repo_id
stringclasses
927 values
file_path
stringlengths
99
214
content
stringlengths
2
4.15M
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2379.yaml
id: GO-2023-2379 modules: - module: github.com/lestrrat-go/jwx versions: - fixed: 1.2.27 vulnerable_at: 1.2.26 packages: - package: github.com/lestrrat-go/jwx/jwe symbols: - Decrypt - module: github.com/lestrrat-go/jwx/v2 versions: - fixed: 2.0.18 vulnerable_at: 2.0.17 packages: - package: github.com/lestrrat-go/jwx/v2/jwe symbols: - decryptCtx.decryptContent derived_symbols: - Decrypt summary: Denial of service due to malicious parameters in github.com/lestrrat-go/jwx description: |- The JWE key management algorithms based on PBKDF2 require a JOSE Header Parameter called p2c (PBES2 Count). This parameter dictates the number of PBKDF2 iterations needed to derive a CEK wrapping key. Its purpose is to intentionally slow down the key derivation function, making password brute-force and dictionary attacks more resource-intensive. However, if an attacker sets the p2c parameter in JWE to a very large number, it can cause excessive computational consumption. cves: - CVE-2023-49290 ghsas: - GHSA-7f9x-gw85-8grf credits: - '@P3ngu1nW' references: - advisory: https://github.com/lestrrat-go/jwx/security/advisories/GHSA-7f9x-gw85-8grf - fix: https://github.com/lestrrat-go/jwx/commit/64f2a229b8e18605f47361d292b526bdc4aee01c review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0009.yaml
id: GO-2020-0009 modules: - module: github.com/square/go-jose versions: - fixed: 0.0.0-20160903044734-789a4c4bd4c1 vulnerable_at: 0.0.0-20160831221313-d00415a0a4fd packages: - package: github.com/square/go-jose/cipher goarch: - "386" - arm - armbe - amd64p32 - mips - mipsle - mips64p32 - mips64p32le - ppc - riscv - s390 - sparc symbols: - cbcAEAD.computeAuthTag derived_symbols: - cbcAEAD.Open - cbcAEAD.Seal - package: github.com/square/go-jose goarch: - "386" - arm - armbe - amd64p32 - mips - mipsle - mips64p32 - mips64p32le - ppc - riscv - s390 - sparc symbols: - JsonWebEncryption.Decrypt derived_symbols: - genericEncrypter.Encrypt - genericEncrypter.EncryptWithAuthData summary: Integer overflow in github.com/square/go-jose description: |- On 32-bit platforms an attacker can manipulate a ciphertext encrypted with AES-CBC with HMAC such that they can control how large the input buffer is when computing the HMAC authentication tag. This can can allow a manipulated ciphertext to be verified as authentic, opening the door for padding oracle attacks. published: 2021-04-14T20:04:52Z cves: - CVE-2016-9123 ghsas: - GHSA-3fx4-7f69-5mmg credits: - Quan Nguyen from Google's Information Security Engineering Team references: - fix: https://github.com/square/go-jose/commit/789a4c4bd4c118f7564954f441b29c153ccd6a96 - web: https://www.openwall.com/lists/oss-security/2016/11/03/1 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2538.yaml
id: GO-2024-2538 modules: - module: github.com/hashicorp/nomad versions: - introduced: 1.5.13 - fixed: 1.5.14 - introduced: 1.6.0 - fixed: 1.6.7 - introduced: 1.7.3 - fixed: 1.7.4 vulnerable_at: 1.7.3 packages: - package: github.com/hashicorp/nomad/helper/escapingfs symbols: - pathEscapesBaseViaSymlink derived_symbols: - PathEscapesAllocDir - package: github.com/hashicorp/nomad/client/allocwatcher symbols: - remotePrevAlloc.streamAllocDir - remotePrevAlloc.migrateAllocDir derived_symbols: - remotePrevAlloc.Migrate summary: Symlink attack in github.com/hashicorp/nomad cves: - CVE-2024-1329 ghsas: - GHSA-c866-8gpw-p3mv references: - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-1329 - report: https://github.com/hashicorp/nomad/issues/19888 - fix: https://github.com/hashicorp/nomad/commit/b3209cbc6921e703b0e9984ce70c10b378665834 - fix: https://github.com/hashicorp/nomad/commit/d1721c7a6fc1833778086603f818a822a34f445a - fix: https://github.com/hashicorp/nomad/commit/de55da677a21ac7572c0f4a8cd9abd5473c47a70 - web: https://discuss.hashicorp.com/t/hcsec-2024-03-nomad-vulnerable-to-arbitrary-write-through-symlink-attack review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2593.yaml
id: GO-2024-2593 modules: - module: github.com/mattermost/mattermost-server versions: - introduced: 9.2.0+incompatible - fixed: 9.2.5+incompatible - introduced: 9.3.0+incompatible - fixed: 9.3.1+incompatible - introduced: 9.4.0+incompatible - fixed: 9.4.2+incompatible vulnerable_at: 9.4.2-rc2+incompatible - module: github.com/mattermost/mattermost-server/v5 vulnerable_at: 5.39.3 - module: github.com/mattermost/mattermost-server/v6 vulnerable_at: 6.7.2 - module: github.com/mattermost/mattermost/server/v8 non_go_versions: - fixed: 8.1.9 vulnerable_at: 8.0.0-20240626184126-817e18414e41 summary: Mattermost fails to check the "invite_guest" permission in github.com/mattermost/mattermost-server cves: - CVE-2024-1888 ghsas: - GHSA-pfw6-5rx3-xh3c unknown_aliases: - CGA-f9x4-gc5p-g8jr references: - advisory: https://github.com/advisories/GHSA-pfw6-5rx3-xh3c - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-1888 - web: https://mattermost.com/security-updates source: id: GHSA-pfw6-5rx3-xh3c created: 2024-06-26T16:09:33.224974-04:00 review_status: UNREVIEWED unexcluded: EFFECTIVELY_PRIVATE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2137.yaml
id: GO-2023-2137 modules: - module: github.com/ydb-platform/ydb-go-sdk/v3 versions: - introduced: 3.48.6 - fixed: 3.53.3 vulnerable_at: 3.53.2 packages: - package: github.com/ydb-platform/ydb-go-sdk/v3 symbols: - connect derived_symbols: - Connector - Driver.Close - Driver.Coordination - Driver.Discovery - Driver.Ratelimiter - Driver.Scheme - Driver.Scripting - Driver.Table - Driver.Topic - Driver.With - IsTimeoutError - IsTransportError - MustConnector - MustOpen - New - Open - Unwrap - WithAccessTokenCredentials - WithAnonymousCredentials - WithCertificatesFromFile - WithRequestType - WithTraceID - initOnce.Close - initOnce.Init - sqlDriver.OpenConnector - package: github.com/ydb-platform/ydb-go-sdk/v3/credentials symbols: - NewAccessTokenCredentials - NewAnonymousCredentials - staticCredentialsConfig.Endpoint - staticCredentialsConfig.GrpcDialOptions - NewStaticCredentials - WithSourceInfo - package: github.com/ydb-platform/ydb-go-sdk/v3/internal/balancer symbols: - Balancer.clusterDiscovery - Balancer.wrapCall derived_symbols: - Balancer.Invoke - Balancer.NewStream - New - package: github.com/ydb-platform/ydb-go-sdk/v3/internal/conn symbols: - WithAfterFunc - package: github.com/ydb-platform/ydb-go-sdk/v3/internal/credentials symbols: - NewAccessTokenCredentials - AccessToken.String - NewAnonymousCredentials - Anonymous.String - WithSourceInfo - NewStaticCredentials - Static.String summary: Credentials leak in github.com/ydb-platform/ydb-go-sdk/v3 description: |- A custom credentials object that does not implement the fmt.Stringer interface may leak sensitive information (e.g., credentials) via logs. cves: - CVE-2023-45825 ghsas: - GHSA-q24m-6h38-5xj8 references: - advisory: https://github.com/ydb-platform/ydb-go-sdk/security/advisories/GHSA-q24m-6h38-5xj8 - fix: https://github.com/ydb-platform/ydb-go-sdk/pull/859 - fix: https://github.com/ydb-platform/ydb-go-sdk/commit/a0d92057c4e1bbdc5e85ae8d649edb0232b8fd4c review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2333.yaml
id: GO-2023-2333 modules: - module: github.com/consensys/gnark versions: - fixed: 0.9.2-0.20231110170422-f528807119e9 vulnerable_at: 0.9.1 packages: - package: github.com/consensys/gnark/std/rangecheck symbols: - commitChecker.commit - nbR1CSConstraints - nbPLONKConstraints summary: |- Range checker gadget allows wider inputs than allowed in github.com/consensys/gnark ghsas: - GHSA-rjjm-x32p-m3f7 credits: - '@ultrainstinct30' references: - advisory: https://github.com/Consensys/gnark/security/advisories/GHSA-rjjm-x32p-m3f7 - web: https://github.com/Consensys/gnark/issues/897 - fix: https://github.com/Consensys/gnark/commit/f528807119e9443df94b8c01fe8ee65abe3c75d8 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0045.yaml
id: GO-2020-0045 modules: - module: github.com/dinever/golf versions: - fixed: 0.3.0 vulnerable_at: 0.2.0 packages: - package: github.com/dinever/golf symbols: - randomBytes derived_symbols: - Context.Render - Context.RenderFromString summary: Cryptographically weak random number generation in github.com/dinever/golf description: |- CSRF tokens are generated using math/rand, which is not a cryptographically secure random number generator, allowing an attacker to predict values and bypass CSRF protections with relatively few requests. published: 2021-04-14T20:04:52Z ghsas: - GHSA-q9qr-jwpw-3qvv credits: - '@elithrar' references: - fix: https://github.com/dinever/golf/pull/24 - fix: https://github.com/dinever/golf/commit/3776f338be48b5bc5e8cf9faff7851fc52a3f1fe - report: https://github.com/dinever/golf/issues/20 cve_metadata: id: CVE-2016-15005 cwe: 'CWE 338: Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)' review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0519.yaml
id: GO-2022-0519 modules: - module: github.com/flyteorg/flyteadmin versions: - fixed: 1.1.31 vulnerable_at: 1.1.30 packages: - package: github.com/flyteorg/flyteadmin/auth/authzserver symbols: - ResourceServer.ValidateAccessToken summary: Improper validation of access tokens in github.com/flyteorg/flyteadmin description: Improper validation of access tokens can permit use of expired tokens. published: 2022-07-30T03:51:07Z cves: - CVE-2022-31145 ghsas: - GHSA-qwrj-9hmp-gpxh references: - fix: https://github.com/flyteorg/flyteadmin/commit/a1ec282d02706e074bc4986fd0412e5da3b9d00a review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1167.yaml
id: GO-2022-1167 modules: - module: helm.sh/helm/v3 versions: - fixed: 3.10.3 vulnerable_at: 3.10.2 packages: - package: helm.sh/helm/v3/pkg/strvals symbols: - parser.key derived_symbols: - Parse - ParseFile - ParseInto - ParseIntoFile - ParseIntoString - ParseJSON - ParseString - ToYAML summary: Denial of service in string value parsing in helm.sh/helm/v3 description: |- Applications that use the strvals package in the Helm SDK to parse user supplied input can suffer a Denial of Service when that input causes an error that cannot be recovered from. The strvals package contains a parser that turns strings into Go structures. For example, the Helm client has command line flags like --set, --set-string, and others that enable the user to pass in strings that are merged into the values. The strvals package converts these strings into structures Go can work with. Some string inputs can cause can cause a stack overflow to be created causing a stack overflow error. Stack overflow errors cannot be recovered from. The Helm Client will panic with input to --set, --set-string, and other value setting flags that causes a stack overflow. Helm is not a long running service so the error will not affect future uses of the Helm client. published: 2022-12-14T18:06:02Z cves: - CVE-2022-23524 ghsas: - GHSA-6rx9-889q-vv2r credits: - Ada Logics in a fuzzing audit sponsored by CNCF references: - advisory: https://github.com/helm/helm/security/advisories/GHSA-6rx9-889q-vv2r - fix: https://github.com/helm/helm/commit/3636f6824757ff734cb265b8770efe48c1fb3737 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2516.yaml
id: GO-2024-2516 modules: - module: github.com/grafana/grafana non_go_versions: - fixed: 7.0.0 vulnerable_at: 5.4.5+incompatible summary: Grafana XSS via a column style in github.com/grafana/grafana cves: - CVE-2018-18624 ghsas: - GHSA-9hv8-4frf-cprf references: - advisory: https://github.com/advisories/GHSA-9hv8-4frf-cprf - advisory: https://nvd.nist.gov/vuln/detail/CVE-2018-18624 - fix: https://github.com/grafana/grafana/commit/0284747c88eb9435899006d26ffaf65f89dec88e - fix: https://github.com/grafana/grafana/pull/11813 - fix: https://github.com/grafana/grafana/pull/23816 - web: https://security.netapp.com/advisory/ntap-20200608-0008 source: id: GHSA-9hv8-4frf-cprf created: 2024-06-14T11:39:35.057497-04:00 review_status: UNREVIEWED unexcluded: NOT_IMPORTABLE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1505.yaml
id: GO-2023-1505 modules: - module: github.com/uber/kraken vulnerable_at: 0.1.4 packages: - package: github.com/uber/kraken/lib/backend/testfs symbols: - Server.downloadHandler - Server.Handler summary: Arbitrary file read vulnerability in github.com/uber/kraken description: kraken contains an arbitrary file read vulnerability via component testfs. cves: - CVE-2022-47747 ghsas: - GHSA-hj4g-4w36-x8hp references: - report: https://github.com/uber/kraken/issues/333 - advisory: https://github.com/advisories/GHSA-hj4g-4w36-x8hp review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2510.yaml
id: GO-2024-2510 modules: - module: github.com/grafana/grafana versions: - fixed: 5.2.0-beta1+incompatible vulnerable_at: 5.1.5+incompatible summary: Grafana Cross-site Scripting (XSS) in github.com/grafana/grafana cves: - CVE-2018-12099 ghsas: - GHSA-v5gq-qvjq-8p53 references: - advisory: https://github.com/advisories/GHSA-v5gq-qvjq-8p53 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2018-12099 - fix: https://github.com/grafana/grafana/pull/11813 - web: https://github.com/grafana/grafana/releases/tag/v5.2.0-beta1 - web: https://security.netapp.com/advisory/ntap-20190416-0004 source: id: GHSA-v5gq-qvjq-8p53 created: 2024-06-14T11:38:50.241825-04:00 review_status: UNREVIEWED unexcluded: NOT_IMPORTABLE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2658.yaml
