://github.com/mattermost/mattermost/commit/54478f2ccbc6c4f110706966adfe0db2c16a566c - web: https://github.com/mattermost/mattermost/commit/f6d320017549ec66efb5fdd4bc10b66ab36abb70 - web: https://mattermost.com/security-updates source: id: GHSA-p2wq-4ggp-45f3 created: 2024-06-04T15:27:02.38708-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0212.yaml
id: GO-2022-0212 modules: - module: std versions: - fixed: 1.12.10 - introduced: 1.13.0-0 - fixed: 1.13.1 vulnerable_at: 1.13.0 packages: - package: net/textproto symbols: - Reader.ReadMimeHeader skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)' summary: Request smuggling due to accepting invalid headers in net/http via net/textproto description: |- net/http (through net/textproto) used to accept and normalize invalid HTTP/1.1 headers with a space before the colon, in violation of RFC 7230. If a Go server is used behind an uncommon reverse proxy that accepts and forwards but doesn't normalize such invalid headers, the reverse proxy and the server can interpret the headers differently. This can lead to filter bypasses or request smuggling, the latter if requests from separate clients are multiplexed onto the same upstream connection by the proxy. Such invalid headers are now rejected by Go servers, and passed without normalization to Go client applications. published: 2022-05-23T22:46:20Z cves: - CVE-2019-16276 credits: - Andrew Stucki (99designs.com) - Adam Scarr (99designs.com) - Jan Masarik (masarik.sh) references: - fix: https://go.dev/cl/197503 - fix: https://go.googlesource.com/go/+/41b1f88efab9d263408448bf139659119002ea50 - report: https://go.dev/issue/34540 - web: https://groups.google.com/g/golang-announce/c/cszieYyuL9Q/m/g4Z7pKaqAgAJ review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0065.yaml
id: GO-2021-0065 modules: - module: k8s.io/client-go versions: - fixed: 0.17.0 vulnerable_at: 0.16.16-rc.0 packages: - package: k8s.io/client-go/transport symbols: - debuggingRoundTripper.RoundTrip derived_symbols: - basicAuthRoundTripper.RoundTrip - bearerAuthRoundTripper.RoundTrip - impersonatingRoundTripper.RoundTrip - userAgentRoundTripper.RoundTrip summary: Unauthorized credential disclosure in k8s.io/kubernetes and k8s.io/client-go description: |- Authorization tokens may be inappropriately logged if the verbosity level is set to a debug level. published: 2021-04-14T20:04:52Z cves: - CVE-2019-11250 ghsas: - GHSA-jmrx-5g74-6v2f references: - fix: https://github.com/kubernetes/kubernetes/pull/81330 - fix: https://github.com/kubernetes/kubernetes/commit/4441f1d9c3e94d9a3d93b4f184a591cab02a5245 - web: https://github.com/kubernetes/kubernetes/issues/81114 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0003.yaml
id: GO-2020-0003 modules: - module: github.com/revel/revel versions: - fixed: 1.0.0 vulnerable_at: 0.21.0 packages: - package: github.com/revel/revel summary: Resource exhaustion in github.com/revel/revel description: |- An attacker can cause an application that accepts slice parameters (https://revel.github.io/manual/parameters.html#slices) to allocate large amounts of memory and crash through manipulating the request query sent to the application. published: 2021-04-14T20:04:52Z ghsas: - GHSA-hggr-p7v6-73p5 credits: - '@SYM01' references: - fix: https://github.com/revel/revel/pull/1427 - fix: https://github.com/revel/revel/commit/d160ecb72207824005b19778594cbdc272e8a605 - web: https://github.com/revel/revel/issues/1424 cve_metadata: id: CVE-2020-36568 cwe: 'CWE-400: Uncontrolled Resource Consumption' description: |- Unsanitized input in the query parser in github.com/revel/revel before v1.0.0 allows remote attackers to cause resource exhaustion via memory allocation. review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0041.yaml
id: GO-2020-0041 modules: - module: github.com/unknwon/cae versions: - fixed: 1.0.1 vulnerable_at: 1.0.0 packages: - package: github.com/unknwon/cae/tz symbols: - TzArchive.syncFiles - TzArchive.ExtractToFunc derived_symbols: - Create - ExtractTo - Open - OpenFile - TzArchive.Close - TzArchive.ExtractTo - TzArchive.Flush - TzArchive.Open - package: github.com/unknwon/cae/zip symbols: - ZipArchive.Open - ZipArchive.ExtractToFunc derived_symbols: - Create - ExtractTo - ExtractToFunc - Open - OpenFile - ZipArchive.Close - ZipArchive.ExtractTo - ZipArchive.Flush summary: Path Traversal in github.com/unknwon/cae description: |- Due to improper path sanitization, archives containing relative file paths can cause files to be written (or overwritten) outside of the target directory. published: 2021-04-14T20:04:52Z cves: - CVE-2020-7668 ghsas: - GHSA-88jf-7rch-32qc references: - fix: https://github.com/unknwon/cae/commit/07971c00a1bfd9dc171c3ad0bfab5b67c2287e11 - web: https://snyk.io/research/zip-slip-vulnerability review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2715.yaml
id: GO-2024-2715 modules: - module: github.com/evmos/evmos vulnerable_at: 1.1.3 - module: github.com/evmos/evmos/v2 vulnerable_at: 2.0.2 - module: github.com/evmos/evmos/v3 vulnerable_at: 3.0.3 - module: github.com/evmos/evmos/v4 vulnerable_at: 4.0.2 - module: github.com/evmos/evmos/v5 unsupported_versions: - last_affected: 5.0.0 vulnerable_at: 5.0.1 - module: github.com/evmos/evmos/v6 unsupported_versions: - last_affected: 6.0.4 vulnerable_at: 6.0.4 - module: github.com/evmos/evmos/v7 unsupported_versions: - last_affected: 7.0.0 vulnerable_at: 7.0.0 - module: github.com/evmos/evmos/v8 vulnerable_at: 8.2.3 - module: github.com/evmos/evmos/v9 vulnerable_at: 9.1.0 - module: github.com/evmos/evmos/v10 vulnerable_at: 10.0.1 - module: github.com/evmos/evmos/v11 vulnerable_at: 11.0.2 - module: github.com/evmos/evmos/v12 vulnerable_at: 12.1.6 - module: github.com/evmos/evmos/v13 vulnerable_at: 13.0.2 - module: github.com/evmos/evmos/v14 vulnerable_at: 14.1.0 - module: github.com/evmos/evmos/v15 vulnerable_at: 15.0.0 - module: github.com/evmos/evmos/v16 vulnerable_at: 16.0.4 - module: github.com/evmos/evmos/v17 versions: - fixed: 17.0.0 - module: github.com/tharsis/evmos unsupported_versions: - last_affected: 1.1.3 vulnerable_at: 1.1.3 - module: github.com/tharsis/evmos/v2 unsupported_versions: - last_affected: 2.0.2 vulnerable_at: 2.0.2 - module: github.com/tharsis/evmos/v3 unsupported_versions: - last_affected: 3.0.3 vulnerable_at: 3.0.3 - module: github.com/tharsis/evmos/v4 unsupported_versions: - last_affected: 4.0.2 vulnerable_at: 4.0.2 - module: github.com/tharsis/evmos/v5 unsupported_versions: - last_affected: 5.0.1 vulnerable_at: 5.0.1 summary: |- Evmos transaction execution not accounting for all state transition after interaction with precompiles in github.com/evmos/evmos cves: - CVE-2024-32644 ghsas: - GHSA-3fp5-2xwh-fxm6 references: - advisory: https://github.com/evmos/evmos/security/advisories/GHSA-3fp5-2xwh-fxm6 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-32644 - fix: https://github.com/evmos/evmos/commit/08982b5ee726b97bc50eaf58d1914829648b6a5f - web: https://github.com/evmos/evmos/blob/b196a522ba4951890b40992e9f97aa610f8b5f9c/x/evm/statedb/state_object.go#L53-L68 - web: https://github.com/evmos/evmos/blob/b196a522ba4951890b40992e9f97aa610f8b5f9c/x/evm/statedb/statedb.go#L33-L55 - web: https://github.com/evmos/evmos/blob/b196a522ba4951890b40992e9f97aa610f8b5f9c/x/evm/statedb/statedb.go#L460-L465 notes: - fix: 'github.com/evmos/evmos/v17: could not add vulnerable_at: could not find tagged version between introduced and fixed' source: id: GHSA-3fp5-2xwh-fxm6 created: 2024-06-26T14:00:32.611718-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2888.yaml
id: GO-2024-2888 modules: - module: std versions: - fixed: 1.21.11 - introduced: 1.22.0-0 - fixed: 1.22.4 vulnerable_at: 1.22.3 packages: - package: archive/zip symbols: - findSignatureInBlock derived_symbols: - NewReader - OpenReader summary: Mishandling of corrupt central directory record in archive/zip description: |- The archive/zip package's handling of certain types of invalid zip files differs from the behavior of most zip implementations. This misalignment could be exploited to create an zip file with contents that vary depending on the implementation reading the file. The archive/zip package now rejects files containing these errors. credits: - Yufan You (@ouuan) references: - fix: https://go.dev/cl/585397 - report: https://go.dev/issue/66869 - web: https://groups.google.com/g/golang-announce/c/XbxouI9gY7k/m/TuoGEhxIEwAJ cve_metadata: id: CVE-2024-24789 cwe: 'CWE-390: Detection of Error Condition Without Action' references: - http://www.openwall.com/lists/oss-security/2024/06/04/1 - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U5YAEIA6IUHUNGJ7AIXXPQT6D2GYENX7/ source: id: go-security-team created: 2024-06-04T17:58:11.150789-04:00 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2842.yaml
id: GO-2024-2842 modules: - module: github.com/containers/image/v5 versions: - fixed: 5.30.1 vulnerable_at: 5.30.0 packages: - package: github.com/containers/image/v5/copy symbols: - copier.createProgressBar - imageCopier.copyConfig - imageCopier.copyLayer derived_symbols: - Image - package: github.com/containers/image/v5/directory symbols: - dirImageDestination.PutBlobWithOptions - dirImageDestination.TryReusingBlobWithOptions - dirImageDestination.PutManifest - dirImageDestination.PutSignaturesWithFormat - dirImageSource.GetManifest - dirImageSource.GetBlob - dirImageSource.GetSignaturesWithFormat derived_symbols: - dirReference.NewImage - package: github.com/containers/image/v5/docker symbols: - dockerClient.fetchManifest - dockerClient.getBlob - dockerClient.getSigstoreAttachmentManifest - dockerClient.getExtensionsSignatures - sigstoreAttachmentTag - GetRepositoryTags - dockerImageDestination.blobExists - dockerImageDestination.PutManifest - dockerImageDestination.putSignaturesToLookaside - dockerImageDestination.putSignaturesToSigstoreAttachments - dockerImageSource.GetManifest - dockerImageSource.GetBlobAt - dockerImageSource.getSignaturesFromLookaside - deleteImage - lookasideStorageURL derived_symbols: - Image.GetRepositoryTags - dockerImageDestination.PutBlobWithOptions - dockerImageDestination.PutSignaturesWithFormat - dockerImageDestination.TryReusingBlobWithOptions - dockerImageSource.GetBlob - dockerImageSource.GetSignaturesWithFormat - dockerReference.DeleteImage - dockerReference.NewImage - dockerReference.NewImageSource - package: github.com/containers/image/v5/docker/internal/tarfile symbols: - Destination.PutBlobWithOptions - Writer.ensureSingleLegacyLayerLocked - Writer.writeLegacyMetadataLocked - Writer.ensureManifestItemLocked - Writer.configPath - Writer.physicalLayerPath derived_symbols: - Destination.PutManifest - package: github.com/containers/image/v5/openshift symbols: - openshiftImageSource.GetSignaturesWithFormat derived_symbols: - openshiftImageDestination.PutBlobWithOptions - openshiftImageDestination.PutManifest - openshiftImageDestination.TryReusingBlobWithOptions - openshiftImageSource.GetBlob - openshiftImageSource.GetManifest - openshiftReference.NewImage - package: github.com/containers/image/v5/ostree symbols: - ostreeImageDestination.TryReusingBlobWithOptions - ostreeImageDestination.Commit - ostreeImageSource.GetBlob skip_fix: contains build constraints - package: github.com/containers/image/v5/pkg/blobcache symbols: - BlobCache.blobPath - BlobCache.findBlob - blobCacheDestination.saveStream derived_symbols: - BlobCache.HasBlob - BlobCache.NewImage - blobCacheDestination.PutBlobWithOptions - blobCacheDestination.PutManifest - blobCacheDestination.TryReusingBlobWithOptions - blobCacheSource.GetBlob - blobCacheSource.GetBlobAt - blobCacheSource.GetManifest - blobCacheSource.LayerInfosForCopy - package: github.com/containers/image/v5/storage symbols: - storageImageDestination.tryReusingBlobAsPending - manifestBigDataKey - signatureBigDataKey derived_symbols: - ResolveReference - storageImageDestination.Commit - storageImageDestination.PutBlobWithOptions - storageImageDestination.TryReusingBlobWithOptions - storageImageSource.GetManifest - storageImageSource.GetSignaturesWithFormat - storageImageSource.LayerInfosForCopy - storageReference.DeleteImage - storageReference.NewImage - storageReference.NewImageSource - storageTransport.GetImage - storageTransport.GetStoreImage summary: Unexpected authenticated registry accesses in github.com/containers/image/v5 description: |- An attacker may trigger unexpected authenticated registry accesses on behalf of a victim user, causing resource exhaustion, local path traversal, and other attacks. cves: - CVE-2024-3727 ghsas: - GHSA-6wvf-f2vw-3425 references: - advisory: https://github.com/advisories/GHSA-6wvf-f2vw-3425 - fix: https://github.com/containers/image/commit/132678b47bae29c710589012668cb85859d88385 - web: https://access.redhat.com/security/cve/CVE-2024-3727 - web: https://bugzilla.redhat.com/show_bug.cgi?id=2274767 - web: https://github.com/containers/image/releases/tag/v5.30.1 source: id: GHSA-6wvf-f2vw-3425 created: 2024-05-17T14:13:29.295109-04:00 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0356.yaml
