repo_id
stringclasses 927
values | file_path
stringlengths 99
214
| content
stringlengths 2
4.15M
|
|---|---|---|
excluded
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/excluded/GO-2023-1461.yaml
|
id: GO-2023-1461
excluded: EFFECTIVELY_PRIVATE
modules:
- module: github.com/usememos/memos
cves:
- CVE-2023-0112
ghsas:
- GHSA-9h7x-9pmh-7gg8
|
excluded
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/excluded/GO-2023-2007.yaml
|
id: GO-2023-2007
excluded: EFFECTIVELY_PRIVATE
modules:
- module: github.com/mattermost/mattermost-server/v6
cves:
- CVE-2023-4107
ghsas:
- GHSA-6xjj-v76v-fwpj
|
excluded
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/excluded/GO-2023-1661.yaml
|
id: GO-2023-1661
excluded: EFFECTIVELY_PRIVATE
modules:
- module: github.com/answerdev/answer
cves:
- CVE-2023-1538
ghsas:
- GHSA-rvjp-8qj4-8p29
|
excluded
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/excluded/GO-2022-0518.yaml
|
id: GO-2022-0518
excluded: EFFECTIVELY_PRIVATE
modules:
- module: github.com/argoproj/argo-cd
cves:
- CVE-2022-31105
ghsas:
- GHSA-7943-82jg-wmw5
|
excluded
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/excluded/GO-2024-2896.yaml
|
id: GO-2024-2896
excluded: NOT_GO_CODE
modules:
- module: github.com/envoyproxy/envoy
cves:
- CVE-2024-34363
|
excluded
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/excluded/GO-2022-0907.yaml
|
id: GO-2022-0907
excluded: NOT_IMPORTABLE
modules:
- module: k8s.io/kubernetes
cves:
- CVE-2021-25735
ghsas:
- GHSA-g42g-737j-qx6j
|
excluded
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/excluded/GO-2023-2273.yaml
|
id: GO-2023-2273
excluded: LEGACY_FALSE_POSITIVE
modules:
- module: github.com/envoyproxy/envoy
cves:
- CVE-2020-12603
ghsas:
- GHSA-pc38-4q6c-85p6
|
excluded
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/excluded/GO-2023-1827.yaml
|
id: GO-2023-1827
excluded: EFFECTIVELY_PRIVATE
modules:
- module: github.com/hashicorp/consul
cves:
- CVE-2023-1297
ghsas:
- GHSA-c57c-7hrj-6q6v
|
excluded
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/excluded/GO-2022-1254.yaml
|
id: GO-2022-1254
excluded: EFFECTIVELY_PRIVATE
modules:
- module: github.com/usememos/memos
cves:
- CVE-2022-4850
ghsas:
- GHSA-c5hq-35h7-r9x4
|
excluded
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/excluded/GO-2022-0312.yaml
|
id: GO-2022-0312
excluded: EFFECTIVELY_PRIVATE
modules:
- module: github.com/grafana/grafana
cves:
- CVE-2022-21703
ghsas:
- GHSA-cmf4-h3xc-jw8w
|
excluded
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/excluded/GO-2022-0916.yaml
|
id: GO-2022-0916
excluded: NOT_IMPORTABLE
modules:
- module: github.com/sylabs/singularity
cves:
- CVE-2021-32635
ghsas:
- GHSA-5mv9-q7fq-9394
|
excluded
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/excluded/GO-2023-1665.yaml
|
id: GO-2023-1665
excluded: NOT_IMPORTABLE
modules:
- module: github.com/gophish/gophish
cves:
- CVE-2022-45003
ghsas:
- GHSA-8gg8-wr4j-v2wr
|
excluded
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/excluded/GO-2022-0287.yaml
|
id: GO-2022-0287
excluded: NOT_GO_CODE
modules:
- module: github.com/Ericsson/codechecker
cves:
- CVE-2021-44217
ghsas:
- GHSA-fxmx-pfm2-85m2
|
excluded
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/excluded/GO-2022-1206.yaml
|
id: GO-2022-1206
excluded: EFFECTIVELY_PRIVATE
modules:
- module: github.com/cri-o/cri-o
cves:
- CVE-2022-4318
ghsas:
- GHSA-cm9x-c3rh-7rc4
|
excluded
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/excluded/GO-2022-0259.yaml
|
id: GO-2022-0259
excluded: EFFECTIVELY_PRIVATE
modules:
- module: github.com/grafana/grafana
cves:
- CVE-2021-41244
ghsas:
- GHSA-mpwp-42x6-4wmx
|
excluded
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/excluded/GO-2023-2178.yaml
|
id: GO-2023-2178
excluded: EFFECTIVELY_PRIVATE
modules:
- module: github.com/projectcalico/calico
cves:
- CVE-2023-41378
ghsas:
- GHSA-5r5h-q934-cccp
|
excluded
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/excluded/GO-2022-0798.yaml
|
id: GO-2022-0798
excluded: NOT_IMPORTABLE
modules:
- module: github.com/google/exposure-notifications-verification-server
cves:
- CVE-2021-22538
ghsas:
- GHSA-5v95-v8c8-3rh6
|
excluded
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/excluded/GO-2024-2708.yaml
|
id: GO-2024-2708
excluded: NOT_GO_CODE
modules:
- module: git.sheetjs.com/sheetjs/sheetjs
cves:
- CVE-2024-22363
|
excluded
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/excluded/GO-2022-1048.yaml
|
id: GO-2022-1048
excluded: NOT_A_VULNERABILITY
modules:
- module: go.etcd.io/etcd/client/v3
cves:
- CVE-2020-15115
ghsas:
- GHSA-4993-m7g5-r9hh
|
excluded
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/excluded/GO-2022-0585.yaml
|
id: GO-2022-0585
excluded: NOT_IMPORTABLE
modules:
- module: github.com/apache/trafficcontrol
cves:
- CVE-2022-23206
ghsas:
- GHSA-wp47-9r3h-xfgq
|
excluded
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/excluded/GO-2023-1911.yaml
|
id: GO-2023-1911
excluded: EFFECTIVELY_PRIVATE
modules:
- module: github.com/liamg/gitjacker
cves:
- CVE-2021-29417
ghsas:
- GHSA-4j5x-f394-xx79
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2023-1842.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2023-29405"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Improper sanitization of LDFLAGS with embedded spaces in go command with cgo in cmd/go",
"descriptions": [
{
"lang": "en",
"value": "The go command may execute arbitrary code at build time when using cgo. This may occur when running \"go get\" on a malicious module, or when running any other command which builds untrusted code. This is can by triggered by linker flags, specified via a \"#cgo LDFLAGS\" directive. Flags containing embedded spaces are mishandled, allowing disallowed flags to be smuggled through the LDFLAGS sanitization by including them in the argument of another flag. This only affects usage of the gccgo compiler."
}
],
"affected": [
{
"vendor": "Go toolchain",
"product": "cmd/go",
"collectionURL": "https://pkg.go.dev",
"packageName": "cmd/go",
"versions": [
{
"version": "0",
"lessThan": "1.19.10",
"status": "affected",
"versionType": "semver"
},
{
"version": "1.20.0-0",
"lessThan": "1.20.5",
"status": "affected",
"versionType": "semver"
}
],
"defaultStatus": "unaffected"
},
{
"vendor": "Go toolchain",
"product": "cmd/cgo",
"collectionURL": "https://pkg.go.dev",
"packageName": "cmd/cgo",
"versions": [
{
"version": "0",
"lessThan": "1.19.10",
"status": "affected",
"versionType": "semver"
},
{
"version": "1.20.0-0",
"lessThan": "1.20.5",
"status": "affected",
"versionType": "semver"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')"
}
]
}
],
"references": [
{
"url": "https://go.dev/issue/60306"
},
{
"url": "https://go.dev/cl/501224"
},
{
"url": "https://groups.google.com/g/golang-announce/c/q5135a9d924/m/j0ZoAJOHAwAJ"
},
{
"url": "https://pkg.go.dev/vuln/GO-2023-1842"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XBS3IIK6ADV24C5ULQU55QLT2UE762ZX/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NZ2O6YCO2IZMZJELQGZYR2WAUNEDLYV6/"
},
{
"url": "https://security.gentoo.org/glsa/202311-09"
}
],
"credits": [
{
"lang": "en",
"value": "Juho Nurminen of Mattermost"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2022-0537.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2022-32189"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Panic when decoding Float and Rat types in math/big",
"descriptions": [
{
"lang": "en",
"value": "A too-short encoded message can cause a panic in Float.GobDecode and Rat GobDecode in math/big in Go before 1.17.13 and 1.18.5, potentially allowing a denial of service."
}
],
"affected": [
{
"vendor": "Go standard library",
"product": "math/big",
"collectionURL": "https://pkg.go.dev",
"packageName": "math/big",
"versions": [
{
"version": "0",
"lessThan": "1.17.13",
"status": "affected",
"versionType": "semver"
},
{
"version": "1.18.0-0",
"lessThan": "1.18.5",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "Float.GobDecode"
},
{
"name": "Rat.GobDecode"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE 400: Uncontrolled Resource Consumption"
}
]
}
],
"references": [
{
"url": "https://go.dev/cl/417774"
},
{
"url": "https://go.googlesource.com/go/+/055113ef364337607e3e72ed7d48df67fde6fc66"
},
{
"url": "https://go.dev/issue/53871"
},
{
"url": "https://groups.google.com/g/golang-announce/c/YqYYG87xB10"
},
{
"url": "https://pkg.go.dev/vuln/GO-2022-0537"
}
],
"credits": [
{
"lang": "en",
"value": "@catenacyber"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2022-0522.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2022-30632"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Stack exhaustion on crafted paths in path/filepath",
"descriptions": [
{
"lang": "en",
"value": "Uncontrolled recursion in Glob in path/filepath before Go 1.17.12 and Go 1.18.4 allows an attacker to cause a panic due to stack exhaustion via a path containing a large number of path separators."