id: GO-2024-2658 modules: - module: github.com/containers/buildah versions: - fixed: 1.35.1 vulnerable_at: 1.35.0 packages: - package: github.com/containers/buildah/internal/volumes symbols: - GetBindMount derived_symbols: - GetVolumes summary: Container escape at build time in github.com/containers/buildah description: |- A crafted container file can use a dummy image with a symbolic link to the host filesystem as a mount source and cause the mount operation to mount the host filesystem during a build-time RUN step. The commands inside the RUN step will then have read-write access to the host filesystem. cves: - CVE-2024-1753 ghsas: - GHSA-pmf3-c36m-g5cf related: - GHSA-874v-pj72-92f3 credits: - '@rmcnamara-snyk' references: - fix: https://github.com/containers/buildah/commit/9de9c20ff368beb84b84fe660773d352519dc1c5 - report: https://bugzilla.redhat.com/show_bug.cgi?id=2265513 notes: - | GHSA-874v-pj72-92f3 is a DEPENDENT_VULNERABILITY of this report, but the GHSA database considers it an alias of CVE-2024-1753. Adding the GHSA as "related" prevents our tooling from adding it to the aliases field. review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2450.yaml
id: GO-2024-2450 modules: - module: github.com/mattermost/mattermost-server non_go_versions: - fixed: 7.8.10 vulnerable_at: 9.9.0+incompatible - module: github.com/mattermost/mattermost-server/v5 vulnerable_at: 5.39.3 - module: github.com/mattermost/mattermost-server/v6 vulnerable_at: 6.7.2 - module: github.com/mattermost/mattermost/server/v8 non_go_versions: - fixed: 8.1.1 vulnerable_at: 8.0.0-20240626184126-817e18414e41 summary: Mattermost viewing archived public channels permissions vulnerability in github.com/mattermost/mattermost-server cves: - CVE-2023-47858 ghsas: - GHSA-w88v-pjr8-cmv2 unknown_aliases: - BIT-mattermost-2023-47858 - CGA-4m9j-264v-7mr3 references: - advisory: https://github.com/advisories/GHSA-w88v-pjr8-cmv2 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2023-47858 - web: https://mattermost.com/security-updates source: id: GHSA-w88v-pjr8-cmv2 created: 2024-06-26T16:13:37.899374-04:00 review_status: UNREVIEWED unexcluded: EFFECTIVELY_PRIVATE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2656.yaml
id: GO-2024-2656 modules: - module: github.com/cilium/cilium versions: - fixed: 1.13.13 - introduced: 1.14.0 - fixed: 1.14.8 - introduced: 1.15.0 - fixed: 1.15.2 vulnerable_at: 1.15.1 summary: Unencrypted traffic between nodes with IPsec in github.com/cilium/cilium description: |- In Cilium clusters with IPsec enabled and traffic matching Layer 7 policies, traffic that should be IPsec-encrypted between a node's Envoy proxy and pods on other nodes is sent unencrypted, and traffic that should be IPsec-encrypted between a node's DNS proxy and pods on other nodes is sent unencrypted. cves: - CVE-2024-28249 ghsas: - GHSA-j89h-qrvr-xc36 credits: - '@jschwinger233' - '@julianwiedmann' - '@giorio94' - '@jrajahalme' references: - advisory: https://github.com/cilium/cilium/security/advisories/GHSA-j89h-qrvr-xc36 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2044.yaml
id: GO-2023-2044 modules: - module: std versions: - introduced: 1.21.0-0 - fixed: 1.21.1 vulnerable_at: 1.21.0 packages: - package: crypto/tls symbols: - QUICConn.HandleData summary: Panic when processing post-handshake message on QUIC connections in crypto/tls description: |- Processing an incomplete post-handshake message for a QUIC connection can cause a panic. credits: - Marten Seemann references: - report: https://go.dev/issue/62266 - fix: https://go.dev/cl/523039 - web: https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ cve_metadata: id: CVE-2023-39321 cwe: 'CWE-400: Uncontrolled Resource Consumption' references: - https://security.netapp.com/advisory/ntap-20231020-0004/ - https://security.gentoo.org/glsa/202311-09 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2882.yaml
id: GO-2024-2882 modules: - module: github.com/huandu/facebook vulnerable_at: 1.8.1 - module: github.com/huandu/facebook/v2 versions: - fixed: 2.7.2 vulnerable_at: 2.7.1 summary: github.com/huandu/facebook may expose access_token in error message. cves: - CVE-2024-35232 ghsas: - GHSA-3f65-m234-9mxr references: - advisory: https://github.com/huandu/facebook/security/advisories/GHSA-3f65-m234-9mxr - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-35232 - fix: https://github.com/huandu/facebook/commit/8b34431b91b32903c8821b1d7621bf81a029d8e4 - web: https://cs.opensource.google/go/go/+/refs/tags/go1.22.3:src/net/http/client.go;l=629-633 - web: https://cs.opensource.google/go/go/+/refs/tags/go1.22.3:src/net/url/url.go;l=30 - web: https://github.com/huandu/facebook/blob/1591be276561bbdb019c0279f1d33cb18a650e1b/session.go#L558-L567 source: id: GHSA-3f65-m234-9mxr created: 2024-06-26T14:08:22.173849-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0010.yaml
id: GO-2020-0010 modules: - module: github.com/square/go-jose versions: - fixed: 1.0.4 vulnerable_at: 1.0.3 packages: - package: github.com/square/go-jose/cipher symbols: - DeriveECDHES - package: github.com/square/go-jose symbols: - JsonWebEncryption.Decrypt - rawJsonWebKey.ecPublicKey - ecDecrypterSigner.decryptKey derived_symbols: - JsonWebKey.UnmarshalJSON summary: Elliptic curve key disclosure in github.com/square/go-jose description: |- When using ECDH-ES an attacker can mount an invalid curve attack during decryption as the supplied public key is not checked to be on the same curve as the receivers private key. published: 2021-04-14T20:04:52Z cves: - CVE-2016-9121 ghsas: - GHSA-86r9-39j9-99wp credits: - Quan Nguyen from Google's Information Security Engineering Team references: - fix: https://github.com/square/go-jose/commit/c7581939a3656bb65e89d64da0a52364a33d2507 - web: https://www.openwall.com/lists/oss-security/2016/11/03/1 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2846.yaml
id: GO-2024-2846 modules: - module: github.com/containerd/containerd versions: - fixed: 1.5.11 - introduced: 1.6.0 - fixed: 1.6.2 vulnerable_at: 1.6.1 packages: - package: github.com/containerd/containerd/oci symbols: - WithDroppedCapabilities - WithAddedCapabilities - WithAmbientCapabilities - WithCapabilities - populateDefaultUnixSpec derived_symbols: - ApplyOpts - GenerateSpec - GenerateSpecWithPlatform summary: Containers started with non-empty inheritable Linux process capabilities in github.com/containerd/containerd ghsas: - GHSA-c9cp-9c75-9v8c references: - advisory: https://github.com/containerd/containerd/security/advisories/GHSA-c9cp-9c75-9v8c - fix: https://github.com/containerd/containerd/commit/e9af808591ee1468f9b0ad6a0d41fdf93ee0c1bc source: id: GHSA-c9cp-9c75-9v8c created: 2024-07-01T14:50:25.651568-04:00 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2587.yaml
id: GO-2024-2587 modules: - module: github.com/apache/age/drivers/golang vulnerable_at: 0.0.0-20240221054422-3b2b394eb669 packages: - package: github.com/apache/age/drivers/golang/age symbols: - ExecCypher - ExecCypherMap - AgeTx.ExecCypher - AgeTx.ExecCypherMap summary: SQL injection in github.com/apache/age/drivers/golang cves: - CVE-2022-45786 ghsas: - GHSA-6p5q-h963-pwwf references: - advisory: https://nvd.nist.gov/vuln/detail/CVE-2022-45786 - web: https://lists.apache.org/thread/of8x0gt5d2vfrm5ksxw55bwn2849ck1w notes: - Symbols determined manually from description of vulnerability. review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0103.yaml
id: GO-2021-0103 modules: - module: github.com/holiman/uint256 versions: - introduced: 0.1.0 - fixed: 1.1.1 vulnerable_at: 1.1.0 packages: - package: github.com/holiman/uint256 symbols: - udivrem derived_symbols: - Int.AddMod - Int.Div - Int.Mod - Int.MulMod - Int.SDiv - Int.SMod summary: Denial of service in github.com/holiman/uint256 description: |- Due to improper bounds checking, certain mathematical operations can cause a panic via an out of bounds read. If this package is used to process untrusted user inputs, this may be used as a vector for a denial of service attack. published: 2021-07-28T18:08:05Z cves: - CVE-2020-26242 ghsas: - GHSA-jm5c-rv3w-w83m credits: - Dima Stebaev references: - fix: https://github.com/holiman/uint256/pull/80 - fix: https://github.com/holiman/uint256/commit/6785da6e3eea403260a5760029e722aa4ff1716d review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2017.yaml
id: GO-2023-2017 modules: - module: github.com/weaviate/weaviate versions: - fixed: 1.18.6 - introduced: 1.19.0 - fixed: 1.19.13 - introduced: 1.20.0 - fixed: 1.20.6 vulnerable_at: 1.20.5 packages: - package: github.com/weaviate/weaviate/adapters/handlers/rest symbols: - handleUnbatchedGraphQLRequest derived_symbols: - Server.ConfigureAPI - Server.Serve - Server.SetAPI summary: Denial of service vulnerability in github.com/weaviate/weaviate description: |- A type conversion issue in Weaviate may allow a remote attack that would cause a denial of service. cves: - CVE-2023-38976 ghsas: - GHSA-8697-479h-5mfp references: - advisory: https://github.com/weaviate/weaviate/security/advisories/GHSA-8697-479h-5mfp - report: https://github.com/weaviate/weaviate/issues/3258 - fix: https://github.com/weaviate/weaviate/pull/3431 - fix: https://github.com/weaviate/weaviate/commit/2a7b208d9aca07e28969e3be82689c184ccf9118 - web: https://github.com/weaviate/weaviate/releases/tag/v1.18.6 - web: https://github.com/weaviate/weaviate/releases/tag/v1.19.13 - web: https://github.com/weaviate/weaviate/releases/tag/v1.20.6 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0012.yaml
id: GO-2020-0012 modules: - module: golang.org/x/crypto versions: - fixed: 0.0.0-20200220183623-bac4c82f6975 vulnerable_at: 0.0.0-20200219234226-1ad67e1f0ef4 packages: - package: golang.org/x/crypto/ssh symbols: - parseED25519 - ed25519PublicKey.Verify - parseSKEd25519 - skEd25519PublicKey.Verify - NewPublicKey derived_symbols: - CertChecker.Authenticate - CertChecker.CheckCert - CertChecker.CheckHostKey - Certificate.Verify - Dial - NewClientConn - NewServerConn - NewSignerFromKey - NewSignerFromSigner - ParseAuthorizedKey - ParseKnownHosts - ParsePrivateKey - ParsePrivateKeyWithPassphrase - ParsePublicKey - ParseRawPrivateKey - ParseRawPrivateKeyWithPassphrase summary: |- Panic due to improper verification of cryptographic signatures in golang.org/x/crypto/ssh description: |- An attacker can craft an ssh-ed25519 or sk-ssh-ed25519@openssh.com public key, such that the library will panic when trying to verify a signature with it. If verifying signatures using user supplied public keys, this may be used as a denial of service vector. published: 2021-04-14T20:04:52Z cves: - CVE-2020-9283 ghsas: - GHSA-ffhg-7mh4-33c4 credits: - Alex Gaynor, Fish in a Barrel references: - fix: https://go.dev/cl/220357 - fix: https://go.googlesource.com/crypto/+/bac4c82f69751a6dd76e702d54b3ceb88adab236 - web: https://groups.google.com/g/golang-announce/c/3L45YRc91SY review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2446.yaml
id: GO-2024-2446 modules: - module: github.com/mattermost/mattermost-server vulnerable_at: 9.9.0+incompatible - module: github.com/mattermost/mattermost-server/v5 vulnerable_at: 5.39.3 - module: github.com/mattermost/mattermost-server/v6 vulnerable_at: 6.7.2 - module: github.com/mattermost/mattermost/server/v8 non_go_versions: - fixed: 8.1.7 vulnerable_at: 8.0.0-20240626184126-817e18414e41 summary: Mattermost Cross-site Scripting vulnerability in github.com/mattermost/mattermost-server cves: - CVE-2023-7113 ghsas: - GHSA-h3gq-j7p9-x3p4 unknown_aliases: - BIT-mattermost-2023-7113 - CGA-pcxv-43r4-92mm references: - advisory: https://github.com/advisories/GHSA-h3gq-j7p9-x3p4 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2023-7113 - web: https://mattermost.com/security-updates source: id: GHSA-h3gq-j7p9-x3p4 created: 2024-06-26T16:12:13.229043-04:00 review_status: UNREVIEWED unexcluded: EFFECTIVELY_PRIVATE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0107.yaml
id: GO-2021-0107 modules: - module: github.com/ecnepsnai/web versions: - introduced: 1.4.0 - fixed: 1.5.2 vulnerable_at: 1.5.1 packages: - package: github.com/ecnepsnai/web symbols: - Server.socketHandler derived_symbols: - Server.Socket summary: Panic or authentication bypass in github.com/ecnepsnai/web description: |- Web Sockets do not execute any AuthenticateMethod methods which may be set, leading to a nil pointer dereference if the returned UserData pointer is assumed to be non-nil, or authentication bypass. This issue only affects WebSockets with an AuthenticateMethod hook. Request handlers that do not explicitly use WebSockets are not vulnerable. published: 2021-07-28T18:08:05Z ghsas: - GHSA-5gjg-jgh4-gppm - GHSA-jpgg-cp2x-qrw3 references: - fix: https://github.com/ecnepsnai/web/commit/5a78f8d5c41ce60dcf9f61aaf47a7a8dc3e0002f cve_metadata: id: CVE-2021-4236 cwe: 'CWE-400: Uncontrolled Resource Consumption' review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0068.yaml
id: GO-2021-0068 modules: - module: cmd versions: - fixed: 1.14.14 - introduced: 1.15.0-0 - fixed: 1.15.7 vulnerable_at: 1.15.6 packages: - package: cmd/go goos: - windows skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)' summary: Arbitrary code injection via the go command with cgo on Windows in cmd/go description: |- The go command may execute arbitrary code at build time when using cgo on Windows. This can be triggered by running go get on a malicious module, or any other time the code is built. published: 2021-04-14T20:04:52Z cves: - CVE-2021-3115 credits: - RyotaK references: - fix: https://go.dev/cl/284783 - fix: https://go.googlesource.com/go/+/953d1feca9b21af075ad5fc8a3dad096d3ccc3a0 - report: https://go.dev/issue/43783 - web: https://groups.google.com/g/golang-announce/c/mperVMGa98w/m/yo5W5wnvAAAJ - fix: https://go.dev/cl/284780 - fix: https://go.googlesource.com/go/+/46e2e2e9d99925bbf724b12693c6d3e27a95d6a0 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2694.yaml
