repo_id
stringclasses 927
values | file_path
stringlengths 99
214
| content
stringlengths 2
4.15M
|
|---|---|---|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2797.yaml
|
id: GO-2024-2797
modules:
- module: github.com/mattermost/mattermost-server
versions:
- introduced: 8.1.0+incompatible
- fixed: 8.1.12+incompatible
- introduced: 9.4.0+incompatible
- fixed: 9.4.5+incompatible
- introduced: 9.5.0+incompatible
- fixed: 9.5.3+incompatible
- introduced: 9.6.0-rc1+incompatible
- fixed: 9.6.1+incompatible
vulnerable_at: 9.6.1-rc3+incompatible
summary: Mattermost's detailed error messages reveal the full file path in github.com/mattermost/mattermost-server
cves:
- CVE-2024-32046
ghsas:
- GHSA-vx97-8q8q-qgq5
references:
- advisory: https://github.com/advisories/GHSA-vx97-8q8q-qgq5
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-32046
- web: https://github.com/mattermost/mattermost/commit/2a48b5b3428cae494452125401e4f72780543ac8
- web: https://github.com/mattermost/mattermost/commit/93738756ff79777c6e340c8de63a7b4b0f881d27
- web: https://github.com/mattermost/mattermost/commit/aa222c66b799c12e32eeb8eae6f555bf6140375b
- web: https://github.com/mattermost/mattermost/commit/c84c25b20c8b8726a2f126ae9370a72498096172
- web: https://mattermost.com/security-updates
source:
id: GHSA-vx97-8q8q-qgq5
created: 2024-06-04T15:26:55.734035-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0963.yaml
|
id: GO-2022-0963
modules:
- module: github.com/gagliardetto/binary
versions:
- fixed: 0.7.1
vulnerable_at: 0.7.0
packages:
- package: github.com/gagliardetto/binary
symbols:
- Decoder.decodeBin
- Decoder.decodeBorsh
- Decoder.decodeCompactU16
- Decoder.ReadTypeID
- Decoder.Discard
- Decoder.ReadRustString
- readNBytes
- discardNBytes
- Encoder.WriteFloat32
- Encoder.WriteFloat64
- Encoder.encodeBin
- Encoder.encodeBorsh
- Encoder.encodeCompactU16
derived_symbols:
- BaseVariant.UnmarshalBinaryVariant
- BinByteCount
- BorshByteCount
- CompactU16ByteCount
- Decoder.Decode
- Decoder.ReadInt64
- Decoder.ReadNBytes
- Decoder.ReadUint64
- Encoder.Encode
- Int64.UnmarshalWithDecoder
- JSONFloat64.MarshalWithEncoder
- MarshalBin
- MarshalBorsh
- MarshalCompactU16
- MustBinByteCount
- MustBorshByteCount
- MustCompactU16ByteCount
- Uint64.UnmarshalWithDecoder
- UnmarshalBin
- UnmarshalBorsh
- UnmarshalCompactU16
summary: Resource exhaustion in github.com/gagliardetto/binary
description: |-
A memory allocation vulnerability can be exploited to allocate arbitrarily large
slices, which can exhaust available memory or crash the program.
When parsing data from untrusted sources of input (e.g. the blockchain), the
length of the slice to allocate is read directly from the data itself without
any checks, which could lead to an allocation of excessive memory.
published: 2022-09-02T18:37:03Z
cves:
- CVE-2022-36078
ghsas:
- GHSA-4p6f-m4f9-ch88
references:
- advisory: https://github.com/gagliardetto/binary/security/advisories/GHSA-4p6f-m4f9-ch88
- fix: https://github.com/gagliardetto/binary/pull/7
- web: https://github.com/gagliardetto/binary/releases/tag/v0.7.1
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0569.yaml
|
id: GO-2022-0569
modules:
- module: github.com/astaxie/beego
vulnerable_at: 1.12.3
packages:
- package: github.com/astaxie/beego
symbols:
- Tree.Match
derived_symbols:
- App.Run
- ControllerRegister.FindPolicy
- ControllerRegister.FindRouter
- ControllerRegister.ServeHTTP
- FilterRouter.ValidRouter
- InitBeegoBeforeTest
- Run
- RunWithMiddleWares
- TestBeegoInit
- adminApp.Run
- module: github.com/beego/beego
versions:
- fixed: 1.12.11
vulnerable_at: 1.12.10
packages:
- package: github.com/beego/beego
symbols:
- Tree.Match
derived_symbols:
- App.Run
- ControllerRegister.FindPolicy
- ControllerRegister.FindRouter
- ControllerRegister.ServeHTTP
- FilterRouter.ValidRouter
- InitBeegoBeforeTest
- Run
- RunWithMiddleWares
- TestBeegoInit
- adminApp.Run
- module: github.com/beego/beego/v2
versions:
- introduced: 2.0.0
- fixed: 2.0.4
vulnerable_at: 2.0.3
packages:
- package: github.com/beego/beego/v2/server/web
symbols:
- Tree.Match
derived_symbols:
- AddNamespace
- AddViewPath
- Any
- AutoPrefix
- AutoRouter
- BuildTemplate
- Compare
- CompareNot
- Controller.Abort
- Controller.Bind
- Controller.BindForm
- Controller.BindJSON
- Controller.BindProtobuf
- Controller.BindXML
- Controller.BindYAML
- Controller.CheckXSRFCookie
- Controller.CustomAbort
- Controller.Delete
- Controller.DestroySession
- Controller.Get
- Controller.GetBool
- Controller.GetFile
- Controller.GetFloat
- Controller.GetInt
- Controller.GetInt16
- Controller.GetInt32
- Controller.GetInt64
- Controller.GetInt8
- Controller.GetSecureCookie
- Controller.GetString
- Controller.GetStrings
- Controller.GetUint16
- Controller.GetUint32
- Controller.GetUint64
- Controller.GetUint8
- Controller.Head
- Controller.Input
- Controller.IsAjax
- Controller.JSONResp
- Controller.Options
- Controller.ParseForm
- Controller.Patch
- Controller.Post
- Controller.Put
- Controller.Redirect
- Controller.Render
- Controller.RenderBytes
- Controller.RenderString
- Controller.Resp
- Controller.SaveToFile
- Controller.SaveToFileWithBuffer
- Controller.ServeFormatted
- Controller.ServeJSON
- Controller.ServeJSONP
- Controller.ServeXML
- Controller.ServeYAML
- Controller.SessionRegenerateID
- Controller.SetData
- Controller.SetSecureCookie
- Controller.Trace
- Controller.URLFor
- Controller.XMLResp
- Controller.XSRFFormHTML
- Controller.XSRFToken
- Controller.YamlResp
- ControllerRegister.Add
- ControllerRegister.AddAuto
- ControllerRegister.AddAutoPrefix
- ControllerRegister.AddMethod
- ControllerRegister.AddRouterMethod
- ControllerRegister.Any
- ControllerRegister.CtrlAny
- ControllerRegister.CtrlDelete
- ControllerRegister.CtrlGet
- ControllerRegister.CtrlHead
- ControllerRegister.CtrlOptions
- ControllerRegister.CtrlPatch
- ControllerRegister.CtrlPost
- ControllerRegister.CtrlPut
- ControllerRegister.Delete
- ControllerRegister.FindPolicy
- ControllerRegister.FindRouter
- ControllerRegister.Get
- ControllerRegister.GetContext
- ControllerRegister.Handler
- ControllerRegister.Head
- ControllerRegister.Include
- ControllerRegister.Init
- ControllerRegister.InsertFilter
- ControllerRegister.Options
- ControllerRegister.Patch
- ControllerRegister.Post
- ControllerRegister.Put
- ControllerRegister.ServeHTTP
- ControllerRegister.URLFor
- CtrlAny
- CtrlDelete
- CtrlGet
- CtrlHead
- CtrlOptions
- CtrlPatch
- CtrlPost
- CtrlPut
- Date
- DateFormat
- DateParse
- Delete
- Exception
- ExecuteTemplate
- ExecuteViewPathTemplate
- FileSystem.Open
- FilterRouter.ValidRouter
- FlashData.Error
- FlashData.Notice
- FlashData.Set
- FlashData.Store
- FlashData.Success
- FlashData.Warning
- Get
- GetConfig
- HTML2str
- Handler
- Head
- Htmlquote
- Htmlunquote
- HttpServer.Any
- HttpServer.AutoPrefix
- HttpServer.AutoRouter
- HttpServer.CtrlAny
- HttpServer.CtrlDelete
- HttpServer.CtrlGet
- HttpServer.CtrlHead
- HttpServer.CtrlOptions
- HttpServer.CtrlPatch
- HttpServer.CtrlPost
- HttpServer.CtrlPut
- HttpServer.Delete
- HttpServer.Get
- HttpServer.Handler
- HttpServer.Head
- HttpServer.Include
- HttpServer.InsertFilter
- HttpServer.LogAccess
- HttpServer.Options
- HttpServer.Patch
- HttpServer.Post
- HttpServer.PrintTree
- HttpServer.Put
- HttpServer.RESTRouter
- HttpServer.Router
- HttpServer.RouterWithOpts
- HttpServer.Run
- Include
- InitBeegoBeforeTest
- InsertFilter
- LoadAppConfig
- LogAccess
- MapGet
- Namespace.Any
- Namespace.AutoPrefix
- Namespace.AutoRouter
- Namespace.Cond
- Namespace.CtrlAny
- Namespace.CtrlDelete
- Namespace.CtrlGet
- Namespace.CtrlHead
- Namespace.CtrlOptions
- Namespace.CtrlPatch
- Namespace.CtrlPost
- Namespace.CtrlPut
- Namespace.Delete
- Namespace.Filter
- Namespace.Get
- Namespace.Handler
- Namespace.Head
- Namespace.Include
- Namespace.Namespace
- Namespace.Options
- Namespace.Patch
- Namespace.Post
- Namespace.Put
- Namespace.Router
- NewControllerRegister
- NewControllerRegisterWithCfg
- NewHttpServerWithCfg
- NewHttpSever
- NewNamespace
- NotNil
- Options
- ParseForm
- Patch
- Policy
- Post
- PrintTree
- Put
- RESTRouter
- ReadFromRequest
- RenderForm
- Router
- RouterWithOpts
- Run
- RunWithMiddleWares
- TestBeegoInit
- Tree.AddRouter
- Tree.AddTree
- URLFor
- URLMap.GetMap
- URLMap.GetMapData
- Walk
- adminApp.Run
- adminController.AdminIndex
- adminController.Healthcheck
- adminController.ListConf
- adminController.ProfIndex
- adminController.PrometheusMetrics
- adminController.QpsIndex
- adminController.TaskStatus
- beegoAppConfig.Bool
- beegoAppConfig.DefaultBool
- beegoAppConfig.SaveConfigFile
- beegoAppConfig.Unmarshaler
summary: Path traversal in github.com/beego/beego and beego/v2
description: |-
The leafInfo.match() function uses path.join() to deal with wildcard values
which can lead to cross directory risk.
published: 2022-08-23T13:24:17Z
cves:
- CVE-2022-31836
ghsas:
- GHSA-95f9-94vc-665h
references:
- fix: https://github.com/beego/beego/pull/5025
- fix: https://github.com/beego/beego/pull/5025/commits/ea5ae58d40589d249cf577a053e490509de2bf57
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2588.yaml
|
id: GO-2024-2588
modules:
- module: github.com/mattermost/mattermost-server
versions:
- introduced: 9.0.0+incompatible
- fixed: 9.4.2+incompatible
vulnerable_at: 9.4.2-rc2+incompatible
- module: github.com/mattermost/mattermost-server/v5
vulnerable_at: 5.39.3
- module: github.com/mattermost/mattermost-server/v6
vulnerable_at: 6.7.2
- module: github.com/mattermost/mattermost/server/v8
non_go_versions:
- fixed: 8.1.9
vulnerable_at: 8.0.0-20240626184126-817e18414e41
summary: Mattermost race condition in github.com/mattermost/mattermost-server
cves:
- CVE-2024-1949
ghsas:
- GHSA-3g35-v53r-gpxc
unknown_aliases:
- CGA-jmr7-jr2v-rjcq
references:
- advisory: https://github.com/advisories/GHSA-3g35-v53r-gpxc
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-1949
- web: https://mattermost.com/security-updates
source:
id: GHSA-3g35-v53r-gpxc
created: 2024-06-26T16:10:37.990276-04:00
review_status: UNREVIEWED
unexcluded: EFFECTIVELY_PRIVATE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1867.yaml
|
id: GO-2023-1867
modules:
- module: github.com/bnb-chain/tss-lib
vulnerable_at: 1.3.5
packages:
- package: github.com/bnb-chain/tss-lib/common
- module: github.com/binance-chain/tss-lib
vulnerable_at: 1.3.0
packages:
- package: github.com/binance-chain/tss-lib/common
summary: Replay attacks involving proofs in github.com/bnb-chain/tss-lib
description: Replay attacks involving proofs in github.com/bnb-chain/tss-lib.
cves:
- CVE-2022-47930
references:
- advisory: https://medium.com/@iofinnet/security-disclosure-for-ecdsa-and-eddsa-threshold-signature-schemes-4e969af7155b
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2556.yaml
|
id: GO-2024-2556
modules:
- module: github.com/elastic/apm-server
non_go_versions:
- fixed: 8.12.1
vulnerable_at: 6.8.23+incompatible
summary: APM Server vulnerable to Insertion of Sensitive Information into Log File in github.com/elastic/apm-server
cves:
- CVE-2024-23448
ghsas:
- GHSA-8r33-q5j5-rh7g
references:
- advisory: https://github.com/advisories/GHSA-8r33-q5j5-rh7g
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-23448
- web: https://discuss.elastic.co/t/apm-server-8-12-1-security-update-esa-2024-03/352688
- web: https://www.elastic.co/community/security
source:
id: GHSA-8r33-q5j5-rh7g
created: 2024-06-14T11:41:38.704445-04:00
review_status: UNREVIEWED
unexcluded: EFFECTIVELY_PRIVATE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0039.yaml
|
id: GO-2020-0039
modules:
- module: gopkg.in/macaron.v1
versions:
- fixed: 1.3.7
vulnerable_at: 1.3.6
packages:
- package: gopkg.in/macaron.v1
symbols:
- staticHandler
derived_symbols:
- Context.Next
- LoggerInvoker.Invoke
- Macaron.Run
- Macaron.ServeHTTP
- Router.ServeHTTP
summary: Open redirect in gopkg.in/macaron.v1
description: |-
Due to improper request sanitization, a specifically crafted URL can cause the
static file handler to redirect to an attacker chosen URL, allowing for open
redirect attacks.
published: 2021-04-14T20:04:52Z
cves:
- CVE-2020-12666
ghsas:
- GHSA-733f-44f3-3frw
credits:
- '@ev0A'
references:
- fix: https://github.com/go-macaron/macaron/pull/199
- fix: https://github.com/go-macaron/macaron/commit/addc7461c3a90a040e79aa75bfd245107a210245
- web: https://github.com/go-macaron/macaron/issues/198
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2744.yaml
|
id: GO-2024-2744
modules:
- module: github.com/authelia/authelia/v4
versions:
- introduced: 4.37.0
- fixed: 4.38.0
vulnerable_at: 4.37.5
summary: Access control change may take longer than expected in github.com/authelia/authelia/v4
description: |-
If the file authentication backend is being used, the ewatch option is set
to true, the refresh interval is configured to a non-disabled value, and an
administrator changes a user's groups, then that user may be able to access
resources that their previous groups had access to.