id: GO-2021-0356 modules: - module: golang.org/x/crypto versions: - fixed: 0.0.0-20220314234659-1baeb1ce4c0b vulnerable_at: 0.0.0-20220314234646-fcc990c556fe packages: - package: golang.org/x/crypto/ssh symbols: - ServerConfig.AddHostKey summary: Denial of service via crafted Signer in golang.org/x/crypto/ssh description: |- Attackers can cause a crash in SSH servers when the server has been configured by passing a Signer to ServerConfig.AddHostKey such that 1) the Signer passed to AddHostKey does not implement AlgorithmSigner, and 2) the Signer passed to AddHostKey returns a key of type “ssh-rsa” from its PublicKey method. Servers that only use Signer implementations provided by the ssh package are unaffected. published: 2022-04-25T20:38:40Z cves: - CVE-2022-27191 ghsas: - GHSA-8c26-wmh5-6g9v references: - fix: https://go.dev/cl/392355 - fix: https://go.googlesource.com/crypto/+/1baeb1ce4c0b006eff0f294c47cb7617598dfb3d - web: https://groups.google.com/g/golang-announce - web: https://groups.google.com/g/golang-announce/c/-cp44ypCT5s review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2766.yaml
id: GO-2024-2766 modules: - module: github.com/containers/libpod vulnerable_at: 1.9.3 - module: github.com/containers/libpod/v2 versions: - fixed: 2.0.5 vulnerable_at: 2.0.4 summary: Information disclosure in podman in github.com/containers/libpod cves: - CVE-2020-14370 ghsas: - GHSA-c3wv-qmjj-45r6 references: - advisory: https://github.com/advisories/GHSA-c3wv-qmjj-45r6 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2020-14370 - web: https://bugzilla.redhat.com/show_bug.cgi?id=1874268 - web: https://github.com/containers/podman/commit/a7e864e6e7de894d4edde4fff00e53dc6a0b5074 - web: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G6BPCZX4ASKNONL3MSCK564IVXNYSKLP - web: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y74V7HGQBNLT6XECCSNZNFZIB7G7XSAR - web: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z4Y2FSGQWP4AFT5AZ6UBN6RKHVXUBRFV source: id: GHSA-c3wv-qmjj-45r6 created: 2024-06-26T14:03:17.391801-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2731.yaml
id: GO-2024-2731 modules: - module: github.com/evmos/evmos vulnerable_at: 1.1.3 - module: github.com/evmos/evmos/v2 vulnerable_at: 2.0.2 - module: github.com/evmos/evmos/v3 vulnerable_at: 3.0.3 - module: github.com/evmos/evmos/v4 vulnerable_at: 4.0.2 - module: github.com/evmos/evmos/v5 vulnerable_at: 5.0.1 - module: github.com/evmos/evmos/v6 vulnerable_at: 6.0.4 - module: github.com/evmos/evmos/v7 vulnerable_at: 7.0.0 - module: github.com/evmos/evmos/v8 vulnerable_at: 8.2.3 - module: github.com/evmos/evmos/v9 vulnerable_at: 9.1.0 - module: github.com/evmos/evmos/v10 vulnerable_at: 10.0.1 - module: github.com/evmos/evmos/v11 vulnerable_at: 11.0.2 - module: github.com/evmos/evmos/v12 vulnerable_at: 12.1.6 - module: github.com/evmos/evmos/v13 unsupported_versions: - last_affected: 13.0.2 vulnerable_at: 13.0.2 summary: Evmos vulnerable to unauthorized account creation with vesting module in github.com/evmos/evmos ghsas: - GHSA-m99c-q26r-m7m7 references: - advisory: https://github.com/evmos/evmos/security/advisories/GHSA-m99c-q26r-m7m7 source: id: GHSA-m99c-q26r-m7m7 created: 2024-06-26T14:01:10.717273-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2537.yaml
id: GO-2024-2537 modules: - module: github.com/rancher/rancher non_go_versions: - introduced: 2.6.0 - fixed: 2.6.14 - introduced: 2.7.0 - fixed: 2.7.10 - introduced: 2.8.0 - fixed: 2.8.2 vulnerable_at: 1.6.30 summary: Rancher 'Audit Log' leaks sensitive information in github.com/rancher/rancher cves: - CVE-2023-22649 ghsas: - GHSA-xfj7-qf8w-2gcr references: - advisory: https://github.com/rancher/rancher/security/advisories/GHSA-xfj7-qf8w-2gcr source: id: GHSA-xfj7-qf8w-2gcr created: 2024-06-14T11:40:59.93657-04:00 review_status: UNREVIEWED unexcluded: EFFECTIVELY_PRIVATE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1114.yaml
id: GO-2022-1114 modules: - module: github.com/duke-git/lancet versions: - fixed: 1.3.4 vulnerable_at: 1.3.3 packages: - package: github.com/duke-git/lancet/fileutil symbols: - UnZip - module: github.com/duke-git/lancet/v2 versions: - introduced: 2.0.0 - fixed: 2.1.10 vulnerable_at: 2.1.9 packages: - package: github.com/duke-git/lancet/v2/fileutil symbols: - UnZip summary: ZipSlip when unzipping files in github.com/duke-git/lancet description: A ZipSlip vulnerability exists when using the fileutil package to unzip files. cves: - CVE-2022-41920 ghsas: - GHSA-pp3f-xrw5-q5j4 references: - report: https://github.com/duke-git/lancet/issues/62 - fix: https://github.com/duke-git/lancet/commit/f133b32faa05eb93e66175d01827afa4b7094572 - fix: https://github.com/duke-git/lancet/commit/f869a0a67098e92d24ddd913e188b32404fa72c9 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0085.yaml
id: GO-2021-0085 modules: - module: github.com/opencontainers/runc versions: - fixed: 1.0.0-rc8.0.20190930145003-cad42f6e0932 vulnerable_at: 1.0.0-rc8 packages: - package: github.com/opencontainers/runc/libcontainer/apparmor symbols: - ApplyProfile - package: github.com/opencontainers/runc/libcontainer/utils symbols: - CloseExecFrom - module: github.com/opencontainers/selinux versions: - fixed: 1.3.1-0.20190929122143-5215b1806f52 vulnerable_at: 1.3.0 packages: - package: github.com/opencontainers/selinux/go-selinux symbols: - readCon - writeCon skip_fix: 'TODO: revisit this reason (readCon and writeCon: func not found)' summary: Authorization bypass in github.com/opencontainers/runc description: |- AppArmor restrictions may be bypassed due to improper validation of mount targets, allowing a malicious image to mount volumes over e.g. /proc. published: 2021-04-14T20:04:52Z cves: - CVE-2019-16884 ghsas: - GHSA-fgv8-vj5c-2ppq credits: - Leopold Schabel references: - fix: https://github.com/opencontainers/runc/pull/2130 - fix: https://github.com/opencontainers/runc/commit/cad42f6e0932db0ce08c3a3d9e89e6063ec283e4 - fix: https://github.com/opencontainers/selinux/commit/03b517dc4fd57245b1cf506e8ba7b817b6d309da - web: https://github.com/opencontainers/runc/issues/2128 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2385.yaml
id: GO-2023-2385 modules: - module: github.com/pubnub/go vulnerable_at: 4.10.0+incompatible packages: - package: github.com/pubnub/go/utils symbols: - EncryptString - DecryptString - EncryptFile - DecryptFile - generateIV - unpadPKCS7 - padWithPKCS7 - EncryptCipherKey - aesCipher derived_symbols: - SerializeAndEncrypt - SerializeEncryptAndSerialize excluded_symbols: - TestComplexClassDecryption - TestComplexClassEncryption - module: github.com/pubnub/go/v5 vulnerable_at: 5.0.3 packages: - package: github.com/pubnub/go/v5/utils symbols: - EncryptString - DecryptString - EncryptFile - DecryptFile - generateIV - unpadPKCS7 - padWithPKCS7 - EncryptCipherKey - aesCipher derived_symbols: - SerializeAndEncrypt - SerializeEncryptAndSerialize excluded_symbols: - TestComplexClassDecryption - TestComplexClassEncryption - module: github.com/pubnub/go/v6 vulnerable_at: 6.1.0 packages: - package: github.com/pubnub/go/v6/utils symbols: - EncryptString - DecryptString - EncryptFile - DecryptFile - generateIV - unpadPKCS7 - padWithPKCS7 - EncryptCipherKey - aesCipher derived_symbols: - SerializeAndEncrypt - SerializeEncryptAndSerialize excluded_symbols: - TestComplexClassDecryption - TestComplexClassEncryption - module: github.com/pubnub/go/v7 vulnerable_at: 7.1.2 packages: - package: github.com/pubnub/go/v7/utils symbols: - EncryptString - DecryptString - EncryptFile - DecryptFile - generateIV - unpadPKCS7 - padWithPKCS7 - EncryptCipherKey - aesCipher derived_symbols: - SerializeAndEncrypt - SerializeEncryptAndSerialize excluded_symbols: - TestComplexClassDecryption - TestComplexClassEncryption - module: github.com/pubnub/go/v7 versions: - introduced: 7.2.0 vulnerable_at: 7.2.0 packages: - package: github.com/pubnub/go/v7/crypto symbols: - NewLegacyCryptor - legacyCryptor.Encrypt - legacyCryptor.Decrypt - legacyCryptor.EncryptStream - legacyCryptor.DecryptStream - EncryptCipherKey - legacyAesCipher derived_symbols: - NewAesCbcCryptoModule - NewLegacyCryptoModule - defaultExtendedCryptor.DecryptStream - defaultExtendedCryptor.EncryptStream - module.Decrypt - module.DecryptStream - module.Encrypt - module.EncryptStream summary: Insufficient entropy in AES-256-CBC in github.com/pubnub/go description: |- There is insufficient entropy in the implementation of the AES-256-CBC cryptographic algorithm. The provided encrypt functions are less secure when hex encoding and trimming are applied, leaving half of the bits in the key always the same for every encoded message or file. Users are encouraged to migrate to the new crypto package introduced in v7.2.0. cves: - CVE-2023-26154 ghsas: - GHSA-5844-q3fc-56rh references: - advisory: https://github.com/advisories/GHSA-5844-q3fc-56rh - fix: https://github.com/pubnub/go/commit/428517fef5b901db7275d9f5a75eda89a4c28e08 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0434.yaml
id: GO-2022-0434 modules: - module: std versions: - introduced: 1.18.0-0 - fixed: 1.18.1 vulnerable_at: 1.18.0 packages: - package: crypto/x509 goos: - darwin symbols: - Certificate.Verify summary: Panic during certificate parsing on Darwin in crypto/x509 description: |- Verifying certificate chains containing certificates which are not compliant with RFC 5280 causes Certificate.Verify to panic on macOS. These chains can be delivered through TLS and can cause a crypto/tls or net/http client to crash. published: 2022-05-23T21:59:00Z cves: - CVE-2022-27536 credits: - Tailscale references: - fix: https://go.dev/cl/393655 - fix: https://go.googlesource.com/go/+/0fca8a8f25cf4636fd980e72ba0bded4230922de - report: https://go.dev/issue/51759 - web: https://groups.google.com/g/golang-announce/c/oecdBNLOml8 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2468.yaml
id: GO-2024-2468 modules: - module: github.com/snapcore/snapd non_go_versions: - fixed: 2.57.6 vulnerable_at: 0.0.0-20240604014309-05c117cc187f summary: snapd Race Condition vulnerability in github.com/snapcore/snapd cves: - CVE-2022-3328 ghsas: - GHSA-cjqf-877p-7m3f references: - advisory: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3328 - advisory: https://github.com/advisories/GHSA-cjqf-877p-7m3f - advisory: https://nvd.nist.gov/vuln/detail/CVE-2022-3328 - fix: https://github.com/snapcore/snapd/commit/21ebc51f00b8a1417888faa2e83a372fd29d0f5e - fix: https://github.com/snapcore/snapd/commit/6226cdc57052f4b7057d92f2e549aa169e35cd2d - fix: https://github.com/snapcore/snapd/pull/12380 - web: https://ubuntu.com/security/notices/USN-5753-1 source: id: GHSA-cjqf-877p-7m3f created: 2024-06-04T15:37:54.887928-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2579.yaml
id: GO-2024-2579 modules: - module: github.com/apache/incubator-answer versions: - fixed: 1.2.5 vulnerable_at: 1.2.5-RC2 summary: Apache Answer Unrestricted Upload of File with Dangerous Type vulnerability in github.com/apache/incubator-answer cves: - CVE-2024-22393 ghsas: - GHSA-rmqp-mvv2-54c6 references: - advisory: https://github.com/advisories/GHSA-rmqp-mvv2-54c6 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-22393 - web: http://www.openwall.com/lists/oss-security/2024/02/22/1 - web: https://lists.apache.org/thread/f58l6dr4r74hl6o71gn47kmn44vw12cv source: id: GHSA-rmqp-mvv2-54c6 created: 2024-05-17T16:15:05.172081-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0492.yaml
id: GO-2022-0492 modules: - module: github.com/argoproj/argo-events versions: - fixed: 1.7.1 vulnerable_at: 1.7.0 packages: - package: github.com/argoproj/argo-events/sensors/artifacts symbols: - NewGitReader derived_symbols: - GetArtifactReader summary: Path traversal in github.com/argoproj/argo-events description: |- GitArtifactReader is vulnerable to directory traversal attacks. The GitArtifactReader.Read function reads and returns the contents of a Git repository file. A maliciously crafted repository can exploit this to cause Read to read from arbitrary files on the filesystem. published: 2022-07-15T23:30:03Z cves: - CVE-2022-25856 ghsas: - GHSA-qpgx-64h2-gc3c credits: - Derek Wang references: - fix: https://github.com/argoproj/argo-events/pull/1965 - web: https://github.com/argoproj/argo-events/issues/1947 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1515.yaml