id: GO-2024-2694 modules: - module: github.com/cosmos/ibc-go vulnerable_at: 1.5.0 - module: github.com/cosmos/ibc-go/v2 vulnerable_at: 2.5.0 - module: github.com/cosmos/ibc-go/v3 vulnerable_at: 3.4.0 - module: github.com/cosmos/ibc-go/v4 versions: - fixed: 4.6.0 vulnerable_at: 4.5.1 packages: - package: github.com/cosmos/ibc-go/v4/modules/core/keeper symbols: - Keeper.Timeout - Keeper.TimeoutOnClose skip_fix: does not build without replace directives - module: github.com/cosmos/ibc-go/v5 versions: - fixed: 5.4.0 vulnerable_at: 5.3.2 packages: - package: github.com/cosmos/ibc-go/v5/modules/core/keeper symbols: - Keeper.Timeout - Keeper.TimeoutOnClose skip_fix: does not build without replace directives - module: github.com/cosmos/ibc-go/v6 versions: - fixed: 6.3.0 vulnerable_at: 6.2.2 packages: - package: github.com/cosmos/ibc-go/v6/modules/core/keeper symbols: - Keeper.Timeout - Keeper.TimeoutOnClose skip_fix: does not build without replace directives - module: github.com/cosmos/ibc-go/v7 versions: - fixed: 7.4.0 vulnerable_at: 7.3.2 packages: - package: github.com/cosmos/ibc-go/v7/modules/core/keeper symbols: - Keeper.Timeout - Keeper.TimeoutOnClose - module: github.com/cosmos/ibc-go/v8 versions: - fixed: 8.2.0 vulnerable_at: 8.1.1 packages: - package: github.com/cosmos/ibc-go/v8/modules/core/keeper symbols: - Keeper.Timeout - Keeper.TimeoutOnClose summary: |- Potential Reentrancy using Timeout Callbacks in ibc-hooks in github.com/cosmos/ibc-go ghsas: - GHSA-j496-crgh-34mx references: - advisory: https://github.com/cosmos/ibc-go/security/advisories/GHSA-j496-crgh-34mx - fix: https://github.com/cosmos/ibc-go/commit/04275aa77644dec97fb91b749d963c992591b7f7 - fix: https://github.com/cosmos/ibc-go/commit/278fa89f192af04af32d82fd5ef41f84f82edd97 - fix: https://github.com/cosmos/ibc-go/commit/5e2e9ebc2f67df324028dd36a1837ffcc8e6b0dd - fix: https://github.com/cosmos/ibc-go/commit/a0185df3953070ba5ebcb66735925449d1dbe729 - fix: https://github.com/cosmos/ibc-go/commit/e78b3a2b9c9ce80a67d6b1c2b7f9abcb225cc219 source: id: GHSA-j496-crgh-34mx created: 2024-05-17T15:08:00.659618-04:00 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0532.yaml
id: GO-2022-0532 modules: - module: std versions: - fixed: 1.17.11 - introduced: 1.18.0-0 - fixed: 1.18.3 vulnerable_at: 1.18.2 packages: - package: os/exec goos: - windows symbols: - Cmd.Start summary: Empty Cmd.Path can trigger unintended binary in os/exec on Windows description: |- On Windows, executing Cmd.Run, Cmd.Start, Cmd.Output, or Cmd.CombinedOutput when Cmd.Path is unset will unintentionally trigger execution of any binaries in the working directory named either "..com" or "..exe". published: 2022-07-26T21:41:20Z credits: - Chris Darroch (chrisd8088@github.com) - brian m. carlson (bk2204@github.com) - Mikhail Shcherbakov (https://twitter.com/yu5k3) references: - fix: https://go.dev/cl/403759 - fix: https://go.googlesource.com/go/+/960ffa98ce73ef2c2060c84c7ac28d37a83f345e - report: https://go.dev/issue/52574 - web: https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg/m/IWz5T6x7AAAJ cve_metadata: id: CVE-2022-30580 cwe: 'CWE-94: Improper Control of Generation of Code (''Code Injection'')' description: |- Code injection in Cmd.Start in os/exec before Go 1.17.11 and Go 1.18.3 allows execution of any binaries in the working directory named either "..com" or "..exe" by calling Cmd.Run, Cmd.Start, Cmd.Output, or Cmd.CombinedOutput when Cmd.Path is unset. review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0075.yaml
id: GO-2021-0075 modules: - module: github.com/ethereum/go-ethereum versions: - fixed: 1.8.11 vulnerable_at: 1.8.11-0.20180605071142-7a22e89080b2 packages: - package: github.com/ethereum/go-ethereum/les symbols: - ProtocolManager.handleMsg skip_fix: 'TODO: revisit this reason (cannot find module providing package github.com/hashicorp/golang-lru)' summary: |- Panic due to improper validation of RPC messages in github.com/ethereum/go-ethereum description: |- Due to improper argument validation in RPC messages, a maliciously crafted message can cause a panic, leading to denial of service. published: 2021-04-14T20:04:52Z cves: - CVE-2018-12018 ghsas: - GHSA-p5gc-957x-gfw9 references: - fix: https://github.com/ethereum/go-ethereum/pull/16891 - fix: https://github.com/ethereum/go-ethereum/commit/a5237a27eaf81946a3edb4fafe13ed6359d119e4 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2461.yaml
id: GO-2024-2461 modules: - module: github.com/gofiber/template/django/v3 versions: - fixed: 3.1.9 vulnerable_at: 3.1.8 packages: - package: github.com/gofiber/template/django/v3 symbols: - New - NewFileSystem - NewPathForwardingFileSystem - Engine.Load - Engine.Render summary: Cross-site scripting in github.com/gofiber/template/django/v3 cves: - CVE-2024-22199 ghsas: - GHSA-4mq2-gc4j-cmw6 references: - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-22199 - fix: https://github.com/gofiber/template/commit/28cff3ac4d4c117ab25b5396954676d624b6cb46 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2433.yaml
id: GO-2024-2433 modules: - module: github.com/cubefs/cubefs non_go_versions: - fixed: 3.3.1 vulnerable_at: 2.5.2+incompatible summary: CubeFS leaks magic secret key when starting Blobstore access service in github.com/cubefs/cubefs cves: - CVE-2023-46741 ghsas: - GHSA-8h2x-gr2c-c275 references: - advisory: https://github.com/cubefs/cubefs/security/advisories/GHSA-8h2x-gr2c-c275 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2023-46741 - fix: https://github.com/cubefs/cubefs/commit/972f0275ee8d5dbba4b1530da7c145c269b31ef5 source: id: GHSA-8h2x-gr2c-c275 created: 2024-06-14T11:34:45.410074-04:00 review_status: UNREVIEWED unexcluded: EFFECTIVELY_PRIVATE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0528.yaml
id: GO-2022-0528 modules: - module: github.com/containrrr/shoutrrr versions: - fixed: 0.6.0 vulnerable_at: 0.5.3 packages: - package: github.com/containrrr/shoutrrr/pkg/util symbols: - PartitionMessage summary: Panic on crafted messages in github.com/containrrr/shoutrrr description: |- Sending a message exactly 2000, 4000, or 6000 characters in length to Discord causes a panic. published: 2022-07-30T03:51:17Z cves: - CVE-2022-25891 ghsas: - GHSA-477v-w82m-634j credits: - justinsteven references: - fix: https://github.com/containrrr/shoutrrr/pull/242 - fix: https://github.com/containrrr/shoutrrr/commit/6a27056f9d7522a8b493216195cb7634bf4b5c42 - web: https://github.com/containrrr/shoutrrr/issues/240 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0017.yaml
id: GO-2020-0017 modules: - module: github.com/dgrijalva/jwt-go versions: - introduced: 0.0.0-20150717181359-44718f8a89b0 vulnerable_at: 3.2.0+incompatible packages: - package: github.com/dgrijalva/jwt-go symbols: - MapClaims.VerifyAudience - module: github.com/dgrijalva/jwt-go/v4 versions: - fixed: 4.0.0-preview1 vulnerable_at: 4.0.0-20190408202314-32acca36b99f packages: - package: github.com/dgrijalva/jwt-go/v4 symbols: - MapClaims.VerifyAudience summary: Authorization bypass in github.com/dgrijalva/jwt-go description: |- If a JWT contains an audience claim with an array of strings, rather than a single string, and MapClaims.VerifyAudience is called with req set to false, then audience verification will be bypassed, allowing an invalid set of audiences to be provided. published: 2021-04-14T20:04:52Z cves: - CVE-2020-26160 ghsas: - GHSA-w73w-5m7g-f7qc credits: - '@christopher-wong' references: - fix: https://github.com/dgrijalva/jwt-go/commit/ec0a89a131e3e8567adcb21254a5cd20a70ea4ab - web: https://github.com/dgrijalva/jwt-go/issues/422 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2442.yaml
id: GO-2024-2442 modules: - module: github.com/gravitational/teleport non_go_versions: - introduced: 13.0.0 - fixed: 13.4.13 - introduced: 14.0.0 - fixed: 14.2.4 vulnerable_at: 3.2.17+incompatible summary: Teleport Access List owners can escalate their privileges in github.com/gravitational/teleport ghsas: - GHSA-76cc-p55w-63g3 references: - advisory: https://github.com/gravitational/teleport/security/advisories/GHSA-76cc-p55w-63g3 source: id: GHSA-76cc-p55w-63g3 created: 2024-06-14T11:35:01.72578-04:00 review_status: UNREVIEWED unexcluded: EFFECTIVELY_PRIVATE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2550.yaml
id: GO-2024-2550 modules: - module: github.com/mongodb/mongo-tools versions: - fixed: 0.0.0-20200819165540-8c1800b51550 non_go_versions: - introduced: 3.6.5 - fixed: 3.6.21 - introduced: 4.0.0 - fixed: 4.0.21 - introduced: 4.2.0 - fixed: 4.2.11 - introduced: 100.0.0 - fixed: 100.2.0 vulnerable_at: 0.0.0-20200817142019-cd4a54b5540f summary: |- MongoDB Tools Improper Certificate Validation vulnerability in github.com/mongodb/mongo-tools description: |- Usage of specific command line parameter in MongoDB Tools which was originally intended to just skip hostname checks, may result in MongoDB skipping all certificate validation. This may result in accepting invalid certificates. NOTE: this module uses its own versioning scheme that is not fully compatible with standard Go module versioning, so the affected versions in this report may differ from the versions listed in other advisories. According to the advisory, the affected versions are as follows: MongoDB Inc. MongoDB Database Tools 3.6 versions later than 3.6.5; 3.6 versions prior to 3.6.21; 4.0 versions prior to 4.0.21; 4.2 versions prior to 4.2.11; 100 versions prior to 100.2.0. MongoDB Inc. Mongomirror 0 versions later than 0.6.0. cves: - CVE-2020-7924 ghsas: - GHSA-6cwm-wm82-hgrw references: - advisory: https://github.com/advisories/GHSA-6cwm-wm82-hgrw - fix: https://github.com/mongodb/mongo-tools/commit/8c1800b5155084f954a39a1f2f259efac3bb86de - web: https://jira.mongodb.org/browse/TOOLS-2587 source: id: GHSA-6cwm-wm82-hgrw created: 2024-07-02T16:16:40.677572-04:00 review_status: REVIEWED unexcluded: NOT_IMPORTABLE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1567.yaml
id: GO-2023-1567 modules: - module: github.com/caddyserver/caddy/v2 versions: - fixed: 2.5.0-beta.1 vulnerable_at: 2.4.6 packages: - package: github.com/caddyserver/caddy/v2/modules/caddyhttp symbols: - SanitizedPathJoin skip_fix: |- Cannot reproduce with normal vulnreport yet. After the step `go get github.com/caddyserver/caddy/v2/modules/caddyhttp@v2.4.6` in vulnreport, run `go1.18 get github.com/lucas-clemente/quic-go@v0.27.2`. - package: github.com/caddyserver/caddy/v2/modules/caddyhttp/fileserver symbols: - FileServer.directoryListing derived_symbols: - FileServer.Provision - FileServer.ServeHTTP - MatchFile.Match - MatchFile.UnmarshalCaddyfile - MatchFile.Validate - fileInfo.HumanModTime - fileInfo.HumanSize - statusOverrideResponseWriter.WriteHeader skip_fix: See skip_fix for github.com/caddyserver/caddy/v2/modules/caddyhttp summary: Open redirect in github.com/caddyserver/caddy/v2 description: |- Due to improper request sanitization, a crafted URL can cause the static file handler to redirect to an attacker chosen URL, allowing for open redirect attacks. cves: - CVE-2022-28923 ghsas: - GHSA-qpm3-vr34-h8w8 credits: - Mayank Mukhi (@Hunt2behunter) references: - web: https://lednerb.de/en/publications/responsible-disclosure/caddy-open-redirect-vulnerability/ - fix: https://github.com/caddyserver/caddy/commit/78b5356f2b1945a90de1ef7f2c7669d82098edbd - advisory: https://github.com/advisories/GHSA-qpm3-vr34-h8w8 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2617.yaml
id: GO-2024-2617 modules: - module: github.com/hashicorp/vault versions: - fixed: 1.14.10 - introduced: 1.15.0 - fixed: 1.15.5 vulnerable_at: 1.15.4 summary: Authentication bypass in github.com/hashicorp/vault description: |- The TLS certificate authentication method incorrectly validates client certificates when configured with a non-CA certificate as a trusted certificate. When configured this way, attackers may be able to craft a certificate that can be used to bypass authentication. cves: - CVE-2024-2048 ghsas: - GHSA-r3w7-mfpm-c2vw references: - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-2048 - web: https://discuss.hashicorp.com/t/hcsec-2024-05-vault-cert-auth-method-did-not-correctly-validate-non-ca-certificates/63382 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2631.yaml
id: GO-2024-2631 modules: - module: github.com/go-jose/go-jose/v4 versions: - fixed: 4.0.1 vulnerable_at: 4.0.0 packages: - package: github.com/go-jose/go-jose/v4 symbols: - inflate derived_symbols: - JSONWebEncryption.Decrypt - JSONWebEncryption.DecryptMulti - module: github.com/go-jose/go-jose/v3 versions: - fixed: 3.0.3 vulnerable_at: 3.0.2 packages: - package: github.com/go-jose/go-jose/v3 symbols: - inflate derived_symbols: - JSONWebEncryption.Decrypt - JSONWebEncryption.DecryptMulti - module: gopkg.in/go-jose/go-jose.v2 versions: - fixed: 2.6.3 vulnerable_at: 2.6.2 packages: - package: gopkg.in/go-jose/go-jose.v2 symbols: - inflate derived_symbols: - JSONWebEncryption.Decrypt - JSONWebEncryption.DecryptMulti - module: gopkg.in/square/go-jose.v2 vulnerable_at: 2.6.0 packages: - package: gopkg.in/square/go-jose.v2 symbols: - inflate derived_symbols: - JSONWebEncryption.Decrypt - JSONWebEncryption.DecryptMulti summary: Decompression bomb vulnerability in github.com/go-jose/go-jose description: |- An attacker could send a JWE containing compressed data that used large amounts of memory and CPU when decompressed by Decrypt or DecryptMulti. cves: - CVE-2024-28180 ghsas: - GHSA-c5q2-7r4c-mv6g credits: - zer0yu - chenjj references: - advisory: https://github.com/go-jose/go-jose/security/advisories/GHSA-c5q2-7r4c-mv6g - fix: https://github.com/go-jose/go-jose/commit/0dd4dd541c665fb292d664f77604ba694726f298 - fix: https://github.com/go-jose/go-jose/commit/add6a284ea0f844fd6628cba637be5451fe4b28a - fix: https://github.com/go-jose/go-jose/commit/f4c051a0653d78199a053892f7619ebf96339502 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1519.yaml