ghsas:
- GHSA-x883-2vmg-xwf7
references:
- advisory: https://github.com/authelia/authelia/security/advisories/GHSA-x883-2vmg-xwf7
- web: https://github.com/authelia/authelia/blob/v4.37.5/internal/handlers/handler_verify.go#L376-L394
source:
id: GHSA-x883-2vmg-xwf7
created: 2024-04-22T14:02:49.727107-04:00
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2734.yaml
|
id: GO-2024-2734
modules:
- module: github.com/1Panel-dev/1Panel
non_go_versions:
- fixed: 1.10.3
vulnerable_at: 1.9.6
summary: |-
1Panel's password verification is suspected to have a timing attack
vulnerability in github.com/1Panel-dev/1Panel
cves:
- CVE-2024-30257
ghsas:
- GHSA-6m9h-2pr2-9j8f
references:
- advisory: https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-6m9h-2pr2-9j8f
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-30257
- web: https://github.com/1Panel-dev/1Panel/blob/dev/backend/app/service/auth.go#L81C5-L81C26
source:
id: GHSA-6m9h-2pr2-9j8f
created: 2024-06-04T15:30:09.964726-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2848.yaml
|
id: GO-2024-2848
modules:
- module: github.com/grafana/grafana
non_go_versions:
- fixed: 8.5.14
- introduced: 9.0.0
- fixed: 9.1.8
vulnerable_at: 5.4.5+incompatible
summary: Grafana when using email as a username can block other users from signing in in github.com/grafana/grafana
cves:
- CVE-2022-39229
ghsas:
- GHSA-gj7m-853r-289r
unknown_aliases:
- BIT-grafana-2022-39229
references:
- advisory: https://github.com/grafana/grafana/security/advisories/GHSA-gj7m-853r-289r
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2022-39229
- fix: https://github.com/grafana/grafana/commit/5644758f0c5ae9955a4e5480d71f9bef57fdce35
- web: https://github.com/grafana/grafana/releases/tag/v9.1.8
source:
id: GHSA-gj7m-853r-289r
created: 2024-06-04T14:27:27.572132-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2803.yaml
|
id: GO-2024-2803
modules:
- module: github.com/navidrome/navidrome
versions:
- fixed: 0.52.0
vulnerable_at: 0.51.1
summary: Navidrome Parameter Tampering vulnerability in github.com/navidrome/navidrome
cves:
- CVE-2024-32963
ghsas:
- GHSA-4jrx-5w4h-3gpm
references:
- advisory: https://github.com/navidrome/navidrome/security/advisories/GHSA-4jrx-5w4h-3gpm
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-32963
source:
id: GHSA-4jrx-5w4h-3gpm
created: 2024-05-17T16:10:05.196852-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0109.yaml
|
id: GO-2021-0109
modules:
- module: github.com/ory/fosite
versions:
- fixed: 0.34.0
vulnerable_at: 0.33.0
packages:
- package: github.com/ory/fosite/handler/oauth2
symbols:
- TokenRevocationHandler.RevokeToken
summary: Improper handling of token revocation in github.com/ory/fosite
description: |-
Due to improper error handling, an error with the underlying token storage may
cause a user to believe a token has been successfully revoked when it is in fact
still valid. An attackers ability to exploit this relies on an ability to
trigger errors in the underlying storage.
published: 2021-07-28T18:08:05Z
cves:
- CVE-2020-15223
ghsas:
- GHSA-7mqr-2v3q-v2wm
references:
- fix: https://github.com/ory/fosite/commit/03dd55813f5521985f7dd64277b7ba0cf1441319
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1027.yaml
|
id: GO-2022-1027
modules:
- module: github.com/cloudwego/hertz
versions:
- fixed: 0.3.1
vulnerable_at: 0.3.0
packages:
- package: github.com/cloudwego/hertz/pkg/protocol
goos:
- windows
symbols:
- normalizePath
derived_symbols:
- Cookie.SetPath
- Cookie.SetPathBytes
- NewRequest
- ParseURI
- Request.Host
- Request.ParseURI
- Request.Path
- Request.QueryString
- Request.SetHost
- Request.SetQueryString
- Request.URI
- URI.Parse
- URI.SetPath
- URI.SetPathBytes
- URI.Update
- URI.UpdateBytes
summary: Path traversal in github.com/cloudwego/hertz
description: |-
Improper path sanitization on Windows permits path traversal attacks. Static
file serving with the Static or StaticFS functions allows an attacker to access
files from outside the filesystem root.
This vulnerability does not affect non-Windows systems.
cves:
- CVE-2022-40082
ghsas:
- GHSA-c9qr-f6c8-rgxf
references:
- web: https://github.com/cloudwego/hertz/issues/228
- fix: https://github.com/cloudwego/hertz/pull/229
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2883.yaml
|
id: GO-2024-2883
modules:
- module: github.com/rs/cors
versions:
- introduced: 1.9.0
- fixed: 1.11.0
vulnerable_at: 1.10.1
packages:
- package: github.com/rs/cors
symbols:
- Cors.handlePreflight
- Cors.areHeadersAllowed
- New
- splitHeaderValues
derived_symbols:
- AllowAll
- Cors.HandlerFunc
- Cors.ServeHTTP
- Default
summary: Denial of service via malicious preflight requests in github.com/rs/cors
description: |-
Middleware causes a prohibitive amount of heap allocations when processing
malicious preflight requests that include a Access-Control-Request-Headers
(ACRH) header whose value contains many commas. This behavior can be abused by
attackers to produce undue load on the middleware/server as an attempt to cause
a denial of service.
ghsas:
- GHSA-mh55-gqvf-xfwm
credits:
- '@jub0bs'
references:
- fix: https://github.com/rs/cors/pull/171
- report: https://github.com/rs/cors/issues/170
source:
id: go-security-team
created: 2024-07-02T11:27:50.335482-04:00
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0063.yaml
|
id: GO-2021-0063
modules:
- module: github.com/ethereum/go-ethereum
versions:
- fixed: 1.9.25
vulnerable_at: 1.9.24
packages:
- package: github.com/ethereum/go-ethereum/les
symbols:
- serverHandler.handleMsg
derived_symbols:
- PrivateLightServerAPI.Benchmark
summary: |-
Nil pointer dereference via malicious RPC message in
github.com/ethereum/go-ethereum
description: |-
Due to a nil pointer dereference, a maliciously crafted RPC message can cause a
panic. If handling RPC messages from untrusted clients, this may be used as a
denial of service vector.
published: 2021-04-14T20:04:52Z
cves:
- CVE-2020-26264
ghsas:
- GHSA-r33q-22hv-j29q
credits:
- '@zsfelfoldi'
references:
- fix: https://github.com/ethereum/go-ethereum/pull/21896
- fix: https://github.com/ethereum/go-ethereum/commit/bddd103a9f0af27ef533f04e06ea429cf76b6d46
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2074.yaml
|
id: GO-2023-2074
modules:
- module: github.com/gomarkdown/markdown
versions:
- fixed: 0.0.0-20230922105210-14b16010c2ee
vulnerable_at: 0.0.0-20230916125811-7478c230c7cd
packages:
- package: github.com/gomarkdown/markdown/parser
symbols:
- Parser.isPrefixHeading
- citation
derived_symbols:
- Parser.Block
- Parser.Inline
- Parser.Parse
summary: |-
Parser out-of-bounds read caused by a malformed markdown input in
github.com/gomarkdown/markdown
cves:
- CVE-2023-42821
ghsas:
- GHSA-m9xq-6h2j-65r2
references:
- advisory: https://github.com/gomarkdown/markdown/security/advisories/GHSA-m9xq-6h2j-65r2
- fix: https://github.com/gomarkdown/markdown/commit/14b16010c2ee7ff33a940a541d993bd043a88940
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1026.yaml
|
id: GO-2022-1026
modules:
- module: github.com/peterzen/goresolver
vulnerable_at: 1.0.2
packages:
- package: github.com/peterzen/goresolver
summary: |-
Incorrect validation of root DNSSEC public keys in
github.com/peterzen/goresolver
description: |-
DNSSEC validation is not performed correctly. An attacker can cause this package
to report successful validation for invalid, attacker-controlled records.
Root DNSSEC public keys are not validated, permitting an attacker to present a
self-signed root key and delegation chain.
ghsas:
- GHSA-jr65-gpj5-cw74
references:
- report: https://github.com/peterzen/goresolver/issues/5#issuecomment-1150214257
cve_metadata:
id: CVE-2022-3347
cwe: 'CWE 295: Improper Certificate Validation'
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2605.yaml
|
id: GO-2024-2605
modules:
- module: github.com/jackc/pgx/v4
versions:
- fixed: 4.18.2
vulnerable_at: 4.18.1
packages:
- package: github.com/jackc/pgx/v4/internal/sanitize
symbols:
- Query.Sanitize
derived_symbols:
- SanitizeSQL
summary: SQL injection in github.com/jackc/pgx/v4
description: |-
SQL injection is possible when the database uses the non-default simple
protocol, a minus sign directly precedes a numeric placeholder followed by a
string placeholder on the same line, and both parameter values are
user-controlled.
cves:
- CVE-2024-27289
ghsas:
- GHSA-m7wr-2xf7-cm9p
credits:
- paul-gerste-sonarsource
references:
- advisory: https://github.com/jackc/pgx/security/advisories/GHSA-m7wr-2xf7-cm9p
- fix: https://github.com/jackc/pgx/commit/f94eb0e2f96782042c96801b5ac448f44f0a81df
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2961.yaml
|
id: GO-2024-2961
modules:
- module: golang.org/x/crypto
versions:
- fixed: 0.0.0-20220525230936-793ad666bf5e
vulnerable_at: 0.0.0-20220518034528-6f7dac969898
packages:
- package: golang.org/x/crypto/acme/autocert
goos:
- windows
symbols:
- DirCache.Get
- DirCache.Put
- DirCache.Delete
derived_symbols:
- HostWhitelist
- Manager.GetCertificate
- Manager.Listener
- NewListener
- listener.Accept
- listener.Close
summary: Limited directory traversal vulnerability on Windows in golang.org/x/crypto
description: |-
httpTokenCacheKey uses path.Base to extract the expected HTTP-01 token value to
lookup in the DirCache implementation. On Windows, path.Base acts differently to
filepath.Base, since Windows uses a different path separator (\ vs. /), allowing
a user to provide a relative path, i.e. .well-known/acme-challenge/..\..\asd
becomes ..\..\asd. The extracted path is then suffixed with +http-01, joined
with the cache directory, and opened.
Since the controlled path is suffixed with +http-01 before opening, the impact
of this is significantly limited, since it only allows reading arbitrary files
on the system if and only if they have this suffix.
credits:
- Juho Nurminen of Mattermost
references:
- fix: https://go.dev/cl/408694
- report: https://go.dev/issue/53082
cve_metadata:
id: CVE-2022-30636
cwe: 'CWE 22: Improper Limitation of a Pathname to a Restricted Directory (''Path Traversal'')'
source:
id: go-security-team
created: 2024-07-02T12:55:35.249465-04:00
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0197.yaml
|
id: GO-2022-0197
modules:
- module: golang.org/x/net
versions:
- fixed: 0.0.0-20190125002852-4b62a64f59f7
vulnerable_at: 0.0.0-20190119204137-ed066c81e75e
packages:
- package: golang.org/x/net/html
symbols:
- nodeStack.contains
derived_symbols:
- Parse
- ParseFragment
summary: Panic when parsing certain inputs in golang.org/x/net/html
description: |-
The Parse function can panic on some invalid inputs.
For example, the Parse function panics on the input
"<svg><template><desc><t><svg></template>".
published: 2022-07-01T20:15:19Z
cves:
- CVE-2018-17847
- CVE-2018-17848
ghsas:
- GHSA-4r78-hx75-jjj2
- GHSA-mv93-wvcp-7m7r
credits:
- '@tr3ee'
references:
- fix: https://go.dev/cl/159397
- fix: https://go.googlesource.com/net/+/4b62a64f59f73840b9ab79204c94fee61cd1ba2c
- report: https://go.dev/issue/27846
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0238.yaml
|
id: GO-2021-0238
modules:
- module: golang.org/x/net
versions:
- fixed: 0.0.0-20210520170846-37e1c6afe023
vulnerable_at: 0.0.0-20210510120150-4163338589ed
packages:
- package: golang.org/x/net/html
symbols:
- inHeadIM
derived_symbols:
- Parse
- ParseFragment
- ParseFragmentWithOptions
- ParseWithOptions
summary: Infinite loop when parsing inputs in golang.org/x/net/html
description: |-
An attacker can craft an input to ParseFragment that causes it to enter an
infinite loop and never return.
published: 2022-02-17T17:33:43Z
cves:
- CVE-2021-33194
ghsas:
- GHSA-83g2-8m93-v3w7
credits:
- OSS-Fuzz (discovery)
- Andrew Thornton (reporter)
references:
- fix: https://go.dev/cl/311090
- fix: https://go.googlesource.com/net/+/37e1c6afe02340126705deced573a85ab75209d7
- report: https://go.dev/issue/46288
- web: https://groups.google.com/g/golang-announce/c/wPunbCPkWUg
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1989.yaml
|
id: GO-2023-1989
modules:
- module: golang.org/x/image
versions:
- fixed: 0.10.0
vulnerable_at: 0.9.0
packages:
- package: golang.org/x/image/tiff
symbols:
- newDecoder
derived_symbols:
- Decode
- DecodeConfig
summary: Excessive resource consumption in golang.org/x/image/tiff
description: |-
The TIFF decoder does not place a limit on the size of compressed tile data. A
maliciously-crafted image can exploit this to cause a small image (both in terms
of pixel width/height, and encoded size) to make the decoder decode large
amounts of compressed data, consuming excessive memory and CPU.
ghsas:
- GHSA-x92r-3vfx-4cv3
credits:
- Philippe Antoine (Catena cyber)
references:
- report: https://go.dev/issue/61582
- fix: https://go.dev/cl/514897
cve_metadata:
id: CVE-2023-29408
cwe: 'CWE-770: Allocation of Resources Without Limits or Throttling'
references:
- https://security.netapp.com/advisory/ntap-20230831-0009/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KO54NBDUJXKAZNGCFOEYL2LKK2RQP6K6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWH6Q7NVM4MV3GWFEU4PA67AWZHVFJQ2/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XZTEP6JYILRBNDTNWTEQ5D4QUUVQBESK/
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0537.yaml
|
id: GO-2022-0537
modules:
- module: std
versions:
- fixed: 1.17.13
- introduced: 1.18.0-0
- fixed: 1.18.5
vulnerable_at: 1.18.4
packages:
- package: math/big
symbols:
- Float.GobDecode
- Rat.GobDecode
summary: Panic when decoding Float and Rat types in math/big
description: |-
Decoding big.Float and big.Rat types can panic if the encoded message is too
short, potentially allowing a denial of service.
published: 2022-08-01T22:21:06Z
credits:
- '@catenacyber'
references:
- fix: https://go.dev/cl/417774
- fix: https://go.googlesource.com/go/+/055113ef364337607e3e72ed7d48df67fde6fc66
- report: https://go.dev/issue/53871
- web: https://groups.google.com/g/golang-announce/c/YqYYG87xB10
cve_metadata:
id: CVE-2022-32189
cwe: 'CWE 400: Uncontrolled Resource Consumption'
description: |-
A too-short encoded message can cause a panic in Float.GobDecode and Rat
GobDecode in math/big in Go before 1.17.13 and 1.18.5, potentially allowing a
denial of service.
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2153.yaml
|
id: GO-2023-2153
modules:
- module: google.golang.org/grpc
versions:
- fixed: 1.56.3
- introduced: 1.57.0
- fixed: 1.57.1
- introduced: 1.58.0
- fixed: 1.58.3
vulnerable_at: 1.58.2
packages:
- package: google.golang.org/grpc/internal/transport
symbols:
- NewServerTransport
- package: google.golang.org/grpc
symbols:
- Server.initServerWorkers
derived_symbols:
- NewServer
- Server.Serve
summary: Denial of service from HTTP/2 Rapid Reset in google.golang.org/grpc
description: |-
An attacker can send HTTP/2 requests, cancel them, and send subsequent requests.