id: GO-2023-1515 modules: - module: github.com/rancher/wrangler versions: - fixed: 0.7.4-security1 - introduced: 0.8.0 - fixed: 0.8.5-security1 - introduced: 0.8.6 - fixed: 0.8.11 - introduced: 1.0.0 - fixed: 1.0.1 vulnerable_at: 1.0.0 packages: - package: github.com/rancher/wrangler/pkg/git symbols: - Git.Clone - Git.fetchAndReset - Git.reset - Git.gitCmd derived_symbols: - Git.Ensure - Git.Head - Git.LsRemote - Git.Update summary: Denial of service when processing Git credentials in github.com/rancher/wrangler description: |- A denial of service (DoS) vulnerability exists in the Wrangler Git package. Specially crafted Git credentials can result in a denial of service (DoS) attack on an application that uses Wrangler due to the exhaustion of the available memory and CPU resources. This is caused by a lack of input validation of Git credentials before they are used, which may lead to a denial of service in some cases. This issue can be triggered when accessing both private and public Git repositories. A workaround is to sanitize input passed to the Git package to remove potential unsafe and ambiguous characters. Otherwise, the best course of action is to update to a patched Wrangler version. cves: - CVE-2022-43756 ghsas: - GHSA-8fcj-gf77-47mg references: - fix: https://github.com/rancher/wrangler/commit/341018c8fef3e12867c7cb2649bd2cecac75f287 - advisory: https://github.com/advisories/GHSA-8fcj-gf77-47mg - web: https://github.com/rancher/rancher/security/policy review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1709.yaml
id: GO-2023-1709 modules: - module: github.com/hashicorp/vault versions: - fixed: 1.11.9 - introduced: 1.12.0 - fixed: 1.12.5 - introduced: 1.13.0 - fixed: 1.13.1 vulnerable_at: 1.13.0 packages: - package: github.com/hashicorp/vault/shamir symbols: - div - mult derived_symbols: - Combine - Split summary: Cache-timing attacks in Shamir's secret sharing in github.com/hashicorp/vault description: |- HashiCorp Vault's implementation of Shamir's secret sharing uses precomputed table lookups, and is vulnerable to cache-timing attacks. An attacker with access to, and the ability to observe a large number of unseal operations on the host through a side channel may reduce the search space of a brute force effort to recover the Shamir shares. cves: - CVE-2023-25000 ghsas: - GHSA-vq4h-9ghm-qmrr credits: - Giuseppe Cocomazzi references: - fix: https://github.com/hashicorp/vault/pull/19495 - web: https://discuss.hashicorp.com/t/hcsec-2023-10-vault-vulnerable-to-cache-timing-attacks-during-seal-and-unseal-operations/52078 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2824.yaml
id: GO-2024-2824 modules: - module: std versions: - introduced: 1.22.0-0 - fixed: 1.22.3 vulnerable_at: 1.22.2 packages: - package: net symbols: - extractExtendedRCode derived_symbols: - Dial - DialTimeout - Dialer.Dial - Dialer.DialContext - Listen - ListenConfig.Listen - ListenConfig.ListenPacket - ListenPacket - LookupAddr - LookupCNAME - LookupHost - LookupIP - LookupMX - LookupNS - LookupSRV - LookupTXT - ResolveIPAddr - ResolveTCPAddr - ResolveUDPAddr - Resolver.LookupAddr - Resolver.LookupCNAME - Resolver.LookupHost - Resolver.LookupIP - Resolver.LookupIPAddr - Resolver.LookupMX - Resolver.LookupNS - Resolver.LookupNetIP - Resolver.LookupSRV - Resolver.LookupTXT summary: Malformed DNS message can cause infinite loop in net description: |- A malformed DNS message in response to a query can cause the Lookup functions to get stuck in an infinite loop. credits: - '@long-name-let-people-remember-you' - Mateusz Poliwczak references: - report: https://go.dev/issue/66754 - fix: https://go.dev/cl/578375 - web: https://groups.google.com/g/golang-announce/c/wkkO4P9stm0 cve_metadata: id: CVE-2024-24788 cwe: 'CWE 400: Uncontrolled Resource Consumption' references: - http://www.openwall.com/lists/oss-security/2024/05/08/3 - https://security.netapp.com/advisory/ntap-20240605-0002/ - https://security.netapp.com/advisory/ntap-20240614-0001/ source: id: go-security-team created: 2024-05-07T16:56:31.886878-04:00 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2380.yaml
id: GO-2023-2380 modules: - module: github.com/ecies/go/v2 versions: - fixed: 2.0.8 vulnerable_at: 2.0.7 packages: - package: github.com/ecies/go/v2 symbols: - PrivateKey.Encapsulate - PrivateKey.ECDH - PublicKey.Decapsulate derived_symbols: - Decrypt - Encrypt summary: Private key recovery via invalid curve point in github.com/ecies/go/v2 description: |- An attacker may be able to recover private keys due to a bug in the ECDH function. The library does not check whether the provided public key is on the curve, which means that an attacker can create a public key that is not on the curve and use it to recover the private key. A workaround is to manually check that the public key is valid by calling the IsOnCurve function from the secp256k1 libraries. cves: - CVE-2023-49292 ghsas: - GHSA-8j98-cjfr-qx3h references: - advisory: https://github.com/ecies/go/security/advisories/GHSA-8j98-cjfr-qx3h - fix: https://github.com/ecies/go/commit/c6e775163866d6ea5233eb8ec8530a9122101ebd - web: https://github.com/ashutosh1206/Crypton/blob/master/Diffie-Hellman-Key-Exchange/Attack-Invalid-Curve-Point/README.md review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2431.yaml
id: GO-2024-2431 modules: - module: github.com/cubefs/cubefs non_go_versions: - fixed: 3.3.1 vulnerable_at: 2.5.2+incompatible summary: Insecure random string generator used for sensitive data in github.com/cubefs/cubefs cves: - CVE-2023-46740 ghsas: - GHSA-4248-p65p-hcrm references: - advisory: https://github.com/cubefs/cubefs/security/advisories/GHSA-4248-p65p-hcrm - advisory: https://nvd.nist.gov/vuln/detail/CVE-2023-46740 - fix: https://github.com/cubefs/cubefs/commit/8555c6402794cabdf2cc025c8bea1576122c07ba source: id: GHSA-4248-p65p-hcrm created: 2024-06-14T11:34:36.394692-04:00 review_status: UNREVIEWED unexcluded: EFFECTIVELY_PRIVATE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1045.yaml
id: GO-2022-1045 modules: - module: github.com/sylabs/sif/v2 versions: - fixed: 2.8.1 vulnerable_at: 2.8.0 packages: - package: github.com/sylabs/sif/v2/pkg/integrity symbols: - signAndEncodeJSON - verifyAndDecode - newDigest - digest.MarshalJSON derived_symbols: - Signer.Sign - Verifier.Verify - digest.UnmarshalJSON summary: Improper validation of signature hash algorithms in github.com/sylabs/sif/v2 description: |- The Singularity Image Format (SIF) reference implementation does not verify that the hash algorithm(s) used are cryptographically secure when verifying digital signatures. cves: - CVE-2022-39237 ghsas: - GHSA-m5m3-46gj-wch8 references: - advisory: https://github.com/sylabs/sif/security/advisories/GHSA-m5m3-46gj-wch8 - fix: https://github.com/sylabs/sif/commit/07fb86029a12e3210f6131e065570124605daeaa review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2528.yaml
id: GO-2024-2528 modules: - module: go.etcd.io/etcd vulnerable_at: 2.3.8+incompatible - module: go.etcd.io/etcd/v3 non_go_versions: - fixed: 3.3.23 - introduced: 3.4.0-rc.0 - fixed: 3.4.10 vulnerable_at: 3.5.14 summary: Etcd Gateway TLS endpoint validation only confirms TCP reachability in go.etcd.io/etcd ghsas: - GHSA-j86v-2vjr-fg8f references: - advisory: https://github.com/etcd-io/etcd/security/advisories/GHSA-j86v-2vjr-fg8f source: id: GHSA-j86v-2vjr-fg8f created: 2024-06-26T16:10:23.766937-04:00 review_status: UNREVIEWED unexcluded: EFFECTIVELY_PRIVATE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0247.yaml
id: GO-2022-0247 modules: - module: cmd versions: - fixed: 1.16.9 - introduced: 1.17.0-0 - fixed: 1.17.2 vulnerable_at: 1.17.1 packages: - package: cmd/link goos: - js goarch: - wasm symbols: - Link.address skip_fix: fix does not work with Go <1.18 summary: Buffer overflow in WASM modules in misc/wasm and cmd/link description: |- When invoking functions from WASM modules, built using GOARCH=wasm GOOS=js, passing very large arguments can cause portions of the module to be overwritten with data from the arguments due to a buffer overflow error. If using wasm_exec.js to execute WASM modules, users will need to replace their copy (as described in https://golang.org/wiki/WebAssembly#getting-started) after rebuilding any modules. published: 2022-05-24T20:14:28Z cves: - CVE-2021-38297 credits: - Ben Lubar references: - fix: https://go.dev/cl/354571 - fix: https://go.googlesource.com/go/+/77f2750f4398990eed972186706f160631d7dae4 - report: https://go.dev/issue/48797 - web: https://groups.google.com/g/golang-announce/c/AEBu9j7yj5A review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0051.yaml
id: GO-2021-0051 modules: - module: github.com/labstack/echo/v4 versions: - fixed: 4.1.18-0.20201215153152-4422e3b66b9f vulnerable_at: 4.1.17 packages: - package: github.com/labstack/echo/v4 goos: - windows symbols: - common.static derived_symbols: - Echo.Static - Group.Static summary: Directory traversal on Windows in github.com/labstack/echo/v4 description: |- Due to improper sanitization of user input on Windows, the static file handler allows for directory traversal, allowing an attacker to read files outside of the target directory that the server has permission to read. published: 2021-04-14T20:04:52Z ghsas: - GHSA-j453-hm5x-c46w credits: - '@little-cui (Apache ServiceComb)' references: - fix: https://github.com/labstack/echo/pull/1718 - fix: https://github.com/labstack/echo/commit/4422e3b66b9fd498ed1ae1d0242d660d0ed3faaa cve_metadata: id: CVE-2020-36565 cwe: 'CWE 22: Improper Limitation of a Pathname to a Restricted Directory (''Path Traversal'')' review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0998.yaml
id: GO-2022-0998 modules: - module: github.com/sigstore/cosign versions: - fixed: 1.12.0 vulnerable_at: 1.11.1 packages: - package: github.com/sigstore/cosign/cmd/cosign/cli/verify symbols: - VerifyBlobCmd - verifySigByUUID - signatures - verifyRekorEntry - verifyRekorBundle derived_symbols: - VerifyAttestationCommand.Exec - VerifyCommand.Exec - package: github.com/sigstore/cosign/pkg/cosign symbols: - VerifySET derived_symbols: - TLogUpload - TLogUploadInTotoAttestation - VerifyBundle - VerifyImageAttestations - VerifyImageSignature - VerifyImageSignatures - VerifyLocalImageAttestations - VerifyLocalImageSignatures - VerifyTLogEntry summary: Improper blob verification in github.com/sigstore/cosign cves: - CVE-2022-36056 ghsas: - GHSA-8gw7-4j42-w388 references: - advisory: https://github.com/sigstore/cosign/security/advisories/GHSA-8gw7-4j42-w388 - fix: https://github.com/sigstore/cosign/commit/80b79ed8b4d28ccbce3d279fd273606b5cddcc25 - web: https://github.com/sigstore/cosign/releases/tag/v1.12.0 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2748.yaml
id: GO-2024-2748 modules: - module: k8s.io/apimachinery versions: - fixed: 0.16.13 - introduced: 0.17.0 - fixed: 0.17.9 - introduced: 0.18.0 - fixed: 0.18.7-rc.0 vulnerable_at: 0.18.6 packages: - package: k8s.io/apimachinery/pkg/util/net symbols: - ConnectWithRedirects - package: k8s.io/apimachinery/pkg/util/proxy symbols: - UpgradeAwareHandler.tryUpgrade derived_symbols: - UpgradeAwareHandler.ServeHTTP - module: k8s.io/kubernetes versions: - fixed: 1.16.13 - introduced: 1.17.0 - fixed: 1.17.9 - introduced: 1.18.0 - fixed: 1.18.7 vulnerable_at: 0.18.6 summary: Privilege Escalation in Kubernetes in k8s.io/apimachinery description: |- The Kubernetes kube-apiserver is vulnerable to an unvalidated redirect on proxied upgrade requests that could allow an attacker to escalate privileges from a node compromise to a full cluster compromise. cves: - CVE-2020-8559 ghsas: - GHSA-33c5-9fx5-fvjm references: - advisory: https://github.com/advisories/GHSA-33c5-9fx5-fvjm - web: https://bugzilla.redhat.com/show_bug.cgi?id=1851422 - web: https://github.com/kubernetes/kubernetes/issues/92914 - web: https://github.com/kubernetes/kubernetes/pull/92941 - web: https://github.com/tdwyer/CVE-2020-8559 - web: https://groups.google.com/d/msg/kubernetes-security-announce/JAIGG5yNROs/19nHQ5wkBwAJ - web: https://groups.google.com/g/kubernetes-security-announce/c/JAIGG5yNROs - web: https://security.netapp.com/advisory/ntap-20200810-0004 source: id: GHSA-33c5-9fx5-fvjm created: 2024-05-17T15:54:30.22341-04:00 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0425.yaml
id: GO-2022-0425 modules: - module: github.com/flynn/noise versions: - fixed: 1.0.0 vulnerable_at: 0.0.0-20210422170017-fc2bb37e287b packages: - package: github.com/flynn/noise symbols: - CipherState.Encrypt - CipherState.Decrypt - symmetricState.EncryptAndHash derived_symbols: - HandshakeState.ReadMessage - HandshakeState.WriteMessage - symmetricState.DecryptAndHash summary: Weak encryption and denial of service in github.com/flynn/noise description: |- The Noise protocol implementation suffers from weakened cryptographic security after encrypting 2^64 messages, and a potential denial of service attack. After 2^64 (~18.4 quintillion) messages are encrypted with the Encrypt function, the nonce counter will wrap around, causing multiple messages to be encrypted with the same key and nonce. In a separate issue, the Decrypt function increments the nonce state even when it fails to decrypt a message. If an attacker can provide an invalid input to the Decrypt function, this will cause the nonce state to desynchronize between the peers, resulting in a failure to encrypt all subsequent messages. published: 2022-02-15T01:57:18Z ghsas: - GHSA-6cr6-fmvc-vw2p - GHSA-g9mp-8g3h-3c5c references: - fix: https://github.com/flynn/noise/pull/44 cve_metadata: id: CVE-2021-4239 cwe: 'CWE 400: Uncontrolled Resource Consumption' review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0059.yaml