}
],
"affected": [
{
"vendor": "Go standard library",
"product": "path/filepath",
"collectionURL": "https://pkg.go.dev",
"packageName": "path/filepath",
"versions": [
{
"version": "0",
"lessThan": "1.17.12",
"status": "affected",
"versionType": "semver"
},
{
"version": "1.18.0-0",
"lessThan": "1.18.4",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "Glob"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-674: Uncontrolled Recursion"
}
]
}
],
"references": [
{
"url": "https://go.dev/cl/417066"
},
{
"url": "https://go.googlesource.com/go/+/ac68c6c683409f98250d34ad282b9e1b0c9095ef"
},
{
"url": "https://go.dev/issue/53416"
},
{
"url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE"
},
{
"url": "https://pkg.go.dev/vuln/GO-2022-0522"
}
],
"credits": [
{
"lang": "en",
"value": "Juho Nurminen of Mattermost"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2023-1989.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2023-29408"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Excessive resource consumption in golang.org/x/image/tiff",
"descriptions": [
{
"lang": "en",
"value": "The TIFF decoder does not place a limit on the size of compressed tile data. A maliciously-crafted image can exploit this to cause a small image (both in terms of pixel width/height, and encoded size) to make the decoder decode large amounts of compressed data, consuming excessive memory and CPU."
}
],
"affected": [
{
"vendor": "golang.org/x/image",
"product": "golang.org/x/image/tiff",
"collectionURL": "https://pkg.go.dev",
"packageName": "golang.org/x/image/tiff",
"versions": [
{
"version": "0",
"lessThan": "0.10.0",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "newDecoder"
},
{
"name": "Decode"
},
{
"name": "DecodeConfig"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-770: Allocation of Resources Without Limits or Throttling"
}
]
}
],
"references": [
{
"url": "https://go.dev/issue/61582"
},
{
"url": "https://go.dev/cl/514897"
},
{
"url": "https://pkg.go.dev/vuln/GO-2023-1989"
},
{
"url": "https://security.netapp.com/advisory/ntap-20230831-0009/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KO54NBDUJXKAZNGCFOEYL2LKK2RQP6K6/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWH6Q7NVM4MV3GWFEU4PA67AWZHVFJQ2/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XZTEP6JYILRBNDTNWTEQ5D4QUUVQBESK/"
}
],
"credits": [
{
"lang": "en",
"value": "Philippe Antoine (Catena cyber)"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2020-0024.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2013-10005"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Infinite loop in github.com/btcsuite/go-socks",
"descriptions": [
{
"lang": "en",
"value": "The RemoteAddr and LocalAddr methods on the returned net.Conn may call themselves, leading to an infinite loop which will crash the program due to a stack overflow."
}
],
"affected": [
{
"vendor": "github.com/btcsuite/go-socks",
"product": "github.com/btcsuite/go-socks",
"collectionURL": "https://pkg.go.dev",
"packageName": "github.com/btcsuite/go-socks",
"versions": [
{
"version": "0",
"lessThan": "0.0.0-20130808000456-233bccbb1abe",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "proxiedConn.LocalAddr"
},
{
"name": "proxiedConn.RemoteAddr"
}
],
"defaultStatus": "unaffected"
},
{
"vendor": "github.com/btcsuitereleases/go-socks",
"product": "github.com/btcsuitereleases/go-socks",
"collectionURL": "https://pkg.go.dev",
"packageName": "github.com/btcsuitereleases/go-socks",
"versions": [
{
"version": "0",
"lessThan": "0.0.0-20130808000456-233bccbb1abe",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "proxiedConn.LocalAddr"
},
{
"name": "proxiedConn.RemoteAddr"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE 400: Uncontrolled Resource Consumption"
}
]
}
],
"references": [
{
"url": "https://github.com/btcsuite/go-socks/commit/233bccbb1abe02f05750f7ace66f5bffdb13defc"
},
{
"url": "https://pkg.go.dev/vuln/GO-2020-0024"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2022-0411.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2021-4238"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Insufficient randomness in github.com/Masterminds/goutils",
"descriptions": [
{
"lang": "en",
"value": "Randomly-generated alphanumeric strings contain significantly less entropy than expected. The RandomAlphaNumeric and CryptoRandomAlphaNumeric functions always return strings containing at least one digit from 0 to 9. This significantly reduces the amount of entropy in short strings generated by these functions."
}
],
"affected": [
{
"vendor": "github.com/Masterminds/goutils",
"product": "github.com/Masterminds/goutils",
"collectionURL": "https://pkg.go.dev",
"packageName": "github.com/Masterminds/goutils",
"versions": [
{
"version": "0",
"lessThan": "1.1.1",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "RandomAlphaNumeric"
},
{
"name": "CryptoRandomAlphaNumeric"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE 330: Use of Insufficiently Random Values"
}
]
}
],
"references": [
{
"url": "https://github.com/Masterminds/goutils/commit/869801f20f9f1e7ecdbdb6422049d8241270d5e1"
},
{
"url": "https://pkg.go.dev/vuln/GO-2022-0411"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2022-0391.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2022-2582"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Exposure of unencrypted plaintext hash in github.com/aws/aws-sdk-go",
"descriptions": [
{
"lang": "en",
"value": "The AWS S3 Crypto SDK sends an unencrypted hash of the plaintext alongside the ciphertext as a metadata field. This hash can be used to brute force the plaintext, if the hash is readable to the attacker. AWS now blocks this metadata field, but older SDK versions still send it."
}
],
"affected": [
{
"vendor": "github.com/aws/aws-sdk-go",
"product": "github.com/aws/aws-sdk-go/service/s3/s3crypto",
"collectionURL": "https://pkg.go.dev",
"packageName": "github.com/aws/aws-sdk-go/service/s3/s3crypto",
"versions": [
{
"version": "0",
"lessThan": "1.34.0",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "encodeMeta"
},
{
"name": "DecryptionClient.GetObject"
},
{
"name": "DecryptionClient.GetObjectWithContext"
},
{
"name": "EncryptionClient.PutObject"
},
{
"name": "EncryptionClient.PutObjectWithContext"
},
{
"name": "S3LoadStrategy.Load"
},
{
"name": "S3SaveStrategy.Save"
},
{
"name": "defaultV2LoadStrategy.Load"
},
{
"name": "kmsKeyHandler.DecryptKey"
},
{
"name": "kmsKeyHandler.DecryptKeyWithContext"
},
{
"name": "kmsKeyHandler.GenerateCipherData"
},
{
"name": "kmsKeyHandler.GenerateCipherDataWithContext"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE 311: Missing Encryption of Sensitive Data"
}
]
}
],
"references": [
{
"url": "https://github.com/aws/aws-sdk-go/commit/35fa6ddf45c061e0f08d3a3b5119f8f4da38f6d1"
},
{
"url": "https://pkg.go.dev/vuln/GO-2022-0391"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2022-0400.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2022-2583"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Race condition in github.com/ntbosscher/gobase",
"descriptions": [
{
"lang": "en",
"value": "A race condition can cause incorrect HTTP request routing."
}
],
"affected": [
{
"vendor": "github.com/ntbosscher/gobase",
"product": "github.com/ntbosscher/gobase/auth/httpauth",
"collectionURL": "https://pkg.go.dev",
"packageName": "github.com/ntbosscher/gobase/auth/httpauth",
"versions": [
{
"version": "0",
"lessThan": "0.7.2",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "Setup"
},
{
"name": "middleware"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')"
}
]
}
],
"references": [
{
"url": "https://github.com/ntbosscher/gobase/commit/a8d40bce9c429d324122d18c446924dab809e812"
},
{
"url": "https://pkg.go.dev/vuln/GO-2022-0400"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2022-0422.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2022-2584"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Panic when decoding invalid blocks in github.com/ipld/go-codec-dagpb",
"descriptions": [
{
"lang": "en",
"value": "The dag-pb codec can panic when decoding invalid blocks."
}
],
"affected": [
{
"vendor": "github.com/ipld/go-codec-dagpb",
"product": "github.com/ipld/go-codec-dagpb",
"collectionURL": "https://pkg.go.dev",
"packageName": "github.com/ipld/go-codec-dagpb",
"versions": [
{
"version": "0",
"lessThan": "1.3.1",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "DecodeBytes"
},
{
"name": "Decode"
},
{
"name": "Decoder"
},
{
"name": "Unmarshal"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer"
}
]
}
],
"references": [
{
"url": "https://github.com/ipld/go-codec-dagpb/commit/a17ace35cc760a2698645c09868f9050fa219f57"
},
{
"url": "https://pkg.go.dev/vuln/GO-2022-0422"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2023-1841.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2023-29404"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Improper handling of non-optional LDFLAGS in go command with cgo in cmd/go",
"descriptions": [
{
"lang": "en",
"value": "The go command may execute arbitrary code at build time when using cgo. This may occur when running \"go get\" on a malicious module, or when running any other command which builds untrusted code. This is can by triggered by linker flags, specified via a \"#cgo LDFLAGS\" directive. The arguments for a number of flags which are non-optional are incorrectly considered optional, allowing disallowed flags to be smuggled through the LDFLAGS sanitization. This affects usage of both the gc and gccgo compilers."