This is valid by the HTTP/2 protocol, but would cause the gRPC-Go server to
launch more concurrent method handlers than the configured maximum stream limit,
grpc.MaxConcurrentStreams. This results in a denial of service due to resource
consumption.
ghsas:
- GHSA-m425-mq94-257g
related:
- CVE-2023-44487
references:
- web: https://github.com/grpc/grpc-go/pull/6703
- fix: https://github.com/grpc/grpc-go/commit/f2180b4d5403d2210b30b93098eb7da31c05c721
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2857.yaml
|
id: GO-2024-2857
modules:
- module: github.com/grafana/grafana
non_go_versions:
- introduced: 8.0.0
- fixed: 8.3.10
- introduced: 8.4.0
- fixed: 8.4.10
- introduced: 8.5.0
- fixed: 8.5.9
- introduced: 9.0.0
- fixed: 9.0.3
vulnerable_at: 5.4.5+incompatible
summary: Grafana Stored Cross-site Scripting in Unified Alerting in github.com/grafana/grafana
cves:
- CVE-2022-31097
ghsas:
- GHSA-vw7q-p2qg-4m5f
unknown_aliases:
- BIT-grafana-2022-31097
references:
- advisory: https://github.com/grafana/grafana/security/advisories/GHSA-vw7q-p2qg-4m5f
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2022-31097
- web: https://grafana.com/docs/grafana/latest/release-notes/release-notes-8-5-9
- web: https://grafana.com/docs/grafana/latest/release-notes/release-notes-9-0-3
- web: https://grafana.com/docs/grafana/next/release-notes/release-notes-8-4-10
- web: https://security.netapp.com/advisory/ntap-20220901-0010
source:
id: GHSA-vw7q-p2qg-4m5f
created: 2024-06-04T14:26:57.952392-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0239.yaml
|
id: GO-2021-0239
modules:
- module: std
versions:
- fixed: 1.15.13
- introduced: 1.16.0-0
- fixed: 1.16.5
vulnerable_at: 1.16.4
packages:
- package: net
symbols:
- Resolver.LookupAddr
- Resolver.LookupCNAME
- Resolver.LookupMX
- Resolver.LookupNS
- Resolver.LookupSRV
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
summary: Improper sanitization when resolving values from DNS in net
description: |-
The LookupCNAME, LookupSRV, LookupMX, LookupNS, and LookupAddr functions and
their respective methods on the Resolver type may return arbitrary values
retrieved from DNS which do not follow the established RFC 1035 rules for domain
names. If these names are used without further sanitization, for instance
unsafely included in HTML, they may allow for injection of unexpected content.
Note that LookupTXT may still return arbitrary values that could require
sanitization before further use.
published: 2022-02-17T17:33:35Z
cves:
- CVE-2021-33195
credits:
- Philipp Jeitner
- Haya Shulman from Fraunhofer SIT
references:
- fix: https://go.dev/cl/320949
- fix: https://go.googlesource.com/go/+/c89f1224a544cde464fcb86e78ebb0cc97eedba2
- web: https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI
- report: https://go.dev/issue/46241
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1031.yaml
|
id: GO-2022-1031
modules:
- module: github.com/labstack/echo/v4
versions:
- fixed: 4.9.0
vulnerable_at: 4.8.0
packages:
- package: github.com/labstack/echo/v4
symbols:
- StaticDirectoryHandler
derived_symbols:
- Echo.Static
- Echo.StaticFS
- Group.Static
- Group.StaticFS
summary: Open redirect in github.com/labstack/echo/v4
description: |-
Labstack Echo contains an open redirect vulnerability via the Static Handler
component. This vulnerability can be leveraged by attackers to cause a
Server-Side Request Forgery (SSRF).
cves:
- CVE-2022-40083
ghsas:
- GHSA-crxj-hrmp-4rwf
references:
- report: https://github.com/labstack/echo/issues/2259
- fix: https://github.com/labstack/echo/pull/2260
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2863.yaml
|
id: GO-2024-2863
modules:
- module: github.com/wolfi-dev/wolfictl
versions:
- fixed: 0.16.10
vulnerable_at: 0.16.9
summary: wolfictl leaks GitHub tokens to remote non-GitHub git servers in github.com/wolfi-dev/wolfictl
cves:
- CVE-2024-35183
ghsas:
- GHSA-8fg7-hp93-qhvr
references:
- advisory: https://github.com/wolfi-dev/wolfictl/security/advisories/GHSA-8fg7-hp93-qhvr
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-35183
- fix: https://github.com/wolfi-dev/wolfictl/commit/0d06e1578300327c212dda26a5ab31d09352b9d0
- fix: https://github.com/wolfi-dev/wolfictl/commit/403e93569f46766b4e26e06cf9cd0cae5ee0c2a2
- web: https://github.com/wolfi-dev/wolfictl/blob/488b53823350caa706de3f01ec0eded9350c7da7/pkg/update/update.go#L143
- web: https://github.com/wolfi-dev/wolfictl/blob/4dd6c95abb4bc0f9306350a8601057bd7a92bded/pkg/update/deps/cleanup.go#L49
- web: https://github.com/wolfi-dev/wolfictl/blob/6d99909f7b1aa23f732d84dad054b02a61f530e6/pkg/git/git.go#L22
source:
id: GHSA-8fg7-hp93-qhvr
created: 2024-05-17T16:08:41.113015-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2804.yaml
|
id: GO-2024-2804
modules:
- module: github.com/zitadel/zitadel
non_go_versions:
- fixed: 2.45.7
- introduced: 2.47.0
- fixed: 2.47.10
- introduced: 2.48.0
- fixed: 2.48.5
- introduced: 2.49.0
- fixed: 2.49.5
- introduced: 2.50.0
- fixed: 2.50.3
vulnerable_at: 1.87.5
summary: Zitadel exposing internal database user name and host information in github.com/zitadel/zitadel
cves:
- CVE-2024-32967
ghsas:
- GHSA-q5qj-x2h5-3945
references:
- advisory: https://github.com/zitadel/zitadel/security/advisories/GHSA-q5qj-x2h5-3945
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-32967
- fix: https://github.com/zitadel/zitadel/commit/b918603b576d156a08b90917c14c2d019c82ffc6
- web: https://github.com/zitadel/zitadel/releases/tag/v2.45.7
- web: https://github.com/zitadel/zitadel/releases/tag/v2.46.7
- web: https://github.com/zitadel/zitadel/releases/tag/v2.47.10
- web: https://github.com/zitadel/zitadel/releases/tag/v2.48.5
- web: https://github.com/zitadel/zitadel/releases/tag/v2.49.5
- web: https://github.com/zitadel/zitadel/releases/tag/v2.50.3
source:
id: GHSA-q5qj-x2h5-3945
created: 2024-06-04T14:29:03.147386-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2919.yaml
|
id: GO-2024-2919
modules:
- module: github.com/cri-o/cri-o
versions:
- introduced: 1.28.6
- fixed: 1.28.7
- introduced: 1.29.4
- fixed: 1.29.5
- introduced: 1.30.0
- fixed: 1.30.1
vulnerable_at: 1.30.0
summary: malicious container creates symlink "mtab" on the host External in github.com/cri-o/cri-o
cves:
- CVE-2024-5154
ghsas:
- GHSA-j9hf-98c3-wrm8
references:
- advisory: https://github.com/cri-o/cri-o/security/advisories/GHSA-j9hf-98c3-wrm8
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-5154
- web: https://access.redhat.com/errata/RHSA-2024:3676
- web: https://access.redhat.com/errata/RHSA-2024:3700
- web: https://access.redhat.com/security/cve/CVE-2024-5154
- web: https://bugzilla.redhat.com/show_bug.cgi?id=2280190
source:
id: GHSA-j9hf-98c3-wrm8
created: 2024-06-26T14:09:29.772592-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2448.yaml
|
id: GO-2024-2448
modules:
- module: github.com/mattermost/mattermost-server
versions:
- fixed: 8.1.7+incompatible
vulnerable_at: 8.1.7-rc3+incompatible
- module: github.com/mattermost/mattermost-server/v5
vulnerable_at: 5.39.3
- module: github.com/mattermost/mattermost-server/v6
vulnerable_at: 6.7.2
- module: github.com/mattermost/mattermost/server/v8
non_go_versions:
- fixed: 8.1.7
vulnerable_at: 8.0.0-20240626184126-817e18414e41
summary: |-
Mattermost notified all users in the channel when using WebSockets to respond
individually in github.com/mattermost/mattermost-server
cves:
- CVE-2023-48732
ghsas:
- GHSA-q7rx-w656-fwmv
unknown_aliases:
- BIT-mattermost-2023-48732
- CGA-jhcr-g7wj-9vq2
references:
- advisory: https://github.com/advisories/GHSA-q7rx-w656-fwmv
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2023-48732
- web: https://github.com/mattermost/mattermost/commit/851515be222160bee0a495c0d411056b19ed4111
- web: https://mattermost.com/security-updates
source:
id: GHSA-q7rx-w656-fwmv
created: 2024-06-26T16:10:54.767283-04:00
review_status: UNREVIEWED
unexcluded: EFFECTIVELY_PRIVATE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0241.yaml
|
id: GO-2021-0241
modules:
- module: std
versions:
- fixed: 1.15.13
- introduced: 1.16.0-0
- fixed: 1.16.5
vulnerable_at: 1.16.4
packages:
- package: net/http/httputil
symbols:
- ReverseProxy.ServeHTTP
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
summary: Attacker can drop certain headers in net/http/httputil
description: |-
ReverseProxy can be made to forward certain hop-by-hop headers, including
Connection. If the target of the ReverseProxy is itself a reverse proxy, this
lets an attacker drop arbitrary headers, including those set by the
ReverseProxy.Director.
published: 2022-02-17T17:33:16Z
cves:
- CVE-2021-33197
credits:
- Mattias Grenfeldt (https://grenfeldt.dev)
- Asta Olofsson
references:
- fix: https://go.dev/cl/321929
- fix: https://go.googlesource.com/go/+/950fa11c4cb01a145bb07eeb167d90a1846061b3
- web: https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI
- report: https://go.dev/issue/46313
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2119.yaml
|
id: GO-2023-2119
modules:
- module: github.com/consensys/gnark
versions:
- fixed: 0.9.1
vulnerable_at: 0.9.0
packages:
- package: github.com/consensys/gnark/backend/plonk/bls12-377
symbols:
- Prove
- Verify
- package: github.com/consensys/gnark/backend/plonk/bls12-381
symbols:
- Prove
- Verify
- package: github.com/consensys/gnark/backend/plonk/bls24-315
symbols:
- Prove
- Verify
- package: github.com/consensys/gnark/backend/plonk/bls24-317
symbols:
- Prove
- Verify
- package: github.com/consensys/gnark/backend/plonk/bn254
symbols:
- Prove
- Verify
- package: github.com/consensys/gnark/backend/plonk/bw6-633
symbols:
- Prove
- Verify
- package: github.com/consensys/gnark/backend/plonk/bw6-761
symbols:
- Prove
- Verify
summary: Proof forgery due to insufficient randomness in github.com/consensys/gnark
description: |-
A a third party may derive a valid proof from a valid initial tuple {proof,
public_inputs}, corresponding to the same public inputs as the initial proof.
This vulnerability is due to randomness being generated using a small part of
the scratch memory describing the state, allowing for degrees of freedom in the
transcript. Note that the impact is limited to the PlonK verifier smart
contract.
ghsas:
- GHSA-7p92-x423-vwj6
references:
- advisory: https://github.com/Consensys/gnark/security/advisories/GHSA-7p92-x423-vwj6
- fix: https://github.com/Consensys/gnark/commit/3421eaa7d544286abf3de8c46282b8d4da6d5da0
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2934.yaml
|
id: GO-2024-2934
modules:
- module: github.com/stacklok/minder
versions:
- fixed: 0.0.52
vulnerable_at: 0.0.51
summary: Minder affected by denial of service from maliciously configured Git repository in github.com/stacklok/minder
cves:
- CVE-2024-37904
ghsas:
- GHSA-hpcg-xjq5-g666
references:
- advisory: https://github.com/stacklok/minder/security/advisories/GHSA-hpcg-xjq5-g666
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-37904
- fix: https://github.com/stacklok/minder/commit/35bab8f9a6025eea9e6e3cef6bd80707ac03d2a9
- fix: https://github.com/stacklok/minder/commit/7979b43
- web: https://github.com/stacklok/minder/blob/85985445c8ac3e51f03372e99c7b2f08a6d274aa/internal/providers/git/git.go#L55-L89
- web: https://github.com/stacklok/minder/blob/85985445c8ac3e51f03372e99c7b2f08a6d274aa/internal/providers/git/git.go#L56-L62
source:
id: GHSA-hpcg-xjq5-g666
created: 2024-06-27T15:53:59.10909-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1038.yaml
|
id: GO-2022-1038
modules:
- module: std
versions:
- fixed: 1.18.7
- introduced: 1.19.0-0
- fixed: 1.19.2
vulnerable_at: 1.19.1
packages:
- package: net/http/httputil
symbols:
- ReverseProxy.ServeHTTP
summary: Incorrect sanitization of forwarded query parameters in net/http/httputil
description: |-
Requests forwarded by ReverseProxy include the raw query parameters from the
inbound request, including unparsable parameters rejected by net/http. This
could permit query parameter smuggling when a Go proxy forwards a parameter with
an unparsable value.
After fix, ReverseProxy sanitizes the query parameters in the forwarded query
when the outbound request's Form field is set after the ReverseProxy. Director
function returns, indicating that the proxy has parsed the query parameters.
Proxies which do not parse query parameters continue to forward the original
query parameters unchanged.
credits:
- Gal Goldstein (Security Researcher, Oxeye)
- Daniel Abeles (Head of Research, Oxeye)
references:
- report: https://go.dev/issue/54663
- fix: https://go.dev/cl/432976
- web: https://groups.google.com/g/golang-announce/c/xtuG5faxtaU
cve_metadata:
id: CVE-2022-2880
cwe: 'CWE-444: Inconsistent Interpretation of HTTP Requests'
references:
- https://security.gentoo.org/glsa/202311-09
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2688.yaml
|
id: GO-2024-2688
modules:
- module: kubevirt.io/kubevirt
unsupported_versions:
- last_affected: 1.2.0
vulnerable_at: 1.2.1
summary: KubeVirt NULL pointer dereference flaw in kubevirt.io/kubevirt
cves:
- CVE-2024-31420
ghsas:
- GHSA-vjhf-6xfr-5p9g
references:
- advisory: https://github.com/advisories/GHSA-vjhf-6xfr-5p9g
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-31420
- web: https://access.redhat.com/security/cve/CVE-2024-31420
- web: https://bugzilla.redhat.com/show_bug.cgi?id=2272951
source:
id: GHSA-vjhf-6xfr-5p9g
created: 2024-06-04T15:36:43.938217-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0171.yaml
|
id: GO-2022-0171
modules:
- module: std
versions:
- fixed: 1.6.4
- introduced: 1.7.0-0
- fixed: 1.7.4
vulnerable_at: 1.7.3
packages:
- package: crypto/x509
goos:
- darwin
symbols:
- FetchPEMRoots
- execSecurityRoots
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
summary: Mishandled trust preferences for root certificates on Darwin in crypto/x509
description: |-
On Darwin, user's trust preferences for root certificates were not honored. If
the user had a root certificate loaded in their Keychain that was explicitly not
trusted, a Go program would still verify a connection using that root
certificate.
published: 2022-05-24T20:17:59Z
cves:
- CVE-2017-1000097
credits:
- Xy Ziemba
references:
- fix: https://go.googlesource.com/go/+/7e5b2e0ec144d5f5b2923a7d5db0b9143f79a35a
- report: https://go.dev/issue/18141
- web: https://groups.google.com/g/golang-dev/c/4NdLzS8sls8/m/uIz8QlnIBQAJ
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2940.yaml
|
id: GO-2024-2940
modules:
- module: github.com/drakkan/sftpgo
vulnerable_at: 1.2.2
- module: github.com/drakkan/sftpgo/v2
versions:
- introduced: 2.2.0
- fixed: 2.6.1
vulnerable_at: 2.6.0
summary: SFTPGo has insufficient access control for password reset in github.com/drakkan/sftpgo
cves:
- CVE-2024-37897
ghsas:
- GHSA-hw5f-6wvv-xcrh
references:
- advisory: https://github.com/drakkan/sftpgo/security/advisories/GHSA-hw5f-6wvv-xcrh
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-37897
- fix: https://github.com/drakkan/sftpgo/commit/1f8ac8bfe16100b0484d6c91e1e8361687324423
- fix: https://github.com/drakkan/sftpgo/commit/3462bba3f41cbc75486474991b9e3ac1b5f1e583
- web: https://github.com/drakkan/sftpgo/releases/tag/v2.6.1
source:
id: GHSA-hw5f-6wvv-xcrh
created: 2024-06-27T15:53:42.415925-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0021.yaml
|
id: GO-2020-0021
modules:
- module: github.com/gogits/gogs
versions:
- fixed: 0.5.8
vulnerable_at: 0.5.5
packages:
- package: github.com/gogits/gogs
symbols:
- GetIssues
- SearchRepositoryByName
- SearchUserByName
skip_fix: 'TODO: Revisit this reason (Some dependencies no longer exist)'
summary: SQL Injection in github.com/gogits/gogs
description: |-
Due to improper sanitization of user input, a number of methods are vulnerable
to SQL injection if used with user input that has not been sanitized by the
caller.