id: GO-2021-0059 modules: - module: github.com/tidwall/gjson versions: - fixed: 1.6.4 vulnerable_at: 1.6.3 packages: - package: github.com/tidwall/gjson symbols: - squash derived_symbols: - Get - GetBytes - GetMany - GetManyBytes - Result.Array - Result.Get - Result.Map - Result.Value summary: Panic due to improper input validation in Get in github.com/tidwall/gjson description: |- Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector. published: 2021-04-14T20:04:52Z cves: - CVE-2020-35380 ghsas: - GHSA-w942-gw6m-p62c credits: - '@toptotu' references: - fix: https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc - web: https://github.com/tidwall/gjson/issues/192 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2831.yaml
id: GO-2024-2831 modules: - module: github.com/spacemeshos/api/release/go versions: - fixed: 1.37.1 vulnerable_at: 1.37.0 packages: - package: github.com/spacemeshos/api/release/go/spacemesh/v1 - module: github.com/spacemeshos/go-spacemesh versions: - fixed: 1.5.2-hotfix1 vulnerable_at: 1.5.1 packages: - package: github.com/spacemeshos/go-spacemesh/activation symbols: - Handler.HandleGossipAtx - Handler.storeAtx - Handler.SyntacticallyValidateDeps - Handler.processATX skip_fix: 'Nonstandard cgo library: github.com/spacemeshos/post@v0.12.6/internal/postrs/api.go' - package: github.com/spacemeshos/go-spacemesh/events symbols: - ToMalfeasancePB derived_symbols: - CloseEventReporter - EmitAtxPublished - EmitBeacon - EmitEligibilities - EmitInitComplete - EmitInitFailure - EmitInitStart - EmitInvalidPostProof - EmitOwnMalfeasanceProof - EmitPoetWaitProof - EmitPoetWaitRound - EmitPostComplete - EmitPostFailure - EmitPostServiceStarted - EmitPostServiceStopped - EmitPostStart - EmitProposal - InitializeReporter - LayerUpdate.Field - ReportAccountUpdate - ReportError - ReportLayerUpdate - ReportMalfeasance - ReportNewActivation - ReportNewTx - ReportNodeStatusUpdate - ReportProposal - ReportResult - ReportRewardReceived - ReportTxWithValidity - SubcribeProposals - Subscribe - SubscribeAccount - SubscribeActivations - SubscribeErrors - SubscribeLayers - SubscribeMalfeasance - SubscribeMatched - SubscribeRewards - SubscribeStatus - SubscribeToLayers - SubscribeTxs - SubscribeUserEvents - package: github.com/spacemeshos/go-spacemesh/malfeasance symbols: - Validate - Handler.HandleSyncedMalfeasanceProof skip_fix: 'Nonstandard cgo library: github.com/spacemeshos/post@v0.12.6/internal/postrs/api.go' - package: github.com/spacemeshos/go-spacemesh/malfeasance/wire symbols: - MalfeasanceInfo - MalfeasanceProof.MarshalLogObject - Proof.DecodeScale derived_symbols: - AtxProof.DecodeScale - AtxProof.MarshalLogObject - AtxProofMsg.DecodeScale - AtxProofMsg.SignedBytes - BallotProof.DecodeScale - BallotProof.MarshalLogObject - BallotProofMsg.DecodeScale - BallotProofMsg.SignedBytes - HareMetadata.DecodeScale - HareMetadata.ToBytes - HareProof.DecodeScale - HareProof.MarshalLogObject - HareProofMsg.DecodeScale - HareProofMsg.SignedBytes - InvalidPostIndexProof.DecodeScale - InvalidPostIndexProof.EncodeScale - MalfeasanceGossip.DecodeScale - MalfeasanceGossip.EncodeScale - MalfeasanceProof.DecodeScale - MalfeasanceProof.EncodeScale - Proof.EncodeScale - package: github.com/spacemeshos/go-spacemesh/node symbols: - App.setupDBs - App.verifyDB skip_fix: 'Nonstandard cgo library: github.com/spacemeshos/post@v0.12.6/internal/postrs/api.go' - package: github.com/spacemeshos/go-spacemesh/sql/atxs symbols: - AddGettingNonce - IterateIDsByEpoch derived_symbols: - Add summary: ATX protocol validation problem in github.com/spacemeshos/go-spacemesh description: |- Nodes can publish ATXs which reference the incorrect previous ATX of the Smesher that created the ATX. ATXs are expected to form a single chain from the newest to the first ATX ever published by an identity. Allowing Smeshers to reference an earlier (but not the latest) ATX as previous breaks this protocol rule. cves: - CVE-2024-34360 ghsas: - GHSA-jcqq-g64v-gcm7 references: - advisory: https://github.com/spacemeshos/go-spacemesh/security/advisories/GHSA-jcqq-g64v-gcm7 - fix: https://github.com/spacemeshos/api/commit/1d5bd972bbe225d024c3e0ae5214ddb6b481716e - fix: https://github.com/spacemeshos/go-spacemesh/commit/9aff88d54be809ac43d60e8a8b4d65359c356b87 - web: https://spacemesh.io/blog/spacemesh-white-paper-1 source: id: GHSA-jcqq-g64v-gcm7 created: 2024-05-11T21:02:32.457027-07:00 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1086.yaml
id: GO-2022-1086 modules: - module: github.com/zalando/skipper versions: - fixed: 0.13.237 vulnerable_at: 0.13.236 packages: - package: github.com/zalando/skipper/proxy symbols: - mapRequest - proxyFromHeader - forwardToProxy derived_symbols: - Proxy.ServeHTTP - context.Loopback skip_fix: 'TODO: revisit this reason (net/redisclient: r.ring.SetAddrs undefined)' summary: Server-side request forger via X-Skipper-Proxy in github.com/zalando/skipper description: |- An attacker can access the internal metadata server or other unauthenticated URLs by adding a specific header (X-Skipper-Proxy) to the http request. cves: - CVE-2022-38580 ghsas: - GHSA-f2rj-m42r-6jm2 references: - advisory: https://github.com/zalando/skipper/security/advisories/GHSA-f2rj-m42r-6jm2 - fix: https://github.com/zalando/skipper/pull/2058 - web: https://github.com/zalando/skipper/releases/tag/v0.13.237 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2541.yaml
id: GO-2024-2541 modules: - module: github.com/mattermost/mattermost-server versions: - introduced: 9.1.0+incompatible - fixed: 9.1.5+incompatible - introduced: 9.2.0+incompatible - fixed: 9.2.4+incompatible vulnerable_at: 9.2.4-rc1+incompatible - module: github.com/mattermost/mattermost-server/v5 vulnerable_at: 5.39.3 - module: github.com/mattermost/mattermost-server/v6 vulnerable_at: 6.7.2 - module: github.com/mattermost/mattermost/server/v8 non_go_versions: - fixed: 8.1.8 vulnerable_at: 8.0.0-20240626184126-817e18414e41 summary: Mattermost vulnerable to denial of service via large number of emoji reactions in github.com/mattermost/mattermost-server cves: - CVE-2024-1402 ghsas: - GHSA-32h7-7j94-8fc2 unknown_aliases: - BIT-mattermost-2024-1402 - CGA-xjf7-9r4q-527v references: - advisory: https://github.com/advisories/GHSA-32h7-7j94-8fc2 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-1402 - web: https://github.com/mattermost/mattermost/commit/64cb0ca8af2dbda1afcddd1604460591a4799b81 - web: https://github.com/mattermost/mattermost/commit/6d2440de9fd774b67e65e3aac4ab8b6ef9aba2d8 - web: https://github.com/mattermost/mattermost/commit/81190e2da128a6985914ea7023a69ac400513fc4 - web: https://mattermost.com/security-updates source: id: GHSA-32h7-7j94-8fc2 created: 2024-06-26T16:13:23.271388-04:00 review_status: UNREVIEWED unexcluded: EFFECTIVELY_PRIVATE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1904.yaml
id: GO-2023-1904 modules: - module: github.com/bnb-chain/tss-lib versions: - fixed: 1.3.6-0.20230324145555-bb6fb30bd3eb vulnerable_at: 1.3.5 packages: - package: github.com/bnb-chain/tss-lib/common symbols: - SHA512_256 - SHA512_256i - module: github.com/binance-chain/tss-lib vulnerable_at: 1.3.0 packages: - package: github.com/binance-chain/tss-lib/common symbols: - SHA512_256 - SHA512_256i summary: Collision of hash values in github.com/bnb-chain/tss-lib description: Collision of hash values in github.com/bnb-chain/tss-lib. cves: - CVE-2022-47931 ghsas: - GHSA-cvcx-g7wh-x8rf references: - advisory: https://medium.com/@iofinnet/security-disclosure-for-ecdsa-and-eddsa-threshold-signature-schemes-4e969af7155b - fix: https://github.com/bnb-chain/tss-lib/pull/233 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2650.yaml
id: GO-2024-2650 modules: - module: github.com/go-vela/sdk-go versions: - fixed: 0.23.2 vulnerable_at: 0.23.1 summary: Golang SDK for Vela Insecure Variable Substitution in github.com/go-vela/sdk-go ghsas: - GHSA-v8mx-hp2q-gw85 references: - advisory: https://github.com/go-vela/sdk-go/security/advisories/GHSA-v8mx-hp2q-gw85 - fix: https://github.com/go-vela/sdk-go/commit/e3a34719badf37928e60f4402abe51f8b50055e1 source: id: GHSA-v8mx-hp2q-gw85 created: 2024-06-04T15:37:27.356345-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0083.yaml
id: GO-2021-0083 modules: - module: github.com/hybridgroup/gobot versions: - fixed: 1.12.1-0.20190521122906-c1aa4f867846 vulnerable_at: 1.12.1-0.20190521122836-07d9e09b1ea5 packages: - package: github.com/hybridgroup/gobot/platforms/mqtt symbols: - Adaptor.newTLSConfig derived_symbols: - Adaptor.Connect summary: Improper certificate validation in github.com/hybridgroup/gobot description: |- TLS certificate verification is skipped when connecting to a MQTT server. This allows an attacker who can MITM the connection to read, or forge, messages passed between the client and server. published: 2021-04-14T20:04:52Z cves: - CVE-2019-12496 ghsas: - GHSA-vfxc-r2gx-v2vq references: - fix: https://github.com/hybridgroup/gobot/commit/c1aa4f867846da4669ecf3bc3318bd96b7ee6f3f - web: https://github.com/hybridgroup/gobot/releases/tag/v1.13.0 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2003.yaml
id: GO-2023-2003 modules: - module: github.com/supranational/blst versions: - introduced: 0.3.0 - fixed: 0.3.11 vulnerable_at: 0.3.10 packages: - package: github.com/supranational/blst/bindings/go summary: Group signature validation bypass in github.com/supranational/blst description: |- When complemented with a check for infinity, blst skips performing a signature group-check. Formally speaking, infinity is the identity element of the elliptic curve group and as such it is a member of the group, so the group-check should be performed. The fix performs the check even in the presence of infinity. ghsas: - GHSA-8c37-7qx3-4c4p credits: - Yunjong Jeong (@blukat29) references: - fix: https://github.com/supranational/blst/commit/fb91221c91c82f65bfc7f243256308977a06d48b - web: https://github.com/supranational/blst/releases/tag/v0.3.11 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2133.yaml
id: GO-2023-2133 modules: - module: github.com/nats-io/nats-server/v2 versions: - introduced: 2.2.0 - fixed: 2.9.23 - introduced: 2.10.0 - fixed: 2.10.2 vulnerable_at: 2.10.1 packages: - package: github.com/nats-io/nats-server/v2/server symbols: - Options.processConfigFileLine - Server.configureAccounts derived_symbols: - ConfigureOptions - New - NewServer - Options.ProcessConfigFile - ProcessConfigFile - Run - Server.EnableJetStream - Server.Reload - Server.ReloadOptions - Server.SetDefaultSystemAccount - Server.SetSystemAccount - Server.Start summary: Authorization bypass in github.com/nats-io/nats-server/v2 description: |- Without any authorization rules in the nats-server, users can connect without authentication. Before nats-server 2.2.0, all authentication and authorization rules for a nats-server lived in an "authorization" block, defining users. With nats-server 2.2.0 all users live inside accounts. When using the authorization block, whose syntax predates this, those users will be placed into the implicit global account, "$G". Users inside accounts go into the newer "accounts" block. If an "accounts" block is defined, in simple deployment scenarios this is often used only to enable client access to the system account. When the only account added is the system account "$SYS", the nats-server would create an implicit user in "$G" and set it as the "no_auth_user" account, enabling the same "without authentication" logic as without any rules. This preserved the ability to connect simply, and then add one authenticated login for system access. But with an "authorization" block, this is wrong. Users exist in the global account, with login rules. And in simple testing, they might still connect fine without administrators seeing that authentication has been disabled. In the fixed versions, using an "authorization" block will inhibit the implicit creation of a "$G" user and setting it as the "no_auth_user" target. In unfixed versions, just creating a second account, with no users, will also inhibit this behavior. cves: - CVE-2023-47090 ghsas: - GHSA-fr2g-9hjm-wr23 credits: - Alex Herrington references: - fix: https://github.com/nats-io/nats-server/pull/4605 - fix: https://github.com/nats-io/nats-server/commit/fa5b7afcb64e7e887e49afdd032358802b5c4478 - advisory: https://advisories.nats.io/CVE/secnote-2023-01.txt - report: https://github.com/nats-io/nats-server/discussions/4535 - web: https://github.com/nats-io/nats-server/releases/tag/v2.10.2 - web: https://github.com/nats-io/nats-server/releases/tag/v2.9.23 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2763.yaml