}
],
"affected": [
{
"vendor": "Go toolchain",
"product": "cmd/go",
"collectionURL": "https://pkg.go.dev",
"packageName": "cmd/go",
"versions": [
{
"version": "0",
"lessThan": "1.19.10",
"status": "affected",
"versionType": "semver"
},
{
"version": "1.20.0-0",
"lessThan": "1.20.5",
"status": "affected",
"versionType": "semver"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-94: Improper Control of Generation of Code (\"Code Injection\")"
}
]
}
],
"references": [
{
"url": "https://go.dev/issue/60305"
},
{
"url": "https://go.dev/cl/501225"
},
{
"url": "https://groups.google.com/g/golang-announce/c/q5135a9d924/m/j0ZoAJOHAwAJ"
},
{
"url": "https://pkg.go.dev/vuln/GO-2023-1841"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XBS3IIK6ADV24C5ULQU55QLT2UE762ZX/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NZ2O6YCO2IZMZJELQGZYR2WAUNEDLYV6/"
},
{
"url": "https://security.gentoo.org/glsa/202311-09"
}
],
"credits": [
{
"lang": "en",
"value": "Juho Nurminen of Mattermost"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2020-0035.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2020-36561"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Path traversal in github.com/yi-ge/unzip",
"descriptions": [
{
"lang": "en",
"value": "Due to improper path sanitization, archives containing relative file paths can cause files to be written (or overwritten) outside of the target directory."
}
],
"affected": [
{
"vendor": "github.com/yi-ge/unzip",
"product": "github.com/yi-ge/unzip",
"collectionURL": "https://pkg.go.dev",
"packageName": "github.com/yi-ge/unzip",
"versions": [
{
"version": "0",
"lessThan": "1.0.3-0.20200308084313-2adbaa4891b9",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "Unzip.Extract"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE 29: Path Traversal: \"\\..\\filename\""
}
]
}
],
"references": [
{
"url": "https://github.com/yi-ge/unzip/pull/1"
},
{
"url": "https://github.com/yi-ge/unzip/commit/2adbaa4891b9690853ef10216189189f5ad7dc73"
},
{
"url": "https://snyk.io/research/zip-slip-vulnerability"
},
{
"url": "https://pkg.go.dev/vuln/GO-2020-0035"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2023-2042.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2023-39320"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Arbitrary code execution via go.mod toolchain directive in cmd/go",
"descriptions": [
{
"lang": "en",
"value": "The go.mod toolchain directive, introduced in Go 1.21, can be leveraged to execute scripts and binaries relative to the root of the module when the \"go\" command was executed within the module. This applies to modules downloaded using the \"go\" command from the module proxy, as well as modules downloaded directly using VCS software."
}
],
"affected": [
{
"vendor": "Go toolchain",
"product": "cmd/go",
"collectionURL": "https://pkg.go.dev",
"packageName": "cmd/go",
"versions": [
{
"version": "1.21.0-0",
"lessThan": "1.21.1",
"status": "affected",
"versionType": "semver"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-94: Improper Control of Generation of Code ('Code Injection')"
}
]
}
],
"references": [
{
"url": "https://go.dev/issue/62198"
},
{
"url": "https://go.dev/cl/526158"
},
{
"url": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ"
},
{
"url": "https://pkg.go.dev/vuln/GO-2023-2042"
},
{
"url": "https://security.netapp.com/advisory/ntap-20231020-0004/"
},
{
"url": "https://security.gentoo.org/glsa/202311-09"
}
],
"credits": [
{
"lang": "en",
"value": "Juho Nurminen of Mattermost"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2024-2825.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2024-24787"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Arbitrary code execution during build on Darwin in cmd/go",
"descriptions": [
{
"lang": "en",
"value": "On Darwin, building a Go module which contains CGO can trigger arbitrary code execution when using the Apple version of ld, due to usage of the -lto_library flag in a \"#cgo LDFLAGS\" directive."
}
],
"affected": [
{
"vendor": "Go toolchain",
"product": "cmd/go",
"collectionURL": "https://pkg.go.dev",
"packageName": "cmd/go",
"versions": [
{
"version": "0",
"lessThan": "1.21.10",
"status": "affected",
"versionType": "semver"
},
{
"version": "1.22.0-0",
"lessThan": "1.22.3",
"status": "affected",
"versionType": "semver"
}
],
"platforms": [
"darwin"
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE 74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')"
}
]
}
],
"references": [
{
"url": "https://go.dev/issue/67119"
},
{
"url": "https://go.dev/cl/583815"
},
{
"url": "https://groups.google.com/g/golang-announce/c/wkkO4P9stm0"
},
{
"url": "https://pkg.go.dev/vuln/GO-2024-2825"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240531-0006/"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/05/08/3"
}
],
"credits": [
{
"lang": "en",
"value": "Juho Forsén (Mattermost)"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2023-1839.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2023-29402"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Code injection via go command with cgo in cmd/go",
"descriptions": [
{
"lang": "en",
"value": "The go command may generate unexpected code at build time when using cgo. This may result in unexpected behavior when running a go program which uses cgo. This may occur when running an untrusted module which contains directories with newline characters in their names. Modules which are retrieved using the go command, i.e. via \"go get\", are not affected (modules retrieved using GOPATH-mode, i.e. GO111MODULE=off, may be affected)."
}
],
"affected": [
{
"vendor": "Go toolchain",
"product": "cmd/go",
"collectionURL": "https://pkg.go.dev",
"packageName": "cmd/go",
"versions": [
{
"version": "0",
"lessThan": "1.19.10",
"status": "affected",
"versionType": "semver"
},
{
"version": "1.20.0-0",
"lessThan": "1.20.5",
"status": "affected",
"versionType": "semver"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-94: Improper Control of Generation of Code ('Code Injection')"
}
]
}
],
"references": [
{
"url": "https://go.dev/issue/60167"
},
{
"url": "https://go.dev/cl/501226"
},
{
"url": "https://groups.google.com/g/golang-announce/c/q5135a9d924/m/j0ZoAJOHAwAJ"
},
{
"url": "https://pkg.go.dev/vuln/GO-2023-1839"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XBS3IIK6ADV24C5ULQU55QLT2UE762ZX/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NZ2O6YCO2IZMZJELQGZYR2WAUNEDLYV6/"
},
{
"url": "https://security.gentoo.org/glsa/202311-09"
}
],
"credits": [
{
"lang": "en",
"value": "Juho Nurminen of Mattermost"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2020-0003.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2020-36568"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Resource exhaustion in github.com/revel/revel",
"descriptions": [
{
"lang": "en",
"value": "Unsanitized input in the query parser in github.com/revel/revel before v1.0.0 allows remote attackers to cause resource exhaustion via memory allocation."
}
],
"affected": [
{
"vendor": "github.com/revel/revel",
"product": "github.com/revel/revel",
"collectionURL": "https://pkg.go.dev",
"packageName": "github.com/revel/revel",
"versions": [
{
"version": "0",
"lessThan": "1.0.0",
"status": "affected",
"versionType": "semver"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-400: Uncontrolled Resource Consumption"
}
]
}
],
"references": [
{
"url": "https://github.com/revel/revel/pull/1427"
},
{
"url": "https://github.com/revel/revel/commit/d160ecb72207824005b19778594cbdc272e8a605"
},
{
"url": "https://github.com/revel/revel/issues/1424"
},
{
"url": "https://pkg.go.dev/vuln/GO-2020-0003"
}
],
"credits": [
{
"lang": "en",
"value": "@SYM01"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2022-0425.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2021-4239"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Weak encryption and denial of service in github.com/flynn/noise",
"descriptions": [
{
"lang": "en",
"value": "The Noise protocol implementation suffers from weakened cryptographic security after encrypting 2^64 messages, and a potential denial of service attack. After 2^64 (~18.4 quintillion) messages are encrypted with the Encrypt function, the nonce counter will wrap around, causing multiple messages to be encrypted with the same key and nonce. In a separate issue, the Decrypt function increments the nonce state even when it fails to decrypt a message. If an attacker can provide an invalid input to the Decrypt function, this will cause the nonce state to desynchronize between the peers, resulting in a failure to encrypt all subsequent messages."
}
],
"affected": [
{
"vendor": "github.com/flynn/noise",
"product": "github.com/flynn/noise",
"collectionURL": "https://pkg.go.dev",
"packageName": "github.com/flynn/noise",
"versions": [
{
"version": "0",
"lessThan": "1.0.0",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "CipherState.Encrypt"
},
{
"name": "CipherState.Decrypt"
},
{
"name": "symmetricState.EncryptAndHash"
},
{
"name": "HandshakeState.ReadMessage"
},
{
"name": "HandshakeState.WriteMessage"
},
{
"name": "symmetricState.DecryptAndHash"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE 400: Uncontrolled Resource Consumption"
}
]
}
],
"references": [
{
"url": "https://github.com/flynn/noise/pull/44"
},
{
"url": "https://pkg.go.dev/vuln/GO-2022-0425"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2023-2185.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2023-45283"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Insecure parsing of Windows paths with a \\??\\ prefix in path/filepath",
"descriptions": [
{
"lang": "en",
"value": "The filepath package does not recognize paths with a \\??\\ prefix as special. On Windows, a path beginning with \\??\\ is a Root Local Device path equivalent to a path beginning with \\\\?\\. Paths with a \\??\\ prefix may be used to access arbitrary locations on the system. For example, the path \\??\\c:\\x is equivalent to the more common path c:\\x. Before fix, Clean could convert a rooted path such as \\a\\..\\??\\b into the root local device path \\??\\b. Clean will now convert this to .\\??\\b. Similarly, Join(\\, ??, b) could convert a seemingly innocent sequence of path elements into the root local device path \\??\\b. Join will now convert this to \\.\\??\\b. In addition, with fix, IsAbs now correctly reports paths beginning with \\??\\ as absolute, and VolumeName correctly reports the \\??\\ prefix as a volume name. UPDATE: Go 1.20.11 and Go 1.21.4 inadvertently changed the definition of the volume name in Windows paths starting with \\?, resulting in filepath.Clean(\\?\\c:) returning \\?\\c: rather than \\?\\c:\\ (among other effects). The previous behavior has been restored."