published: 2021-04-14T20:04:52Z
cves:
- CVE-2014-8681
ghsas:
- GHSA-mr6h-chqp-p9g2
credits:
- Pascal Turbing
- Jiahua (Joe) Chen
references:
- fix: https://github.com/gogs/gogs/commit/83283bca4cb4e0f4ec48a28af680f0d88db3d2c8
- web: https://seclists.org/fulldisclosure/2014/Nov/31
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2698.yaml
|
id: GO-2024-2698
modules:
- module: github.com/mholt/archiver
vulnerable_at: 2.1.0+incompatible
- module: github.com/mholt/archiver/v3
vulnerable_at: 3.5.1
summary: Archiver Path Traversal vulnerability in github.com/mholt/archiver
description: |-
A flaw was discovered in the mholt/archiver package. This flaw allows an
attacker to create a specially crafted tar file, which, when unpacked, may allow
access to restricted files or directories. This issue can allow the creation or
overwriting of files with the user's or application's privileges using the
library.
cves:
- CVE-2024-0406
ghsas:
- GHSA-rhh4-rh7c-7r5v
references:
- advisory: https://github.com/advisories/GHSA-rhh4-rh7c-7r5v
- web: https://access.redhat.com/security/cve/CVE-2024-0406
- web: https://bugzilla.redhat.com/show_bug.cgi?id=2257749
notes:
- no known fix
source:
id: GHSA-rhh4-rh7c-7r5v
created: 2024-07-01T16:15:06.574303-04:00
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2705.yaml
|
id: GO-2024-2705
modules:
- module: github.com/go-skynet/LocalAI
unsupported_versions:
- last_affected: 2.7.0
vulnerable_at: 1.40.0
summary: LocalAI cross-site request forgery vulnerability in github.com/go-skynet/LocalAI
cves:
- CVE-2024-3135
ghsas:
- GHSA-jhvf-7c85-3c9g
references:
- advisory: https://github.com/advisories/GHSA-jhvf-7c85-3c9g
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-3135
- web: https://huntr.com/bounties/7afdc4d3-4b68-45ea-96d0-cf9ed3712ae8
source:
id: GHSA-jhvf-7c85-3c9g
created: 2024-06-04T15:31:08.697271-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0535.yaml
|
id: GO-2022-0535
modules:
- module: std
versions:
- fixed: 1.12.16
- introduced: 1.13.0-0
- fixed: 1.13.7
vulnerable_at: 1.13.6
packages:
- package: crypto/x509
goos:
- windows
symbols:
- Certificate.systemVerify
summary: Certificate validation bypass on Windows in crypto/x509
description: |-
A Windows vulnerability allows attackers to spoof valid certificate chains when
the system root store is in use.
A workaround is present in Go 1.12.6+ and Go 1.13.7+, but affected users should
additionally install the Windows security update to protect their system.
See https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-0601
for details on the Windows vulnerability.
published: 2022-08-01T22:21:17Z
cves:
- CVE-2020-0601
references:
- fix: https://go.dev/cl/215905
- fix: https://go.googlesource.com/go/+/953bc8f391a63adf00bac2515dba62abe8a1e2c2
- report: https://go.dev/issue/36834
- web: https://groups.google.com/g/golang-announce/c/Hsw4mHYc470/m/WJeW5wguEgAJ
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1857.yaml
|
id: GO-2023-1857
modules:
- module: github.com/malfunkt/iprange
vulnerable_at: 0.9.0
packages:
- package: github.com/malfunkt/iprange
symbols:
- Parse
- ParseList
summary: Panic when parsing ranges with invalid masks in github.com/malfunkt/iprange
description: Parsing a range with a mask larger than 32 bits causes a panic.
ghsas:
- GHSA-f99h-w337-mv56
references:
- report: https://github.com/malfunkt/iprange/issues/1
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2569.yaml
|
id: GO-2024-2569
modules:
- module: github.com/cilium/cilium
versions:
- fixed: 1.14.7
vulnerable_at: 1.14.6
summary: Unencrypted traffic between pods when using Wireguard and an external kvstore in github.com/cilium/cilium
cves:
- CVE-2024-25631
ghsas:
- GHSA-x989-52fc-4vr4
unknown_aliases:
- BIT-cilium-2024-25631
- BIT-cilium-operator-2024-25631
- BIT-hubble-2024-25631
- BIT-hubble-relay-2024-25631
references:
- advisory: https://github.com/cilium/cilium/security/advisories/GHSA-x989-52fc-4vr4
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-25631
- web: https://docs.cilium.io/en/stable/installation/k8s-install-external-etcd/#when-do-i-need-to-use-a-kvstore
- web: https://docs.cilium.io/en/stable/security/network/encryption-wireguard/#encryption-wg
- web: https://github.com/cilium/cilium/releases/tag/v1.14.7
source:
id: GHSA-x989-52fc-4vr4
created: 2024-06-05T13:39:10.852421-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2654.yaml
|
id: GO-2024-2654
modules:
- module: github.com/argoproj/argo-cd/v2
versions:
- fixed: 2.8.13
- introduced: 2.9.0
- fixed: 2.9.9
- introduced: 2.10.0
- fixed: 2.10.4
vulnerable_at: 2.10.3
packages:
- package: github.com/argoproj/argo-cd/v2/server/application
symbols:
- NewHandler
- newTerminalSession
- package: github.com/argoproj/argo-cd/v2/util/session
symbols:
- expireOldFailedAttempts
- SessionManager.updateFailureCount
- SessionManager.getFailureCount
derived_symbols:
- SessionManager.VerifyUsernamePassword
summary: Denial of service in github.com/argoproj/argo-cd/v2
description: |-
Application may crash due to concurrent writes, leading to a denial of service.
An attacker can crash the application continuously, making it impossible for
legitimate users to access the service. Authentication is not required in the
attack.
cves:
- CVE-2024-21661
ghsas:
- GHSA-6v85-wr92-q4p7
credits:
- '@nadava669'
- '@todaywasawesome'
- '@crenshaw-dev'
- '@jannfis'
- '@pasha-codefresh'
references:
- fix: https://github.com/argoproj/argo-cd/commit/2a22e19e06aaf6a1e734443043310a66c234e345
- fix: https://github.com/argoproj/argo-cd/commit/5bbb51ab423f273dda74ab956469843d2db2e208
- fix: https://github.com/argoproj/argo-cd/commit/ce04dc5c6f6e92033221ec6d96b74403b065ca8b
- web: https://github.com/argoproj/argo-cd/blob/54601c8fd30b86a4c4b7eb449956264372c8bde0/util/session/sessionmanager.go#L302-L311
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2959.yaml
|
id: GO-2024-2959
modules:
- module: github.com/gofiber/fiber
vulnerable_at: 1.14.6
- module: github.com/gofiber/fiber/v2
versions:
- fixed: 2.52.5
vulnerable_at: 2.52.4
packages:
- package: github.com/gofiber/fiber/v2/middleware/session
symbols:
- Store.Get
- Store.responseCookies
summary: Session Middleware Token Injection Vulnerability in github.com/gofiber/fiber
cves:
- CVE-2024-38513
ghsas:
- GHSA-98j2-3j3p-fw2v
references:
- advisory: https://github.com/gofiber/fiber/security/advisories/GHSA-98j2-3j3p-fw2v
- fix: https://github.com/gofiber/fiber/commit/7926e5bf4da03e54f62d27d53229d35b264cba8e
source:
id: GHSA-98j2-3j3p-fw2v
created: 2024-07-02T11:03:15.390979-04:00
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2765.yaml
|
id: GO-2024-2765
modules:
- module: kubevirt.io/kubevirt
versions:
- fixed: 0.26.0
vulnerable_at: 0.26.0-rc.0
summary: Permissions bypass in KubeVirt in kubevirt.io/kubevirt
cves:
- CVE-2020-1701
ghsas:
- GHSA-849r-8wvp-4wwg
references:
- advisory: https://github.com/advisories/GHSA-849r-8wvp-4wwg
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2020-1701
- web: https://bugzilla.redhat.com/show_bug.cgi?id=1792092
- web: https://github.com/kubevirt/containerized-data-importer/pull/1098
- web: https://github.com/kubevirt/kubevirt/commit/9efa8d7388d4fe1c698c6980aa7122c06bd141be
- web: https://github.com/kubevirt/kubevirt/issues/2967
- web: https://github.com/kubevirt/kubevirt/pull/3001
source:
id: GHSA-849r-8wvp-4wwg
created: 2024-05-17T16:11:56.381692-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0038.yaml
|
id: GO-2020-0038
modules:
- module: github.com/pion/dtls
versions:
- fixed: 1.5.2
vulnerable_at: 1.5.1
packages:
- package: github.com/pion/dtls
symbols:
- Conn.handleIncomingPacket
derived_symbols:
- Client
- Dial
- Listener.Accept
- Resume
- Server
summary: Improper authentication in github.com/pion/dtls
description: |-
Due to improper verification of packets, unencrypted packets containing
application data are accepted after the initial handshake. This allows an
attacker to inject arbitrary data which the client/server believes was
encrypted, despite not knowing the session key.
published: 2021-04-14T20:04:52Z
cves:
- CVE-2019-20786
ghsas:
- GHSA-7gfg-6934-mqq2
references:
- fix: https://github.com/pion/dtls/pull/128
- fix: https://github.com/pion/dtls/commit/fd73a5df2ff0e1fb6ae6a51e2777d7a16cc4f4e0
- web: https://www.usenix.org/system/files/sec20fall_fiterau-brostean_prepub.pdf
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0701.yaml
|
id: GO-2022-0701
modules:
- module: k8s.io/kubernetes
versions:
- fixed: 1.1.1
vulnerable_at: 1.1.0
packages:
- package: k8s.io/kubernetes/pkg/api/rest
symbols:
- BeforeCreate
skip_fix: 'TODO: Revisit this reason (Dependency github.com/docker/docker/pkg/units no longer exists)'
- package: k8s.io/kubernetes/pkg/registry/generic/etcd
symbols:
- NamespaceKeyFunc
skip_fix: 'TODO: Revisit this reason (Dependency github.com/docker/docker/pkg/units no longer exists)'
- package: k8s.io/kubernetes/pkg/api/storage
symbols:
- NamespaceKeyFunc
- NoNamespaceKeyFunc
skip_fix: 'TODO: Revisit this reason (Dependency github.com/docker/docker/pkg/units no longer exists)'
- package: k8s.io/kubernetes/pkg/registry/namespace/etcd
symbols:
- NewREST
skip_fix: 'TODO: Revisit this reason (Dependency github.com/docker/docker/pkg/units no longer exists)'
- package: k8s.io/kubernetes/pkg/registry/node/etcd
symbols:
- NewREST
skip_fix: 'TODO: Revisit this reason (Dependency github.com/docker/docker/pkg/units no longer exists)'
- package: k8s.io/kubernetes/pkg/registry/persistentvolume/etcd
symbols:
- NewREST
skip_fix: 'TODO: Revisit this reason (Dependency github.com/docker/docker/pkg/units no longer exists)'
summary: Directory traversal in k8s.io/kubernetes
description: |-
Crafted object type names can cause directory traversal in Kubernetes.
Object names are not validated before being passed to etcd. This allows
attackers to write arbitrary files via a crafted object name, hence causing
directory traversal vulnerability in Kubernetes, as used in Red Hat OpenShift
Enterprise 3.0.
published: 2022-02-15T01:57:18Z
cves:
- CVE-2015-5305
ghsas:
- GHSA-jp32-vmm6-3vf5
credits:
- liggitt (Jordan Liggitt)
references:
- fix: https://github.com/kubernetes/kubernetes/pull/16381
- fix: https://github.com/kubernetes/kubernetes/commit/37f730f68c7f06e060f90714439bfb0dbb2df5e7
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2606.yaml
|
id: GO-2024-2606
modules:
- module: github.com/jackc/pgproto3/v2
versions:
- fixed: 2.3.3
vulnerable_at: 2.3.2
packages:
- package: github.com/jackc/pgproto3/v2
symbols:
- CloseComplete.Encode
- AuthenticationSASLFinal.Encode
- Terminate.Encode
- NotificationResponse.Encode
- AuthenticationGSSContinue.Encode
- DataRow.Encode
- CopyInResponse.Encode
- FunctionCall.Encode
- BackendKeyData.Encode
- Query.Encode
- CancelRequest.Encode
- ParameterStatus.Encode
- BindComplete.Encode
- CopyBothResponse.Encode
- CopyData.Encode
- CopyOutResponse.Encode
- AuthenticationGSS.Encode
- Parse.Encode
- PasswordMessage.Encode
- AuthenticationCleartextPassword.Encode
- ErrorResponse.Encode
- SASLInitialResponse.Encode
- Execute.Encode
- FunctionCallResponse.Encode
- ReadyForQuery.Encode
- AuthenticationOk.Encode
- SSLRequest.Encode
- CopyDone.Encode
- AuthenticationMD5Password.Encode
- ParseComplete.Encode
- EmptyQueryResponse.Encode
- CommandComplete.Encode
- AuthenticationSASL.Encode
- NoData.Encode
- Flush.Encode
- GSSEncRequest.Encode
- StartupMessage.Encode
- Backend.Send
- GSSResponse.Encode
- CopyFail.Encode
- Bind.Encode
- AuthenticationSASLContinue.Encode
- NoticeResponse.Encode
- SASLResponse.Encode
- Frontend.Send
- Sync.Encode
- ErrorResponse.marshalBinary
- RowDescription.Encode
- Close.Encode
- ParameterDescription.Encode
- PortalSuspended.Encode
- Describe.Encode
- package: github.com/jackc/pgproto3/v2/example/pgfortune
symbols:
- PgFortuneBackend.handleStartup
- PgFortuneBackend.Run
derived_symbols:
- main
fix_links:
- https://github.com/jackc/pgproto3/commit/945c2126f6db8f3bea7eeebe307c01fe92bca007
- module: github.com/jackc/pgx/v4
versions:
- fixed: 4.18.2
vulnerable_at: 4.18.1
packages:
- package: github.com/jackc/pgx/v4/internal/sanitize
symbols:
- Query.Sanitize
derived_symbols:
- SanitizeSQL
fix_links:
- https://github.com/jackc/pgx/commit/f94eb0e2f96782042c96801b5ac448f44f0a81df,
- module: github.com/jackc/pgx/v5
versions:
- introduced: 5.0.0
- fixed: 5.5.4
vulnerable_at: 5.5.3
packages:
- package: github.com/jackc/pgx/v5/internal/sanitize
symbols:
- Query.Sanitize
derived_symbols:
- SanitizeSQL
- package: github.com/jackc/pgx/v5/pgproto3
symbols:
- Frontend.SendSync
- Backend.Flush
- Frontend.SendDescribe
- Parse.Encode
- CopyBothResponse.Encode
- CopyOutResponse.Encode
- GSSResponse.Encode
- DataRow.Encode
- EmptyQueryResponse.Encode
- PortalSuspended.Encode
- Close.Encode
- SASLInitialResponse.Encode
- ReadyForQuery.Encode
- Query.Encode
- CopyFail.Encode
- ParameterDescription.Encode
- NoData.Encode
- SSLRequest.Encode
- AuthenticationMD5Password.Encode
- Flush.Encode
- StartupMessage.Encode
- Frontend.SendParse
- CloseComplete.Encode
- Backend.Send
- CopyInResponse.Encode
- GSSEncRequest.Encode
- Frontend.Send
- Describe.Encode
- AuthenticationOk.Encode
- FunctionCallResponse.Encode
- Bind.Encode
- Frontend.SendClose
- Terminate.Encode
- Frontend.SendExecute
- Sync.Encode
- Execute.Encode
- AuthenticationGSSContinue.Encode
- FunctionCall.Encode
- CancelRequest.Encode
- AuthenticationSASLFinal.Encode
- BackendKeyData.Encode
- Frontend.Flush
- NoticeResponse.Encode
- AuthenticationSASL.Encode
- Frontend.SendBind
- AuthenticationSASLContinue.Encode
- BindComplete.Encode
- PasswordMessage.Encode
- NotificationResponse.Encode
- ErrorResponse.Encode
- CopyData.Encode
- ErrorResponse.marshalBinary
- Frontend.SendQuery
- ParameterStatus.Encode
- AuthenticationCleartextPassword.Encode
- AuthenticationGSS.Encode
- RowDescription.Encode
- CopyDone.Encode
- CommandComplete.Encode
- SASLResponse.Encode
- ParseComplete.Encode
derived_symbols:
- Frontend.SendUnbufferedEncodedCopyData
- package: github.com/jackc/pgx/v5/pgconn
symbols:
- Batch.ExecParams
- PgConn.ExecBatch
- Batch.ExecPrepared
derived_symbols:
- Connect
- ConnectConfig
- ConnectWithOptions
- MultiResultReader.Close
- MultiResultReader.NextResult
- MultiResultReader.ReadAll
- PgConn.CheckConn
- PgConn.Close
- PgConn.CopyFrom
- PgConn.CopyTo
- PgConn.Deallocate
- PgConn.Exec
- PgConn.ExecParams
- PgConn.ExecPrepared
- PgConn.Ping
- PgConn.Prepare
- PgConn.ReceiveMessage
- PgConn.SyncConn
- PgConn.WaitForNotification
- Pipeline.Close
- Pipeline.Flush
- Pipeline.GetResults
- Pipeline.SendDeallocate
- Pipeline.SendPrepare
- Pipeline.SendQueryParams
- Pipeline.SendQueryPrepared
- Pipeline.Sync
- ResultReader.Close
- ResultReader.NextRow
- ResultReader.Read
- ValidateConnectTargetSessionAttrsPreferStandby
- ValidateConnectTargetSessionAttrsPrimary
- ValidateConnectTargetSessionAttrsReadOnly
- ValidateConnectTargetSessionAttrsReadWrite
- ValidateConnectTargetSessionAttrsStandby
- package: github.com/jackc/pgx/v5/pgproto3/example/pgfortune
symbols:
- PgFortuneBackend.handleStartup
- PgFortuneBackend.Run
derived_symbols:
- main
fix_links:
- https://github.com/jackc/pgx/commit/c543134753a0c5d22881c12404025724cb05ffd8
- https://github.com/jackc/pgx/commit/adbb38f298c76e283ffc7c7a3f571036fea47fd4
summary: SQL injection in github.com/jackc/pgproto3 and github.com/jackc/pgx
description: |-
An integer overflow in the calculated message size of a query or bind message
could allow a single large message to be sent as multiple messages under the
attacker's control. This could lead to SQL injection if an attacker can cause a
single query or bind message to exceed 4 GB in size.