id: GO-2024-2763 modules: - module: github.com/heketi/heketi versions: - fixed: 5.0.1+incompatible vulnerable_at: 5.0.0+incompatible summary: Heketi Arbitrary Code Execution in github.com/heketi/heketi cves: - CVE-2017-15103 ghsas: - GHSA-6g56-v9qg-jp92 references: - advisory: https://github.com/advisories/GHSA-6g56-v9qg-jp92 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2017-15103 - fix: https://github.com/heketi/heketi/commit/787bae461b23003a4daa4d1d639016a754cf6b00 - web: https://access.redhat.com/errata/RHSA-2017:3481 - web: https://access.redhat.com/security/cve/CVE-2017-15103 - web: https://bugzilla.redhat.com/show_bug.cgi?id=1510147 - web: https://github.com/heketi/heketi/releases/tag/v5.0.1 source: id: GHSA-6g56-v9qg-jp92 created: 2024-05-17T16:12:01.544224-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2931.yaml
id: GO-2024-2931 modules: - module: github.com/rancher/rancher non_go_versions: - introduced: 2.7.0 - fixed: 2.7.14 - introduced: 2.8.0 - fixed: 2.8.5 vulnerable_at: 1.6.30 summary: |- Rancher does not automatically clean up a user deleted or disabled from the configured Authentication Provider in github.com/rancher/rancher cves: - CVE-2023-22650 ghsas: - GHSA-9ghh-mmcq-8phc references: - advisory: https://github.com/rancher/rancher/security/advisories/GHSA-9ghh-mmcq-8phc source: id: GHSA-9ghh-mmcq-8phc created: 2024-06-27T15:54:12.45213-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0090.yaml
id: GO-2021-0090 modules: - module: github.com/tendermint/tendermint versions: - introduced: 0.33.0 - fixed: 0.34.0-dev1.0.20200702134149-480b995a3172 vulnerable_at: 0.33.0 packages: - package: github.com/tendermint/tendermint/types symbols: - VoteSet.MakeCommit derived_symbols: - MakeCommit summary: Denial of service in github.com/tendermint/tendermint description: |- Proposed commits may contain signatures for blocks not contained within the commit. Instead of skipping these signatures, they cause failure during verification. A malicious proposer can use this to force consensus failures. published: 2021-04-14T20:04:52Z cves: - CVE-2020-15091 ghsas: - GHSA-6jqj-f58p-mrw3 credits: - Neeraj Murarka references: - fix: https://github.com/tendermint/tendermint/pull/5426 - fix: https://github.com/tendermint/tendermint/commit/480b995a31727593f58b361af979054d17d84340 - web: https://github.com/tendermint/tendermint/issues/4926 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2741.yaml
id: GO-2024-2741 modules: - module: github.com/owncast/owncast versions: - fixed: 0.1.3 vulnerable_at: 0.1.2 summary: Owncast vulnerable to arbitrary file deletion in emoji.go (GHSL-2023-277) in github.com/owncast/owncast cves: - CVE-2024-31450 references: - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-31450 - fix: https://github.com/owncast/owncast/commit/1b14800c7d7f54be14ed4d130bfe7f480645076e - web: https://github.com/owncast/owncast/blob/v0.1.2/controllers/admin/emoji.go#L63 - web: https://github.com/owncast/owncast/releases/tag/v0.1.3 - web: https://securitylab.github.com/advisories/GHSL-2023-277_Owncast/ source: id: CVE-2024-31450 created: 2024-05-17T16:12:46.896265-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0427.yaml
id: GO-2022-0427 modules: - module: github.com/swaggo/http-swagger versions: - fixed: 1.2.6 vulnerable_at: 1.2.5 packages: - package: github.com/swaggo/http-swagger summary: Unprotected file upload in github.com/swaggo/http-swagger description: |- The httpSwagger package's HTTP handler provides WebDAV read/write access to an in-memory filesystem. An attacker can exploit this to cause memory exhaustion by uploading many files, XSS attacks by uploading malicious files, or other unexpected behaviors. cves: - CVE-2022-24863 - CVE-2024-25712 ghsas: - GHSA-49w7-5r33-jm9m - GHSA-xg75-q3q5-cqmv references: - web: https://cosmosofcyberspace.github.io/improper_http_method_leads_to_xss/poc.html - fix: https://github.com/swaggo/http-swagger/pull/62 - report: https://github.com/swaggo/http-swagger/issues/61 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2816.yaml
id: GO-2024-2816 modules: - module: kubevirt.io/kubevirt unsupported_versions: - last_affected: 1.2.0 vulnerable_at: 1.2.1 summary: kubevirt allows a local attacker to execute arbitrary code via a crafted command in kubevirt.io/kubevirt cves: - CVE-2024-33394 ghsas: - GHSA-4q63-mr2m-57hf references: - advisory: https://github.com/advisories/GHSA-4q63-mr2m-57hf - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-33394 - web: https://gist.github.com/HouqiyuA/1b75e23ece7ad98490aec1c887bdf49b source: id: GHSA-4q63-mr2m-57hf created: 2024-06-04T14:27:47.602792-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2095.yaml
id: GO-2023-2095 modules: - module: cmd versions: - fixed: 1.20.9 - introduced: 1.21.0-0 - fixed: 1.21.2 vulnerable_at: 1.21.1 packages: - package: cmd/go summary: Arbitrary code execution during build via line directives in cmd/go description: |- Line directives ("//line") can be used to bypass the restrictions on "//go:cgo_" directives, allowing blocked linker and compiler flags to be passed during compilation. This can result in unexpected execution of arbitrary code when running "go build". The line directive requires the absolute path of the file in which the directive lives, which makes exploiting this issue significantly more complex. references: - report: https://go.dev/issue/63211 - fix: https://go.dev/cl/533215 - web: https://groups.google.com/g/golang-announce/c/XBa1oHDevAo cve_metadata: id: CVE-2023-39323 cwe: 'CWE 94: Improper Control of Generation of Code (''Code Injection'')' references: - https://security.netapp.com/advisory/ntap-20231020-0001/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/ - https://security.gentoo.org/glsa/202311-09 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2574.yaml
id: GO-2024-2574 modules: - module: github.com/gofiber/fiber/v2 versions: - fixed: 2.52.1 vulnerable_at: 2.52.0 packages: - package: github.com/gofiber/fiber/v2/middleware/cors symbols: - New - matchSubdomain summary: |- Insecure CORS Configuration allowing wildcard origin with credentials in github.com/gofiber/fiber/v2 description: |- The CORS middleware allows for insecure configurations that could potentially expose the application to multiple CORS-related vulnerabilities. Specifically, it allows setting the Access-Control-Allow-Origin header to a wildcard ("*") while also having the Access-Control-Allow-Credentials set to true, which goes against recommended security best practices. cves: - CVE-2024-25124 ghsas: - GHSA-fmg4-x8pw-hjhg references: - advisory: https://github.com/gofiber/fiber/security/advisories/GHSA-fmg4-x8pw-hjhg - fix: https://github.com/gofiber/fiber/commit/f0cd3b44b086544a37886232d0530601f2406c23 - web: http://blog.portswigger.net/2016/10/exploiting-cors-misconfigurations-for.html - web: https://codeql.github.com/codeql-query-help/javascript/js-cors-misconfiguration-for-credentials - web: https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS/Errors/CORSNotSupportingCredentials - web: https://fetch.spec.whatwg.org/#cors-protocol-and-credentials - web: https://github.com/gofiber/fiber/releases/tag/v2.52.1 - web: https://saturncloud.io/blog/cors-cannot-use-wildcard-in-accesscontrolalloworigin-when-credentials-flag-is-true source: id: GHSA-fmg4-x8pw-hjhg created: 2024-05-17T15:29:50.096863-04:00 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2646.yaml
id: GO-2024-2646 modules: - module: github.com/argoproj/argo-cd versions: - introduced: 1.0.0 vulnerable_at: 1.8.6 - module: github.com/argoproj/argo-cd/v2 versions: - introduced: 2.0.0 - fixed: 2.8.12 - introduced: 2.9.0 - fixed: 2.9.8 - introduced: 2.10.0 - fixed: 2.10.3 vulnerable_at: 2.10.2 summary: |- Cross-site scripting on application summary component in github.com/argoproj/argo-cd/v2 description: |- Due to the improper URL protocols filtering of links specified in the link.argocd.argoproj.io annotations in the application summary component, an attacker can achieve cross-site scripting with elevated permissions. A malicious user to inject a javascript: link in the UI. When clicked by a victim user, the script will execute with the victim's permissions (up to and including admin). This vulnerability allows an attacker to perform arbitrary actions on behalf of the victim via the API, such as creating, modifying, and deleting Kubernetes resources. cves: - CVE-2024-28175 ghsas: - GHSA-jwv5-8mqv-g387 unknown_aliases: - BIT-argo-cd-2024-28175 credits: - '@Ry0taK, @agaudreault, and @crenshaw-dev' references: - advisory: https://github.com/argoproj/argo-cd/security/advisories/GHSA-jwv5-8mqv-g387 - fix: https://github.com/argoproj/argo-cd/commit/479b5544b57dc9ef767d49f7003f39602c480b71 notes: - Fix is in typescript code. review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2717.yaml
id: GO-2024-2717 modules: - module: github.com/go-skynet/LocalAI non_go_versions: - fixed: 2.10.0 vulnerable_at: 1.40.0 summary: LocalAI Command Injection in audioToWav in github.com/go-skynet/LocalAI cves: - CVE-2024-2029 ghsas: - GHSA-wx43-g55g-2jf4 references: - advisory: https://github.com/advisories/GHSA-wx43-g55g-2jf4 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-2029 - web: https://github.com/mudler/localai/commit/31a4c9c9d3abc58de2bdc5305419181c8b33eb1c - web: https://huntr.com/bounties/e092528a-ce3b-4e66-9b98-3f56d6b276b0 source: id: GHSA-wx43-g55g-2jf4 created: 2024-06-04T15:30:38.950992-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2113.yaml
id: GO-2023-2113 modules: - module: go.opentelemetry.io/contrib/instrumentation/github.com/emicklei/go-restful/otelrestful versions: - fixed: 0.44.0 vulnerable_at: 0.43.0 packages: - package: go.opentelemetry.io/contrib/instrumentation/github.com/emicklei/go-restful/otelrestful/internal/semconvutil symbols: - httpConv.proto derived_symbols: - HTTPClientRequest - HTTPServerRequest - httpConv.ClientRequest - httpConv.ServerRequest - module: go.opentelemetry.io/contrib/instrumentation/github.com/gin-gonic/gin/otelgin versions: - fixed: 0.44.0 vulnerable_at: 0.43.0 packages: - package: go.opentelemetry.io/contrib/instrumentation/github.com/gin-gonic/gin/otelgin/internal/semconvutil symbols: - httpConv.proto derived_symbols: - HTTPClientRequest - HTTPServerRequest - httpConv.ClientRequest - httpConv.ServerRequest - module: go.opentelemetry.io/contrib/instrumentation/github.com/gorilla/mux/otelmux versions: - fixed: 0.44.0 vulnerable_at: 0.43.0 packages: - package: go.opentelemetry.io/contrib/instrumentation/github.com/gorilla/mux/otelmux/internal/semconvutil symbols: - httpConv.proto derived_symbols: - HTTPClientRequest - HTTPServerRequest - httpConv.ClientRequest - httpConv.ServerRequest - module: go.opentelemetry.io/contrib/instrumentation/github.com/labstack/echo/otelecho versions: - fixed: 0.44.0 vulnerable_at: 0.43.0 packages: - package: go.opentelemetry.io/contrib/instrumentation/github.com/labstack/echo/otelecho/internal/semconvutil symbols: - httpConv.proto derived_symbols: - HTTPClientRequest - HTTPServerRequest - httpConv.ClientRequest - httpConv.ServerRequest - module: go.opentelemetry.io/contrib/instrumentation/gopkg.in/macaron.v1/otelmacaron versions: - fixed: 0.44.0 vulnerable_at: 0.43.0 packages: - package: go.opentelemetry.io/contrib/instrumentation/gopkg.in/macaron.v1/otelmacaron/internal/semconvutil symbols: - httpConv.proto derived_symbols: - HTTPClientRequest - HTTPServerRequest - httpConv.ClientRequest - httpConv.ServerRequest - module: go.opentelemetry.io/contrib/instrumentation/net/http/httptrace/otelhttptrace versions: - fixed: 0.44.0 vulnerable_at: 0.43.0 packages: - package: go.opentelemetry.io/contrib/instrumentation/net/http/httptrace/otelhttptrace/internal/semconvutil symbols: - httpConv.proto derived_symbols: - HTTPClientRequest - HTTPServerRequest - httpConv.ClientRequest - httpConv.ServerRequest - module: go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp versions: - fixed: 0.44.0 vulnerable_at: 0.43.0 packages: - package: go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp symbols: - middleware.serveHTTP summary: Memory exhaustion in go.opentelemetry.io/contrib/instrumentation cves: - CVE-2023-45142 ghsas: - GHSA-rcjv-mgp8-qvmr related: - CVE-2022-21698 - CVE-2023-25151 - GHSA-5r5m-65gx-7vrh - GHSA-cg3q-j54f-5p7p references: - advisory: https://github.com/open-telemetry/opentelemetry-go-contrib/security/advisories/GHSA-rcjv-mgp8-qvmr - fix: https://github.com/open-telemetry/opentelemetry-go-contrib/pull/4277 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2818.yaml