}
],
"affected": [
{
"vendor": "Go standard library",
"product": "path/filepath",
"collectionURL": "https://pkg.go.dev",
"packageName": "path/filepath",
"versions": [
{
"version": "0",
"lessThan": "1.20.11",
"status": "affected",
"versionType": "semver"
},
{
"version": "1.21.0-0",
"lessThan": "1.21.4",
"status": "affected",
"versionType": "semver"
}
],
"platforms": [
"windows"
],
"programRoutines": [
{
"name": "Clean"
},
{
"name": "volumeNameLen"
},
{
"name": "join"
},
{
"name": "Abs"
},
{
"name": "Base"
},
{
"name": "Dir"
},
{
"name": "EvalSymlinks"
},
{
"name": "Glob"
},
{
"name": "IsLocal"
},
{
"name": "Join"
},
{
"name": "Rel"
},
{
"name": "Split"
},
{
"name": "VolumeName"
},
{
"name": "Walk"
},
{
"name": "WalkDir"
}
],
"defaultStatus": "unaffected"
},
{
"vendor": "Go standard library",
"product": "internal/safefilepath",
"collectionURL": "https://pkg.go.dev",
"packageName": "internal/safefilepath",
"versions": [
{
"version": "0",
"lessThan": "1.20.11",
"status": "affected",
"versionType": "semver"
},
{
"version": "1.21.0-0",
"lessThan": "1.21.4",
"status": "affected",
"versionType": "semver"
}
],
"platforms": [
"windows"
],
"programRoutines": [
{
"name": "fromFS"
},
{
"name": "FromFS"
}
],
"defaultStatus": "unaffected"
},
{
"vendor": "Go standard library",
"product": "path/filepath",
"collectionURL": "https://pkg.go.dev",
"packageName": "path/filepath",
"versions": [
{
"version": "1.20.11",
"lessThan": "1.20.12",
"status": "affected",
"versionType": "semver"
},
{
"version": "1.21.4",
"lessThan": "1.21.5",
"status": "affected",
"versionType": "semver"
}
],
"platforms": [
"windows"
],
"programRoutines": [
{
"name": "volumeNameLen"
},
{
"name": "Abs"
},
{
"name": "Base"
},
{
"name": "Clean"
},
{
"name": "Dir"
},
{
"name": "EvalSymlinks"
},
{
"name": "Glob"
},
{
"name": "IsLocal"
},
{
"name": "Join"
},
{
"name": "Rel"
},
{
"name": "Split"
},
{
"name": "VolumeName"
},
{
"name": "Walk"
},
{
"name": "WalkDir"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-41: Improper Resolution of Path Equivalence"
}
]
}
],
"references": [
{
"url": "https://go.dev/issue/63713"
},
{
"url": "https://go.dev/cl/540277"
},
{
"url": "https://groups.google.com/g/golang-announce/c/4tU8LZfBFkY"
},
{
"url": "https://go.dev/issue/64028"
},
{
"url": "https://go.dev/cl/541175"
},
{
"url": "https://groups.google.com/g/golang-dev/c/6ypN5EjibjM/m/KmLVYH_uAgAJ"
},
{
"url": "https://pkg.go.dev/vuln/GO-2023-2185"
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/12/05/2"
},
{
"url": "https://security.netapp.com/advisory/ntap-20231214-0008/"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2020-0020.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2017-20146"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Improper access control in github.com/gorilla/handlers",
"descriptions": [
{
"lang": "en",
"value": "Usage of the CORS handler may apply improper CORS headers, allowing the requester to explicitly control the value of the Access-Control-Allow-Origin header, which bypasses the expected behavior of the Same Origin Policy."
}
],
"affected": [
{
"vendor": "github.com/gorilla/handlers",
"product": "github.com/gorilla/handlers",
"collectionURL": "https://pkg.go.dev",
"packageName": "github.com/gorilla/handlers",
"versions": [
{
"version": "0",
"lessThan": "1.3.0",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "cors.ServeHTTP"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE 284: Improper Access Control"
}
]
}
],
"references": [
{
"url": "https://github.com/gorilla/handlers/pull/116"
},
{
"url": "https://github.com/gorilla/handlers/commit/90663712d74cb411cbef281bc1e08c19d1a76145"
},
{
"url": "https://pkg.go.dev/vuln/GO-2020-0020"
}
],
"credits": [
{
"lang": "en",
"value": "Evan J Johnson"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2021-0061.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2021-4235"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Denial of service in gopkg.in/yaml.v2",
"descriptions": [
{
"lang": "en",
"value": "Due to unbounded alias chasing, a maliciously crafted YAML file can cause the system to consume significant system resources. If parsing user input, this may be used as a denial of service vector."
}
],
"affected": [
{
"vendor": "gopkg.in/yaml.v2",
"product": "gopkg.in/yaml.v2",
"collectionURL": "https://pkg.go.dev",
"packageName": "gopkg.in/yaml.v2",
"versions": [
{
"version": "0",
"lessThan": "2.2.3",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "decoder.unmarshal"
},
{
"name": "Decoder.Decode"
},
{
"name": "Unmarshal"
},
{
"name": "UnmarshalStrict"
}
],
"defaultStatus": "unaffected"
},
{
"vendor": "github.com/go-yaml/yaml",
"product": "github.com/go-yaml/yaml",
"collectionURL": "https://pkg.go.dev",
"packageName": "github.com/go-yaml/yaml",
"programRoutines": [
{
"name": "decoder.unmarshal"
},
{
"name": "Decoder.Decode"
},
{
"name": "Unmarshal"
},
{
"name": "UnmarshalStrict"
}
],
"defaultStatus": "affected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE 400: Uncontrolled Resource Consumption"
}
]
}
],
"references": [
{
"url": "https://github.com/go-yaml/yaml/pull/375"
},
{
"url": "https://github.com/go-yaml/yaml/commit/bb4e33bf68bf89cad44d386192cbed201f35b241"
},
{
"url": "https://pkg.go.dev/vuln/GO-2021-0061"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00001.html"
}
],
"credits": [
{
"lang": "en",
"value": "@simonferquel"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2023-1631.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2023-24535"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Panic when parsing invalid messages in google.golang.org/protobuf",
"descriptions": [
{
"lang": "en",
"value": "Parsing invalid messages can panic. Parsing a text-format message which contains a potential number consisting of a minus sign, one or more characters of whitespace, and no further input will cause a panic."
}
],
"affected": [
{
"vendor": "google.golang.org/protobuf",
"product": "google.golang.org/protobuf/encoding/prototext",
"collectionURL": "https://pkg.go.dev",
"packageName": "google.golang.org/protobuf/encoding/prototext",
"versions": [
{
"version": "1.29.0",
"lessThan": "1.29.1",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "UnmarshalOptions.unmarshal"
},
{
"name": "Unmarshal"
},
{
"name": "UnmarshalOptions.Unmarshal"
}
],
"defaultStatus": "unaffected"
},
{
"vendor": "google.golang.org/protobuf",
"product": "google.golang.org/protobuf/internal/encoding/text",
"collectionURL": "https://pkg.go.dev",
"packageName": "google.golang.org/protobuf/internal/encoding/text",
"versions": [
{
"version": "1.29.0",
"lessThan": "1.29.1",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "parseNumber"
},
{
"name": "Decoder.Peek"
},
{
"name": "Decoder.Read"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-125: Out-of-bounds Read"
}
]
}
],
"references": [
{
"url": "https://go.dev/cl/475995"
},
{
"url": "https://github.com/golang/protobuf/issues/1530"
},
{
"url": "https://pkg.go.dev/vuln/GO-2023-1631"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2024-2962.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2023-24531"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Output of \"go env\" does not sanitize values in cmd/go",
"descriptions": [
{
"lang": "en",
"value": "Command go env is documented as outputting a shell script containing the Go environment. However, go env doesn't sanitize values, so executing its output as a shell script can cause various bad bahaviors, including executing arbitrary commands or inserting new environment variables. This issue is relatively minor because, in general, if an attacker can set arbitrary environment variables on a system, they have better attack vectors than making \"go env\" print them out."
}
],
"affected": [
{
"vendor": "Go toolchain",
"product": "cmd/go",
"collectionURL": "https://pkg.go.dev",
"packageName": "cmd/go",
"versions": [
{
"version": "0",
"lessThan": "1.21.0-0",
"status": "affected",
"versionType": "semver"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-138: Improper Neutralization of Special Elements"
}
]
}
],
"references": [
{
"url": "https://go.dev/cl/488375"
},
{
"url": "https://go.dev/cl/493535"
},
{
"url": "https://go.dev/issue/58508"
},
{
"url": "https://groups.google.com/g/golang-dev/c/ixHOFpSbajE/m/8EjlbKVWAwAJ"
},
{
"url": "https://pkg.go.dev/vuln/GO-2024-2962"
}
],
"credits": [
{
"lang": "en",
"value": "Hunter Wittenborn (https://hunterwittenborn.com/)"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2020-0037.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2019-25072"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Uncontrolled resource consumption in github.com/tendermint/tendermint",
"descriptions": [
{
"lang": "en",
"value": "Due to support of Gzip compression in request bodies, as well as a lack of limiting response body sizes, a malicious server can cause a client to consume a significant amount of system resources, which may be used as a denial of service vector."
}
],
"affected": [
{
"vendor": "github.com/tendermint/tendermint",
"product": "github.com/tendermint/tendermint/rpc/lib/client",
"collectionURL": "https://pkg.go.dev",
"packageName": "github.com/tendermint/tendermint/rpc/lib/client",
"versions": [
{
"version": "0",
"lessThan": "0.31.1",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "makeHTTPClient"
},
{
"name": "NewJSONRPCClient"
},
{
"name": "NewURIClient"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-400: Uncontrolled Resource Consumption"
}
]
}
],
"references": [
{
"url": "https://github.com/tendermint/tendermint/pull/3430"
},
{
"url": "https://github.com/tendermint/tendermint/commit/03085c2da23b179c4a51f59a03cb40aa4e85a613"
},
{
"url": "https://pkg.go.dev/vuln/GO-2020-0037"
}
],
"credits": [
{
"lang": "en",
"value": "@guagualvcha"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2022-0531.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2022-30629"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Session tickets lack random ticket_age_add in crypto/tls",
"descriptions": [
{
"lang": "en",
"value": "Non-random values for ticket_age_add in session tickets in crypto/tls before Go 1.17.11 and Go 1.18.3 allow an attacker that can observe TLS handshakes to correlate successive connections by comparing ticket ages during session resumption."