cves:
- CVE-2024-27304
ghsas:
- GHSA-mrww-27vc-gghv
- GHSA-7jwh-3vrq-q3m8
credits:
- paul-gerste-sonarsource
references:
- advisory: https://github.com/jackc/pgx/security/advisories/GHSA-mrww-27vc-gghv
- fix: https://github.com/jackc/pgproto3/commit/945c2126f6db8f3bea7eeebe307c01fe92bca007
- fix: https://github.com/jackc/pgx/commit/adbb38f298c76e283ffc7c7a3f571036fea47fd4
- fix: https://github.com/jackc/pgx/commit/c543134753a0c5d22881c12404025724cb05ffd8
- fix: https://github.com/jackc/pgx/commit/f94eb0e2f96782042c96801b5ac448f44f0a81df
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2114.yaml
|
id: GO-2023-2114
modules:
- module: github.com/crewjam/saml
versions:
- fixed: 0.4.14
vulnerable_at: 0.4.13
packages:
- package: github.com/crewjam/saml
summary: |-
Cross-site scripting via missing binding syntax validation in
github.com/crewjam/saml
description: |-
The package does not validate the ACS Location URI according to the SAML binding
being parsed. If abused, this flaw allows attackers to register malicious
Service Providers at the IdP and inject Javascript in the ACS endpoint
definition, achieving Cross-Site-Scripting (XSS) in the IdP context during the
redirection at the end of a SAML SSO Flow. Consequently, an attacker may perform
any authenticated action as the victim once the victim's browser loads the SAML
IdP initiated SSO link for the malicious service provider.
cves:
- CVE-2023-45683
ghsas:
- GHSA-267v-3v32-g6q5
credits:
- Francesco Lacerenza from Doyensec
references:
- advisory: https://github.com/crewjam/saml/security/advisories/GHSA-267v-3v32-g6q5
- fix: https://github.com/crewjam/saml/commit/b07b16cf83c4171d16da4d85608cb827f183cd79
notes:
- The fix introduced functions Endpoint.UnmarshalXML and IndexedEndpoint.UnmarshalXML, but we currently do not have a way to mark uses of xml.Unmarshal on a certain type as vulnerable.
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0274.yaml
|
id: GO-2022-0274
modules:
- module: github.com/opencontainers/runc
versions:
- introduced: 1.0.1-0.20211012131345-9c444070ec7b
- fixed: 1.1.0
vulnerable_at: 1.0.1-0.20211012131345-9c444070ec7b
packages:
- package: github.com/opencontainers/runc/libcontainer
symbols:
- Bytemsg.Serialize
derived_symbols:
- LinuxFactory.StartInitialization
- linuxContainer.Run
- linuxContainer.Start
- linuxStandardInit.Init
summary: Namespace restriction bypass in github.com/opencontainers/runc
description: |-
An attacker with partial control over the bind mount sources of a new container
can bypass namespace restrictions.
published: 2022-07-15T23:08:20Z
cves:
- CVE-2021-43784
ghsas:
- GHSA-v95c-p5hm-xq8f
references:
- fix: https://github.com/opencontainers/runc/commit/f50369af4b571e358f20b139eea52d612eb55eed
- web: https://github.com/opencontainers/runc/commit/dde509df4e28cec33b3c99c6cda3d4fd5beafc77
- web: https://bugs.chromium.org/p/project-zero/issues/detail?id=2241
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2775.yaml
|
id: GO-2024-2775
modules:
- module: github.com/IBAX-io/go-ibax
versions:
- fixed: 1.4.2
vulnerable_at: 1.4.0
summary: IBAX go-ibax vulnerable to SQL injection in github.com/IBAX-io/go-ibax
cves:
- CVE-2022-3801
ghsas:
- GHSA-m738-584h-26p6
references:
- advisory: https://github.com/advisories/GHSA-m738-584h-26p6
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2022-3801
- fix: https://github.com/IBAX-io/go-ibax/commit/b0183d8e550836dc50282ee74ff421ee41b25a37
- report: https://github.com/IBAX-io/go-ibax/issues/2062
- web: https://vuldb.com/?id.212637
source:
id: GHSA-m738-584h-26p6
created: 2024-06-04T17:59:22.590889-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2696.yaml
|
id: GO-2024-2696
modules:
- module: github.com/mattermost/mattermost-server
versions:
- introduced: 9.3.0+incompatible
- fixed: 9.3.3+incompatible
- introduced: 9.4.0+incompatible
- fixed: 9.4.4+incompatible
- introduced: 9.5.0+incompatible
- fixed: 9.5.2+incompatible
vulnerable_at: 9.5.1+incompatible
- module: github.com/mattermost/mattermost-server/v5
vulnerable_at: 5.39.3
- module: github.com/mattermost/mattermost-server/v6
vulnerable_at: 6.7.2
- module: github.com/mattermost/mattermost/server/v8
non_go_versions:
- introduced: 8.1.0
- fixed: 8.1.11
vulnerable_at: 8.0.0-20240626145722-59998b0b8473
summary: Mattermost fails to authenticate the source of certain types of post actions in github.com/mattermost/mattermost-server
cves:
- CVE-2024-2447
ghsas:
- GHSA-wp43-vprh-c3w5
references:
- advisory: https://github.com/advisories/GHSA-wp43-vprh-c3w5
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-2447
- web: https://mattermost.com/security-updates
source:
id: GHSA-wp43-vprh-c3w5
created: 2024-06-26T13:59:50.842034-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0086.yaml
|
id: GO-2021-0086
modules:
- module: github.com/documize/community
versions:
- fixed: 1.76.3-0.20191119114751-a4384210d4d0
vulnerable_at: 1.76.3-0.20191115182156-68824912016c
packages:
- package: github.com/documize/community/domain/section/markdown
symbols:
- Provider.Render
summary: Cross-site scripting in github.com/documize/community
description: |-
HTML content in markdown is not sanitized during rendering, possibly allowing
XSS if used to render untrusted user input.
published: 2021-04-14T20:04:52Z
cves:
- CVE-2019-19619
ghsas:
- GHSA-wmwp-pggc-h4mj
references:
- fix: https://github.com/documize/community/commit/a4384210d4d0d6b18e6fdb7e155de96d4a1cf9f3
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2811.yaml
|
id: GO-2024-2811
modules:
- module: github.com/piraeusdatastore/piraeus-operator
vulnerable_at: 1.10.9
- module: github.com/piraeusdatastore/piraeus-operator/v2
unsupported_versions:
- last_affected: 2.5.0
vulnerable_at: 2.5.1
summary: piraeus-operator allows attacker to impersonate service account in github.com/piraeusdatastore/piraeus-operator
cves:
- CVE-2024-33398
ghsas:
- GHSA-6fg2-hvj9-832f
references:
- advisory: https://github.com/advisories/GHSA-6fg2-hvj9-832f
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-33398
- web: https://gist.github.com/HouqiyuA/d0c11fae5ba4789946ae33175d0f9edb
- web: https://github.com/HouqiyuA/k8s-rbac-poc
- web: https://piraeus.io
source:
id: GHSA-6fg2-hvj9-832f
created: 2024-06-26T14:06:22.393269-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2915.yaml
|
id: GO-2024-2915
modules:
- module: github.com/goharbor/harbor
versions:
- fixed: 2.8.5+incompatible
- introduced: 2.9.0+incompatible
- fixed: 2.9.3+incompatible
- introduced: 2.10.0+incompatible
- fixed: 2.10.1+incompatible
vulnerable_at: 2.10.1-rc1+incompatible
summary: Open Redirect URL in Harbor in github.com/goharbor/harbor
cves:
- CVE-2024-22244
ghsas:
- GHSA-5757-v49g-f6r7
references:
- advisory: https://github.com/goharbor/harbor/security/advisories/GHSA-5757-v49g-f6r7
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-22244
source:
id: GHSA-5757-v49g-f6r7
created: 2024-06-13T12:05:47.096437-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2490.yaml
|
id: GO-2024-2490
modules:
- module: github.com/anchore/stereoscope
versions:
- fixed: 0.0.1
vulnerable_at: 0.0.0-20240118133533-eb656fc71793
packages:
- package: github.com/anchore/stereoscope/pkg/file
symbols:
- UntarToDirectory
fix_links:
- https://github.com/anchore/stereoscope/commit/09dacab4d9ee65ee8bc7af8ebf4aa7b5aaa36204
summary: Path traversal in github.com/anchore/stereoscope
description: |-
It is possible to craft an OCI tar archive that, when stereoscope attempts to
unarchive the contents, will result in writing to paths outside of the unarchive
temporary directory.
cves:
- CVE-2024-24579
ghsas:
- GHSA-hpxr-w9w7-g4gv
credits:
- '@wagoodman'
- '@joshbressers'
- '@nurmi'
references:
- advisory: https://github.com/anchore/stereoscope/security/advisories/GHSA-hpxr-w9w7-g4gv
- fix: https://github.com/anchore/stereoscope/commit/09dacab4d9ee65ee8bc7af8ebf4aa7b5aaa36204
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1547.yaml
|
id: GO-2023-1547
modules:
- module: helm.sh/helm/v3
versions:
- fixed: 3.11.1
vulnerable_at: 3.11.0
packages:
- package: helm.sh/helm/v3/cmd/helm
symbols:
- addInstallFlags
- newUpgradeCmd
derived_symbols:
- main
- package: helm.sh/helm/v3/pkg/action
symbols:
- Configuration.renderResources
- Install.RunWithContext
- Upgrade.prepareUpgrade
derived_symbols:
- Install.Run
- Lint.Run
- Upgrade.Run
- Upgrade.RunWithContext
- package: helm.sh/helm/v3/pkg/engine
symbols:
- Engine.initFunMap
derived_symbols:
- Engine.Render
- Render
- RenderWithClient
summary: Information disclosure in helm.sh/helm/v3
description: |-
An information disclosure vulnerability exists in the getHostByName template
function.
The function getHostByName is a Helm template function introduced in Helm v3.
The function is able to accept a hostname and return an IP address for that
hostname. To get the IP address the function performs a DNS lookup. The DNS
lookup happens when used with "helm install|upgrade|template" or when the Helm
SDK is used to render a chart.
Information passed into the chart can be disclosed to the DNS servers used to
lookup the IP address. For example, a malicious chart could inject getHostByName
into a chart in order to disclose values to a malicious DNS server.
cves:
- CVE-2023-25165
ghsas:
- GHSA-pwcw-6f5g-gxf8
credits:
- Philipp Stehle of SAP
references:
- advisory: https://github.com/helm/helm/security/advisories/GHSA-pwcw-6f5g-gxf8
- fix: https://github.com/helm/helm/commit/293b50c65d4d56187cd4e2f390f0ada46b4c4737
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0523.yaml
|
id: GO-2022-0523
modules:
- module: std
versions:
- fixed: 1.17.12
- introduced: 1.18.0-0
- fixed: 1.18.4
vulnerable_at: 1.18.3
packages:
- package: encoding/xml
symbols:
- Decoder.DecodeElement
- Decoder.unmarshal
- Decoder.unmarshalPath
summary: Stack exhaustion when unmarshaling certain documents in encoding/xml
description: |-
Unmarshaling an XML document into a Go struct which has a nested field that uses
the 'any' field tag can panic due to stack exhaustion.
published: 2022-07-20T20:52:06Z
references:
- fix: https://go.dev/cl/417061
- fix: https://go.googlesource.com/go/+/c4c1993fd2a5b26fe45c09592af6d3388a3b2e08
- report: https://go.dev/issue/53611
- web: https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE
cve_metadata:
id: CVE-2022-30633
cwe: 'CWE-674: Uncontrolled Recursion'
description: |-
Uncontrolled recursion in Unmarshal in encoding/xml before Go 1.17.12 and Go
1.18.4 allows an attacker to cause a panic due to stack exhaustion via
unmarshalling an XML document into a Go struct which has a nested field that
uses the 'any' field tag.
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2780.yaml
|
id: GO-2024-2780
modules:
- module: k8s.io/kubernetes
versions:
- introduced: 1.13.0
- fixed: 1.13.7
- introduced: 1.14.0
- fixed: 1.14.3
vulnerable_at: 1.14.3-beta.0
summary: Kubelet Incorrect Privilege Assignment in k8s.io/kubernetes
cves:
- CVE-2019-11245
ghsas:
- GHSA-r76g-g87f-vw8f
references:
- advisory: https://github.com/advisories/GHSA-r76g-g87f-vw8f
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2019-11245
- web: https://bugzilla.redhat.com/show_bug.cgi?id=1715726
- web: https://github.com/kubernetes/kubernetes/issues/78308
- web: https://github.com/kubernetes/kubernetes/pull/76665
- web: https://github.com/kubernetes/kubernetes/pull/76665/commits/26e3c8674e66f0d10170d34f5445f0aed207387f
- web: https://security.netapp.com/advisory/ntap-20190919-0003
source:
id: GHSA-r76g-g87f-vw8f
created: 2024-06-07T11:26:55.945196-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2515.yaml
|
id: GO-2024-2515
modules:
- module: github.com/grafana/grafana
non_go_versions:
- fixed: 7.0.0
vulnerable_at: 5.4.5+incompatible
summary: Grafana XSS via the OpenTSDB datasource in github.com/grafana/grafana
cves:
- CVE-2020-13430
ghsas:
- GHSA-7m2x-qhrq-rp8h
unknown_aliases:
- BIT-grafana-2020-13430
references:
- advisory: https://github.com/advisories/GHSA-7m2x-qhrq-rp8h
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2020-13430
- fix: https://github.com/grafana/grafana/pull/24539
- web: https://github.com/grafana/grafana/releases/tag/v7.0.0
- web: https://security.netapp.com/advisory/ntap-20200528-0003
source:
id: GHSA-7m2x-qhrq-rp8h
created: 2024-06-14T11:39:28.904078-04:00
review_status: UNREVIEWED
unexcluded: NOT_IMPORTABLE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2755.yaml
|
id: GO-2024-2755
modules:
- module: k8s.io/kubernetes
versions:
- fixed: 1.19.3
vulnerable_at: 1.19.3-rc.0
summary: Sensitive Information leak via Log File in Kubernetes in k8s.io/kubernetes
cves:
- CVE-2020-8563
ghsas:
- GHSA-5xfg-wv98-264m
references:
- advisory: https://github.com/advisories/GHSA-5xfg-wv98-264m
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2020-8563
- web: https://bugzilla.redhat.com/show_bug.cgi?id=1886635
- web: https://github.com/kubernetes/kubernetes/issues/95621
- web: https://github.com/kubernetes/kubernetes/pull/95236
- web: https://github.com/kubernetes/kubernetes/pull/95236/commits/247f6dd09299bc7893c1e0affea11c0255025b96
- web: https://groups.google.com/g/kubernetes-announce/c/ScdmyORnPDk
- web: https://groups.google.com/g/kubernetes-security-discuss/c/vm-HcrFUOCs/m/36utxAM5CwAJ
- web: https://security.netapp.com/advisory/ntap-20210122-0006
source:
id: GHSA-5xfg-wv98-264m
created: 2024-06-04T17:59:43.631502-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2812.yaml
|
id: GO-2024-2812
modules:
- module: github.com/jub0bs/fcors
versions:
- fixed: 0.9.0
vulnerable_at: 0.8.0
packages:
- package: github.com/jub0bs/fcors/internal/radix
symbols:
- splitRight
- Tree.Insert
- node.add
- lengthOfCommonSuffix
- lastByteIn
- Tree.Contains
summary: Some CORS middleware allow untrusted origins in github.com/jub0bs/fcors
description: |-
Some CORS middleware (more specifically those created by specifying two or more
origin patterns whose hosts share a proper suffix) incorrectly allow some
untrusted origins, thereby opening the door to cross-origin attacks from the
untrusted origins in question.