id: GO-2023-1519 modules: - module: github.com/rancher/wrangler versions: - fixed: 0.7.4-security1 - introduced: 0.8.0 - fixed: 0.8.5-security1 - introduced: 0.8.6 - fixed: 0.8.11 - introduced: 1.0.0 - fixed: 1.0.1 vulnerable_at: 1.0.0 packages: - package: github.com/rancher/wrangler/pkg/git symbols: - Git.Clone - Git.fetchAndReset - Git.reset - Git.gitCmd derived_symbols: - Git.Ensure - Git.Head - Git.LsRemote - Git.Update summary: Command injection in github.com/rancher/wrangler description: |- A command injection vulnerability exists in the Wrangler Git package. Specially crafted commands can be passed to Wrangler that will change their behavior and cause confusion when executed through Git, resulting in command injection in the underlying host. A workaround is to sanitize input passed to the Git package to remove potential unsafe and ambiguous characters. Otherwise, the best course of action is to update to a patched Wrangler version. cves: - CVE-2022-31249 ghsas: - GHSA-qrg7-hfx7-95c5 references: - advisory: https://github.com/advisories/GHSA-qrg7-hfx7-95c5 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1188.yaml
id: GO-2022-1188 modules: - module: code.sajari.com/docconv versions: - fixed: 1.2.1 vulnerable_at: 1.2.0 packages: - package: code.sajari.com/docconv/docd symbols: - serve derived_symbols: - main summary: Uncontrolled memory allocation in code.sajari.com/docconv description: |- An attacker can remotely supply a specially crafted input that causes uncontrolled memory allocation. cves: - CVE-2022-4741 ghsas: - GHSA-qvx2-59g8-8hph references: - fix: https://github.com/sajari/docconv/commit/42bcff666855ab978e67a9041d0cdea552f20301 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2977.yaml
id: GO-2024-2977 modules: - module: github.com/google/nftables versions: - introduced: 0.1.0 - fixed: 0.2.0 vulnerable_at: 0.1.0 packages: - package: github.com/google/nftables symbols: - Conn.AddSet skip_fix: 'errors of the form ''undefined: unix.*''' summary: IP addresses were encoded in the wrong byte order in github.com/google/nftables description: |- IP addresses were encoded in the wrong byte order, resulting in an nftables configuration which did not work as intended (might block or not block the desired addresses). cves: - CVE-2024-6284 ghsas: - GHSA-qjvf-8748-9w7h references: - advisory: https://github.com/advisories/GHSA-qjvf-8748-9w7h - fix: https://github.com/google/nftables/commit/b1f901b05510bed05c232c5049f68d1511b56a19 - report: https://github.com/google/nftables/issues/225 - web: https://bugs.launchpad.net/ubuntu/+source/crowdsec-firewall-bouncer/+bug/2069596 - web: https://github.com/crowdsecurity/cs-firewall-bouncer/issues/368 source: id: GHSA-qjvf-8748-9w7h created: 2024-07-08T13:23:25.436858-04:00 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1751.yaml
id: GO-2023-1751 modules: - module: std versions: - fixed: 1.19.9 - introduced: 1.20.0-0 - fixed: 1.20.4 vulnerable_at: 1.20.3 packages: - package: html/template symbols: - cssValueFilter - escaper.commit derived_symbols: - Template.Execute - Template.ExecuteTemplate summary: Improper sanitization of CSS values in html/template description: |- Angle brackets (<>) are not considered dangerous characters when inserted into CSS contexts. Templates containing multiple actions separated by a '/' character can result in unexpectedly closing the CSS context and allowing for injection of unexpected HTML, if executed with untrusted input. credits: - Juho Nurminen of Mattermost references: - report: https://go.dev/issue/59720 - fix: https://go.dev/cl/491615 - web: https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU cve_metadata: id: CVE-2023-24539 cwe: 'CWE-74: Improper input validation' review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2041.yaml
id: GO-2023-2041 modules: - module: std versions: - fixed: 1.20.8 - introduced: 1.21.0-0 - fixed: 1.21.1 vulnerable_at: 1.21.0 packages: - package: html/template symbols: - isComment - escaper.escapeText - tJS - tLineCmt derived_symbols: - Template.Execute - Template.ExecuteTemplate summary: Improper handling of HTML-like comments in script contexts in html/template description: |- The html/template package does not properly handle HTML-like "" comment tokens, nor hashbang "#!" comment tokens, in <script> contexts. This may cause the template parser to improperly interpret the contents of <script> contexts, causing actions to be improperly escaped. This may be leveraged to perform an XSS attack. credits: - Takeshi Kaneko (GMO Cybersecurity by Ierae, Inc.) references: - report: https://go.dev/issue/62196 - fix: https://go.dev/cl/526156 - web: https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ cve_metadata: id: CVE-2023-39318 cwe: 'CWE-79: Improper Neutralization of Input During Web Page Generation (''Cross-site Scripting'')' references: - https://security.netapp.com/advisory/ntap-20231020-0009/ - https://security.gentoo.org/glsa/202311-09 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0476.yaml
id: GO-2022-0476 modules: - module: cmd versions: - fixed: 1.14.12 - introduced: 1.15.0-0 - fixed: 1.15.5 vulnerable_at: 1.15.4 packages: - package: cmd/go symbols: - validCompilerFlags skip_fix: 'TODO: revisit this reason (cant request explicit version v1.15.4 of standard library package cmd/go)' summary: Arbitrary code execution via the go command with cgo in cmd/go description: |- The go command may execute arbitrary code at build time when cgo is in use. This may occur when running go get on a malicious package, or any other command that builds untrusted code. This can be caused by malicious gcc flags specified via a cgo directive. published: 2022-07-28T17:24:43Z credits: - Imre Rad references: - fix: https://go.dev/cl/267277 - fix: https://go.googlesource.com/go/+/da7aa86917811a571e6634b45a457f918b8e6561 - report: https://go.dev/issue/42556 - web: https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM cve_metadata: id: CVE-2020-28367 cwe: 'CWE-94: Improper Control of Generation of Code (''Code Injection'')' description: |- Code injection in the go command with cgo before Go 1.14.12 and Go 1.15.5 allows arbitrary code execution at build time via malicious gcc flags specified via a #cgo directive. references: - https://lists.debian.org/debian-lts-announce/2023/04/msg00021.html review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2618.yaml
id: GO-2024-2618 modules: - module: github.com/cloudevents/sdk-go/v2 versions: - fixed: 2.15.2 vulnerable_at: 2.15.1 packages: - package: github.com/cloudevents/sdk-go/v2/protocol/http symbols: - New summary: Authentication token leak in github.com/cloudevents/sdk-go/v2 description: |- Using cloudevents.WithRoundTripper to create a cloudevents.Client with an authenticated http.RoundTripper causes the go-sdk to leak credentials to arbitrary endpoints. When the transport is populated with an authenticated transport, http.DefaultClient is modified with the authenticated transport and will start to send Authorization tokens to any endpoint it is used to contact. cves: - CVE-2024-28110 ghsas: - GHSA-5pf6-2qwx-pxm2 credits: - mattmoor - tcnghia references: - advisory: https://github.com/cloudevents/sdk-go/security/advisories/GHSA-5pf6-2qwx-pxm2 - fix: https://github.com/cloudevents/sdk-go/commit/de2f28370b0d2a0f64f92c0c6139fa4b8a7c3851 - web: https://github.com/cloudevents/sdk-go/blob/67e389964131d55d65cd14b4eb32d57a47312695/v2/protocol/http/protocol.go#L104-L110 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2540.yaml
id: GO-2024-2540 modules: - module: github.com/mattermost/mattermost-plugin-jira non_go_versions: - fixed: 4.0.0-rc1 vulnerable_at: 1.1.1 summary: Mattermost Jira Plugin does not properly check security levels in github.com/mattermost/mattermost-plugin-jira cves: - CVE-2024-24774 ghsas: - GHSA-qr8f-cjw7-838m unknown_aliases: - BIT-mattermost-2024-24774 references: - advisory: https://github.com/advisories/GHSA-qr8f-cjw7-838m - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-24774 - fix: https://github.com/mattermost/mattermost-plugin-jira/commit/5f5e084d169bf6b82d5c46a7a7eb033e1a01c6de - web: https://mattermost.com/security-updates source: id: GHSA-qr8f-cjw7-838m created: 2024-06-14T11:41:03.591421-04:00 review_status: UNREVIEWED unexcluded: EFFECTIVELY_PRIVATE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0142.yaml
id: GO-2021-0142 modules: - module: std versions: - fixed: 1.13.15 - introduced: 1.14.0-0 - fixed: 1.14.7 vulnerable_at: 1.14.6 packages: - package: encoding/binary symbols: - ReadUvarint - ReadVarint summary: Unbounded read from invalid inputs in encoding/binary description: |- ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs. Certain invalid inputs to ReadUvarint or ReadVarint can cause these functions to read an unlimited number of bytes from the ByteReader parameter before returning an error. This can lead to processing more input than expected when the caller is reading directly from a network and depends on ReadUvarint or ReadVarint only consuming a small, bounded number of bytes, even from invalid inputs. published: 2022-07-01T20:11:09Z cves: - CVE-2020-16845 ghsas: - GHSA-q6gq-997w-f55g credits: - Diederik Loerakker - Jonny Rhea - Raúl Kripalani - Preston Van Loon references: - fix: https://go.dev/cl/247120 - fix: https://go.googlesource.com/go/+/027d7241ce050d197e7fabea3d541ffbe3487258 - report: https://go.dev/issue/40618 - web: https://groups.google.com/g/golang-announce/c/NyPIaucMgXo review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0177.yaml
id: GO-2022-0177 modules: - module: cmd versions: - fixed: 1.8.4 - introduced: 1.9.0-0 - fixed: 1.9.1 vulnerable_at: 1.9.0 packages: - package: cmd/go skip_fix: 'TODO: revisit this reason (cant request explicit version of standard library package cmd/go)' summary: Remote command execution via "go get" in cmd/go description: |- The "go get" command allows remote command execution. Using custom domains, it is possible to arrange things so that example.com/pkg1 points to a Subversion repository but example.com/pkg1/pkg2 points to a Git repository. If the Subversion repository includes a Git checkout in its pkg2 directory and some other work is done to ensure the proper ordering of operations, "go get" can be tricked into reusing this Git checkout for the fetch of code from pkg2. If the Subversion repository's Git checkout has malicious commands in .git/hooks/, they will execute on the system running "go get". published: 2022-08-09T17:31:35Z cves: - CVE-2017-15041 credits: - Simon Rawet references: - fix: https://go.dev/cl/68110 - fix: https://go.googlesource.com/go/+/ec71ee078fd3243b78c0d404c8634bd97e38d7eb - report: https://go.dev/issue/22125 - web: https://groups.google.com/g/golang-dev/c/RinSE3EiJBI/m/kYL7zb07AgAJ review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2598.yaml
id: GO-2024-2598 modules: - module: std versions: - fixed: 1.21.8 - introduced: 1.22.0-0 - fixed: 1.22.1 vulnerable_at: 1.22.0 packages: - package: crypto/x509 symbols: - Certificate.buildChains derived_symbols: - Certificate.Verify summary: |- Verify panics on certificates with an unknown public key algorithm in crypto/x509 description: |- Verifying a certificate chain which contains a certificate with an unknown public key algorithm will cause Certificate.Verify to panic. This affects all crypto/tls clients, and servers that set Config.ClientAuth to VerifyClientCertIfGiven or RequireAndVerifyClientCert. The default behavior is for TLS servers to not verify client certificates. credits: - John Howard (Google) references: - report: https://go.dev/issue/65390 - fix: https://go.dev/cl/569339 - web: https://groups.google.com/g/golang-announce/c/5pwGVUPoMbg cve_metadata: id: CVE-2024-24783 cwe: 'CWE-476: NULL Pointer Dereference' references: - https://security.netapp.com/advisory/ntap-20240329-0005/ - http://www.openwall.com/lists/oss-security/2024/03/08/4 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2500.yaml