}
],
"affected": [
{
"vendor": "Go standard library",
"product": "crypto/tls",
"collectionURL": "https://pkg.go.dev",
"packageName": "crypto/tls",
"versions": [
{
"version": "0",
"lessThan": "1.17.11",
"status": "affected",
"versionType": "semver"
},
{
"version": "1.18.0-0",
"lessThan": "1.18.3",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "serverHandshakeStateTLS13.sendSessionTickets"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-200: Information Exposure"
}
]
}
],
"references": [
{
"url": "https://go.dev/cl/405994"
},
{
"url": "https://go.googlesource.com/go/+/fe4de36198794c447fbd9d7cc2d7199a506c76a5"
},
{
"url": "https://go.dev/issue/52814"
},
{
"url": "https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg/m/IWz5T6x7AAAJ"
},
{
"url": "https://pkg.go.dev/vuln/GO-2022-0531"
}
],
"credits": [
{
"lang": "en",
"value": "Github user @nervuri"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2023-2382.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2023-39326"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Denial of service via chunk extensions in net/http",
"descriptions": [
{
"lang": "en",
"value": "A malicious HTTP sender can use chunk extensions to cause a receiver reading from a request or response body to read many more bytes from the network than are in the body. A malicious HTTP client can further exploit this to cause a server to automatically read a large amount of data (up to about 1GiB) when a handler fails to read the entire body of a request. Chunk extensions are a little-used HTTP feature which permit including additional metadata in a request or response body sent using the chunked encoding. The net/http chunked encoding reader discards this metadata. A sender can exploit this by inserting a large metadata segment with each byte transferred. The chunk reader now produces an error if the ratio of real body to encoded bytes grows too small."
}
],
"affected": [
{
"vendor": "Go standard library",
"product": "net/http/internal",
"collectionURL": "https://pkg.go.dev",
"packageName": "net/http/internal",
"versions": [
{
"version": "0",
"lessThan": "1.20.12",
"status": "affected",
"versionType": "semver"
},
{
"version": "1.21.0-0",
"lessThan": "1.21.5",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "chunkedReader.beginChunk"
},
{
"name": "readChunkLine"
},
{
"name": "chunkedReader.Read"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-400: Uncontrolled Resource Consumption"
}
]
}
],
"references": [
{
"url": "https://go.dev/issue/64433"
},
{
"url": "https://go.dev/cl/547335"
},
{
"url": "https://groups.google.com/g/golang-dev/c/6ypN5EjibjM/m/KmLVYH_uAgAJ"
},
{
"url": "https://pkg.go.dev/vuln/GO-2023-2382"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UIU6HOGV6RRIKWM57LOXQA75BGZSIH6G/"
}
],
"credits": [
{
"lang": "en",
"value": "Bartek Nowotarski"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2023-1840.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2023-29403"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Unsafe behavior in setuid/setgid binaries in runtime",
"descriptions": [
{
"lang": "en",
"value": "On Unix platforms, the Go runtime does not behave differently when a binary is run with the setuid/setgid bits. This can be dangerous in certain cases, such as when dumping memory state, or assuming the status of standard i/o file descriptors. If a setuid/setgid binary is executed with standard I/O file descriptors closed, opening any files can result in unexpected content being read or written with elevated privileges. Similarly, if a setuid/setgid program is terminated, either via panic or signal, it may leak the contents of its registers."
}
],
"affected": [
{
"vendor": "Go standard library",
"product": "runtime",
"collectionURL": "https://pkg.go.dev",
"packageName": "runtime",
"versions": [
{
"version": "0",
"lessThan": "1.19.10",
"status": "affected",
"versionType": "semver"
},
{
"version": "1.20.0-0",
"lessThan": "1.20.5",
"status": "affected",
"versionType": "semver"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-642: External Control of Critical State Data"
}
]
}
],
"references": [
{
"url": "https://go.dev/issue/60272"
},
{
"url": "https://go.dev/cl/501223"
},
{
"url": "https://groups.google.com/g/golang-announce/c/q5135a9d924/m/j0ZoAJOHAwAJ"
},
{
"url": "https://pkg.go.dev/vuln/GO-2023-1840"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XBS3IIK6ADV24C5ULQU55QLT2UE762ZX/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NZ2O6YCO2IZMZJELQGZYR2WAUNEDLYV6/"
},
{
"url": "https://security.gentoo.org/glsa/202311-09"
}
],
"credits": [
{
"lang": "en",
"value": "Vincent Dehors from Synacktiv"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2022-0523.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2022-30633"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Stack exhaustion when unmarshaling certain documents in encoding/xml",
"descriptions": [
{
"lang": "en",
"value": "Uncontrolled recursion in Unmarshal in encoding/xml before Go 1.17.12 and Go 1.18.4 allows an attacker to cause a panic due to stack exhaustion via unmarshalling an XML document into a Go struct which has a nested field that uses the 'any' field tag."
}
],
"affected": [
{
"vendor": "Go standard library",
"product": "encoding/xml",
"collectionURL": "https://pkg.go.dev",
"packageName": "encoding/xml",
"versions": [
{
"version": "0",
"lessThan": "1.17.12",
"status": "affected",
"versionType": "semver"
},
{
"version": "1.18.0-0",
"lessThan": "1.18.4",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "Decoder.DecodeElement"
},
{
"name": "Decoder.unmarshal"
},
{
"name": "Decoder.unmarshalPath"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-674: Uncontrolled Recursion"
}
]
}
],
"references": [
{
"url": "https://go.dev/cl/417061"
},
{
"url": "https://go.googlesource.com/go/+/c4c1993fd2a5b26fe45c09592af6d3388a3b2e08"
},
{
"url": "https://go.dev/issue/53611"
},
{
"url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE"
},
{
"url": "https://pkg.go.dev/vuln/GO-2022-0523"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2023-1987.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2023-29409"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Large RSA keys can cause high CPU usage in crypto/tls",
"descriptions": [
{
"lang": "en",
"value": "Extremely large RSA keys in certificate chains can cause a client/server to expend significant CPU time verifying signatures. With fix, the size of RSA keys transmitted during handshakes is restricted to \u003c= 8192 bits. Based on a survey of publicly trusted RSA keys, there are currently only three certificates in circulation with keys larger than this, and all three appear to be test certificates that are not actively deployed. It is possible there are larger keys in use in private PKIs, but we target the web PKI, so causing breakage here in the interests of increasing the default safety of users of crypto/tls seems reasonable."
}
],
"affected": [
{
"vendor": "Go standard library",
"product": "crypto/tls",
"collectionURL": "https://pkg.go.dev",
"packageName": "crypto/tls",
"versions": [
{
"version": "0",
"lessThan": "1.19.12",
"status": "affected",
"versionType": "semver"
},
{
"version": "1.20.0-0",
"lessThan": "1.20.7",
"status": "affected",
"versionType": "semver"
},
{
"version": "1.21.0-0",
"lessThan": "1.21.0-rc.4",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "Conn.verifyServerCertificate"
},
{
"name": "Conn.processCertsFromClient"
},
{
"name": "Conn.Handshake"
},
{
"name": "Conn.HandshakeContext"
},
{
"name": "Conn.Read"
},
{
"name": "Conn.Write"
},
{
"name": "Dial"
},
{
"name": "DialWithDialer"
},
{
"name": "Dialer.Dial"
},
{
"name": "Dialer.DialContext"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-400: Uncontrolled Resource Consumption"
}
]
}
],
"references": [
{
"url": "https://go.dev/issue/61460"
},
{
"url": "https://go.dev/cl/515257"
},
{
"url": "https://groups.google.com/g/golang-announce/c/X0b6CsSAaYI/m/Efv5DbZ9AwAJ"
},
{
"url": "https://pkg.go.dev/vuln/GO-2023-1987"
},
{
"url": "https://security.netapp.com/advisory/ntap-20230831-0010/"
},
{
"url": "https://security.gentoo.org/glsa/202311-09"
}
],
"credits": [
{
"lang": "en",
"value": "Mateusz Poliwczak"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2022-0477.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2022-30634"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Indefinite hang with large buffers on Windows in crypto/rand",
"descriptions": [
{
"lang": "en",
"value": "Infinite loop in Read in crypto/rand before Go 1.17.11 and Go 1.18.3 on Windows allows attacker to cause an indefinite hang by passing a buffer larger than 1 \u003c\u003c 32 - 1 bytes."
}
],
"affected": [
{
"vendor": "Go standard library",
"product": "crypto/rand",
"collectionURL": "https://pkg.go.dev",
"packageName": "crypto/rand",
"versions": [
{
"version": "0",
"lessThan": "1.17.11",
"status": "affected",
"versionType": "semver"
},
{
"version": "1.18.0-0",
"lessThan": "1.18.3",
"status": "affected",
"versionType": "semver"
}
],
"platforms": [
"windows"
],
"programRoutines": [
{
"name": "Read"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop')"
}
]
}
],
"references": [
{
"url": "https://go.dev/cl/402257"
},
{
"url": "https://go.googlesource.com/go/+/bb1f4416180511231de6d17a1f2f55c82aafc863"
},
{
"url": "https://go.dev/issue/52561"
},
{
"url": "https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg/m/IWz5T6x7AAAJ"
},
{
"url": "https://pkg.go.dev/vuln/GO-2022-0477"
}
],
"credits": [
{
"lang": "en",
"value": "Davis Goodin"
},
{
"lang": "en",
"value": "Quim Muntal of Microsoft"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2024-2611.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2024-24786"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Infinite loop in JSON unmarshaling in google.golang.org/protobuf",
"descriptions": [
{
"lang": "en",
"value": "The protojson.Unmarshal function can enter an infinite loop when unmarshaling certain forms of invalid JSON. This condition can occur when unmarshaling into a message which contains a google.protobuf.Any value, or when the UnmarshalOptions.DiscardUnknown option is set."