For example, specifying origin patterns "https://foo.com" and "https://bar.com"
(in that order) would yield a middleware that would incorrectly allow untrusted
origin "https://barfoo.com".
ghsas:
- GHSA-v84h-653v-4pq9
related:
- GHSA-vhxv-fg4m-p2w8
references:
- advisory: https://github.com/jub0bs/fcors/security/advisories/GHSA-v84h-653v-4pq9
- fix: https://github.com/jub0bs/fcors/commit/b5dcb889a49def37d7d9c25deb7135f4eb45625e
source:
id: GHSA-v84h-653v-4pq9
created: 2024-05-20T16:46:53.091159-04:00
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2472.yaml
|
id: GO-2024-2472
modules:
- module: github.com/notaryproject/notation
unsupported_versions:
- last_affected: 1.0.0
vulnerable_at: 1.1.1
summary: |-
Go package github.com/notaryproject/notation configured with permissive trust
policies potentially susceptible to rollback attack from compromised registry
cves:
- CVE-2024-23332
ghsas:
- GHSA-57wx-m636-g3g8
references:
- advisory: https://github.com/notaryproject/specifications/security/advisories/GHSA-57wx-m636-g3g8
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-23332
- web: https://github.com/notaryproject/specifications/commit/cdabdd1042de2999c685fa5d422a785ded9c983a
source:
id: GHSA-57wx-m636-g3g8
created: 2024-06-14T11:36:23.175793-04:00
review_status: UNREVIEWED
unexcluded: EFFECTIVELY_PRIVATE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2604.yaml
|
id: GO-2024-2604
modules:
- module: github.com/zeromicro/go-zero
versions:
- fixed: 1.4.4
vulnerable_at: 1.4.3
packages:
- package: github.com/zeromicro/go-zero/rest/internal/cors
symbols:
- isOriginAllowed
summary: CORS Filter bypass in github.com/zeromicro/go-zero
description: |-
The CORS Filter feature in go-zero allows users to specify an array of domains
allowed in the CORS policy. However, the isOriginAllowed function uses
strings.HasSuffix to check the origin, which can lead to a bypass via a domain
like "evil-victim.com". This vulnerability is capable of breaking CORS policy
and thus allowing any page to make requests and retrieve data on behalf of other
users.
cves:
- CVE-2024-27302
ghsas:
- GHSA-fgxv-gw55-r5fq
credits:
- cokeBeer
references:
- advisory: https://github.com/zeromicro/go-zero/security/advisories/GHSA-fgxv-gw55-r5fq
- fix: https://github.com/zeromicro/go-zero/commit/d9d79e930dff6218a873f4f02115df61c38b15db
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2102.yaml
|
id: GO-2023-2102
modules:
- module: std
versions:
- fixed: 1.20.10
- introduced: 1.21.0-0
- fixed: 1.21.3
vulnerable_at: 1.21.2
packages:
- package: net/http
symbols:
- http2serverConn.serve
- http2serverConn.processHeaders
- http2serverConn.upgradeRequest
- http2serverConn.runHandler
derived_symbols:
- ListenAndServe
- ListenAndServeTLS
- Serve
- ServeTLS
- Server.ListenAndServe
- Server.ListenAndServeTLS
- Server.Serve
- Server.ServeTLS
- http2Server.ServeConn
- module: golang.org/x/net
versions:
- fixed: 0.17.0
vulnerable_at: 0.16.0
packages:
- package: golang.org/x/net/http2
symbols:
- serverConn.serve
- serverConn.processHeaders
- serverConn.upgradeRequest
- serverConn.runHandler
derived_symbols:
- Server.ServeConn
summary: HTTP/2 rapid reset can cause excessive work in net/http
description: |-
A malicious HTTP/2 client which rapidly creates requests and immediately resets
them can cause excessive server resource consumption. While the total number of
requests is bounded by the http2.Server.MaxConcurrentStreams setting, resetting
an in-progress request allows the attacker to create a new request while the
existing one is still executing.
With the fix applied, HTTP/2 servers now bound the number of simultaneously
executing handler goroutines to the stream concurrency limit
(MaxConcurrentStreams). New requests arriving when at the limit (which can only
happen after the client has reset an existing, in-flight request) will be queued
until a handler exits. If the request queue grows too large, the server will
terminate the connection.
This issue is also fixed in golang.org/x/net/http2 for users manually
configuring HTTP/2.
The default stream concurrency limit is 250 streams (requests) per HTTP/2
connection. This value may be adjusted using the golang.org/x/net/http2 package;
see the Server.MaxConcurrentStreams setting and the ConfigureServer function.
ghsas:
- GHSA-4374-p667-p6c8
related:
- CVE-2023-44487
references:
- report: https://go.dev/issue/63417
- fix: https://go.dev/cl/534215
- fix: https://go.dev/cl/534235
- web: https://groups.google.com/g/golang-announce/c/iNNxDTCjZvo/m/UDd7VKQuAAAJ
cve_metadata:
id: CVE-2023-39325
cwe: 'CWE-400: Uncontrolled Resource Consumption'
references:
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/
- https://security.netapp.com/advisory/ntap-20231110-0008/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OXGWPQOJ3JNDW2XIYKIVJ7N7QUIFNM2Q/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZQIELEIRSZUYTFFH5KTH2YJ4IIQG2KE/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QF5QSYAOPDOWLY6DUHID56Q4HQFYB45I/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XTNLSL44Y5FB6JWADSZH6DCV4JJAAEQY/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ECRC75BQJP6FJN2L7KCKYZW4DSBD7QSD/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4BUK2ZIAGCULOOYDNH25JPU6JBES5NF2/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YRKEXKANQ7BKJW2YTAMP625LJUJZLJ4P/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D2BBIDR2ZMB3X5BC7SR4SLQMHRMVPY6L/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7N5GV4CHH6WAGX3GFMDD3COEOVCZ4RI/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/REMHVVIBDNKSRKNOTV7EQSB7CYQWOUOU/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UTT7DG3QOF5ZNJLUGHDNLRUIN6OWZARP/
- https://security.gentoo.org/glsa/202311-09
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ULQQONMSCQSH5Z5OWFFQHCGEZ3NL4DRJ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R3UETKPUB3V5JS5TLZOF3SMTGT5K5APS/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3SZN67IL7HMGMNAVLOTIXLIHUDXZK4LH/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NG7IMPL55MVWU3LCI4JQJT3K2U5CHDV7/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GSY7SXFFTPZFWDM6XELSDSHZLVW3AHK7/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WCNCBYKZXLDFGAJUB7ZP5VLC3YTHJNVH/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AVZDNSMVDAQJ64LJC5I5U5LDM5753647/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZSVEMQV5ROY5YW5QE3I57HT3ITWG5GCV/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CHHITS4PUOZAKFIUBQAQZC7JWXMOYE4B/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3OVW5V2DM5K5IC3H7O42YDUGNJ74J35O/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KEOTKBUPZXHE3F352JBYNTSNRXYLWD6P/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MZQYOOKHQDQ57LV2IAG6NRFOVXKHJJ3Z/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5RSKA2II6QTD4YUKUNDVJQSRYSFC4VFR/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FTMJ3NJIDAZFWJQQSP3L22MUFJ3UP2PT/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPWCNYB5PQ5PCVZ4NJT6G56ZYFZ5QBU6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W2LZSWTV4NV4SNQARNXG5T6LRHP26EW2/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PJCUNGIQDUMZ4Z6HWVYIMR66A35F5S74/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L5E5JSJBZLYXOTZWXHJKRVCIXIHVWKJ6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YJWHBLVZDM5KQSDFRBFRKU5KSSOLIRQ4/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3WJ4QVX2AMUJ2F2S27POOAHRC4K3CHU4/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ODBY7RVMGZCBSTWF2OZGIZS57FNFUL67/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QXOU2JZUBEBP7GBKAYIJRPRBZSJCD7ST/
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2495.yaml
|
id: GO-2024-2495
modules:
- module: github.com/apache/servicecomb-service-center
non_go_versions:
- fixed: 2.2.0
vulnerable_at: 1.4.8
summary: Apache ServiceComb Service-Center Server-Side Request Forgery vulnerability in github.com/apache/servicecomb-service-center
cves:
- CVE-2023-44313
ghsas:
- GHSA-9xc9-xq7w-vpcr
references:
- advisory: https://github.com/advisories/GHSA-9xc9-xq7w-vpcr
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2023-44313
- web: http://www.openwall.com/lists/oss-security/2024/01/31/4
- web: https://lists.apache.org/thread/kxovd455o9h4f2v811hcov2qknbwld5r
source:
id: GHSA-9xc9-xq7w-vpcr
created: 2024-06-14T11:37:55.379016-04:00
review_status: UNREVIEWED
unexcluded: EFFECTIVELY_PRIVATE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2480.yaml
|
id: GO-2024-2480
modules:
- module: github.com/0xJacky/Nginx-UI
non_go_versions:
- fixed: 2.0.0-beta.12
vulnerable_at: 1.9.9
summary: |-
Nginx-UI vulnerable to authenticated RCE through injecting into the application
config via CRLF in github.com/0xJacky/Nginx-UI
cves:
- CVE-2024-23828
ghsas:
- GHSA-qcjq-7f7v-pvc8
references:
- advisory: https://github.com/0xJacky/nginx-ui/security/advisories/GHSA-qcjq-7f7v-pvc8
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-23828
- web: https://github.com/0xJacky/nginx-ui/commit/d70e37c8575e25b3da7203ff06da5e16c77a42d1
source:
id: GHSA-qcjq-7f7v-pvc8
created: 2024-06-14T11:36:54.518439-04:00
review_status: UNREVIEWED
unexcluded: NOT_IMPORTABLE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0191.yaml
|
id: GO-2022-0191
modules:
- module: std
versions:
- fixed: 1.10.6
- introduced: 1.11.0-0
- fixed: 1.11.3
vulnerable_at: 1.11.2
packages:
- package: crypto/x509
symbols:
- CertPool.findVerifiedParents
- Certificate.buildChains
summary: Denial of service in chain verification in crypto/x509
description: |-
The crypto/x509 package does not limit the amount of work performed for each
chain verification, which might allow attackers to craft pathological inputs
leading to a CPU denial of service. Go TLS servers accepting client certificates
and TLS clients verifying certificates are affected.
published: 2022-07-15T23:03:26Z
cves:
- CVE-2018-16875
credits:
- Netflix
references:
- fix: https://go.dev/cl/154105
- fix: https://go.googlesource.com/go/+/770130659b6fb2acf271476579a3644e093dda7f
- report: https://go.dev/issue/29233
- web: https://groups.google.com/g/golang-announce/c/Kw31K8G7Fi0
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2939.yaml
|
id: GO-2024-2939
modules:
- module: github.com/authzed/spicedb
versions:
- fixed: 1.33.1
vulnerable_at: 1.33.0
summary: SpiceDB exclusions can result in no permission returned when permission expected in github.com/authzed/spicedb
cves:
- CVE-2024-38361
ghsas:
- GHSA-grjv-gjgr-66g2
unknown_aliases:
- CGA-pfrr-qxjv-xmf4
references:
- advisory: https://github.com/authzed/spicedb/security/advisories/GHSA-grjv-gjgr-66g2
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-38361
- fix: https://github.com/authzed/spicedb/commit/ecef31d2b266fde17eb2c3415e2ec4ceff96fbeb
source:
id: GHSA-grjv-gjgr-66g2
created: 2024-06-27T15:53:47.71938-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0228.yaml
|
id: GO-2021-0228
modules:
- module: github.com/unknwon/cae
versions:
- fixed: 1.0.1
vulnerable_at: 1.0.0
packages:
- package: github.com/unknwon/cae/tz
symbols:
- TzArchive.syncFiles
- TzArchive.ExtractToFunc
derived_symbols:
- Create
- ExtractTo
- Open
- OpenFile
- TzArchive.Close
- TzArchive.ExtractTo
- TzArchive.Flush
- TzArchive.Open
- package: github.com/unknwon/cae/zip
symbols:
- ZipArchive.Open
- ZipArchive.ExtractToFunc
derived_symbols:
- Create
- ExtractTo
- ExtractToFunc
- Open
- OpenFile
- ZipArchive.Close
- ZipArchive.ExtractTo
- ZipArchive.Flush
summary: Path traversal in github.com/unknwon/cae
description: |-
The ExtractTo function doesn't securely escape file paths in zip archives which
include leading or non-leading "..". This allows an attacker to add or replace
files system-wide.
published: 2022-01-14T17:30:28Z
cves:
- CVE-2020-7664
ghsas:
- GHSA-vpx7-vm66-qx8r
credits:
- Georgios Gkitsas of Snyk Security Team
references:
- fix: https://github.com/unknwon/cae/commit/07971c00a1bfd9dc171c3ad0bfab5b67c2287e11
- web: https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMUNKNWONCAEZIP-570383
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0217.yaml
|
id: GO-2022-0217
modules:
- module: std
versions:
- fixed: 1.10.8
- introduced: 1.11.0-0
- fixed: 1.11.5
vulnerable_at: 1.11.4
packages:
- package: crypto/elliptic
symbols:
- curve.doubleJacobian
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
summary: Denial of service affecting P-521 and P-384 curves in crypto/elliptic
description: |-
A DoS vulnerability in the crypto/elliptic implementations of the P-521 and
P-384 elliptic curves may let an attacker craft inputs that consume excessive
amounts of CPU.