id: GO-2024-2818 modules: - module: github.com/btcsuite/btcd versions: - fixed: 0.24.0 vulnerable_at: 0.23.4 packages: - package: github.com/btcsuite/btcd/blockchain symbols: - BlockChain.calcSequenceLock derived_symbols: - BlockChain.CalcSequenceLock - BlockChain.CheckConnectBlockTemplate - BlockChain.ProcessBlock - ValidateTransactionScripts - txValidator.Validate - package: github.com/btcsuite/btcd/txscript symbols: - opcodeCheckSequenceVerify derived_symbols: - Engine.Execute - Engine.Step summary: Consensus failures in github.com/btcsuite/btcd description: |- Incorrect implementation of the consensus rules outlined in BIP 68 and BIP 112 making btcd susceptible to consensus failures. Specifically, it uses the transaction version as a signed integer when it is supposed to be treated as unsigned. There can be a chain split and loss of funds. cves: - CVE-2024-34478 ghsas: - GHSA-3jgf-r68h-xfqm credits: - Niklas Gögge references: - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-34478 - web: https://delvingbitcoin.org/t/disclosure-btcd-consensus-bugs-due-to-usage-of-signed-transaction-version/455 - web: https://github.com/btcsuite/btcd/blob/e4c88c3a3ecb1813529bf3dddc7a865bd418a6b8/blockchain/chain.go#L383C1-L392C3 - web: https://github.com/btcsuite/btcd/blob/e4c88c3a3ecb1813529bf3dddc7a865bd418a6b8/txscript/opcode.go#L1172C1-L1178C3 - fix: https://github.com/btcsuite/btcd/pull/1981 source: id: GHSA-3jgf-r68h-xfqm created: 2024-05-07T21:45:01.011365-07:00 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2669.yaml
id: GO-2024-2669 modules: - module: github.com/hashicorp/nomad versions: - introduced: 1.2.11 - fixed: 1.4.11 - introduced: 1.5.0 - fixed: 1.5.7 vulnerable_at: 1.5.6 summary: API token secret ID leak to Sentinel in github.com/hashicorp/nomad description: |- A vulnerability exists in Nomad where the API caller's ACL token secret ID is exposed to Sentinel policies. cves: - CVE-2023-3299 ghsas: - GHSA-9jfx-84v9-2rr2 credits: - anonymous4ACL24 references: - report: https://github.com/hashicorp/nomad/issues/17907 - web: https://discuss.hashicorp.com/t/hcsec-2023-21-nomad-caller-acl-tokens-secret-id-is-exposed-to-sentinel/56271 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2048.yaml
id: GO-2023-2048 modules: - module: github.com/cyphar/filepath-securejoin versions: - fixed: 0.2.4 vulnerable_at: 0.2.3 packages: - package: github.com/cyphar/filepath-securejoin goos: - windows symbols: - SecureJoinVFS derived_symbols: - SecureJoin summary: |- Paths outside of the rootfs could be produced on Windows in github.com/cyphar/filepath-securejoin description: |- Certain rootfs and path combinations result in generated paths that are outside of the provided rootfs on Windows. ghsas: - GHSA-6xv5-86q9-7xr8 credits: - '@pjbgf' references: - advisory: https://github.com/cyphar/filepath-securejoin/security/advisories/GHSA-6xv5-86q9-7xr8 - fix: https://github.com/cyphar/filepath-securejoin/commit/c121231e1276e11049547bee5ce68d5a2cfe2d9b review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0112.yaml
id: GO-2021-0112 modules: - module: go.mongodb.org/mongo-driver versions: - fixed: 1.5.1 vulnerable_at: 1.5.0 packages: - package: go.mongodb.org/mongo-driver/x/bsonx/bsoncore symbols: - AppendHeader - AppendRegex derived_symbols: - AppendArrayElement - AppendArrayElementStart - AppendBinaryElement - AppendBooleanElement - AppendCodeWithScopeElement - AppendDBPointerElement - AppendDateTimeElement - AppendDecimal128Element - AppendDocumentElement - AppendDocumentElementStart - AppendDoubleElement - AppendInt32Element - AppendInt64Element - AppendJavaScriptElement - AppendMaxKeyElement - AppendMinKeyElement - AppendNullElement - AppendObjectIDElement - AppendRegexElement - AppendStringElement - AppendSymbolElement - AppendTimeElement - AppendTimestampElement - AppendUndefinedElement - AppendValueElement - ArrayBuilder.AppendArray - ArrayBuilder.AppendBinary - ArrayBuilder.AppendBoolean - ArrayBuilder.AppendCodeWithScope - ArrayBuilder.AppendDBPointer - ArrayBuilder.AppendDateTime - ArrayBuilder.AppendDecimal128 - ArrayBuilder.AppendDocument - ArrayBuilder.AppendDouble - ArrayBuilder.AppendInt32 - ArrayBuilder.AppendInt64 - ArrayBuilder.AppendJavaScript - ArrayBuilder.AppendMaxKey - ArrayBuilder.AppendMinKey - ArrayBuilder.AppendNull - ArrayBuilder.AppendObjectID - ArrayBuilder.AppendRegex - ArrayBuilder.AppendString - ArrayBuilder.AppendSymbol - ArrayBuilder.AppendTimestamp - ArrayBuilder.AppendUndefined - ArrayBuilder.AppendValue - ArrayBuilder.StartArray - BuildArray - BuildArrayElement - BuildDocumentElement - DocumentBuilder.AppendArray - DocumentBuilder.AppendBinary - DocumentBuilder.AppendBoolean - DocumentBuilder.AppendCodeWithScope - DocumentBuilder.AppendDBPointer - DocumentBuilder.AppendDateTime - DocumentBuilder.AppendDecimal128 - DocumentBuilder.AppendDocument - DocumentBuilder.AppendDouble - DocumentBuilder.AppendInt32 - DocumentBuilder.AppendInt64 - DocumentBuilder.AppendJavaScript - DocumentBuilder.AppendMaxKey - DocumentBuilder.AppendMinKey - DocumentBuilder.AppendNull - DocumentBuilder.AppendObjectID - DocumentBuilder.AppendRegex - DocumentBuilder.AppendString - DocumentBuilder.AppendSymbol - DocumentBuilder.AppendTimestamp - DocumentBuilder.AppendUndefined - DocumentBuilder.AppendValue - DocumentBuilder.StartDocument - package: go.mongodb.org/mongo-driver/bson/bsonrw symbols: - valueWriter.writeElementHeader derived_symbols: - Copier.AppendArrayBytes - Copier.AppendDocumentBytes - Copier.AppendValueBytes - Copier.CopyArrayFromBytes - Copier.CopyBytesToArrayWriter - Copier.CopyBytesToDocumentWriter - Copier.CopyDocument - Copier.CopyDocumentFromBytes - Copier.CopyDocumentToBytes - Copier.CopyValue - Copier.CopyValueFromBytes - Copier.CopyValueToBytes - CopyDocument - valueWriter.WriteArray - valueWriter.WriteBinary - valueWriter.WriteBinaryWithSubtype - valueWriter.WriteBoolean - valueWriter.WriteCodeWithScope - valueWriter.WriteDBPointer - valueWriter.WriteDateTime - valueWriter.WriteDecimal128 - valueWriter.WriteDocument - valueWriter.WriteDouble - valueWriter.WriteInt32 - valueWriter.WriteInt64 - valueWriter.WriteJavascript - valueWriter.WriteMaxKey - valueWriter.WriteMinKey - valueWriter.WriteNull - valueWriter.WriteObjectID - valueWriter.WriteRegex - valueWriter.WriteString - valueWriter.WriteSymbol - valueWriter.WriteTimestamp - valueWriter.WriteUndefined - valueWriter.WriteValueBytes summary: Improper input validation in go.mongodb.org/mongo-driver description: |- Due to improper input sanitization when marshalling Go objects into BSON, a maliciously constructed Go structure could allow an attacker to inject additional fields into a MongoDB document. Users are affected if they use this package to handle untrusted user input. published: 2021-07-28T18:08:05Z cves: - CVE-2021-20329 ghsas: - GHSA-f6mq-5m25-4r72 references: - fix: https://github.com/mongodb/mongo-go-driver/pull/622 - fix: https://github.com/mongodb/mongo-go-driver/commit/2aca31d5986a9e1c65a92264736de9fdc3b9b4ca - web: https://jira.mongodb.org/browse/GODRIVER-1923 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0244.yaml
id: GO-2022-0244 modules: - module: github.com/satori/go.uuid versions: - introduced: 1.2.1-0.20180103161547-0ef6afb2f6cd - fixed: 1.2.1-0.20180404165556-75cca531ea76 vulnerable_at: 1.2.1-0.20180103161547-0ef6afb2f6cd packages: - package: github.com/satori/go.uuid symbols: - rfc4122Generator.NewV4 - rfc4122Generator.getClockSequence - rfc4122Generator.getHardwareAddr derived_symbols: - NewV1 - NewV2 - NewV4 - rfc4122Generator.NewV1 - rfc4122Generator.NewV2 summary: Insufficient randomness in UUIDs in github.com/satori/go.uuid description: |- Random data used to create UUIDs can contain zeros, resulting in predictable UUIDs and possible collisions. published: 2022-07-15T23:06:26Z cves: - CVE-2021-3538 ghsas: - GHSA-33m6-q9v5-62r7 credits: - '@josselin-c' references: - fix: https://github.com/satori/go.uuid/pull/75 - fix: https://github.com/satori/go.uuid/commit/75cca531ea763666bc46e531da3b4c3b95f64557 - report: https://github.com/satori/go.uuid/issues/73 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1295.yaml
id: GO-2023-1295 modules: - module: github.com/square/squalor versions: - fixed: 0.0.0-20200306154055-f6f0a47cc344 vulnerable_at: 0.0.0-20190215211619-afa27bf1201c packages: - package: github.com/square/squalor symbols: - quoteName - Table.loadColumns - Table.loadKeys derived_symbols: - AliasedTableExpr.Serialize - AndExpr.Serialize - BinaryExpr.Serialize - ColName.Serialize - Columns.Serialize - ComparisonExpr.Serialize - DB.BindModel - DB.Delete - DB.DeleteContext - DB.Exec - DB.ExecContext - DB.Get - DB.GetContext - DB.Insert - DB.InsertContext - DB.InsertIgnore - DB.InsertIgnoreContext - DB.MustBindModel - DB.Query - DB.QueryContext - DB.QueryRow - DB.QueryRowContext - DB.Replace - DB.ReplaceContext - DB.Select - DB.SelectContext - DB.Update - DB.UpdateContext - DB.Upsert - DB.UpsertContext - Delete.Serialize - FuncExpr.Serialize - GroupBy.Serialize - Insert.Serialize - JoinTableExpr.Serialize - Limit.Serialize - LoadTable - NonStarExpr.Serialize - NotExpr.Serialize - NullCheck.Serialize - OnDup.Serialize - OnJoinCond.Serialize - OrExpr.Serialize - Order.Serialize - OrderBy.Serialize - ParenBoolExpr.Serialize - RangeCond.Serialize - Select.Serialize - SelectExprs.Serialize - Serialize - StandardLogger.Log - StarExpr.Serialize - TableExprs.Serialize - TableName.Serialize - TableNames.Serialize - Tx.Delete - Tx.DeleteContext - Tx.Exec - Tx.ExecContext - Tx.Get - Tx.GetContext - Tx.Insert - Tx.InsertContext - Tx.InsertIgnore - Tx.InsertIgnoreContext - Tx.Query - Tx.QueryContext - Tx.QueryRow - Tx.QueryRowContext - Tx.Replace - Tx.ReplaceContext - Tx.Select - Tx.SelectContext - Tx.Update - Tx.UpdateContext - Tx.Upsert - Tx.UpsertContext - Update.Serialize - UpdateExpr.Serialize - UpdateExprs.Serialize - UsingJoinCond.Serialize - ValExprs.Serialize - ValTuple.Serialize - Values.Serialize - Where.Serialize summary: SQL injection in github.com/square/squalor description: There is a potential for SQL injection in the table name parameter. cves: - CVE-2020-36645 ghsas: - GHSA-3hc7-2xcc-7p8f references: - report: https://github.com/square/squalor/pull/76 - fix: https://github.com/square/squalor/pull/76/commits/033350b8596b397c6cefa066b1f2c83d35fc8c4a review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0227.yaml
id: GO-2021-0227 modules: - module: golang.org/x/crypto versions: - fixed: 0.0.0-20201216223049-8b5274cf687f vulnerable_at: 0.0.0-20201208171446-5f87f3452ae9 packages: - package: golang.org/x/crypto/ssh symbols: - connection.serverAuthenticate derived_symbols: - NewServerConn summary: Panic on crafted authentication request message in golang.org/x/crypto/ssh description: |- Clients can cause a panic in SSH servers. An attacker can craft an authentication request message for the “gssapi-with-mic” method which will cause NewServerConn to panic via a nil pointer dereference if ServerConfig.GSSAPIWithMICConfig is nil. published: 2022-02-17T17:35:32Z cves: - CVE-2020-29652 ghsas: - GHSA-3vm4-22fp-5rfm credits: - Joern Schneewesiz (GitLab Security Research Team) references: - fix: https://go.dev/cl/278852 - fix: https://go.googlesource.com/crypto/+/8b5274cf687fd9316b4108863654cc57385531e8 - web: https://groups.google.com/g/golang-announce/c/ouZIlBimOsE?pli=1 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1821.yaml
id: GO-2023-1821 modules: - module: github.com/cosmos/cosmos-sdk vulnerable_at: 0.47.3 packages: - package: github.com/cosmos/cosmos-sdk/x/crisis summary: The x/crisis package does not cause chain halt in github.com/cosmos/cosmos-sdk description: |- If an invariant check fails on a Cosmos SDK network, and a transaction is sent to the x/crisis package to halt the chain, the chain does not halt as originally intended. No patch will be released, as the package is planned to be deprecated and replaced. ghsas: - GHSA-qfc5-6r3j-jj22 references: - advisory: https://github.com/cosmos/cosmos-sdk/security/advisories/GHSA-qfc5-6r3j-jj22 - report: https://github.com/cosmos/cosmos-sdk/issues/15325 - report: https://github.com/cosmos/cosmos-sdk/issues/15706 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1118.yaml
id: GO-2022-1118 modules: - module: github.com/codenotary/immudb versions: - fixed: 1.4.1 vulnerable_at: 1.4.0 packages: - package: github.com/codenotary/immudb/pkg/client symbols: - NewImmuClient - DefaultOptions - immuClient.OpenSession derived_symbols: - NewClient summary: Improper validation of UUIDs in github.com/codenotary/immudb description: |- A malicious server can trick a client into treating it as a different server by changing the reported UUID. immudb client SDKs use the server's UUID to distinguish between different server instance so that the client can connect to different immudb instances and keep the state for multiple servers. The SDK does not validate this UUID and accepts any value reported by the server. A malicious server can therefore change the reported UUID and trick the client into treating it as a different server. cves: - CVE-2022-39199 ghsas: - GHSA-6cqj-6969-p57x references: - advisory: https://github.com/codenotary/immudb/security/advisories/GHSA-6cqj-6969-p57x - fix: https://github.com/codenotary/immudb/commit/cade04756ff3f0a3b9e8d24149062744574adf5d review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0319.yaml