}
],
"affected": [
{
"vendor": "google.golang.org/protobuf",
"product": "google.golang.org/protobuf/encoding/protojson",
"collectionURL": "https://pkg.go.dev",
"packageName": "google.golang.org/protobuf/encoding/protojson",
"versions": [
{
"version": "0",
"lessThan": "1.33.0",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "UnmarshalOptions.unmarshal"
},
{
"name": "Unmarshal"
},
{
"name": "UnmarshalOptions.Unmarshal"
}
],
"defaultStatus": "unaffected"
},
{
"vendor": "google.golang.org/protobuf",
"product": "google.golang.org/protobuf/internal/encoding/json",
"collectionURL": "https://pkg.go.dev",
"packageName": "google.golang.org/protobuf/internal/encoding/json",
"versions": [
{
"version": "0",
"lessThan": "1.33.0",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "Decoder.Read"
},
{
"name": "Decoder.Peek"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-1286: Improper Validation of Syntactic Correctness of Input"
}
]
}
],
"references": [
{
"url": "https://go.dev/cl/569356"
},
{
"url": "https://pkg.go.dev/vuln/GO-2024-2611"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDMBHAVSDU2FBDZ45U3A2VLSM35OJ2HU/"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/03/08/4"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240517-0002/"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2021-0051.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2020-36565"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Directory traversal on Windows in github.com/labstack/echo/v4",
"descriptions": [
{
"lang": "en",
"value": "Due to improper sanitization of user input on Windows, the static file handler allows for directory traversal, allowing an attacker to read files outside of the target directory that the server has permission to read."
}
],
"affected": [
{
"vendor": "github.com/labstack/echo/v4",
"product": "github.com/labstack/echo/v4",
"collectionURL": "https://pkg.go.dev",
"packageName": "github.com/labstack/echo/v4",
"versions": [
{
"version": "0",
"lessThan": "4.1.18-0.20201215153152-4422e3b66b9f",
"status": "affected",
"versionType": "semver"
}
],
"platforms": [
"windows"
],
"programRoutines": [
{
"name": "common.static"
},
{
"name": "Echo.Static"
},
{
"name": "Group.Static"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE 22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')"
}
]
}
],
"references": [
{
"url": "https://github.com/labstack/echo/pull/1718"
},
{
"url": "https://github.com/labstack/echo/commit/4422e3b66b9fd498ed1ae1d0242d660d0ed3faaa"
},
{
"url": "https://pkg.go.dev/vuln/GO-2021-0051"
}
],
"credits": [
{
"lang": "en",
"value": "@little-cui (Apache ServiceComb)"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2020-0034.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2020-36560"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Path traversal in github.com/artdarek/go-unzip",
"descriptions": [
{
"lang": "en",
"value": "Due to improper path sanitization, archives containing relative file paths can cause files to be written (or overwritten) outside of the target directory."
}
],
"affected": [
{
"vendor": "github.com/artdarek/go-unzip",
"product": "github.com/artdarek/go-unzip",
"collectionURL": "https://pkg.go.dev",
"packageName": "github.com/artdarek/go-unzip",
"versions": [
{
"version": "0",
"lessThan": "1.0.0",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "Unzip.Extract"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE 29: Path Traversal: \"\\..\\filename\""
}
]
}
],
"references": [
{
"url": "https://github.com/artdarek/go-unzip/pull/2"
},
{
"url": "https://github.com/artdarek/go-unzip/commit/4975cbe0a719dc50b12da8585f1f207c82f7dfe0"
},
{
"url": "https://snyk.io/research/zip-slip-vulnerability"
},
{
"url": "https://pkg.go.dev/vuln/GO-2020-0034"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2022-0476.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2020-28367"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Arbitrary code execution via the go command with cgo in cmd/go",
"descriptions": [
{
"lang": "en",
"value": "Code injection in the go command with cgo before Go 1.14.12 and Go 1.15.5 allows arbitrary code execution at build time via malicious gcc flags specified via a #cgo directive."
}
],
"affected": [
{
"vendor": "Go toolchain",
"product": "cmd/go",
"collectionURL": "https://pkg.go.dev",
"packageName": "cmd/go",
"versions": [
{
"version": "0",
"lessThan": "1.14.12",
"status": "affected",
"versionType": "semver"
},
{
"version": "1.15.0-0",
"lessThan": "1.15.5",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "validCompilerFlags"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-94: Improper Control of Generation of Code ('Code Injection')"
}
]
}
],
"references": [
{
"url": "https://go.dev/cl/267277"
},
{
"url": "https://go.googlesource.com/go/+/da7aa86917811a571e6634b45a457f918b8e6561"
},
{
"url": "https://go.dev/issue/42556"
},
{
"url": "https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM"
},
{
"url": "https://pkg.go.dev/vuln/GO-2022-0476"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00021.html"
}
],
"credits": [
{
"lang": "en",
"value": "Imre Rad"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2023-2328.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2023-45286"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "HTTP request body disclosure in github.com/go-resty/resty/v2",
"descriptions": [
{
"lang": "en",
"value": "A race condition in go-resty can result in HTTP request body disclosure across requests. This condition can be triggered by calling sync.Pool.Put with the same *bytes.Buffer more than once, when request retries are enabled and a retry occurs. The call to sync.Pool.Get will then return a bytes.Buffer that hasn't had bytes.Buffer.Reset called on it. This dirty buffer will contain the HTTP request body from an unrelated request, and go-resty will append the current HTTP request body to it, sending two bodies in one request. The sync.Pool in question is defined at package level scope, so a completely unrelated server could receive the request body."
}
],
"affected": [
{
"vendor": "github.com/go-resty/resty/v2",
"product": "github.com/go-resty/resty/v2",
"collectionURL": "https://pkg.go.dev",
"packageName": "github.com/go-resty/resty/v2",
"versions": [
{
"version": "2.10.0",
"lessThan": "2.11.0",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "handleRequestBody"
},
{
"name": "Backoff"
},
{
"name": "Request.Delete"
},
{
"name": "Request.Execute"
},
{
"name": "Request.Get"
},
{
"name": "Request.Head"
},
{
"name": "Request.Options"
},
{
"name": "Request.Patch"
},
{
"name": "Request.Post"
},
{
"name": "Request.Put"
},
{
"name": "Request.Send"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor"
}
]
}
],
"references": [
{
"url": "https://github.com/go-resty/resty/issues/743"
},
{
"url": "https://github.com/go-resty/resty/issues/739"
},
{
"url": "https://github.com/go-resty/resty/pull/745"
},
{
"url": "https://github.com/go-resty/resty/commit/577fed8730d79f583eb48dfc81674164e1fc471e"
},
{
"url": "https://pkg.go.dev/vuln/GO-2023-2328"
}
],
"credits": [
{
"lang": "en",
"value": "Logan Attwood (@lattwood)"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2023-1990.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2023-29407"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Excessive CPU consumption when decoding 0-height images in golang.org/x/image/tiff",
"descriptions": [
{
"lang": "en",
"value": "A maliciously-crafted image can cause excessive CPU consumption in decoding. A tiled image with a height of 0 and a very large width can cause excessive CPU consumption, despite the image size (width * height) appearing to be zero."
}
],
"affected": [
{
"vendor": "golang.org/x/image",
"product": "golang.org/x/image/tiff",
"collectionURL": "https://pkg.go.dev",
"packageName": "golang.org/x/image/tiff",
"versions": [
{
"version": "0",
"lessThan": "0.10.0",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "newDecoder"
},
{
"name": "Decode"
},
{
"name": "DecodeConfig"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-834: Excessive Iteration"
}
]
}
],
"references": [
{
"url": "https://go.dev/issue/61581"
},
{
"url": "https://go.dev/cl/514897"
},
{
"url": "https://pkg.go.dev/vuln/GO-2023-1990"
},
{
"url": "https://security.netapp.com/advisory/ntap-20230831-0009/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KO54NBDUJXKAZNGCFOEYL2LKK2RQP6K6/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWH6Q7NVM4MV3GWFEU4PA67AWZHVFJQ2/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XZTEP6JYILRBNDTNWTEQ5D4QUUVQBESK/"
}
],
"credits": [
{
"lang": "en",
"value": "Philippe Antoine (Catena cyber)"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2024-2610.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2024-24785"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Errors returned from JSON marshaling may break template escaping in html/template",
"descriptions": [
{
"lang": "en",
"value": "If errors returned from MarshalJSON methods contain user controlled data, they may be used to break the contextual auto-escaping behavior of the html/template package, allowing for subsequent actions to inject unexpected content into templates."
}
],
"affected": [
{
"vendor": "Go standard library",
"product": "html/template",
"collectionURL": "https://pkg.go.dev",
"packageName": "html/template",
"versions": [
{
"version": "0",
"lessThan": "1.21.8",
"status": "affected",
"versionType": "semver"
},
{
"version": "1.22.0-0",
"lessThan": "1.22.1",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "jsValEscaper"
},
{
"name": "escaper.commit"
},
{
"name": "Template.Execute"
},
{
"name": "Template.ExecuteTemplate"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-150: Improper Neutralization of Escape, Meta, or Control Sequences"
}
]
}
],
"references": [
{
"url": "https://go.dev/issue/65697"
},
{
"url": "https://go.dev/cl/564196"
},
{
"url": "https://groups.google.com/g/golang-announce/c/5pwGVUPoMbg"
},
{
"url": "https://pkg.go.dev/vuln/GO-2024-2610"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240329-0008/"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/03/08/4"
}
],
"credits": [
{
"lang": "en",
"value": "RyotaK (https://ryotak.net)"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2023-1570.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2022-41724"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Panic on large handshake records in crypto/tls",
"descriptions": [
{
"lang": "en",
"value": "Large handshake records may cause panics in crypto/tls. Both clients and servers may send large TLS handshake records which cause servers and clients, respectively, to panic when attempting to construct responses. This affects all TLS 1.3 clients, TLS 1.2 clients which explicitly enable session resumption (by setting Config.ClientSessionCache to a non-nil value), and TLS 1.3 servers which request client certificates (by setting Config.ClientAuth \u003e= RequestClientCert)."