These inputs might be delivered via TLS handshakes, X.509 certificates, JWT
tokens, ECDH shares or ECDSA signatures. In some cases, if an ECDH private key
is reused more than once, the attack can also lead to key recovery.
published: 2022-05-24T15:21:01Z
cves:
- CVE-2019-6486
credits:
- Wycheproof Project
references:
- fix: https://go.dev/cl/159218
- fix: https://go.googlesource.com/go/+/193c16a3648b8670a762e925b6ac6e074f468a20
- report: https://go.dev/issue/29903
- web: https://groups.google.com/g/golang-announce/c/mVeX35iXuSw
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2726.yaml
|
id: GO-2024-2726
modules:
- module: github.com/traefik/traefik
vulnerable_at: 1.7.34
- module: github.com/traefik/traefik/v2
versions:
- fixed: 2.11.2
vulnerable_at: 2.11.1
- module: github.com/traefik/traefik/v3
versions:
- introduced: 3.0.0-rc1
- fixed: 3.0.0-rc5
vulnerable_at: 3.0.0-rc4
summary: Traefik affected by HTTP/2 CONTINUATION flood in net/http in github.com/traefik/traefik
ghsas:
- GHSA-7f4j-64p6-5h5v
references:
- advisory: https://github.com/traefik/traefik/security/advisories/GHSA-7f4j-64p6-5h5v
- web: https://github.com/traefik/traefik/releases/tag/v2.11.2
- web: https://github.com/traefik/traefik/releases/tag/v3.0.0-rc5
source:
id: GHSA-7f4j-64p6-5h5v
created: 2024-06-26T14:01:00.948687-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0243.yaml
|
id: GO-2021-0243
modules:
- module: std
versions:
- fixed: 1.15.14
- introduced: 1.16.0-0
- fixed: 1.16.6
vulnerable_at: 1.16.5
packages:
- package: crypto/tls
symbols:
- rsaKeyAgreement.generateClientKeyExchange
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
summary: Panic on certain certificates in crypto/tls
description: |-
crypto/tls clients can panic when provided a certificate of the wrong type for
the negotiated parameters. net/http clients performing HTTPS requests are also
affected.
published: 2022-02-17T17:32:57Z
cves:
- CVE-2021-34558
credits:
- Imre Rad
references:
- fix: https://go.dev/cl/334031
- fix: https://go.googlesource.com/go/+/a98589711da5e9d935e8d690cfca92892e86d557
- web: https://groups.google.com/g/golang-announce/c/n9FxMelZGAQ
- report: https://go.dev/issue/47143
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2491.yaml
|
id: GO-2024-2491
modules:
- module: github.com/opencontainers/runc
versions:
- introduced: 1.0.0-rc93
- fixed: 1.1.12
vulnerable_at: 1.1.11
packages:
- package: github.com/opencontainers/runc/libcontainer/utils
symbols:
- CloseExecFrom
skip_fix: cgo related fix error
- package: github.com/opencontainers/runc/libcontainer/cgroups
symbols:
- openFile
- prepareOpenat2
skip_fix: cgo related fix error
- package: github.com/opencontainers/runc/libcontainer
symbols:
- Container.start
- linuxSetnsInit.Init
- linuxStandardInit.Init
- Init
- finalizeNamespace
skip_fix: cgo related fix error
summary: |-
Container breakout through process.cwd trickery and leaked
fds in github.com/opencontainers/runc
cves:
- CVE-2024-21626
ghsas:
- GHSA-xr7r-f8xq-vfvv
credits:
- Rory McNamara from Snyk
- '@lifubang from acmcoder'
- Aleksa Sarai from SUSE
references:
- advisory: https://github.com/opencontainers/runc/security/advisories/GHSA-xr7r-f8xq-vfvv
- fix: https://github.com/opencontainers/runc/commit/02120488a4c0fc487d1ed2867e901eeed7ce8ecf
- web: http://packetstormsecurity.com/files/176993/runc-1.1.11-File-Descriptor-Leak-Privilege-Escalation.html
source:
id: GHSA-xr7r-f8xq-vfvv
created: 2024-07-01T16:15:02.647859-04:00
review_status: REVIEWED
unexcluded: EFFECTIVELY_PRIVATE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1704.yaml
|
id: GO-2023-1704
modules:
- module: std
versions:
- fixed: 1.19.8
- introduced: 1.20.0-0
- fixed: 1.20.3
vulnerable_at: 1.20.2
packages:
- package: net/textproto
symbols:
- readMIMEHeader
- Reader.upcomingHeaderNewlines
derived_symbols:
- Reader.ReadMIMEHeader
summary: Excessive memory allocation in net/http and net/textproto
description: |-
HTTP and MIME header parsing can allocate large amounts of memory, even when
parsing small inputs, potentially leading to a denial of service.
Certain unusual patterns of input data can cause the common function used to
parse HTTP and MIME headers to allocate substantially more memory than required
to hold the parsed headers. An attacker can exploit this behavior to cause an
HTTP server to allocate large amounts of memory from a small request,
potentially leading to memory exhaustion and a denial of service.
With fix, header parsing now correctly allocates only the memory required to
hold parsed headers.
credits:
- Jakob Ackermann (@das7pad)
references:
- report: https://go.dev/issue/58975
- fix: https://go.dev/cl/481994
- web: https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8
cve_metadata:
id: CVE-2023-24534
cwe: 'CWE-400: Uncontrolled Resource Consumption'
references:
- https://security.netapp.com/advisory/ntap-20230526-0007/
- https://security.gentoo.org/glsa/202311-09
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2158.yaml
|
id: GO-2023-2158
modules:
- module: github.com/grafana/google-sheets-datasource
versions:
- introduced: 0.9.0
- fixed: 1.2.2
vulnerable_at: 1.2.0
packages:
- package: github.com/grafana/google-sheets-datasource/pkg/googlesheets
symbols:
- GoogleSheets.getSheetData
derived_symbols:
- GoogleSheets.Query
- googleSheetsDatasource.QueryData
summary: Google Sheet API key disclosure in github.com/grafana/google-sheets-datasource
description: |-
Error messages for the Google Sheets data source plugin were improperly
sanitized. The Google Sheet API-key could potentially be exposed.
cves:
- CVE-2023-4457
ghsas:
- GHSA-37x5-qpm8-53rq
references:
- web: https://grafana.com/security/security-advisories/cve-2023-4457/
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2562.yaml
|
id: GO-2024-2562
modules:
- module: github.com/greenpau/caddy-security
unsupported_versions:
- last_affected: 1.1.23
vulnerable_at: 1.1.29
summary: Improper Neutralization of HTTP Headers in github.com/greenpau/caddy-security
cves:
- CVE-2024-21499
ghsas:
- GHSA-r969-783f-6jqr
references:
- advisory: https://github.com/advisories/GHSA-r969-783f-6jqr
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-21499
- report: https://github.com/greenpau/caddy-security/issues/270
- web: https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy
- web: https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-6249863
source:
id: GHSA-r969-783f-6jqr
created: 2024-06-14T11:42:07.479664-04:00
review_status: UNREVIEWED
unexcluded: EFFECTIVELY_PRIVATE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0101.yaml
|
id: GO-2021-0101
modules:
- module: github.com/apache/thrift
versions:
- introduced: 0.0.0-20151001171628-53dd39833a08
- fixed: 0.13.0
vulnerable_at: 0.12.1-0.20190222141417-6e5c0f6e315e
packages:
- package: github.com/apache/thrift/lib/go/thrift
symbols:
- TSimpleJSONProtocol.safePeekContains
derived_symbols:
- Skip
- SkipDefaultDepth
- TBinaryProtocol.Skip
- TCompactProtocol.Skip
- TJSONProtocol.ParseElemListBegin
- TJSONProtocol.ReadBool
- TJSONProtocol.ReadByte
- TJSONProtocol.ReadDouble
- TJSONProtocol.ReadFieldBegin
- TJSONProtocol.ReadFieldEnd
- TJSONProtocol.ReadI16
- TJSONProtocol.ReadI32
- TJSONProtocol.ReadI64
- TJSONProtocol.ReadListBegin
- TJSONProtocol.ReadListEnd
- TJSONProtocol.ReadMapBegin
- TJSONProtocol.ReadMapEnd
- TJSONProtocol.ReadMessageBegin
- TJSONProtocol.ReadMessageEnd
- TJSONProtocol.ReadSetBegin
- TJSONProtocol.ReadSetEnd
- TJSONProtocol.ReadStructBegin
- TJSONProtocol.ReadStructEnd
- TJSONProtocol.Skip
- TSimpleJSONProtocol.ParseElemListBegin
- TSimpleJSONProtocol.ParseF64
- TSimpleJSONProtocol.ParseI64
- TSimpleJSONProtocol.ParseListBegin
- TSimpleJSONProtocol.ParseListEnd
- TSimpleJSONProtocol.ParseObjectEnd
- TSimpleJSONProtocol.ParseObjectStart
- TSimpleJSONProtocol.ReadByte
- TSimpleJSONProtocol.ReadDouble
- TSimpleJSONProtocol.ReadI16
- TSimpleJSONProtocol.ReadI32
- TSimpleJSONProtocol.ReadI64
- TSimpleJSONProtocol.ReadListBegin
- TSimpleJSONProtocol.ReadListEnd
- TSimpleJSONProtocol.ReadMapBegin
- TSimpleJSONProtocol.ReadMapEnd
- TSimpleJSONProtocol.ReadMessageBegin
- TSimpleJSONProtocol.ReadMessageEnd
- TSimpleJSONProtocol.ReadSetBegin
- TSimpleJSONProtocol.ReadSetEnd
- TSimpleJSONProtocol.ReadStructBegin
- TSimpleJSONProtocol.ReadStructEnd
- TSimpleJSONProtocol.Skip
- TStandardClient.Call
- TStandardClient.Recv
- tApplicationException.Read
summary: Panic due to out-of-bounds read in github.com/apache/thrift
description: |-
Due to an improper bounds check, parsing maliciously crafted messages can cause
panics. If this package is used to parse untrusted input, this may be used as a
vector for a denial of service attack.
published: 2021-07-28T18:08:05Z
cves:
- CVE-2019-0210
ghsas:
- GHSA-jq7p-26h5-w78r
references:
- fix: https://github.com/apache/thrift/commit/264a3f318ed3e9e51573f67f963c8509786bcec2
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2394.yaml
|
id: GO-2023-2394
modules:
- module: github.com/shift72/caddy-geo-ip
vulnerable_at: 0.6.0
packages:
- package: github.com/shift72/caddy-geo-ip
skip_fix: Relies on quic-go which doesn't build on Go 1.18.
summary: Spoofed source IP address in github.com/shift72/caddy-geo-ip
description: |-
The caddy-geo-ip (aka GeoIP) middleware for Caddy 2 allows attackers to spoof
their source IP address via an X-Forwarded-For header, which may bypass a
protection mechanism (trusted_proxy directive in reverse_proxy or IP address
range restrictions).
cves:
- CVE-2023-50463
ghsas:
- GHSA-rxg9-hgq7-8pwx
references:
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2023-50463
- report: https://github.com/shift72/caddy-geo-ip/issues/4
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2578.yaml
|
id: GO-2024-2578
modules:
- module: github.com/apache/incubator-answer
versions:
- fixed: 1.2.5
vulnerable_at: 1.2.5-RC2
summary: Apache Answer Cross-site Scripting vulnerability in github.com/apache/incubator-answer
cves:
- CVE-2024-23349
ghsas:
- GHSA-8pf2-qj4v-fj64
references:
- advisory: https://github.com/advisories/GHSA-8pf2-qj4v-fj64
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-23349
- web: http://www.openwall.com/lists/oss-security/2024/02/22/2
- web: https://lists.apache.org/thread/y5902t09vfgy7892z3vzr1zq900sgyqg
source:
id: GHSA-8pf2-qj4v-fj64
created: 2024-05-17T16:15:07.683729-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2867.yaml
|
id: GO-2024-2867
modules:
- module: github.com/grafana/grafana
non_go_versions:
- fixed: 8.5.16
- introduced: 9.0.0
- fixed: 9.2.8
vulnerable_at: 5.4.5+incompatible
summary: Grafana Spoofing originalUrl of snapshots in github.com/grafana/grafana
cves:
- CVE-2022-39324
ghsas:
- GHSA-4724-7jwc-3fpw
unknown_aliases:
- BIT-grafana-2022-39324
references:
- advisory: https://github.com/grafana/grafana/security/advisories/GHSA-4724-7jwc-3fpw
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2022-39324
- fix: https://github.com/grafana/grafana/commit/239888f22983010576bb3a9135a7294e88c0c74a
- fix: https://github.com/grafana/grafana/commit/d7dcea71ea763780dc286792a0afd560bff2985c
- fix: https://github.com/grafana/grafana/pull/60232
- fix: https://github.com/grafana/grafana/pull/60256
source:
id: GHSA-4724-7jwc-3fpw
created: 2024-06-04T14:26:30.813921-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2163.yaml
|
id: GO-2023-2163
modules:
- module: github.com/nats-io/nkeys
versions:
- introduced: 0.4.0
- fixed: 0.4.6
vulnerable_at: 0.4.5
packages:
- package: github.com/nats-io/nkeys
symbols:
- decodePubCurveKey
derived_symbols:
- ckp.Open
- ckp.Seal
- ckp.SealWithRand
summary: Curve KeyPairs fail to encrypt in github.com/nats-io/nkeys
description: |-
Curve KeyPairs always use the same (all-zeros) key to encrypt data, and provide
no security.
cves:
- CVE-2023-46129
ghsas:
- GHSA-mr45-rx8q-wcm9
credits:
- Quentin Matillat (GitHub @tinou98)
references:
- advisory: https://github.com/nats-io/nkeys/security/advisories/GHSA-mr45-rx8q-wcm9
- fix: https://github.com/nats-io/nkeys/commit/58fb9d69f42ea73fffad1d14e5914dc666f3daa1
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2695.yaml
|
id: GO-2024-2695
modules:
- module: github.com/mattermost/mattermost-server
versions:
- introduced: 9.3.0+incompatible
- fixed: 9.3.3+incompatible
- introduced: 9.4.0+incompatible
- fixed: 9.4.4+incompatible
- introduced: 9.5.0+incompatible
- fixed: 9.5.2+incompatible
vulnerable_at: 9.5.1+incompatible
- module: github.com/mattermost/mattermost-server/v5
vulnerable_at: 5.39.3
- module: github.com/mattermost/mattermost-server/v6
vulnerable_at: 6.7.2
- module: github.com/mattermost/mattermost/server/v8
non_go_versions:
- introduced: 8.1.0
- fixed: 8.1.11
vulnerable_at: 8.0.0-20240626145722-59998b0b8473
summary: Mattermost Server doesn't limit the number of user preferences in github.com/mattermost/mattermost-server
cves:
- CVE-2024-28949
ghsas:
- GHSA-mcw6-3256-64gg
references:
- advisory: https://github.com/advisories/GHSA-mcw6-3256-64gg
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-28949
- web: https://github.com/mattermost/mattermost/commit/11a21f4da352a472a09de3b8e125514750a6619a
- web: https://github.com/mattermost/mattermost/commit/362b7d29d35c00fe80721d3d47442a4f3168eb2b
- web: https://github.com/mattermost/mattermost/commit/5632d6b4ff6d019a21bb8ddd037d4a931cd85ae2
- web: https://github.com/mattermost/mattermost/commit/88f9285173dc4cb35fa19a8b8604e098a567f704
- web: https://mattermost.com/security-updates
source:
id: GHSA-mcw6-3256-64gg
created: 2024-06-26T13:59:18.437352-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1792.yaml
|
id: GO-2023-1792
modules:
- module: github.com/rs/cors
versions:
- fixed: 1.5.0
vulnerable_at: 1.4.0
packages:
- package: github.com/rs/cors
symbols:
- New
- Cors.handlePreflight
derived_symbols:
- AllowAll
- Cors.HandlerFunc
- Cors.ServeHTTP
- Default
summary: Insecure wildcard CORS policy in github.com/rs/cors
description: |-
The CORS handler actively converts a wildcard CORS policy into reflecting an
arbitrary Origin header value, which is incompatible with the CORS security
design, and could lead to CORS misconfiguration security problems.
cves:
- CVE-2018-20744
ghsas:
- GHSA-927h-x4qj-r242
references:
- fix: https://github.com/rs/cors/pull/57
- report: https://github.com/rs/cors/issues/55
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2447.yaml
|
id: GO-2024-2447
modules:
- module: github.com/gravitational/teleport
non_go_versions:
- fixed: 12.4.31
- introduced: 13.0.0
- fixed: 13.4.13
- introduced: 14.0.0
- fixed: 14.2.4
vulnerable_at: 3.2.17+incompatible
summary: |-
Teleport Proxy and Teleport Agents: SSRF to arbitrary hosts is possible from low
privileged users in github.com/gravitational/teleport
ghsas:
- GHSA-hw4x-mcx5-9q36
references:
- advisory: https://github.com/gravitational/teleport/security/advisories/GHSA-hw4x-mcx5-9q36
- fix: https://github.com/gravitational/teleport/commit/bb2d67d357e868254a21ed7cb132030d7bf9fcbc
- fix: https://github.com/gravitational/teleport/pull/36127
source:
id: GHSA-hw4x-mcx5-9q36
created: 2024-06-14T11:35:35.160981-04:00
review_status: UNREVIEWED
unexcluded: EFFECTIVELY_PRIVATE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2476.yaml
|
id: GO-2024-2476
modules:
- module: github.com/dexidp/dex
non_go_versions:
- introduced: 2.37.0
- fixed: 2.38.0
vulnerable_at: 0.6.1
summary: |-
Dex discarding TLSconfig and always serves deprecated TLS 1.0/1.1 and insecure
ciphers in github.com/dexidp/dex
cves:
- CVE-2024-23656
ghsas:
- GHSA-gr79-9v6v-gc9r
references:
- advisory: https://github.com/dexidp/dex/security/advisories/GHSA-gr79-9v6v-gc9r
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-23656
- fix: https://github.com/dexidp/dex/commit/5bbdb4420254ba73b9c4df4775fe7bdacf233b17
- fix: https://github.com/dexidp/dex/pull/2964
- report: https://github.com/dexidp/dex/issues/2848
- web: https://github.com/dexidp/dex/blob/70d7a2c7c1bb2646b1a540e49616cbc39622fb83/cmd/dex/serve.go#L425
source:
id: GHSA-gr79-9v6v-gc9r
created: 2024-06-14T11:36:28.742125-04:00
review_status: UNREVIEWED
unexcluded: EFFECTIVELY_PRIVATE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0379.yaml
|
id: GO-2022-0379
modules:
- module: github.com/docker/distribution
versions:
- fixed: 2.8.0+incompatible
vulnerable_at: 2.7.1+incompatible
packages:
- package: github.com/docker/distribution
symbols:
- UnmarshalManifest
summary: Type confusion in github.com/docker/distribution
description: |-
Systems that rely on digest equivalence for image attestations may be vulnerable
to type confusion.