id: GO-2021-0319 modules: - module: std versions: - fixed: 1.16.14 - introduced: 1.17.0-0 - fixed: 1.17.7 vulnerable_at: 1.17.6 packages: - package: crypto/elliptic symbols: - CurveParams.IsOnCurve - p384PointFromAffine - p521PointFromAffine skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)' summary: Incorrect computation for some invalid field elements in crypto/elliptic description: |- Some big.Int values that are not valid field elements (negative or overflowing) might cause Curve.IsOnCurve to incorrectly return true. Operating on those values may cause a panic or an invalid curve operation. Note that Unmarshal will never return such values. published: 2022-05-23T22:15:21Z cves: - CVE-2022-23806 credits: - Guido Vranken references: - fix: https://go.dev/cl/382455 - fix: https://go.googlesource.com/go/+/7f9494c277a471f6f47f4af3036285c0b1419816 - web: https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ - report: https://go.dev/issue/50974 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1148.yaml
id: GO-2022-1148 modules: - module: github.com/libp2p/go-libp2p versions: - fixed: 0.18.0 vulnerable_at: 0.18.0-rc1 packages: - package: github.com/libp2p/go-libp2p symbols: - New derived_symbols: - DefaultStaticRelays - Muxer - NewWithoutDefaults - Security - Transport - package: github.com/libp2p/go-libp2p/config symbols: - MuxerConstructor - makeMuxer - TransportConstructor - makeTransports - makeArgumentConstructors - makeConstructor - SecurityConstructor derived_symbols: - Config.NewNode - package: github.com/libp2p/go-libp2p/p2p/host/autonat symbols: - client.DialBack - autoNATService.handleStream derived_symbols: - New - package: github.com/libp2p/go-libp2p/p2p/host/basic symbols: - BasicHost.newStreamHandler derived_symbols: - NewHost - package: github.com/libp2p/go-libp2p/p2p/protocol/circuitv1/relay symbols: - NewRelay - package: github.com/libp2p/go-libp2p/p2p/protocol/circuitv2/client symbols: - Client.connectV1 - Client.connectV2 - Client.Dial - package: github.com/libp2p/go-libp2p/p2p/protocol/circuitv2/relay symbols: - New - Relay.Close - Relay.handleStream - Relay.handleConnect - package: github.com/libp2p/go-libp2p/p2p/protocol/holepunch symbols: - Service.initiateHolePunch - Service.incomingHolePunch - Service.handleNewStream derived_symbols: - Service.DirectConnect - netNotifiee.Connected summary: Resource exhaustion in github.com/libp2p/go-libp2p description: |- go-libp2p is vulnerable to targeted resource exhaustion attacks. These attacks target libp2p's connection, stream, peer, and memory management. An attacker can cause the allocation of large amounts of memory ultimately leading to the process getting killed by the host's operating system. While a connection manager tasked with keeping the number of connections within manageable limits has been part of go-libp2p, this component was designed to handle the regular churn of peers, not a targeted resource exhaustion attack. It's recommend to update to v0.21.0 onwards to get some useful functionality that will help in production environments like better metrics around resource usage, Grafana dashboards around resource usage, allow list support, and default autoscaling limits. cves: - CVE-2022-23492 ghsas: - GHSA-j7qp-mfxf-8xjw references: - advisory: https://github.com/libp2p/go-libp2p/security/advisories/GHSA-j7qp-mfxf-8xjw - fix: https://github.com/libp2p/go-libp2p/commit/15d7dfbf54264ead8e6f49ca658d79c90635e2de review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2434.yaml
id: GO-2024-2434 modules: - module: github.com/cubefs/cubefs non_go_versions: - fixed: 3.3.1 vulnerable_at: 2.5.2+incompatible summary: CubeFS leaks users key in logs in github.com/cubefs/cubefs cves: - CVE-2023-46742 ghsas: - GHSA-vwch-g97w-hfg2 references: - advisory: https://github.com/cubefs/cubefs/security/advisories/GHSA-vwch-g97w-hfg2 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2023-46742 - fix: https://github.com/cubefs/cubefs/commit/8dccce6ac8dff3db44d7e9074094c7303a5ff5dd source: id: GHSA-vwch-g97w-hfg2 created: 2024-06-14T11:34:49.71851-04:00 review_status: UNREVIEWED unexcluded: EFFECTIVELY_PRIVATE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2485.yaml
id: GO-2024-2485 modules: - module: github.com/hashicorp/vault versions: - introduced: 0.11.0 - fixed: 1.3.4 vulnerable_at: 1.3.3 summary: HashiCorp Vault Improper Privilege Management in github.com/hashicorp/vault cves: - CVE-2020-10661 ghsas: - GHSA-j6vv-vv26-rh7c unknown_aliases: - BIT-vault-2020-10661 references: - advisory: https://github.com/advisories/GHSA-j6vv-vv26-rh7c - advisory: https://nvd.nist.gov/vuln/detail/CVE-2020-10661 - fix: https://github.com/hashicorp/vault/commit/18485ee9d4352ac8e8396c580b5941ccf8e5b31a - web: https://github.com/hashicorp/vault/blob/master/CHANGELOG.md#134-march-19th-2020 - web: https://www.hashicorp.com/blog/category/vault source: id: GHSA-j6vv-vv26-rh7c created: 2024-06-14T11:37:17.728135-04:00 review_status: UNREVIEWED unexcluded: EFFECTIVELY_PRIVATE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2488.yaml
id: GO-2024-2488 modules: - module: github.com/hashicorp/vault versions: - introduced: 0.8.3 - fixed: 1.2.5 - introduced: 1.3.0 - fixed: 1.3.8 - introduced: 1.4.0 - fixed: 1.4.4 - introduced: 1.5.0 - fixed: 1.5.1 vulnerable_at: 1.5.0 summary: HashiCorp Vault Authentication bypass in github.com/hashicorp/vault cves: - CVE-2020-16251 ghsas: - GHSA-4mp7-2m29-gqxf unknown_aliases: - BIT-vault-2020-16251 references: - advisory: https://github.com/advisories/GHSA-4mp7-2m29-gqxf - advisory: https://nvd.nist.gov/vuln/detail/CVE-2020-16251 - web: http://packetstormsecurity.com/files/159479/Hashicorp-Vault-GCP-IAM-Integration-Authentication-Bypass.html - web: https://github.com/hashicorp/vault/blob/master/CHANGELOG.md#151 - web: https://www.hashicorp.com/blog/category/vault source: id: GHSA-4mp7-2m29-gqxf created: 2024-06-14T11:37:32.985013-04:00 review_status: UNREVIEWED unexcluded: EFFECTIVELY_PRIVATE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2799.yaml
id: GO-2024-2799 modules: - module: github.com/mcu-tools/mcuboot unsupported_versions: - cve_version_range: affected at <= 1.11.0 vulnerable_at: 1.10.0 summary: MCUboot Injection attack of unprotected TLV values in github.com/mcu-tools/mcuboot cves: - CVE-2024-32883 references: - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-32883 - web: https://github.com/mcu-tools/mcuboot/security/advisories/GHSA-m59c-q9gq-rh2j source: id: CVE-2024-32883 created: 2024-06-04T15:26:24.569-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0391.yaml
id: GO-2022-0391 modules: - module: github.com/aws/aws-sdk-go versions: - fixed: 1.34.0 vulnerable_at: 1.30.0 packages: - package: github.com/aws/aws-sdk-go/service/s3/s3crypto symbols: - encodeMeta derived_symbols: - DecryptionClient.GetObject - DecryptionClient.GetObjectWithContext - EncryptionClient.PutObject - EncryptionClient.PutObjectWithContext - S3LoadStrategy.Load - S3SaveStrategy.Save - defaultV2LoadStrategy.Load - kmsKeyHandler.DecryptKey - kmsKeyHandler.DecryptKeyWithContext - kmsKeyHandler.GenerateCipherData - kmsKeyHandler.GenerateCipherDataWithContext summary: Exposure of unencrypted plaintext hash in github.com/aws/aws-sdk-go description: |- The AWS S3 Crypto SDK sends an unencrypted hash of the plaintext alongside the ciphertext as a metadata field. This hash can be used to brute force the plaintext, if the hash is readable to the attacker. AWS now blocks this metadata field, but older SDK versions still send it. published: 2022-07-01T20:10:56Z ghsas: - GHSA-6jvc-q2x7-pchv - GHSA-76wf-9vgp-pj7w references: - fix: https://github.com/aws/aws-sdk-go/commit/35fa6ddf45c061e0f08d3a3b5119f8f4da38f6d1 cve_metadata: id: CVE-2022-2582 cwe: 'CWE 311: Missing Encryption of Sensitive Data' review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0037.yaml
id: GO-2020-0037 modules: - module: github.com/tendermint/tendermint versions: - fixed: 0.31.1 vulnerable_at: 0.31.0 packages: - package: github.com/tendermint/tendermint/rpc/lib/client symbols: - makeHTTPClient derived_symbols: - NewJSONRPCClient - NewURIClient summary: Uncontrolled resource consumption in github.com/tendermint/tendermint description: |- Due to support of Gzip compression in request bodies, as well as a lack of limiting response body sizes, a malicious server can cause a client to consume a significant amount of system resources, which may be used as a denial of service vector. published: 2021-04-14T20:04:52Z ghsas: - GHSA-3fm3-m23v-5r46 credits: - '@guagualvcha' references: - fix: https://github.com/tendermint/tendermint/pull/3430 - fix: https://github.com/tendermint/tendermint/commit/03085c2da23b179c4a51f59a03cb40aa4e85a613 cve_metadata: id: CVE-2019-25072 cwe: 'CWE-400: Uncontrolled Resource Consumption' review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1860.yaml
id: GO-2023-1860 modules: - module: github.com/cosmos/ibc-go/v7 versions: - fixed: 7.0.1 vulnerable_at: 7.0.0 packages: - package: github.com/cosmos/ibc-go/v7/modules/core/04-channel/keeper symbols: - Keeper.UnreceivedPackets - package: github.com/cosmos/ibc-go/v7/modules/core/keeper symbols: - Keeper.RecvPacket derived_symbols: - Keeper.UnreceivedPackets - module: github.com/cosmos/ibc-go/v6 versions: - fixed: 6.1.1 vulnerable_at: 6.1.0 packages: - package: github.com/cosmos/ibc-go/v6/modules/core/04-channel/keeper symbols: - Keeper.UnreceivedPackets skip_fix: v6.1.0 does not build without replace directives - package: github.com/cosmos/ibc-go/v6/modules/core/keeper symbols: - Keeper.RecvPacket skip_fix: v6.1.0 does not build without replace directives - module: github.com/cosmos/ibc-go/v5 versions: - fixed: 5.2.1 - introduced: 5.3.0 - fixed: 5.3.1 vulnerable_at: 5.3.0 packages: - package: github.com/cosmos/ibc-go/v5/modules/core/04-channel/keeper symbols: - Keeper.UnreceivedPackets skip_fix: v5.3.0 does not build without replace directives - package: github.com/cosmos/ibc-go/v5/modules/core/keeper symbols: - Keeper.RecvPacket skip_fix: v5.3.0 does not build without replace directives - module: github.com/cosmos/ibc-go/v4 versions: - fixed: 4.1.3 - introduced: 4.2.0 - fixed: 4.2.2 - introduced: 4.3.0 - fixed: 4.3.1 - introduced: 4.4.0 - fixed: 4.4.1 vulnerable_at: 4.1.2 packages: - package: github.com/cosmos/ibc-go/v4/modules/core/04-channel/keeper symbols: - Keeper.UnreceivedPackets skip_fix: v4.1.2 does not build without replace directives - package: github.com/cosmos/ibc-go/v4/modules/core/keeper symbols: - Keeper.RecvPacket skip_fix: v4.1.2 does not build without replace directives summary: IBC protocol "Huckleberry" vulnerability in github.com/cosmos/ibc-go description: |- The ibc-go module is affected by the Inter-Blockchain Communication (IBC) protocol "Huckleberry" vulnerability. references: - advisory: https://forum.cosmos.network/t/ibc-security-advisory-huckleberry/10731 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0234.yaml
id: GO-2021-0234 modules: - module: std versions: - fixed: 1.15.9 - introduced: 1.16.0-0 - fixed: 1.16.1 vulnerable_at: 1.16.0 packages: - package: encoding/xml symbols: - Decoder.Token skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)' summary: Infinite loop when decoding inputs in encoding/xml description: |- The Decode, DecodeElement, and Skip methods of an xml.Decoder provided by xml.NewTokenDecoder may enter an infinite loop when operating on a custom xml.TokenReader which returns an EOF in the middle of an open XML element. published: 2022-02-17T17:34:24Z cves: - CVE-2021-27918 credits: - Sam Whited references: - fix: https://go.dev/cl/300391 - fix: https://go.googlesource.com/go/+/d0b79e3513a29628f3599dc8860666b6eed75372 - report: https://go.dev/issue/44913 - web: https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2757.yaml
id: GO-2024-2757 modules: - module: code.gitea.io/gitea versions: - introduced: 1.9.0 - fixed: 1.13.2 vulnerable_at: 1.13.1 summary: Buffer Overflow in gitea in code.gitea.io/gitea cves: - CVE-2021-3382 ghsas: - GHSA-9f8c-pfvv-p4gm unknown_aliases: - BIT-gitea-2021-3382 references: - advisory: https://github.com/advisories/GHSA-9f8c-pfvv-p4gm - advisory: https://nvd.nist.gov/vuln/detail/CVE-2021-3382 - web: https://github.com/go-gitea/gitea/pull/14390 source: id: GHSA-9f8c-pfvv-p4gm created: 2024-05-17T16:12:14.05802-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2743.yaml
id: GO-2024-2743 modules: - module: github.com/apache/incubator-answer versions: - fixed: 1.3.0 vulnerable_at: 1.3.0-RC1 summary: XSS vulnerability via personal website in github.com/apache/incubator-answer cves: - CVE-2024-29217 ghsas: - GHSA-cvqr-mwh6-2vc6 credits: - Tsubasa Umeuchi references: - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-29217 - web: https://lists.apache.org/thread/nc0g1borr0d3wx25jm39pn7nyf268n0x source: id: GHSA-cvqr-mwh6-2vc6 created: 2024-04-22T13:43:40.133698-04:00 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0064.yaml