id: GO-2024-2500 modules: - module: github.com/docker/docker versions: - fixed: 20.10.9+incompatible vulnerable_at: 20.10.8+incompatible packages: - package: github.com/docker/docker/daemon symbols: - Daemon.setupContainerMountsRoot - Daemon.create - NewDaemon - setupDaemonRoot skip_fix: fix does not work due to incompatible versions - package: github.com/docker/docker/daemon/graphdriver/aufs symbols: - Init skip_fix: fix does not work due to incompatible versions - package: github.com/docker/docker/daemon/graphdriver/btrfs symbols: - Init - Driver.Create skip_fix: fix does not work due to incompatible versions - package: github.com/docker/docker/daemon/graphdriver/fuse-overlayfs symbols: - Init - Driver.create skip_fix: fix does not work due to incompatible versions - package: github.com/docker/docker/daemon/graphdriver/overlay symbols: - Init - Driver.Create skip_fix: fix does not work due to incompatible versions - package: github.com/docker/docker/daemon/graphdriver/overlay2 symbols: - Init - Driver.create skip_fix: fix does not work due to incompatible versions - package: github.com/docker/docker/daemon/graphdriver/vfs symbols: - Init - Driver.Create skip_fix: fix does not work due to incompatible versions - package: github.com/docker/docker/daemon/graphdriver/zfs symbols: - Init skip_fix: fix does not work due to incompatible versions - module: github.com/moby/moby versions: - fixed: 20.10.9+incompatible vulnerable_at: 20.10.8+incompatible packages: - package: github.com/moby/moby/daemon symbols: - Daemon.setupContainerMountsRoot - Daemon.create - NewDaemon - setupDaemonRoot skip_fix: fix does not work due to incompatible versions - package: github.com/moby/moby/daemon/graphdriver/aufs symbols: - Init skip_fix: fix does not work due to incompatible versions - package: github.com/moby/moby/daemon/graphdriver/btrfs symbols: - Init - Driver.Create skip_fix: fix does not work due to incompatible versions - package: github.com/moby/moby/daemon/graphdriver/fuse-overlayfs symbols: - Init - Driver.create skip_fix: fix doesn't work due to build tags - package: github.com/moby/moby/daemon/graphdriver/overlay symbols: - Init - Driver.Create skip_fix: fix does not work due to incompatible versions - package: github.com/moby/moby/daemon/graphdriver/overlay2 symbols: - Init - Driver.create skip_fix: fix does not work due to incompatible versions - package: github.com/moby/moby/daemon/graphdriver/vfs symbols: - Init - Driver.Create skip_fix: fix does not work due to incompatible versions - package: github.com/moby/moby/daemon/graphdriver/zfs symbols: - Init skip_fix: fix does not work due to incompatible versions summary: Moby (Docker Engine) Insufficiently restricted permissions on data directory in github.com/docker/docker cves: - CVE-2021-41091 ghsas: - GHSA-3fwx-pjgw-3558 credits: - Joan Bruguera references: - advisory: https://github.com/moby/moby/security/advisories/GHSA-3fwx-pjgw-3558 - fix: https://github.com/moby/moby/commit/f0ab919f518c47240ea0e72d0999576bb8008e64 source: id: GHSA-3fwx-pjgw-3558 created: 2024-07-01T15:02:17.770473-04:00 review_status: REVIEWED unexcluded: EFFECTIVELY_PRIVATE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2582.yaml
id: GO-2024-2582 modules: - module: github.com/stacklok/minder non_go_versions: - fixed: 0.20240226.1425 vulnerable_at: 0.0.51 summary: Minder trusts client-provided mapping from repo name to upstream ID in github.com/stacklok/minder cves: - CVE-2024-27093 ghsas: - GHSA-q6h8-4j2v-pjg4 references: - advisory: https://github.com/stacklok/minder/security/advisories/GHSA-q6h8-4j2v-pjg4 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-27093 - fix: https://github.com/stacklok/minder/commit/53868a878e93f29c43437f96dbc990b548e48d1d source: id: GHSA-q6h8-4j2v-pjg4 created: 2024-06-14T11:42:26.439797-04:00 review_status: UNREVIEWED unexcluded: NOT_IMPORTABLE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0008.yaml
id: GO-2020-0008 modules: - module: github.com/miekg/dns versions: - fixed: 1.1.25-0.20191211073109-8ebf2e419df7 vulnerable_at: 1.1.24 packages: - package: github.com/miekg/dns symbols: - id derived_symbols: - Msg.SetAxfr - Msg.SetIxfr - Msg.SetNotify - Msg.SetQuestion - Msg.SetUpdate summary: Insecure generation of random numbers in github.com/miekg/dns description: |- DNS message transaction IDs are generated using math/rand which makes them relatively predictable. This reduces the complexity of response spoofing attacks against DNS clients. published: 2021-04-14T20:04:52Z cves: - CVE-2019-19794 ghsas: - GHSA-44r7-7p62-q3fr references: - fix: https://github.com/miekg/dns/pull/1044 - fix: https://github.com/miekg/dns/commit/8ebf2e419df7857ac8919baa05248789a8ffbf33 - web: https://github.com/miekg/dns/issues/1037 - web: https://github.com/miekg/dns/issues/1043 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2642.yaml
id: GO-2024-2642 modules: - module: github.com/pterodactyl/wings versions: - fixed: 1.11.9 vulnerable_at: 1.11.8 summary: Pterodactyl Wings vulnerable to improper isolation of server file access in github.com/pterodactyl/wings cves: - CVE-2024-27102 ghsas: - GHSA-494h-9924-xww9 references: - advisory: https://github.com/pterodactyl/wings/security/advisories/GHSA-494h-9924-xww9 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-27102 - fix: https://github.com/pterodactyl/wings/commit/d1c0ca526007113a0f74f56eba99511b4e989287 source: id: GHSA-494h-9924-xww9 created: 2024-05-17T16:14:39.536444-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2690.yaml
id: GO-2024-2690 modules: - module: github.com/hashicorp/vault versions: - fixed: 1.16.0 vulnerable_at: 1.16.0-rc3 summary: HashiCorpVault does not correctly validate OCSP responses in github.com/hashicorp/vault cves: - CVE-2024-2660 ghsas: - GHSA-j2rp-gmqv-frhv unknown_aliases: - BIT-vault-2024-2660 references: - advisory: https://github.com/advisories/GHSA-j2rp-gmqv-frhv - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-2660 - web: https://discuss.hashicorp.com/t/hcsec-2024-07-vault-tls-cert-auth-method-did-not-correctly-validate-ocsp-responses/64573 - web: https://security.netapp.com/advisory/ntap-20240524-0007 source: id: GHSA-j2rp-gmqv-frhv created: 2024-06-26T13:59:09.265191-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2864.yaml
id: GO-2024-2864 modules: - module: github.com/stacklok/minder versions: - fixed: 0.0.49 vulnerable_at: 0.0.48 summary: Denial of service of Minder Server with attacker-controlled REST endpoint in github.com/stacklok/minder cves: - CVE-2024-35185 ghsas: - GHSA-fjw8-3gp8-4cvx references: - advisory: https://github.com/stacklok/minder/security/advisories/GHSA-fjw8-3gp8-4cvx - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-35185 - fix: https://github.com/stacklok/minder/commit/065049336aac0621ee00a0bb2211f8051d47c14b source: id: GHSA-fjw8-3gp8-4cvx created: 2024-05-16T17:13:21.902381-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0493.yaml
id: GO-2022-0493 modules: - module: std versions: - fixed: 1.17.10 - introduced: 1.18.0-0 - fixed: 1.18.2 vulnerable_at: 1.18.1 packages: - package: syscall symbols: - Faccessat - module: golang.org/x/sys versions: - fixed: 0.0.0-20220412211240-33da011f77ad vulnerable_at: 0.0.0-20220412071739-889880a91fd5 packages: - package: golang.org/x/sys/unix symbols: - Faccessat excluded_symbols: - Access summary: Incorrect privilege reporting in syscall and golang.org/x/sys/unix description: |- When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible. published: 2022-07-15T23:30:12Z cves: - CVE-2022-29526 ghsas: - GHSA-p782-xgp4-8hr8 credits: - Joël Gähwiler (@256dpi) references: - fix: https://go.dev/cl/399539 - report: https://go.dev/issue/52313 - fix: https://go.dev/cl/400074 - web: https://groups.google.com/g/golang-announce/c/Y5qrqw_lWdU review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2501.yaml
id: GO-2024-2501 modules: - module: github.com/hashicorp/consul versions: - introduced: 1.7.0 - fixed: 1.7.9 - introduced: 1.8.0 - fixed: 1.8.5 vulnerable_at: 1.8.4 summary: Denial of service in HashiCorp Consul in github.com/hashicorp/consul cves: - CVE-2020-25201 ghsas: - GHSA-496g-fr33-whrf unknown_aliases: - BIT-consul-2020-25201 references: - advisory: https://github.com/advisories/GHSA-496g-fr33-whrf - advisory: https://nvd.nist.gov/vuln/detail/CVE-2020-25201 - fix: https://github.com/hashicorp/consul/pull/9024 - web: https://github.com/hashicorp/consul/blob/master/CHANGELOG.md#185-october-23-2020 - web: https://github.com/hashicorp/consul/releases/tag/v1.8.5 - web: https://security.gentoo.org/glsa/202208-09 - web: https://www.hashicorp.com/blog/category/consul source: id: GHSA-496g-fr33-whrf created: 2024-06-14T11:38:16.725105-04:00 review_status: UNREVIEWED unexcluded: EFFECTIVELY_PRIVATE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2462.yaml
id: GO-2024-2462 modules: - module: github.com/0xJacky/Nginx-UI versions: - fixed: 1.9.10-0.20231219184941-827e76c46e63 vulnerable_at: 1.9.10-0.20231219042952-0a9e23daf406 packages: - package: github.com/0xJacky/Nginx-UI/api/system symbols: - GetSettings - SaveSettings summary: Arbitrary command execution in github.com/0xJacky/Nginx-UI cves: - CVE-2024-22198 ghsas: - GHSA-8r25-68wm-jw35 credits: - '@jorgectf' references: - fix: https://github.com/0xJacky/nginx-ui/commit/827e76c46e63c52114a62a899f61313039c754e3 - advisory: https://github.com/advisories/GHSA-8r25-68wm-jw35 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2924.yaml
id: GO-2024-2924 modules: - module: github.com/AdguardTeam/AdGuardHome non_go_versions: - introduced: 0.93.0 unsupported_versions: - last_affected: 0.107.51 vulnerable_at: 0.107.51 summary: AdGuardHome privilege escalation vulnerability in github.com/AdguardTeam/AdGuardHome cves: - CVE-2024-36586 ghsas: - GHSA-7jp9-vgmq-c8r5 references: - advisory: https://github.com/advisories/GHSA-7jp9-vgmq-c8r5 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-36586 - web: https://github.com/go-compile/security-advisories/blob/master/vulns/CVE-2024-36586.md source: id: GHSA-7jp9-vgmq-c8r5 created: 2024-06-27T15:54:33.634108-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2750.yaml
id: GO-2024-2750 modules: - module: github.com/Azure/secrets-store-csi-driver-provider-azure non_go_versions: - fixed: 0.0.10 vulnerable_at: 1.5.2 - module: github.com/GoogleCloudPlatform/secrets-store-csi-driver-provider-gcp versions: - fixed: 0.2.0 vulnerable_at: 0.1.0 - module: github.com/hashicorp/vault-csi-provider non_go_versions: - fixed: 0.0.6 vulnerable_at: 1.4.2 summary: Kubernetes Secrets Store CSI Driver plugins arbitrary file write in github.com/Azure/secrets-store-csi-driver-provider-azure cves: - CVE-2020-8567 ghsas: - GHSA-2v35-wj4r-rcmv references: - advisory: https://github.com/advisories/GHSA-2v35-wj4r-rcmv - advisory: https://nvd.nist.gov/vuln/detail/CVE-2020-8567 - fix: https://github.com/Azure/secrets-store-csi-driver-provider-azure/pull/298 - fix: https://github.com/GoogleCloudPlatform/secrets-store-csi-driver-provider-gcp/pull/74 - web: https://github.com/hashicorp/secrets-store-csi-driver-provider-vault/pull/50 - web: https://github.com/kubernetes-sigs/secrets-store-csi-driver/issues/384 - web: https://groups.google.com/g/kubernetes-secrets-store-csi-driver/c/BI2qisiNXHY source: id: GHSA-2v35-wj4r-rcmv created: 2024-06-04T15:29:24.764705-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0020.yaml
id: GO-2020-0020 modules: - module: github.com/gorilla/handlers versions: - fixed: 1.3.0 vulnerable_at: 1.2.1 packages: - package: github.com/gorilla/handlers symbols: - cors.ServeHTTP summary: Improper access control in github.com/gorilla/handlers description: |- Usage of the CORS handler may apply improper CORS headers, allowing the requester to explicitly control the value of the Access-Control-Allow-Origin header, which bypasses the expected behavior of the Same Origin Policy. published: 2021-04-14T20:04:52Z ghsas: - GHSA-jcr6-mmjj-pchw credits: - Evan J Johnson references: - fix: https://github.com/gorilla/handlers/pull/116 - fix: https://github.com/gorilla/handlers/commit/90663712d74cb411cbef281bc1e08c19d1a76145 cve_metadata: id: CVE-2017-20146 cwe: 'CWE 284: Improper Access Control' review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0242.yaml
id: GO-2021-0242 modules: - module: std versions: - fixed: 1.15.13 - introduced: 1.16.0-0 - fixed: 1.16.5 vulnerable_at: 1.16.4 packages: - package: math/big symbols: - Rat.SetString skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)' summary: Panic on inputs with large exponents in math/big description: |- Rat.SetString and Rat.UnmarshalText may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents. published: 2022-02-17T17:33:07Z cves: - CVE-2021-33198 credits: - The OSS-Fuzz project (discovery) - Emmanuel Odeke (reporter) references: - fix: https://go.dev/cl/316149 - fix: https://go.googlesource.com/go/+/6c591f79b0b5327549bd4e94970f7a279efb4ab0 - web: https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI - report: https://go.dev/issue/45910 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2697.yaml
id: GO-2024-2697 modules: - module: github.com/grafana/grafana non_go_versions: - introduced: 9.5.0 - fixed: 9.5.18 - introduced: 10.0.0 - fixed: 10.0.13 - introduced: 10.1.0 - fixed: 10.1.9 - introduced: 10.2.0 - fixed: 10.2.6 - introduced: 10.3.0 - fixed: 10.3.5 vulnerable_at: 5.4.5+incompatible summary: 'Grafana: Users outside an organization can delete a snapshot with its key in github.com/grafana/grafana' cves: - CVE-2024-1313 ghsas: - GHSA-67rv-qpw2-6qrr unknown_aliases: - BIT-grafana-2024-1313 references: - advisory: https://github.com/grafana/bugbounty/security/advisories/GHSA-67rv-qpw2-6qrr - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-1313 - web: https://grafana.com/security/security-advisories/cve-2024-1313 source: id: GHSA-67rv-qpw2-6qrr created: 2024-06-04T15:31:16.41185-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2951.yaml
id: GO-2024-2951 modules: - module: github.com/cometbft/cometbft versions: - introduced: 0.37.0 - fixed: 0.37.7 - introduced: 0.38.0 - fixed: 0.38.8 vulnerable_at: 0.38.7 packages: - package: github.com/cometbft/cometbft/blocksync symbols: - NewBlockPool - BlockPool.removeTimedoutPeers - BlockPool.RemovePeerAndRedoAllPeerRequests - BlockPool.SetPeerRange derived_symbols: - BlockPool.OnStart - BlockPool.RedoRequest - NewReactor - Reactor.OnStart - Reactor.Receive - Reactor.SwitchToBlockSync summary: |- Denial of service when syncing with a malicious peer in github.com/cometbft/cometbft description: |- A malicious peer can cause a syncing node to panic during blocksync. The syncing node may enter into a catastrophic invalid syncing state or get stuck in blocksync mode, never switching to consensus. Nodes that are vulnerable to this state may experience a Denial of Service condition in which syncing will not work as expected when joining a network as a client. ghsas: - GHSA-hg58-rf2h-6rr7 credits: - unknown_feature references: - advisory: https://github.com/cometbft/cometbft/security/advisories/GHSA-hg58-rf2h-6rr7 - fix: https://github.com/cometbft/cometbft/commit/07866e11139127e415bd0339ac377b6e6a845533 - fix: https://github.com/cometbft/cometbft/commit/8ba2e4f52d5e626e019501ba6420cc86d5de7857 source: id: GHSA-hg58-rf2h-6rr7 created: 2024-07-02T10:14:20.718028-07:00 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1268.yaml