A maliciously crafted OCI Container Image can cause registry clients to parse
the same image in two different ways without modifying the image's digest,
invalidating the common pattern of relying on container image digests for
equivalence.
This problem has been addressed in newer versions by improving validation in
manifest unmarshalling.
published: 2022-07-29T20:00:03Z
ghsas:
- GHSA-qq97-vm5h-rrhg
references:
- fix: https://github.com/distribution/distribution/commit/b59a6f827947f9e0e67df0cfb571046de4733586
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2497.yaml
|
id: GO-2024-2497
modules:
- module: github.com/moby/buildkit
versions:
- fixed: 0.12.5
vulnerable_at: 0.12.4
packages:
- package: github.com/moby/buildkit/solver/llbsolver
symbols:
- llbBridge.Exec
- llbBridge.Run
- ValidateEntitlements
- Solver.Solve
- provenanceBridge.Solve
- package: github.com/moby/buildkit/frontend/gateway/forwarder
symbols:
- BridgeClient.NewContainer
- LLBBridgeToGatewayClient
- GatewayForwarder.Solve
- package: github.com/moby/buildkit/cmd/buildkitd
symbols:
- newController
- package: github.com/moby/buildkit/frontend/gateway/container
symbols:
- NewContainer
- package: github.com/moby/buildkit/frontend/gateway
symbols:
- serveLLBBridgeForwarder
- newBridgeForwarder
- gatewayFrontend.Solve
- NewBridgeForwarder
- llbBridgeForwarder.NewContainer
fix_links:
- https://github.com/moby/buildkit/commit/5026d95aa3336e97cfe46e3764f52d08bac7a10e
summary: Privilege escalation in github.com/moby/buildkit
description: |-
BuildKit provides APIs for running interactive containers based on built images.
It was possible to use these APIs to ask BuildKit to run a container with
elevated privileges. Normally, running such containers is only allowed if
special security.insecure entitlement is enabled both by buildkitd configuration
and allowed by the user initializing the build request.
cves:
- CVE-2024-23653
ghsas:
- GHSA-wr6v-9f75-vh2g
credits:
- '@rmcnamara-snyk'
references:
- fix: https://github.com/moby/buildkit/pull/4602
- fix: https://github.com/moby/buildkit/commit/92cc595cfb12891d4b3ae476e067c74250e4b71e
- fix: https://github.com/moby/buildkit/commit/5026d95aa3336e97cfe46e3764f52d08bac7a10e
- web: https://github.com/moby/buildkit/releases/tag/v0.12.5
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1832.yaml
|
id: GO-2023-1832
modules:
- module: github.com/notaryproject/notation-go
versions:
- fixed: 1.0.0-rc.6
vulnerable_at: 1.0.0-rc.5
packages:
- package: github.com/notaryproject/notation-go
symbols:
- Sign
- Verify
summary: Verification bypass in github.com/notaryproject/notation-go
description: |-
An attacker who controls or compromises a registry can lead a user to verify the
wrong artifact.
cves:
- CVE-2023-33959
ghsas:
- GHSA-xhg5-42rf-296r
credits:
- Adam Korczynski (@AdamKorcz)
- Shiwei Zhang (@shizhMSFT)
- Pritesh Bandi (@priteshbandi)
references:
- advisory: https://github.com/notaryproject/notation-go/security/advisories/GHSA-xhg5-42rf-296r
- fix: https://github.com/notaryproject/notation-go/commit/39c8ed050a65cca3f3f308534acb612096735a64
- fix: https://github.com/notaryproject/notation-go/commit/eba60f5aed9c9e05dee55324423c95fe34700b4c
- web: https://github.com/notaryproject/notation-go/releases/tag/v1.0.0-rc.6
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2979.yaml
|
id: GO-2024-2979
modules:
- module: zotregistry.dev/zot
non_go_versions:
- fixed: 2.1.0
vulnerable_at: 1.4.3
- module: zotregistry.io/zot
non_go_versions:
- fixed: 2.1.0
vulnerable_at: 1.4.3
summary: |-
Cache driver GetBlob() allows read access to any blob without access control
check in zotregistry.dev/zot
cves:
- CVE-2024-39897
ghsas:
- GHSA-55r9-5mx9-qq7r
references:
- advisory: https://github.com/project-zot/zot/security/advisories/GHSA-55r9-5mx9-qq7r
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-39897
- web: https://github.com/project-zot/zot/commit/aaee0220e46bdadd12115ac67c19f9d3153eb1df
source:
id: GHSA-55r9-5mx9-qq7r
created: 2024-07-10T14:10:22.351360194Z
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1578.yaml
|
id: GO-2023-1578
modules:
- module: github.com/hashicorp/go-getter/v2
versions:
- introduced: 2.0.0
- fixed: 2.2.0
vulnerable_at: 2.0.0
packages:
- package: github.com/hashicorp/go-getter/v2
symbols:
- untar
- ZipDecompressor.Decompress
- copyReader
derived_symbols:
- Bzip2Decompressor.Decompress
- Client.Get
- Client.GetChecksum
- FolderStorage.Get
- Get
- GetAny
- GetFile
- GzipDecompressor.Decompress
- HttpGetter.Get
- Request.CopyReader
- TarBzip2Decompressor.Decompress
- TarGzipDecompressor.Decompress
- TarXzDecompressor.Decompress
- XzDecompressor.Decompress
skip_fix: TODO include package variable Decompressors.
- module: github.com/hashicorp/go-getter
versions:
- fixed: 1.7.0
vulnerable_at: 1.6.0
packages:
- package: github.com/hashicorp/go-getter
symbols:
- untar
- ZipDecompressor.Decompress
- copyReader
derived_symbols:
- Bzip2Decompressor.Decompress
- Client.ChecksumFromFile
- Client.Get
- FolderStorage.Get
- GCSGetter.Get
- GCSGetter.GetFile
- Get
- GetAny
- GetFile
- GzipDecompressor.Decompress
- HttpGetter.Get
- S3Getter.Get
- S3Getter.GetFile
- TarBzip2Decompressor.Decompress
- TarDecompressor.Decompress
- TarGzipDecompressor.Decompress
- TarXzDecompressor.Decompress
- TarZstdDecompressor.Decompress
- XzDecompressor.Decompress
- ZstdDecompressor.Decompress
skip_fix: TODO include package variable Decompressors.
summary: Denial of service in github.com/hashicorp/go-getter/v2
description: |-
HashiCorp go-getter is vulnerable to decompression bombs. This can lead to
excessive memory consumption and denial-of-service attacks.
cves:
- CVE-2023-0475
ghsas:
- GHSA-jpxj-2jvg-6jv9
references:
- web: https://discuss.hashicorp.com/t/hcsec-2023-4-go-getter-vulnerable-to-denial-of-service-via-malicious-compressed-archive/50125
- fix: https://github.com/hashicorp/go-getter/commit/0edab85348271c843782993345b07b1ac98912e6
- fix: https://github.com/hashicorp/go-getter/commit/78e6721a2a76266718dc92c3c03c1571dffdefdc
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0531.yaml
|
id: GO-2022-0531
modules:
- module: std
versions:
- fixed: 1.17.11
- introduced: 1.18.0-0
- fixed: 1.18.3
vulnerable_at: 1.18.2
packages:
- package: crypto/tls
symbols:
- serverHandshakeStateTLS13.sendSessionTickets
summary: Session tickets lack random ticket_age_add in crypto/tls
description: |-
An attacker can correlate a resumed TLS session with a previous connection.
Session tickets generated by crypto/tls do not contain a randomly generated
ticket_age_add, which allows an attacker that can observe TLS handshakes to
correlate successive connections by comparing ticket ages during session
resumption.
published: 2022-07-28T17:24:57Z
credits:
- Github user @nervuri
references:
- fix: https://go.dev/cl/405994
- fix: https://go.googlesource.com/go/+/fe4de36198794c447fbd9d7cc2d7199a506c76a5
- report: https://go.dev/issue/52814
- web: https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg/m/IWz5T6x7AAAJ
cve_metadata:
id: CVE-2022-30629
cwe: 'CWE-200: Information Exposure'
description: |-
Non-random values for ticket_age_add in session tickets in crypto/tls before Go
1.17.11 and Go 1.18.3 allow an attacker that can observe TLS handshakes to
correlate successive connections by comparing ticket ages during session
resumption.
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2900.yaml
|
id: GO-2024-2900
modules:
- module: go.opentelemetry.io/collector/config/configgrpc
versions:
- fixed: 0.102.1
vulnerable_at: 0.102.0
packages:
- package: go.opentelemetry.io/collector/config/configgrpc
symbols:
- getGRPCCompressionName
derived_symbols:
- ClientConfig.ToClientConn
- module: go.opentelemetry.io/collector/config/confighttp
versions:
- fixed: 0.102.0
vulnerable_at: 0.101.0
packages:
- package: go.opentelemetry.io/collector/config/confighttp
symbols:
- httpContentDecompressor
- decompressor.ServeHTTP
- ServerConfig.ToServer
derived_symbols:
- clientInfoHandler.ServeHTTP
summary: |-
Denial of Service via Zip/Decompression Bomb sent over HTTP or gRPC in
go.opentelemetry.io/collector/config/configgrpc
description: |-
An unsafe decompression vulnerability allows unauthenticated attackers to crash
the collector via excessive memory consumption.
cves:
- CVE-2024-36129
ghsas:
- GHSA-c74f-6mfw-mm4v
references:
- advisory: https://github.com/open-telemetry/opentelemetry-collector/security/advisories/GHSA-c74f-6mfw-mm4v
- fix: https://github.com/open-telemetry/opentelemetry-collector/pull/10289
- fix: https://github.com/open-telemetry/opentelemetry-collector/pull/10323
- web: https://opentelemetry.io/blog/2024/cve-2024-36129
source:
id: GHSA-c74f-6mfw-mm4v
created: 2024-07-16T10:53:58.646682-04:00
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2865.yaml
|
id: GO-2024-2865
modules:
- module: github.com/stakater/Forecastle
unsupported_versions:
- last_affected: 1.0.139
vulnerable_at: 1.0.119
summary: Stakater Forecastle has a directory traversal vulnerability in github.com/stakater/Forecastle
cves:
- CVE-2023-40297
ghsas:
- GHSA-x8xm-wrjq-5g54
references:
- advisory: https://github.com/advisories/GHSA-x8xm-wrjq-5g54
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2023-40297
- web: https://github.com/sahar042/CVE-2023-40297
source:
id: GHSA-x8xm-wrjq-5g54
created: 2024-06-04T14:26:50.366285-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1602.yaml
|
id: GO-2023-1602
modules:
- module: github.com/russellhaering/gosaml2
versions:
- fixed: 0.9.0
vulnerable_at: 0.8.1
packages:
- package: github.com/russellhaering/gosaml2
symbols:
- SAMLServiceProvider.ValidateEncodedLogoutRequestPOST
- SAMLServiceProvider.validationContext
- SAMLServiceProvider.ValidateEncodedResponse
- maybeDeflate
- DecodeUnverifiedBaseResponse
- parseResponse
- DecodeUnverifiedLogoutResponse
- SAMLServiceProvider.ValidateEncodedLogoutResponsePOST
derived_symbols:
- SAMLServiceProvider.RetrieveAssertionInfo
summary: |-
Denial of service via deflate decompression bomb in
github.com/russellhaering/gosaml2
description: |-
A bug in SAML authentication library can result in Denial of Service attacks.
Attackers can craft a "deflate"-compressed request which will consume
significantly more memory during processing than the size of the original
request. This may eventually lead to memory exhaustion and the process being
killed.
cves:
- CVE-2023-26483
ghsas:
- GHSA-6gc3-crp7-25w5
references:
- advisory: https://github.com/advisories/GHSA-6gc3-crp7-25w5
- fix: https://github.com/russellhaering/gosaml2/commit/f9d66040241093e8702649baff50cc70d2c683c0
- web: https://github.com/russellhaering/gosaml2/releases/tag/v0.9.0
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0057.yaml
|
id: GO-2021-0057
modules:
- module: github.com/buger/jsonparser
versions:
- fixed: 1.1.1
vulnerable_at: 1.1.0
packages:
- package: github.com/buger/jsonparser
symbols:
- searchKeys
derived_symbols:
- ArrayEach
- Delete
- EachKey
- FuzzDelete
- FuzzEachKey
- FuzzGetBoolean
- FuzzGetFloat
- FuzzGetInt
- FuzzGetString
- FuzzGetUnsafeString
- FuzzObjectEach
- FuzzSet
- Get
- GetBoolean
- GetFloat
- GetInt
- GetString
- GetUnsafeString
- ObjectEach
- Set
summary: Panic due to improper input validation in github.com/buger/jsonparser
description: |-
Due to improper bounds checking, maliciously crafted JSON objects can cause an
out-of-bounds panic. If parsing user input, this may be used as a denial of
service vector.
published: 2021-04-14T20:04:52Z
cves:
- CVE-2020-35381
ghsas:
- GHSA-8vrw-m3j9-j27c
credits:
- '@toptotu'
references:
- fix: https://github.com/buger/jsonparser/pull/221
- fix: https://github.com/buger/jsonparser/commit/df3ea76ece10095374fd1c9a22a4fb85a44efc42
- web: https://github.com/buger/jsonparser/issues/219
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2808.yaml
|
id: GO-2024-2808
modules:
- module: github.com/firebase/firebase-tools
unsupported_versions:
- cve_version_range: 'affected from 0 to 13.6.0 (default: unaffected)'
vulnerable_at: 13.10.2+incompatible
summary: CSRF in firebase-tools emulator suite in github.com/firebase/firebase-tools
cves:
- CVE-2024-4128
references:
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-4128
- fix: https://github.com/firebase/firebase-tools/commit/068a2b08dc308c7ab4b569617f5fc8821237e3a0
- fix: https://github.com/firebase/firebase-tools/pull/6944
source:
id: CVE-2024-4128
created: 2024-06-04T15:26:12.991483-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0380.yaml
|
id: GO-2022-0380
modules:
- module: github.com/nats-io/jwt
versions:
- fixed: 1.1.0
vulnerable_at: 1.0.1
packages:
- package: github.com/nats-io/jwt
symbols:
- AccountClaims.IsRevoked
- Export.IsRevoked
summary: Incorrect handling of credential expiry in github.com/nats-io/jwt
description: |-
The AccountClaims.IsRevoked and Export.IsRevoked functions improperly validate
expired credentials using the current system time rather than the issue time of
the JWT to be tested.
These functions cannot be used properly. Newer versions of the jwt package
provide an IsClaimRevoked method which performs correct validation. In these
versions, the IsRevoked method always return true.
published: 2022-07-15T23:29:36Z
cves:
- CVE-2020-26892
ghsas:
- GHSA-2c64-vj8g-vwrq
- GHSA-4w5x-x539-ppf5
references:
- advisory: https://advisories.nats.io/CVE/CVE-2020-26892.txt
- fix: https://github.com/nats-io/jwt/commit/e11ce317263cef69619fc1ca743b195d02aa1d8a
review_status: REVIEWED
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.