id: GO-2021-0064 modules: - module: k8s.io/client-go versions: - fixed: 0.20.0-alpha.2 vulnerable_at: 0.20.0-alpha.1 packages: - package: k8s.io/client-go/transport symbols: - requestInfo.toCurl derived_symbols: - basicAuthRoundTripper.RoundTrip - bearerAuthRoundTripper.RoundTrip - debuggingRoundTripper.RoundTrip - impersonatingRoundTripper.RoundTrip - userAgentRoundTripper.RoundTrip summary: |- Unauthorized credential disclosure via debug logs in k8s.io/kubernetes and k8s.io/client-go description: |- Authorization tokens may be inappropriately logged if the verbosity level is set to a debug level. This is due to an incomplete fix for CVE-2019-11250. published: 2021-04-14T20:04:52Z cves: - CVE-2020-8565 ghsas: - GHSA-8cfg-vx93-jvxw credits: - '@sfowl' references: - fix: https://github.com/kubernetes/kubernetes/pull/95316 - fix: https://github.com/kubernetes/kubernetes/commit/e99df0e5a75eb6e86123b56d53e9b7ca0fd00419 - web: https://github.com/kubernetes/kubernetes/issues/95623 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2440.yaml
id: GO-2024-2440 modules: - module: github.com/buildkite/elastic-ci-stack-for-aws vulnerable_at: 4.5.0+incompatible - module: github.com/buildkite/elastic-ci-stack-for-aws/v5 vulnerable_at: 5.22.5 - module: github.com/buildkite/elastic-ci-stack-for-aws/v6 versions: - fixed: 6.7.1 vulnerable_at: 6.7.0 summary: |- Buildkite Elastic CI for AWS time-of-check-time-of-use race condition vulnerability in github.com/buildkite/elastic-ci-stack-for-aws cves: - CVE-2023-43741 ghsas: - GHSA-r5hg-349q-mg2q references: - advisory: https://github.com/advisories/GHSA-r5hg-349q-mg2q - advisory: https://nvd.nist.gov/vuln/detail/CVE-2023-43741 - fix: https://github.com/buildkite/elastic-ci-stack-for-aws/commit/edad0b158ea10a6647bb1c84629d93f5c3d8770e - web: https://github.com/atredispartners/advisories/blob/master/ATREDIS-2023-0003.md source: id: GHSA-r5hg-349q-mg2q created: 2024-06-26T16:12:24.457895-04:00 review_status: UNREVIEWED unexcluded: NOT_IMPORTABLE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2843.yaml
id: GO-2024-2843 modules: - module: github.com/grafana/grafana non_go_versions: - introduced: 8.0.0 - fixed: 8.5.15 - introduced: 9.0.0 - fixed: 9.2.4 vulnerable_at: 5.4.5+incompatible summary: Grafana Email addresses and usernames can not be trusted in github.com/grafana/grafana cves: - CVE-2022-39306 ghsas: - GHSA-2x6g-h2hg-rq84 unknown_aliases: - BIT-grafana-2022-39306 references: - advisory: https://github.com/grafana/grafana/security/advisories/GHSA-2x6g-h2hg-rq84 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2022-39306 - web: https://security.netapp.com/advisory/ntap-20221215-0004 source: id: GHSA-2x6g-h2hg-rq84 created: 2024-06-04T14:27:39.956482-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2661.yaml
id: GO-2024-2661 modules: - module: github.com/grafana/grafana non_go_versions: - fixed: 6.4.4 summary: Arbitrary file read in github.com/grafana/grafana description: |- An authenticated attacker that has privileges to modify the data source configurations can read arbitrary files. cves: - CVE-2019-19499 ghsas: - GHSA-4pwp-cx67-5cpx references: - fix: https://github.com/grafana/grafana/pull/20192 - web: https://github.com/grafana/grafana/blob/master/CHANGELOG.md#644-2019-11-06 - web: https://security.netapp.com/advisory/ntap-20200918-0003 - web: https://swarm.ptsecurity.com/grafana-6-4-3-arbitrary-file-read review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2584.yaml
id: GO-2024-2584 modules: - module: github.com/cosmos/cosmos-sdk versions: - fixed: 0.47.10 - introduced: 0.50.0 vulnerable_at: 0.47.9 packages: - package: github.com/cosmos/cosmos-sdk/x/auth/vesting symbols: - msgServer.CreatePeriodicVestingAccount - package: github.com/cosmos/cosmos-sdk/x/staking/keeper symbols: - Keeper.SlashRedelegation derived_symbols: - Keeper.Slash - Keeper.SlashWithInfractionReason summary: Slashing evasion in github.com/cosmos/cosmos-sdk ghsas: - GHSA-86h5-xcpx-cfqc references: - advisory: https://github.com/cosmos/cosmos-sdk/security/advisories/GHSA-86h5-xcpx-cfqc - fix: https://github.com/cosmos/cosmos-sdk/commit/7dbed2fc0c3ed7c285645e21cb1037d8810372ae - fix: https://github.com/cosmos/cosmos-sdk/commit/d1b5b0c5ae2c51206cc1849e09e4d59986742cc3 notes: - The GHSA says that 0.50.5 is a fixed version, but it currently doesn't exist. review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2911.yaml
id: GO-2024-2911 modules: - module: github.com/mostynb/go-grpc-compression versions: - introduced: 1.1.4 - fixed: 1.2.3 vulnerable_at: 1.2.2 summary: go-grpc-compression has a zstd decompression bombing vulnerability in github.com/mostynb/go-grpc-compression ghsas: - GHSA-87m9-rv8p-rgmg unknown_aliases: - CGA-55fv-r57p-8jr6 - CGA-5mr6-pxmv-g3rf - CGA-9h9r-pfxh-82vp - CGA-9p94-3p48-x4p9 - CGA-f77f-95vc-hx27 - CGA-fpq9-2vcx-mr9m - CGA-jj45-rqfh-mhq4 - CGA-vxwm-jjvq-32cx references: - advisory: https://github.com/mostynb/go-grpc-compression/security/advisories/GHSA-87m9-rv8p-rgmg - fix: https://github.com/mostynb/go-grpc-compression/commit/629c44d3acb9624993cc7de629f47d72109e2ce5 source: id: GHSA-87m9-rv8p-rgmg created: 2024-06-26T14:09:10.765895-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2785.yaml
id: GO-2024-2785 modules: - module: github.com/coredns/coredns versions: - fixed: 1.11.2 vulnerable_at: 1.11.1 packages: - package: github.com/coredns/coredns/plugin/cache symbols: - Cache.ServeDNS - Cache.getIgnoreTTL - Cache.exists - key - hash - newPrefetchResponseWriter - ResponseWriter.WriteMsg derived_symbols: - verifyStaleResponseWriter.WriteMsg summary: CoreDNS may return invalid cache entries in github.com/coredns/coredns description: |- A flaw was found in coredns. This issue could lead to invalid cache entries returning due to incorrectly implemented caching. cves: - CVE-2024-0874 ghsas: - GHSA-m9w6-wp3h-vq8g references: - advisory: https://github.com/advisories/GHSA-m9w6-wp3h-vq8g - fix: https://github.com/coredns/coredns/commit/997c7f953962d47c242273f0e41398fdfb5b0151 - fix: https://github.com/coredns/coredns/pull/6354 - report: https://github.com/coredns/coredns/issues/6186 - web: https://access.redhat.com/errata/RHSA-2024:0041 - web: https://access.redhat.com/security/cve/CVE-2024-0874 - web: https://bugzilla.redhat.com/show_bug.cgi?id=2219234 source: id: GHSA-m9w6-wp3h-vq8g created: 2024-07-01T16:15:04.682445-04:00 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2530.yaml
id: GO-2024-2530 modules: - module: go.etcd.io/etcd vulnerable_at: 2.3.8+incompatible - module: go.etcd.io/etcd/v3 non_go_versions: - fixed: 3.3.23 - introduced: 3.4.0-rc.0 - fixed: 3.4.10 vulnerable_at: 3.5.14 summary: |- Etcd auth Inaccurate logging of authentication attempts for users with CN-based auth only in go.etcd.io/etcd ghsas: - GHSA-vjg6-93fv-qv64 references: - advisory: https://github.com/etcd-io/etcd/security/advisories/GHSA-vjg6-93fv-qv64 source: id: GHSA-vjg6-93fv-qv64 created: 2024-06-26T16:05:38.246759-04:00 review_status: UNREVIEWED unexcluded: EFFECTIVELY_PRIVATE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2449.yaml
id: GO-2024-2449 modules: - module: github.com/gravitational/teleport non_go_versions: - fixed: 12.4.31 - introduced: 13.0.0 - fixed: 13.4.13 - introduced: 14.0.0 - fixed: 14.2.4 vulnerable_at: 3.2.17+incompatible summary: User-provided environment values allow execution on macOS agents in github.com/gravitational/teleport ghsas: - GHSA-vfxf-76hv-v4w4 references: - advisory: https://github.com/gravitational/teleport/security/advisories/GHSA-vfxf-76hv-v4w4 - fix: https://github.com/gravitational/teleport/commit/fcc97de9f99dfec8696ecfd620672a26f29cf9ac - fix: https://github.com/gravitational/teleport/pull/36132 source: id: GHSA-vfxf-76hv-v4w4 created: 2024-06-14T11:35:44.744025-04:00 review_status: UNREVIEWED unexcluded: EFFECTIVELY_PRIVATE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1702.yaml
id: GO-2023-1702 modules: - module: std versions: - fixed: 1.19.8 - introduced: 1.20.0-0 - fixed: 1.20.3 vulnerable_at: 1.20.2 packages: - package: go/scanner symbols: - Scanner.updateLineInfo derived_symbols: - Scanner.Scan summary: Infinite loop in parsing in go/scanner description: |- Calling any of the Parse functions on Go source code which contains //line directives with very large line numbers can cause an infinite loop due to integer overflow. credits: - Philippe Antoine (Catena cyber) references: - report: https://go.dev/issue/59180 - fix: https://go.dev/cl/482078 - web: https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8 cve_metadata: id: CVE-2023-24537 cwe: 'CWE-835: Loop with Unreachable Exit Condition (''Infinite Loop'')' references: - https://security.gentoo.org/glsa/202311-09 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1752.yaml
id: GO-2023-1752 modules: - module: std versions: - fixed: 1.19.9 - introduced: 1.20.0-0 - fixed: 1.20.4 vulnerable_at: 1.20.3 packages: - package: html/template symbols: - nextJSCtx derived_symbols: - Template.Execute - Template.ExecuteTemplate summary: Improper handling of JavaScript whitespace in html/template description: |- Not all valid JavaScript whitespace characters are considered to be whitespace. Templates containing whitespace characters outside of the character set "\t\n\f\r\u0020\u2028\u2029" in JavaScript contexts that also contain actions may not be properly sanitized during execution. credits: - Juho Nurminen of Mattermost references: - report: https://go.dev/issue/59721 - fix: https://go.dev/cl/491616 - web: https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU cve_metadata: id: CVE-2023-24540 cwe: 'CWE-74: Improper input validation' review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1572.yaml
id: GO-2023-1572 modules: - module: golang.org/x/image versions: - fixed: 0.5.0 vulnerable_at: 0.4.0 packages: - package: golang.org/x/image/tiff symbols: - decoder.ifdUint - newDecoder - Decode derived_symbols: - DecodeConfig summary: Denial of service via crafted TIFF image in golang.org/x/image/tiff description: |- An attacker can craft a malformed TIFF image which will consume a significant amount of memory when passed to DecodeConfig. This could lead to a denial of service. ghsas: - GHSA-qgc7-mgm3-q253 credits: - Philippe Antoine (Catena cyber) - OSS Fuzz references: - report: https://go.dev/issue/58003 - fix: https://go.dev/cl/468195 - web: https://groups.google.com/g/golang-announce/c/ag-FiyjlD5o cve_metadata: id: CVE-2022-41727 cwe: 'CWE-400: Uncontrolled Resource Consumption' references: - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KO54NBDUJXKAZNGCFOEYL2LKK2RQP6K6/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWH6Q7NVM4MV3GWFEU4PA67AWZHVFJQ2/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XZTEP6JYILRBNDTNWTEQ5D4QUUVQBESK/ review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2492.yaml
id: GO-2024-2492 modules: - module: github.com/moby/buildkit versions: - fixed: 0.12.5 vulnerable_at: 0.12.4 packages: - package: github.com/moby/buildkit/solver/llbsolver symbols: - Solver.Solve - llbBridge.loadResult - loadSourcePolicy - package: github.com/moby/buildkit/sourcepolicy symbols: - match - package: github.com/moby/buildkit/control symbols: - Controller.Solve - package: github.com/moby/buildkit/frontend/gateway/client symbols: - AttestationFromPB - package: github.com/moby/buildkit/frontend/gateway symbols: - llbBridgeForwarder.Warn - llbBridgeForwarder.Solve - package: github.com/moby/buildkit/util/tracing/transform symbols: - spanEvents - doubleArray - arrayValues - stringArray - Attributes - intArray - links - statusCode - Spans - boolArray - package: github.com/moby/buildkit/exporter/containerimage/exptypes symbols: - ParsePlatforms - package: github.com/moby/buildkit/exporter/containerimage symbols: - patchImageConfig fix_links: - https://github.com/moby/buildkit/commit/7718bd5c3dc8fc5cd246a30cc41766e7a53c043c summary: Panic in github.com/moby/buildkit description: |- A malicious BuildKit client or frontend could craft a request that could lead to a BuildKit daemon crashing with a panic. cves: - CVE-2024-23650 ghsas: - GHSA-9p26-698r-w4hx credits: - '@cpuguy83' references: - fix: https://github.com/moby/buildkit/pull/4601 - fix: https://github.com/moby/buildkit/commit/e1924dc32da35bfb0bfdbb9d0fc7bca25e552330 - fix: https://github.com/moby/buildkit/commit/7718bd5c3dc8fc5cd246a30cc41766e7a53c043c - fix: https://github.com/moby/buildkit/commit/96663dd35bf3787d7efb1ee7fd9ac7fe533582ae - fix: https://github.com/moby/buildkit/commit/481d9c45f473c58537f39694a38d7995cc656987 - fix: https://github.com/moby/buildkit/commit/83edaef59d545b93e2750f1f85675a3764593fee - web: https://github.com/moby/buildkit/releases/tag/v0.12.5 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1494.yaml
id: GO-2023-1494 modules: - module: github.com/elgs/gosqljson versions: - fixed: 0.0.0-20220916234230-750f26ee23c7 vulnerable_at: 0.0.0-20140902115517-fa34a82f9316 packages: - package: github.com/elgs/gosqljson symbols: - ExecDb - QueryDbToArray - QueryDbToMap derived_symbols: - QueryDbToArrayJson - QueryDbToMapJson summary: SQL injection in github.com/elgs/gosqljson description: |- There is a potential for SQL injection through manipulation of the sqlStatement argument. cves: - CVE-2014-125064 ghsas: - GHSA-g7mw-9pf9-p2pm references: - fix: https://github.com/elgs/gosqljson/commit/2740b331546cb88eb61771df4c07d389e9f0363a review_status: REVIEWED