id: GO-2023-1268 modules: - module: mellium.im/sasl versions: - fixed: 0.3.1 vulnerable_at: 0.3.0 packages: - package: mellium.im/sasl symbols: - NewClient - NewServer summary: Authentication failure in mellium.im/sasl description: |- An issue was discovered in Mellium mellium.im/sasl before 0.3.1. When performing SCRAM-based SASL authentication, if the remote end advertises support for channel binding, no random nonce is generated (instead, the nonce is empty). This causes authentication to fail in the best case, but (if paired with a remote end that does not validate the length of the nonce) could lead to insufficient randomness being used during authentication. cves: - CVE-2022-48195 ghsas: - GHSA-gvfj-fxx3-j323 references: - advisory: https://mellium.im/cve/cve-2022-48195/ - fix: https://codeberg.org/mellium/sasl/commit/e6cbf681b247c4efa1477eaad2cc47a01707b732 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2535.yaml
id: GO-2024-2535 modules: - module: github.com/rancher/rancher non_go_versions: - introduced: 2.6.0 - fixed: 2.6.14 - introduced: 2.7.0 - fixed: 2.7.10 - introduced: 2.8.0 - fixed: 2.8.2 vulnerable_at: 1.6.30 summary: |- Rancher permissions on 'namespaces' in any API group grants 'edit' permissions on namespaces in 'core' in github.com/rancher/rancher cves: - CVE-2023-32194 ghsas: - GHSA-c85r-fwc7-45vc references: - advisory: https://github.com/rancher/rancher/security/advisories/GHSA-c85r-fwc7-45vc source: id: GHSA-c85r-fwc7-45vc created: 2024-06-14T11:40:51.774851-04:00 review_status: UNREVIEWED unexcluded: EFFECTIVELY_PRIVATE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2965.yaml
id: GO-2024-2965 modules: - module: github.com/pomerium/pomerium versions: - fixed: 0.26.1 vulnerable_at: 0.26.0 summary: Pomerium exposed OAuth2 access and ID tokens in user info endpoint response in github.com/pomerium/pomerium cves: - CVE-2024-39315 references: - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-39315 - fix: https://github.com/pomerium/pomerium/commit/4c7c4320afb2ced70ba19b46de1ac4383f3daa48 - web: https://github.com/pomerium/pomerium/security/advisories/GHSA-rrqr-7w59-637v source: id: CVE-2024-39315 created: 2024-07-03T11:41:11.749711-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2929.yaml
id: GO-2024-2929 modules: - module: github.com/rancher/rancher non_go_versions: - introduced: 2.7.0 - fixed: 2.7.14 - introduced: 2.8.0 - fixed: 2.8.5 vulnerable_at: 1.6.30 summary: Rancher's External RoleTemplates can lead to privilege escalation in github.com/rancher/rancher cves: - CVE-2023-32196 ghsas: - GHSA-64jq-m7rq-768h references: - advisory: https://github.com/rancher/rancher/security/advisories/GHSA-64jq-m7rq-768h source: id: GHSA-64jq-m7rq-768h created: 2024-06-27T15:54:17.748688-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0098.yaml
id: GO-2021-0098 modules: - module: github.com/git-lfs/git-lfs versions: - fixed: 1.5.1-0.20210113180018-fc664697ed2c vulnerable_at: 1.5.1-0.20201211195948-e896fc7af7db packages: - package: github.com/git-lfs/git-lfs/commands goos: - windows symbols: - PipeCommand derived_symbols: - PipeMediaCommand - Run - lockVerifier.Verify - singleCheckout.Run - singleCheckout.RunToPath - uploadContext.NewQueue - uploadContext.UploadPointers - package: github.com/git-lfs/git-lfs/creds goos: - windows symbols: - AskPassCredentialHelper.getFromProgram - commandCredentialHelper.Approve derived_symbols: - AskPassCredentialHelper.Fill - CredentialHelperWrapper.FillCreds - CredentialHelpers.Approve - CredentialHelpers.Fill - package: github.com/git-lfs/git-lfs/lfs goos: - windows symbols: - pipeExtensions derived_symbols: - GitFilter.Clean - GitFilter.Smudge - GitFilter.SmudgeToFile - package: github.com/git-lfs/git-lfs/lfshttp goos: - windows symbols: - sshAuthClient.Resolve derived_symbols: - Client.Do - Client.DoWithAccess - Client.HttpClient - Client.NewRequest - Client.Transport - sshCache.Resolve summary: Arbitrary code execution on Windows in github.com/git-lfs/git-lfs description: |- Due to the standard library behavior of exec.LookPath on Windows a number of methods may result in arbitrary code execution when cloning or operating on untrusted Git repositories. published: 2021-04-14T20:04:52Z cves: - CVE-2021-21237 ghsas: - GHSA-cx3w-xqmc-84g5 credits: - '@Ry0taK' references: - fix: https://github.com/git-lfs/git-lfs/commit/fc664697ed2c2081ee9633010de0a7f9debea72a review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0013.yaml
id: GO-2020-0013 modules: - module: golang.org/x/crypto versions: - fixed: 0.0.0-20170330155735-e4e2799dd7aa vulnerable_at: 0.0.0-20170317163734-459e26527287 packages: - package: golang.org/x/crypto/ssh symbols: - NewClientConn derived_symbols: - Dial summary: Man-in-the-middle attack in golang.org/x/crypto/ssh description: |- By default host key verification is disabled which allows for man-in-the-middle attacks against SSH clients if ClientConfig.HostKeyCallback is not set. published: 2021-04-14T20:04:52Z cves: - CVE-2017-3204 ghsas: - GHSA-xhjq-w7xm-p8qj credits: - Phil Pennock references: - fix: https://go.dev/cl/38701 - fix: https://go.googlesource.com/crypto/+/e4e2799dd7aab89f583e1d898300d96367750991 - report: https://go.dev/issue/19767 - web: https://bridge.grumpy-troll.org/2017/04/golang-ssh-security/ review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0159.yaml
id: GO-2021-0159 modules: - module: std versions: - fixed: 1.4.3 vulnerable_at: 1.4.2 packages: - package: net/http symbols: - CanonicalMIMEHeaderKey - body.readLocked - canonicalMIMEHeaderKey - chunkWriter.writeHeader - fixLength - fixTransferEncoding - readTransfer - transferWriter.shouldSendContentLength - validHeaderFieldByte skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)' summary: Request smuggling due to improper header parsing in net/http description: |- HTTP headers were not properly parsed, which allows remote attackers to conduct HTTP request smuggling attacks via a request that contains Content-Length and Transfer-Encoding header fields. published: 2022-01-05T21:39:14Z cves: - CVE-2015-5739 - CVE-2015-5740 - CVE-2015-5741 credits: - Jed Denlea - Régis Leroy references: - fix: https://go.dev/cl/13148 - fix: https://go.googlesource.com/go/+/26049f6f9171d1190f3bbe05ec304845cfe6399f - fix: https://go.dev/cl/11772 - fix: https://go.dev/cl/11810 - fix: https://go.dev/cl/12865 - fix: https://go.googlesource.com/go/+/117ddcb83d7f42d6aa72241240af99ded81118e9 - fix: https://go.googlesource.com/go/+/300d9a21583e7cf0149a778a0611e76ff7c6680f - fix: https://go.googlesource.com/go/+/c2db5f4ccc61ba7df96a747e268a277b802cbb87 - report: https://go.dev/issue/12027 - report: https://go.dev/issue/11930 - web: https://groups.google.com/g/golang-announce/c/iSIyW4lM4hY/m/ADuQR4DiDwAJ review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0088.yaml
id: GO-2021-0088 modules: - module: github.com/facebook/fbthrift versions: - fixed: 0.31.1-0.20190225164308-c461c1bd1a3e vulnerable_at: 0.31.1-0.20190225124004-41af43a0444b packages: - package: github.com/facebook/fbthrift/thrift/lib/go/thrift symbols: - Skip derived_symbols: - BinaryProtocol.Skip - CompactProtocol.Skip - HeaderProtocol.Skip - JSONProtocol.Skip - Process - ProcessContext - SimpleJSONProtocol.Skip - SimpleServer.AcceptLoop - SimpleServer.AcceptLoopContext - SimpleServer.Serve - SimpleServer.ServeContext - SkipDefaultDepth - applicationException.Read summary: Denial of service via ignored unknown fields in github.com/facebook/fbthrift description: |- Skip ignores unknown fields, rather than failing. A malicious user can craft small messages with unknown fields which can take significant resources to parse. If a server accepts messages from an untrusted user, it may be used as a denial of service vector. published: 2021-04-14T20:04:52Z cves: - CVE-2019-3564 ghsas: - GHSA-x4rg-4545-4w7w references: - fix: https://github.com/facebook/fbthrift/commit/c461c1bd1a3e130b181aa9c854da3030cd4b5156 - web: https://www.facebook.com/security/advisories/cve-2019-3564 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1941.yaml
id: GO-2023-1941 modules: - module: github.com/elazarl/goproxy versions: - fixed: 0.0.0-20230731152917-f99041a5c027 vulnerable_at: 0.0.0-20221015165544-a0805db90819 packages: - package: github.com/elazarl/goproxy symbols: - ProxyHttpServer.handleHttps derived_symbols: - ProxyHttpServer.ServeHTTP summary: Panic when handling invalid request in MITM mode in github.com/elazarl/goproxy description: An invalid request can cause a panic when running in MITM mode. cves: - CVE-2023-37788 ghsas: - GHSA-4r8x-2p26-976p references: - report: https://github.com/elazarl/goproxy/issues/502 - fix: https://github.com/elazarl/goproxy/pull/507 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1098.yaml
id: GO-2022-1098 modules: - module: github.com/btcsuite/btcd versions: - fixed: 0.23.2 vulnerable_at: 0.23.1 packages: - package: github.com/btcsuite/btcd/wire symbols: - MsgTx.BtcDecode derived_symbols: - MsgBlock.BtcDecode - MsgBlock.Deserialize - MsgBlock.DeserializeNoWitness - MsgBlock.DeserializeTxLoc - MsgTx.Deserialize - MsgTx.DeserializeNoWitness - ReadMessage - ReadMessageN - ReadMessageWithEncodingN summary: Denial of service in message decoding in github.com/btcsuite/btcd description: |- Erroneous message decoding can cause denial of service. Improper checking of maximum witness size during node message decoding prevented nodes in Lightning Labs lnd (before 0.15.2-beta) to sync. cves: - CVE-2022-44797 ghsas: - GHSA-2chg-86hq-7w38 credits: - rsafier (Github user) - Roasbeef (Github user) references: - advisory: https://github.com/advisories/GHSA-2chg-86hq-7w38 - report: https://github.com/lightningnetwork/lnd/issues/7002 - fix: https://github.com/btcsuite/btcd/pull/1896/commits/f523d4ccaa5f34a2f761f16a05f5d6e6665b1168 - web: https://github.com/btcsuite/btcd/releases/tag/v0.23.2 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0061.yaml
id: GO-2021-0061 modules: - module: gopkg.in/yaml.v2 versions: - fixed: 2.2.3 vulnerable_at: 2.2.2 packages: - package: gopkg.in/yaml.v2 symbols: - decoder.unmarshal derived_symbols: - Decoder.Decode - Unmarshal - UnmarshalStrict - module: github.com/go-yaml/yaml vulnerable_at: 2.1.0+incompatible packages: - package: github.com/go-yaml/yaml symbols: - decoder.unmarshal derived_symbols: - Decoder.Decode - Unmarshal - UnmarshalStrict summary: Denial of service in gopkg.in/yaml.v2 description: |- Due to unbounded alias chasing, a maliciously crafted YAML file can cause the system to consume significant system resources. If parsing user input, this may be used as a denial of service vector. published: 2021-04-14T20:04:52Z ghsas: - GHSA-r88r-gmrh-7j83 credits: - '@simonferquel' references: - fix: https://github.com/go-yaml/yaml/pull/375 - fix: https://github.com/go-yaml/yaml/commit/bb4e33bf68bf89cad44d386192cbed201f35b241 cve_metadata: id: CVE-2021-4235 cwe: 'CWE 400: Uncontrolled Resource Consumption' references: - https://lists.debian.org/debian-lts-announce/2023/07/msg00001.html review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2463.yaml
id: GO-2024-2463 modules: - module: github.com/0xJacky/Nginx-UI versions: - fixed: 1.9.10-0.20231219195202-ec93ab05a3ec vulnerable_at: 1.9.10-0.20231219184941-827e76c46e63 packages: - package: github.com/0xJacky/Nginx-UI/api/cosy symbols: - Ctx.SortOrder - package: github.com/0xJacky/Nginx-UI/model symbols: - OrderAndPaginate summary: SQL injection in github.com/0xJacky/Nginx-UI cves: - CVE-2024-22196 ghsas: - GHSA-h374-mm57-879c credits: - '@jorgectf' references: - advisory: https://github.com/advisories/GHSA-h374-mm57-879c - fix: https://github.com/0xJacky/nginx-ui/commit/ec93ab05a3ecbb6bcf464d9dca48d74452df8a5b review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2851.yaml
id: GO-2024-2851 modules: - module: github.com/grafana/grafana non_go_versions: - introduced: 7.0.0 - fixed: 8.5.14 - introduced: 9.0.0 - fixed: 9.1.8 vulnerable_at: 5.4.5+incompatible summary: |- Grafana Data source and plugin proxy endpoints leaking authentication tokens to some destination plugins in github.com/grafana/grafana cves: - CVE-2022-31130 ghsas: - GHSA-jv32-5578-pxjc unknown_aliases: - BIT-grafana-2022-31130 references: - advisory: https://github.com/grafana/grafana/security/advisories/GHSA-jv32-5578-pxjc - advisory: https://nvd.nist.gov/vuln/detail/CVE-2022-31130 - fix: https://github.com/grafana/grafana/commit/4dd56e4dabce10007bf4ba1059bf54178c35b177 - fix: https://github.com/grafana/grafana/commit/9da278c044ba605eb5a1886c48df9a2cb0d3885f - web: https://github.com/grafana/grafana/releases/tag/v9.1.8 source: id: GHSA-jv32-5578-pxjc created: 2024-06-04T14:27:17.106354-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0087.yaml