}
],
"affected": [
{
"vendor": "Go standard library",
"product": "crypto/tls",
"collectionURL": "https://pkg.go.dev",
"packageName": "crypto/tls",
"versions": [
{
"version": "0",
"lessThan": "1.19.6",
"status": "affected",
"versionType": "semver"
},
{
"version": "1.20.0-0",
"lessThan": "1.20.1",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "handshakeMessage.marshal"
},
{
"name": "Conn.writeRecord"
},
{
"name": "Conn.readHandshake"
},
{
"name": "Conn.handleRenegotiation"
},
{
"name": "Conn.handlePostHandshakeMessage"
},
{
"name": "Conn.handleKeyUpdate"
},
{
"name": "Conn.clientHandshake"
},
{
"name": "Conn.loadSession"
},
{
"name": "clientHandshakeState.handshake"
},
{
"name": "clientHandshakeState.doFullHandshake"
},
{
"name": "clientHandshakeState.readFinished"
},
{
"name": "clientHandshakeState.readSessionTicket"
},
{
"name": "clientHandshakeState.sendFinished"
},
{
"name": "clientHandshakeStateTLS13.handshake"
},
{
"name": "clientHandshakeStateTLS13.sendDummyChangeCipherSpec"
},
{
"name": "clientHandshakeStateTLS13.processHelloRetryRequest"
},
{
"name": "clientHandshakeStateTLS13.readServerParameters"
},
{
"name": "clientHandshakeStateTLS13.readServerCertificate"
},
{
"name": "clientHandshakeStateTLS13.readServerFinished"
},
{
"name": "clientHandshakeStateTLS13.sendClientCertificate"
},
{
"name": "clientHandshakeStateTLS13.sendClientFinished"
},
{
"name": "clientHelloMsg.marshal"
},
{
"name": "clientHelloMsg.marshalWithoutBinders"
},
{
"name": "clientHelloMsg.updateBinders"
},
{
"name": "serverHelloMsg.marshal"
},
{
"name": "encryptedExtensionsMsg.marshal"
},
{
"name": "endOfEarlyDataMsg.marshal"
},
{
"name": "keyUpdateMsg.marshal"
},
{
"name": "newSessionTicketMsgTLS13.marshal"
},
{
"name": "certificateRequestMsgTLS13.marshal"
},
{
"name": "certificateMsg.marshal"
},
{
"name": "certificateMsgTLS13.marshal"
},
{
"name": "serverKeyExchangeMsg.marshal"
},
{
"name": "certificateStatusMsg.marshal"
},
{
"name": "serverHelloDoneMsg.marshal"
},
{
"name": "clientKeyExchangeMsg.marshal"
},
{
"name": "finishedMsg.marshal"
},
{
"name": "certificateRequestMsg.marshal"
},
{
"name": "certificateVerifyMsg.marshal"
},
{
"name": "newSessionTicketMsg.marshal"
},
{
"name": "helloRequestMsg.marshal"
},
{
"name": "Conn.readClientHello"
},
{
"name": "serverHandshakeState.doResumeHandshake"
},
{
"name": "serverHandshakeState.doFullHandshake"
},
{
"name": "serverHandshakeState.readFinished"
},
{
"name": "serverHandshakeState.sendSessionTicket"
},
{
"name": "serverHandshakeState.sendFinished"
},
{
"name": "serverHandshakeStateTLS13.checkForResumption"
},
{
"name": "serverHandshakeStateTLS13.sendDummyChangeCipherSpec"
},
{
"name": "serverHandshakeStateTLS13.doHelloRetryRequest"
},
{
"name": "serverHandshakeStateTLS13.sendServerParameters"
},
{
"name": "serverHandshakeStateTLS13.sendServerCertificate"
},
{
"name": "serverHandshakeStateTLS13.sendServerFinished"
},
{
"name": "serverHandshakeStateTLS13.sendSessionTickets"
},
{
"name": "serverHandshakeStateTLS13.readClientCertificate"
},
{
"name": "serverHandshakeStateTLS13.readClientFinished"
},
{
"name": "cipherSuiteTLS13.expandLabel"
},
{
"name": "sessionState.marshal"
},
{
"name": "sessionStateTLS13.marshal"
},
{
"name": "Conn.Handshake"
},
{
"name": "Conn.HandshakeContext"
},
{
"name": "Conn.Read"
},
{
"name": "Conn.Write"
},
{
"name": "ConnectionState.ExportKeyingMaterial"
},
{
"name": "Dial"
},
{
"name": "DialWithDialer"
},
{
"name": "Dialer.Dial"
},
{
"name": "Dialer.DialContext"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-400: Uncontrolled Resource Consumption"
}
]
}
],
"references": [
{
"url": "https://go.dev/issue/58001"
},
{
"url": "https://go.dev/cl/468125"
},
{
"url": "https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E"
},
{
"url": "https://pkg.go.dev/vuln/GO-2023-1570"
},
{
"url": "https://security.gentoo.org/glsa/202311-09"
}
],
"credits": [
{
"lang": "en",
"value": "Marten Seemann"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2023-1571.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2022-41723"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Denial of service via crafted HTTP/2 stream in net/http and golang.org/x/net",
"descriptions": [
{
"lang": "en",
"value": "A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests."
}
],
"affected": [
{
"vendor": "Go standard library",
"product": "net/http",
"collectionURL": "https://pkg.go.dev",
"packageName": "net/http",
"versions": [
{
"version": "0",
"lessThan": "1.19.6",
"status": "affected",
"versionType": "semver"
},
{
"version": "1.20.0-0",
"lessThan": "1.20.1",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "Transport.RoundTrip"
},
{
"name": "Server.Serve"
},
{
"name": "Client.Do"
},
{
"name": "Client.Get"
},
{
"name": "Client.Head"
},
{
"name": "Client.Post"
},
{
"name": "Client.PostForm"
},
{
"name": "Get"
},
{
"name": "Head"
},
{
"name": "ListenAndServe"
},
{
"name": "ListenAndServeTLS"
},
{
"name": "Post"
},
{
"name": "PostForm"
},
{
"name": "Serve"
},
{
"name": "ServeTLS"
},
{
"name": "Server.ListenAndServe"
},
{
"name": "Server.ListenAndServeTLS"
},
{
"name": "Server.ServeTLS"
}
],
"defaultStatus": "unaffected"
},
{
"vendor": "golang.org/x/net",
"product": "golang.org/x/net/http2",
"collectionURL": "https://pkg.go.dev",
"packageName": "golang.org/x/net/http2",
"versions": [
{
"version": "0",
"lessThan": "0.7.0",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "Transport.RoundTrip"
},
{
"name": "Server.ServeConn"
},
{
"name": "ClientConn.Close"
},
{
"name": "ClientConn.Ping"
},
{
"name": "ClientConn.RoundTrip"
},
{
"name": "ClientConn.Shutdown"
},
{
"name": "ConfigureServer"
},
{
"name": "ConfigureTransport"
},
{
"name": "ConfigureTransports"
},
{
"name": "ConnectionError.Error"
},
{
"name": "ErrCode.String"
},
{
"name": "FrameHeader.String"
},
{
"name": "FrameType.String"
},
{
"name": "FrameWriteRequest.String"
},
{
"name": "Framer.ReadFrame"
},
{
"name": "Framer.WriteContinuation"
},
{
"name": "Framer.WriteData"
},
{
"name": "Framer.WriteDataPadded"
},
{
"name": "Framer.WriteGoAway"
},
{
"name": "Framer.WriteHeaders"
},
{
"name": "Framer.WritePing"
},
{
"name": "Framer.WritePriority"
},
{
"name": "Framer.WritePushPromise"
},
{
"name": "Framer.WriteRSTStream"
},
{
"name": "Framer.WriteRawFrame"
},
{
"name": "Framer.WriteSettings"
},
{
"name": "Framer.WriteSettingsAck"
},
{
"name": "Framer.WriteWindowUpdate"
},
{
"name": "GoAwayError.Error"
},
{
"name": "ReadFrameHeader"
},
{
"name": "Setting.String"
},
{
"name": "SettingID.String"
},
{
"name": "SettingsFrame.ForeachSetting"
},
{
"name": "StreamError.Error"
},
{
"name": "Transport.CloseIdleConnections"
},
{
"name": "Transport.NewClientConn"
},
{
"name": "Transport.RoundTripOpt"
},
{
"name": "bufferedWriter.Flush"
},
{
"name": "bufferedWriter.Write"
},
{
"name": "chunkWriter.Write"
},
{
"name": "clientConnPool.GetClientConn"
},
{
"name": "connError.Error"
},
{
"name": "dataBuffer.Read"
},
{
"name": "duplicatePseudoHeaderError.Error"
},
{
"name": "gzipReader.Close"
},
{
"name": "gzipReader.Read"
},
{
"name": "headerFieldNameError.Error"
},
{
"name": "headerFieldValueError.Error"
},
{
"name": "noDialClientConnPool.GetClientConn"
},
{
"name": "noDialH2RoundTripper.RoundTrip"
},
{
"name": "pipe.Read"
},
{
"name": "priorityWriteScheduler.CloseStream"
},
{
"name": "priorityWriteScheduler.OpenStream"
},
{
"name": "pseudoHeaderError.Error"
},
{
"name": "requestBody.Close"
},
{
"name": "requestBody.Read"
},
{
"name": "responseWriter.Flush"
},
{
"name": "responseWriter.FlushError"
},
{
"name": "responseWriter.Push"
},
{
"name": "responseWriter.SetReadDeadline"
},
{
"name": "responseWriter.SetWriteDeadline"
},
{
"name": "responseWriter.Write"
},
{
"name": "responseWriter.WriteHeader"
},
{
"name": "responseWriter.WriteString"
},
{
"name": "serverConn.CloseConn"
},
{
"name": "serverConn.Flush"
},
{
"name": "stickyErrWriter.Write"
},
{
"name": "transportResponseBody.Close"
},
{
"name": "transportResponseBody.Read"
},
{
"name": "writeData.String"
}
],
"defaultStatus": "unaffected"
},
{
"vendor": "golang.org/x/net",
"product": "golang.org/x/net/http2/hpack",
"collectionURL": "https://pkg.go.dev",
"packageName": "golang.org/x/net/http2/hpack",
"versions": [
{
"version": "0",
"lessThan": "0.7.0",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "Decoder.parseFieldLiteral"
},
{
"name": "Decoder.readString"
},
{
"name": "Decoder.DecodeFull"
},
{
"name": "Decoder.Write"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE 400: Uncontrolled Resource Consumption"
}
]
}
],
"references": [
{
"url": "https://go.dev/issue/57855"
},
{
"url": "https://go.dev/cl/468135"
},
{
"url": "https://go.dev/cl/468295"
},
{
"url": "https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E"
},
{
"url": "https://pkg.go.dev/vuln/GO-2023-1571"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4MA5XS5DAOJ5PKKNG5TUXKPQOFHT5VBC/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RLBQ3A7ROLEQXQLXFDLNJ7MYPKG5GULE/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGW7GE2Z32ZT47UFAQFDRQE33B7Q7LMT/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XX3IMUTZKRQ73PBZM4E2JP4BKYH4C6XE/"
},
{
"url": "https://www.couchbase.com/alerts/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4BUK2ZIAGCULOOYDNH25JPU6JBES5NF2/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7N5GV4CHH6WAGX3GFMDD3COEOVCZ4RI/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/REMHVVIBDNKSRKNOTV7EQSB7CYQWOUOU/"
},
{
"url": "https://security.gentoo.org/glsa/202311-09"
}
],
"credits": [
{
"lang": "en",
"value": "Philippe Antoine (Catena cyber)"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2023-1621.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2023-24532"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Incorrect calculation on P256 curves in crypto/internal/nistec",
"descriptions": [
{
"lang": "en",
"value": "The ScalarMult and ScalarBaseMult methods of the P256 Curve may return an incorrect result if called with some specific unreduced scalars (a scalar larger than the order of the curve). This does not impact usages of crypto/ecdsa or crypto/ecdh."