id: GO-2021-0087 modules: - module: github.com/opencontainers/runc versions: - fixed: 1.0.0-rc9.0.20200122160610-2fc03cc11c77 vulnerable_at: 1.0.0-rc9.0.20191217094952-7496a9682535 packages: - package: github.com/opencontainers/runc/libcontainer symbols: - mountToRootfs skip_fix: 'TODO: Revisit this reason. (Fix causes multiple errors (dependent fields/methods undefined)' summary: Race condition in github.com/opencontainers/runc description: |- A race while mounting volumes allows a possible symlink-exchange attack, allowing a user whom can start multiple containers with custom volume mount configurations to escape the container. published: 2021-04-14T20:04:52Z cves: - CVE-2019-19921 ghsas: - GHSA-fh74-hm69-rqjw credits: - Leopold Schabel references: - fix: https://github.com/opencontainers/runc/pull/2207 - fix: https://github.com/opencontainers/runc/commit/2fc03cc11c775b7a8b2e48d7ee447cb9bef32ad0 - web: https://github.com/opencontainers/runc/issues/2197 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2560.yaml
id: GO-2024-2560 modules: - module: github.com/greenpau/caddy-security unsupported_versions: - last_affected: 1.1.23 vulnerable_at: 1.1.29 summary: Open Redirect in github.com/greenpau/caddy-security cves: - CVE-2024-21497 ghsas: - GHSA-8hp3-rmr7-xh88 references: - advisory: https://github.com/advisories/GHSA-8hp3-rmr7-xh88 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-21497 - report: https://github.com/greenpau/caddy-security/issues/268 - web: https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy - web: https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-6249861 source: id: GHSA-8hp3-rmr7-xh88 created: 2024-06-14T11:41:57.639653-04:00 review_status: UNREVIEWED unexcluded: EFFECTIVELY_PRIVATE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2904.yaml
id: GO-2024-2904 modules: - module: github.com/evmos/evmos vulnerable_at: 1.1.3 - module: github.com/evmos/evmos/v2 vulnerable_at: 2.0.2 - module: github.com/evmos/evmos/v3 vulnerable_at: 3.0.3 - module: github.com/evmos/evmos/v4 vulnerable_at: 4.0.2 - module: github.com/evmos/evmos/v5 vulnerable_at: 5.0.1 - module: github.com/evmos/evmos/v6 unsupported_versions: - last_affected: 6.0.4 vulnerable_at: 6.0.4 - module: github.com/evmos/evmos/v7 unsupported_versions: - last_affected: 7.0.0 vulnerable_at: 7.0.0 - module: github.com/evmos/evmos/v8 unsupported_versions: - last_affected: 8.2.3 vulnerable_at: 8.2.3 - module: github.com/evmos/evmos/v9 unsupported_versions: - last_affected: 9.1.0 vulnerable_at: 9.1.0 - module: github.com/evmos/evmos/v10 unsupported_versions: - last_affected: 10.0.1 vulnerable_at: 10.0.1 - module: github.com/evmos/evmos/v11 unsupported_versions: - last_affected: 11.0.2 vulnerable_at: 11.0.2 - module: github.com/evmos/evmos/v12 unsupported_versions: - last_affected: 12.1.6 vulnerable_at: 12.1.6 - module: github.com/evmos/evmos/v13 unsupported_versions: - last_affected: 13.0.2 vulnerable_at: 13.0.2 - module: github.com/evmos/evmos/v14 unsupported_versions: - last_affected: 14.1.0 vulnerable_at: 14.1.0 - module: github.com/evmos/evmos/v15 unsupported_versions: - last_affected: 15.0.0 vulnerable_at: 15.0.0 - module: github.com/evmos/evmos/v16 unsupported_versions: - last_affected: 16.0.4 vulnerable_at: 16.0.4 - module: github.com/evmos/evmos/v17 unsupported_versions: - last_affected: 17.0.1 vulnerable_at: 17.0.1 - module: github.com/evmos/evmos/v18 unsupported_versions: - last_affected: 18.1.0 vulnerable_at: 18.1.0 summary: Evmos allows unvested token delegations in github.com/evmos/evmos cves: - CVE-2024-37154 ghsas: - GHSA-7hrh-v6wp-53vw references: - advisory: https://github.com/evmos/evmos/security/advisories/GHSA-7hrh-v6wp-53vw - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-37154 source: id: GHSA-7hrh-v6wp-53vw created: 2024-06-26T14:09:01.722367-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1569.yaml
id: GO-2023-1569 modules: - module: std versions: - fixed: 1.19.6 - introduced: 1.20.0-0 - fixed: 1.20.1 vulnerable_at: 1.20.0 packages: - package: mime/multipart symbols: - Reader.ReadForm summary: Excessive resource consumption in mime/multipart description: |- A denial of service is possible from excessive resource consumption in net/http and mime/multipart. Multipart form parsing with mime/multipart.Reader.ReadForm can consume largely unlimited amounts of memory and disk files. This also affects form parsing in the net/http package with the Request methods FormFile, FormValue, ParseMultipartForm, and PostFormValue. ReadForm takes a maxMemory parameter, and is documented as storing "up to maxMemory bytes +10MB (reserved for non-file parts) in memory". File parts which cannot be stored in memory are stored on disk in temporary files. The unconfigurable 10MB reserved for non-file parts is excessively large and can potentially open a denial of service vector on its own. However, ReadForm did not properly account for all memory consumed by a parsed form, such as map entry overhead, part names, and MIME headers, permitting a maliciously crafted form to consume well over 10MB. In addition, ReadForm contained no limit on the number of disk files created, permitting a relatively small request body to create a large number of disk temporary files. With fix, ReadForm now properly accounts for various forms of memory overhead, and should now stay within its documented limit of 10MB + maxMemory bytes of memory consumption. Users should still be aware that this limit is high and may still be hazardous. In addition, ReadForm now creates at most one on-disk temporary file, combining multiple form parts into a single temporary file. The mime/multipart.File interface type's documentation states, "If stored on disk, the File's underlying concrete type will be an *os.File.". This is no longer the case when a form contains more than one file part, due to this coalescing of parts into a single file. The previous behavior of using distinct files for each form part may be reenabled with the environment variable GODEBUG=multipartfiles=distinct. Users should be aware that multipart.ReadForm and the http.Request methods that call it do not limit the amount of disk consumed by temporary files. Callers can limit the size of form data with http.MaxBytesReader. credits: - Arpad Ryszka - Jakob Ackermann (@das7pad) references: - report: https://go.dev/issue/58006 - fix: https://go.dev/cl/468124 - web: https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E cve_metadata: id: CVE-2022-41725 cwe: 'CWE-400: Uncontrolled Resource Consumption' references: - https://security.gentoo.org/glsa/202311-09 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0240.yaml
id: GO-2021-0240 modules: - module: std versions: - fixed: 1.15.13 - introduced: 1.16.0-0 - fixed: 1.16.5 vulnerable_at: 1.16.4 packages: - package: archive/zip symbols: - Reader.init skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)' summary: Panic when reading certain archives in archive/zip description: |- NewReader and OpenReader can cause a panic or an unrecoverable fatal error when reading an archive that claims to contain a large number of files, regardless of its actual size. published: 2022-02-17T17:33:25Z cves: - CVE-2021-33196 credits: - OSS-Fuzz (discovery) - Emmanuel Odeke (reporter) references: - fix: https://go.dev/cl/318909 - fix: https://go.googlesource.com/go/+/74242baa4136c7a9132a8ccd9881354442788c8c - web: https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI - report: https://go.dev/issue/46242 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1180.yaml
id: GO-2022-1180 modules: - module: github.com/kyverno/kyverno versions: - introduced: 1.8.3 - fixed: 1.8.5 vulnerable_at: 1.8.5-0.20221217180442-ef63302dc479 packages: - package: github.com/kyverno/kyverno/pkg/engine symbols: - imageVerifier.verifyAttestation - imageVerifier.verifyAttestations - imageVerifier.verifyAttestors - imageVerifier.verifyAttestorSet - imageVerifier.verifyImage skip_fix: 'TODO: revisit this reason (undefined: gojmespath.NotFoundError)' summary: Verification rule bypass in github.com/kyverno/kyverno description: A malicious proxy/registry can bypass verifyImages rules. cves: - CVE-2022-47633 ghsas: - GHSA-m3cq-xcx9-3gvm credits: - '@slashben' references: - advisory: https://github.com/kyverno/kyverno/security/advisories/GHSA-m3cq-xcx9-3gvm - fix: https://github.com/kyverno/kyverno/pull/5713 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0108.yaml
id: GO-2021-0108 modules: - module: github.com/gofiber/fiber versions: - fixed: 1.12.6 vulnerable_at: 1.12.5 packages: - package: github.com/gofiber/fiber symbols: - Ctx.Attachment summary: CRLF vulnerability in Fiber in github.com/gofiber/fiber description: |- Due to improper input sanitization, a maliciously constructed filename could cause a file download to use an attacker controlled filename, as well as injecting additional headers into an HTTP response. published: 2021-07-28T18:08:05Z cves: - CVE-2020-15111 ghsas: - GHSA-9cx9-x2gp-9qvh credits: - Hasibul Hasan - Abdullah Shaleh references: - fix: https://github.com/gofiber/fiber/pull/579 - fix: https://github.com/gofiber/fiber/commit/f698b5d5066cfe594102ae252cd58a1fe57cf56f review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1571.yaml
id: GO-2023-1571 modules: - module: std versions: - fixed: 1.19.6 - introduced: 1.20.0-0 - fixed: 1.20.1 vulnerable_at: 1.20.0 packages: - package: net/http symbols: - Transport.RoundTrip - Server.Serve derived_symbols: - Client.Do - Client.Get - Client.Head - Client.Post - Client.PostForm - Get - Head - ListenAndServe - ListenAndServeTLS - Post - PostForm - Serve - ServeTLS - Server.ListenAndServe - Server.ListenAndServeTLS - Server.ServeTLS - module: golang.org/x/net versions: - fixed: 0.7.0 vulnerable_at: 0.6.1-0.20230213185550-547e7edf3873 packages: - package: golang.org/x/net/http2 symbols: - Transport.RoundTrip - Server.ServeConn derived_symbols: - ClientConn.Close - ClientConn.Ping - ClientConn.RoundTrip - ClientConn.Shutdown - ConfigureServer - ConfigureTransport - ConfigureTransports - ConnectionError.Error - ErrCode.String - FrameHeader.String - FrameType.String - FrameWriteRequest.String - Framer.ReadFrame - Framer.WriteContinuation - Framer.WriteData - Framer.WriteDataPadded - Framer.WriteGoAway - Framer.WriteHeaders - Framer.WritePing - Framer.WritePriority - Framer.WritePushPromise - Framer.WriteRSTStream - Framer.WriteRawFrame - Framer.WriteSettings - Framer.WriteSettingsAck - Framer.WriteWindowUpdate - GoAwayError.Error - ReadFrameHeader - Setting.String - SettingID.String - SettingsFrame.ForeachSetting - StreamError.Error - Transport.CloseIdleConnections - Transport.NewClientConn - Transport.RoundTripOpt - bufferedWriter.Flush - bufferedWriter.Write - chunkWriter.Write - clientConnPool.GetClientConn - connError.Error - dataBuffer.Read - duplicatePseudoHeaderError.Error - gzipReader.Close - gzipReader.Read - headerFieldNameError.Error - headerFieldValueError.Error - noDialClientConnPool.GetClientConn - noDialH2RoundTripper.RoundTrip - pipe.Read - priorityWriteScheduler.CloseStream - priorityWriteScheduler.OpenStream - pseudoHeaderError.Error - requestBody.Close - requestBody.Read - responseWriter.Flush - responseWriter.FlushError - responseWriter.Push - responseWriter.SetReadDeadline - responseWriter.SetWriteDeadline - responseWriter.Write - responseWriter.WriteHeader - responseWriter.WriteString - serverConn.CloseConn - serverConn.Flush - stickyErrWriter.Write - transportResponseBody.Close - transportResponseBody.Read - writeData.String - package: golang.org/x/net/http2/hpack symbols: - Decoder.parseFieldLiteral - Decoder.readString derived_symbols: - Decoder.DecodeFull - Decoder.Write summary: Denial of service via crafted HTTP/2 stream in net/http and golang.org/x/net description: |- A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. ghsas: - GHSA-vvpx-j8f3-3w6h credits: - Philippe Antoine (Catena cyber) references: - report: https://go.dev/issue/57855 - fix: https://go.dev/cl/468135 - fix: https://go.dev/cl/468295 - web: https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E cve_metadata: id: CVE-2022-41723 cwe: 'CWE 400: Uncontrolled Resource Consumption' references: - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4MA5XS5DAOJ5PKKNG5TUXKPQOFHT5VBC/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RLBQ3A7ROLEQXQLXFDLNJ7MYPKG5GULE/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGW7GE2Z32ZT47UFAQFDRQE33B7Q7LMT/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XX3IMUTZKRQ73PBZM4E2JP4BKYH4C6XE/ - https://www.couchbase.com/alerts/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4BUK2ZIAGCULOOYDNH25JPU6JBES5NF2/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7N5GV4CHH6WAGX3GFMDD3COEOVCZ4RI/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/REMHVVIBDNKSRKNOTV7EQSB7CYQWOUOU/ - https://security.gentoo.org/glsa/202311-09 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2563.yaml
id: GO-2024-2563 modules: - module: github.com/greenpau/caddy-security unsupported_versions: - last_affected: 1.1.23 vulnerable_at: 1.1.29 summary: |- Improper Restriction of Excessive Authentication Attempts in github.com/greenpau/caddy-security cves: - CVE-2024-21500 ghsas: - GHSA-vfph-hjfv-cpv2 references: - advisory: https://github.com/advisories/GHSA-vfph-hjfv-cpv2 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-21500 - report: https://github.com/greenpau/caddy-security/issues/271 - web: https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy - web: https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-6249864 source: id: GHSA-vfph-hjfv-cpv2 created: 2024-06-14T11:42:12.085045-04:00 review_status: UNREVIEWED unexcluded: EFFECTIVELY_PRIVATE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2430.yaml
id: GO-2024-2430 modules: - module: github.com/cubefs/cubefs non_go_versions: - fixed: 3.3.1 vulnerable_at: 2.5.2+incompatible summary: |- Authenticated users can crash the CubeFS servers with maliciously crafted requests in github.com/cubefs/cubefs cves: - CVE-2023-46738 ghsas: - GHSA-qc6v-g3xw-grmx references: - advisory: https://github.com/cubefs/cubefs/security/advisories/GHSA-qc6v-g3xw-grmx - advisory: https://nvd.nist.gov/vuln/detail/CVE-2023-46738 - fix: https://github.com/cubefs/cubefs/commit/dd46c24873c8f3df48d0a598b704ef9bd24b1ec1 source: id: GHSA-qc6v-g3xw-grmx created: 2024-06-14T11:34:31.298261-04:00 review_status: UNREVIEWED unexcluded: EFFECTIVELY_PRIVATE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1166.yaml
id: GO-2022-1166 modules: - module: helm.sh/helm/v3 versions: - fixed: 3.10.3 vulnerable_at: 3.10.2 packages: - package: helm.sh/helm/v3/pkg/chartutil symbols: - ValidateAgainstSingleSchema derived_symbols: - ToRenderValues - ValidateAgainstSchema summary: Denial of service via schema file in helm.sh/helm/v3 description: |- Certain JSON schema validation files can cause a Helm Client to panic, leading to a possible denial of service. The chartutil package contains a parser that loads a JSON Schema validation file. For example, the Helm client when rendering a chart will validate its values with the schema file. The chartutil package parses the schema file and loads it into memory, but some schema files can cause array data structures to be created causing a memory violation. The Helm Client will panic with a schema file that causes a memory violation panic. Helm is not a long running service so the panic will not affect future uses of the Helm client. cves: - CVE-2022-23526 ghsas: - GHSA-67fx-wx78-jx33 credits: - Ada Logics, in a fuzzing audit sponsored by CNCF references: - advisory: https://github.com/helm/helm/security/advisories/GHSA-67fx-wx78-jx33 - fix: https://github.com/helm/helm/commit/bafafa8bb1b571b61d7a9528da8d40c307dade3d review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2683.yaml
id: GO-2024-2683 modules: - module: github.com/hashicorp/consul versions: - introduced: 1.8.1 - fixed: 1.11.9 - introduced: 1.12.0 - fixed: 1.12.5 - introduced: 1.13.0 - fixed: 1.13.2 vulnerable_at: 1.13.1 packages: - package: github.com/hashicorp/consul/agent/consul symbols: - jwtAuthorizer.Authorize derived_symbols: - AutoConfig.InitialConfiguration summary: |- Improper handling of node names in JWT claims assertions in github.com/hashicorp/consul description: |- HashiCorp Consul does not properly validate the node or segment names prior to interpolation and usage in JWT claim assertions with the auto config RPC. cves: - CVE-2021-41803 ghsas: - GHSA-hr3v-8cp3-68rf unknown_aliases: - BIT-consul-2021-41803 credits: - anonymous4ACL24 references: - web: https://discuss.hashicorp.com/t/hcsec-2022-19-consul-auto-config-jwt-authorization-missing-input-validation/44627 - fix: https://github.com/hashicorp/consul/pull/14577/commits/2c881259ce10e308ff03afc968c4165998fd7fee review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2943.yaml
id: GO-2024-2943 modules: - module: github.com/lightningnetwork/lnd versions: - fixed: 0.17.0-beta vulnerable_at: 0.16.4-beta.rc1 summary: |- Lightning Network Daemon (LND)'s onion processing logic leads to a denial of service in github.com/lightningnetwork/lnd cves: - CVE-2024-38359 ghsas: - GHSA-9gxx-58q6-42p7 references: - advisory: https://github.com/lightningnetwork/lnd/security/advisories/GHSA-9gxx-58q6-42p7 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-38359 - web: https://delvingbitcoin.org/t/dos-disclosure-lnd-onion-bomb/979 - web: https://github.com/lightningnetwork/lnd/releases/tag/v0.17.0-beta - web: https://lightning.network - web: https://morehouse.github.io/lightning/lnd-onion-bomb source: id: GHSA-9gxx-58q6-42p7 created: 2024-07-01T14:09:09.810773-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2973.yaml
id: GO-2024-2973 modules: - module: github.com/traefik/traefik vulnerable_at: 1.7.34 - module: github.com/traefik/traefik/v2 versions: - fixed: 2.11.6 vulnerable_at: 2.11.5 - module: github.com/traefik/traefik/v3 versions: - introduced: 3.0.0-beta3 - fixed: 3.0.4 - introduced: 3.1.0-rc1 - fixed: 3.1.0-rc3 vulnerable_at: 3.1.0-rc2 summary: |- Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT handshakes in github.com/traefik/traefik cves: - CVE-2024-39321 ghsas: - GHSA-gxrv-wf35-62w9 references: - advisory: https://github.com/traefik/traefik/security/advisories/GHSA-gxrv-wf35-62w9 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-39321 - web: https://github.com/traefik/traefik/releases/tag/v2.11.6 - web: https://github.com/traefik/traefik/releases/tag/v3.0.4 - web: https://github.com/traefik/traefik/releases/tag/v3.1.0-rc3 source: id: GHSA-gxrv-wf35-62w9 created: 2024-07-08T13:23:57.045256-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2549.yaml
id: GO-2024-2549 modules: - module: github.com/greenpau/caddy-security unsupported_versions: - last_affected: 1.1.20 vulnerable_at: 1.1.29 summary: caddy-security plugin for Caddy vulnerable to reflected Cross-site Scripting in github.com/greenpau/caddy-security cves: - CVE-2023-52430 ghsas: - GHSA-xwmv-cx7p-fqfc references: - advisory: https://github.com/advisories/GHSA-xwmv-cx7p-fqfc - advisory: https://nvd.nist.gov/vuln/detail/CVE-2023-52430 - report: https://github.com/greenpau/caddy-security/issues/264 - web: https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy source: id: GHSA-xwmv-cx7p-fqfc created: 2024-06-14T11:41:20.789976-04:00 review_status: UNREVIEWED unexcluded: EFFECTIVELY_PRIVATE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0272.yaml
id: GO-2022-0272 modules: - module: github.com/kataras/iris/v12 versions: - fixed: 12.2.0-alpha8 vulnerable_at: 12.1.8 packages: - package: github.com/kataras/iris/v12/context symbols: - Context.UploadFormFiles - module: github.com/kataras/iris vulnerable_at: 0.0.2 packages: - package: github.com/kataras/iris/context symbols: - Context.UploadFormFiles summary: Directory traversal in github.com/kataras/iris and github.com/kataras/iris/v12 description: |- The Context.UploadFormFiles function is vulnerable to directory traversal attacks, and can be made to write to arbitrary locations outside the destination directory. This vulnerability only occurs when built with Go versions prior to 1.17. Go 1.17 and later strip directory paths from filenames returned by "mime/multipart".Part.FileName, which avoids this issue. published: 2022-07-15T23:08:12Z cves: - CVE-2021-23772 ghsas: - GHSA-jcxc-rh6w-wf49 credits: - Snyk Security Team references: - fix: https://github.com/kataras/iris/commit/e213dba0d32ff66653e0ef124bc5088817264b08 - web: https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMKATARASIRIS-2325169 - web: https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMKATARASIRISV12-2325170 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2850.yaml
id: GO-2024-2850 modules: - module: github.com/nats-io/nats-server vulnerable_at: 1.4.1 - module: github.com/nats-io/nats-server/v2 versions: - fixed: 2.2.3 vulnerable_at: 2.2.2 summary: NATS server TLS missing ciphersuite settings when CLI flags used in github.com/nats-io/nats-server cves: - CVE-2021-32026 ghsas: - GHSA-jj54-5q2m-q7pj references: - advisory: https://github.com/nats-io/nats-server/security/advisories/GHSA-jj54-5q2m-q7pj - fix: https://github.com/nats-io/nats-server/commit/ffccc2e1bd7aa2466bd9e631e976bfd7ca46f225 - web: https://advisories.nats.io - web: https://advisories.nats.io/CVE/CVE-2021-32026.txt source: id: GHSA-jj54-5q2m-q7pj created: 2024-06-26T14:06:56.187996-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2517.yaml
id: GO-2024-2517 modules: - module: github.com/grafana/grafana non_go_versions: - fixed: 6.7.3 vulnerable_at: 5.4.5+incompatible summary: Grafana XSS in header column rename in github.com/grafana/grafana cves: - CVE-2020-12245 ghsas: - GHSA-ccmg-w4xm-p28v unknown_aliases: - BIT-grafana-2020-12245 references: - advisory: https://github.com/advisories/GHSA-ccmg-w4xm-p28v - advisory: https://nvd.nist.gov/vuln/detail/CVE-2020-12245 - fix: https://github.com/grafana/grafana/commit/0284747c88eb9435899006d26ffaf65f89dec88e - fix: https://github.com/grafana/grafana/pull/23816 - web: http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00060.html - web: http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00083.html - web: http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00009.html - web: http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00017.html - web: https://community.grafana.com/t/release-notes-v6-7-x/27119 - web: https://github.com/grafana/grafana/blob/master/CHANGELOG.md#673-2020-04-23 - web: https://security.netapp.com/advisory/ntap-20200511-0001 source: id: GHSA-ccmg-w4xm-p28v created: 2024-06-14T11:39:42.736913-04:00 review_status: UNREVIEWED unexcluded: NOT_IMPORTABLE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2558.yaml
id: GO-2024-2558 modules: - module: github.com/greenpau/caddy-security unsupported_versions: - last_affected: 1.1.23 vulnerable_at: 1.1.29 summary: Authentication Bypass by Spoofing in github.com/greenpau/caddy-security cves: - CVE-2024-21494 ghsas: - GHSA-vj36-3ccr-6563 references: - advisory: https://github.com/advisories/GHSA-vj36-3ccr-6563 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-21494 - report: https://github.com/greenpau/caddy-security/issues/266 - web: https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy - web: https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-6249859 source: id: GHSA-vj36-3ccr-6563 created: 2024-06-14T11:41:47.937414-04:00 review_status: UNREVIEWED unexcluded: EFFECTIVELY_PRIVATE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0564.yaml
id: GO-2022-0564 modules: - module: github.com/biscuit-auth/biscuit-go vulnerable_at: 1.0.0 packages: - package: github.com/biscuit-auth/biscuit-go summary: Signature forgery in github.com/biscuit-auth/biscuit-go description: |- An attacker can forge Biscuit v1 tokens with any access level. There is no known workaround for Biscuit v1. The Biscuit v2 specification avoids this vulnerability. published: 2022-08-15T18:02:15Z cves: - CVE-2022-31053 ghsas: - GHSA-75rw-34q6-72cr references: - advisory: https://github.com/advisories/GHSA-75rw-34q6-72cr review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0032.yaml
id: GO-2020-0032 modules: - module: github.com/goadesign/goa versions: - fixed: 1.4.3 vulnerable_at: 1.4.3-0.20191129212618-4f2e80285f2e packages: - package: github.com/goadesign/goa symbols: - Controller.FileHandler derived_symbols: - Service.ListenAndServe - Service.ListenAndServeTLS - Service.Serve - mux.ServeHTTP - module: goa.design/goa versions: - fixed: 1.4.3 vulnerable_at: 1.4.3-0.20191129212618-4f2e80285f2e packages: - package: goa.design/goa symbols: - Controller.FileHandler skip_fix: 'TODO: revisit this reason (cannot find module providing package github.com/goadesign/goa/uuid)' - module: goa.design/goa/v3 versions: - fixed: 3.0.9 vulnerable_at: 3.0.8 packages: - package: goa.design/goa/v3 symbols: - Controller.FileHandler skip_fix: 'TODO: revisit this reason (goa.design/goa/v3 appears to not be a package, but I could not locate the fix for this issue in v3)' summary: Path traversal in github.com/goadesign/goa description: |- Due to improper sanitization of user input, Controller.FileHandler allows for directory traversal, allowing an attacker to read files outside of the target directory that the server has permission to read. published: 2021-04-14T20:04:52Z ghsas: - GHSA-fjgq-224f-fq37 credits: - '@christi3k' references: - fix: https://github.com/goadesign/goa/pull/2388 - fix: https://github.com/goadesign/goa/commit/70b5a199d0f813d74423993832c424e1fc73fb39 cve_metadata: id: CVE-2019-25073 cwe: 'CWE-22: Improper Limitation of a Pathname to a Restricted Directory(''Path Traversal'')' description: |- Improper path sanitization in github.com/goadesign/goa before v3.0.9, v2.0.10, or v1.4.3 allow remote attackers to read files outside of the intended directory. review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0256.yaml
id: GO-2022-0256 modules: - module: github.com/ethereum/go-ethereum versions: - fixed: 1.10.9 vulnerable_at: 1.10.8 packages: - package: github.com/ethereum/go-ethereum/eth/protocols/snap symbols: - handleMessage - package: github.com/ethereum/go-ethereum/trie symbols: - Trie.tryGetNode derived_symbols: - SecureTrie.TryGetNode - Trie.TryGetNode summary: Panic via maliciously crafted message in github.com/ethereum/go-ethereum description: A maliciously crafted snap/1 protocol message can cause a panic. published: 2022-07-15T23:08:03Z cves: - CVE-2021-41173 ghsas: - GHSA-59hh-656j-3p7v references: - fix: https://github.com/ethereum/go-ethereum/pull/23657/commits/f1fd963a5a965e643e52fcf805a2a02a323c32b8 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0096.yaml
id: GO-2021-0096 modules: - module: github.com/proglottis/gpgme versions: - fixed: 0.1.1 vulnerable_at: 0.1.1-0.20191030043844-e5586b79c357 packages: - package: github.com/proglottis/gpgme summary: Memory corruption or code execution in github.com/proglottis/gpgme description: |- Due to improper setting of finalizers, memory passed to C may be freed before it is used, leading to crashes due to memory corruption or possible code execution. published: 2021-04-14T20:04:52Z cves: - CVE-2020-8945 ghsas: - GHSA-m6wg-2mwg-4rfq credits: - Ulrich Obergfell references: - fix: https://github.com/proglottis/gpgme/pull/23 - fix: https://github.com/proglottis/gpgme/commit/92153bcb59bd2f511e502262c46c7bd660e21733 review_status: REVIEWED