}
],
"affected": [
{
"vendor": "Go standard library",
"product": "crypto/internal/nistec",
"collectionURL": "https://pkg.go.dev",
"packageName": "crypto/internal/nistec",
"versions": [
{
"version": "0",
"lessThan": "1.19.7",
"status": "affected",
"versionType": "semver"
},
{
"version": "1.20.0-0",
"lessThan": "1.20.2",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "P256Point.ScalarBaseMult"
},
{
"name": "P256Point.ScalarMult"
},
{
"name": "P256OrdInverse"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-682: Incorrect Calculation"
}
]
}
],
"references": [
{
"url": "https://go.dev/issue/58647"
},
{
"url": "https://go.dev/cl/471255"
},
{
"url": "https://groups.google.com/g/golang-announce/c/3-TpUx48iQY"
},
{
"url": "https://pkg.go.dev/vuln/GO-2023-1621"
}
],
"credits": [
{
"lang": "en",
"value": "Guido Vranken, via the Ethereum Foundation bug bounty program"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2023-1752.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2023-24540"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Improper handling of JavaScript whitespace in html/template",
"descriptions": [
{
"lang": "en",
"value": "Not all valid JavaScript whitespace characters are considered to be whitespace. Templates containing whitespace characters outside of the character set \"\\t\\n\\f\\r\\u0020\\u2028\\u2029\" in JavaScript contexts that also contain actions may not be properly sanitized during execution."
}
],
"affected": [
{
"vendor": "Go standard library",
"product": "html/template",
"collectionURL": "https://pkg.go.dev",
"packageName": "html/template",
"versions": [
{
"version": "0",
"lessThan": "1.19.9",
"status": "affected",
"versionType": "semver"
},
{
"version": "1.20.0-0",
"lessThan": "1.20.4",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "nextJSCtx"
},
{
"name": "Template.Execute"
},
{
"name": "Template.ExecuteTemplate"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-74: Improper input validation"
}
]
}
],
"references": [
{
"url": "https://go.dev/issue/59721"
},
{
"url": "https://go.dev/cl/491616"
},
{
"url": "https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU"
},
{
"url": "https://pkg.go.dev/vuln/GO-2023-1752"
}
],
"credits": [
{
"lang": "en",
"value": "Juho Nurminen of Mattermost"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2024-2961.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2022-30636"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Limited directory traversal vulnerability on Windows in golang.org/x/crypto",
"descriptions": [
{
"lang": "en",
"value": "httpTokenCacheKey uses path.Base to extract the expected HTTP-01 token value to lookup in the DirCache implementation. On Windows, path.Base acts differently to filepath.Base, since Windows uses a different path separator (\\ vs. /), allowing a user to provide a relative path, i.e. .well-known/acme-challenge/..\\..\\asd becomes ..\\..\\asd. The extracted path is then suffixed with +http-01, joined with the cache directory, and opened. Since the controlled path is suffixed with +http-01 before opening, the impact of this is significantly limited, since it only allows reading arbitrary files on the system if and only if they have this suffix."
}
],
"affected": [
{
"vendor": "golang.org/x/crypto",
"product": "golang.org/x/crypto/acme/autocert",
"collectionURL": "https://pkg.go.dev",
"packageName": "golang.org/x/crypto/acme/autocert",
"versions": [
{
"version": "0",
"lessThan": "0.0.0-20220525230936-793ad666bf5e",
"status": "affected",
"versionType": "semver"
}
],
"platforms": [
"windows"
],
"programRoutines": [
{
"name": "DirCache.Get"
},
{
"name": "DirCache.Put"
},
{
"name": "DirCache.Delete"
},
{
"name": "HostWhitelist"
},
{
"name": "Manager.GetCertificate"
},
{
"name": "Manager.Listener"
},
{
"name": "NewListener"
},
{
"name": "listener.Accept"
},
{
"name": "listener.Close"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE 22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')"
}
]
}
],
"references": [
{
"url": "https://go.dev/cl/408694"
},
{
"url": "https://go.dev/issue/53082"
},
{
"url": "https://pkg.go.dev/vuln/GO-2024-2961"
}
],
"credits": [
{
"lang": "en",
"value": "Juho Nurminen of Mattermost"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2022-0972.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2022-41719"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Panic in github.com/shamaton/msgpack/v2",
"descriptions": [
{
"lang": "en",
"value": "Unmarshal can panic on some inputs, possibly allowing for denial of service attacks."
}
],
"affected": [
{
"vendor": "github.com/shamaton/msgpack/v2",
"product": "github.com/shamaton/msgpack/v2",
"collectionURL": "https://pkg.go.dev",
"packageName": "github.com/shamaton/msgpack/v2",
"versions": [
{
"version": "0",
"lessThan": "2.1.1",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "Unmarshal"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE 400: Uncontrolled Resource Consumption"
}
]
}
],
"references": [
{
"url": "https://github.com/shamaton/msgpack/issues/31"
},
{
"url": "https://github.com/shamaton/msgpack/pull/32"
},
{
"url": "https://pkg.go.dev/vuln/GO-2022-0972"
}
],
"credits": [
{
"lang": "en",
"value": "Red Canary"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2023-2186.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2023-45284"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Incorrect detection of reserved device names on Windows in path/filepath",
"descriptions": [
{
"lang": "en",
"value": "On Windows, The IsLocal function does not correctly detect reserved device names in some cases. Reserved names followed by spaces, such as \"COM1 \", and reserved names \"COM\" and \"LPT\" followed by superscript 1, 2, or 3, are incorrectly reported as local. With fix, IsLocal now correctly reports these names as non-local."
}
],
"affected": [
{
"vendor": "Go standard library",
"product": "path/filepath",
"collectionURL": "https://pkg.go.dev",
"packageName": "path/filepath",
"versions": [
{
"version": "0",
"lessThan": "1.20.11",
"status": "affected",
"versionType": "semver"
},
{
"version": "1.21.0-0",
"lessThan": "1.21.4",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "IsLocal"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-41: Improper Resolution of Path Equivalence"
}
]
}
],
"references": [
{
"url": "https://go.dev/issue/63713"
},
{
"url": "https://go.dev/cl/540277"
},
{
"url": "https://groups.google.com/g/golang-announce/c/4tU8LZfBFkY"
},
{
"url": "https://pkg.go.dev/vuln/GO-2023-2186"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2020-0033.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2020-36559"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Path Traversal in aahframe.work",
"descriptions": [
{
"lang": "en",
"value": "Due to improper sanitization of user input, HTTPEngine.Handle allows for directory traversal, allowing an attacker to read files outside of the target directory that the server has permission to read."
}
],
"affected": [
{
"vendor": "aahframe.work",
"product": "aahframe.work",
"collectionURL": "https://pkg.go.dev",
"packageName": "aahframe.work",
"versions": [
{
"version": "0",
"lessThan": "0.12.4",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "HTTPEngine.Handle"
},
{
"name": "Application.Run"
},
{
"name": "Application.ServeHTTP"
},
{
"name": "Application.Start"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE 23: Relative Path Traversal"
}
]
}
],
"references": [
{
"url": "https://github.com/go-aah/aah/pull/267"
},
{
"url": "https://github.com/go-aah/aah/commit/881dc9f71d1f7a4e8a9a39df9c5c081d3a2da1ec"
},
{
"url": "https://github.com/go-aah/aah/issues/266"
},
{
"url": "https://pkg.go.dev/vuln/GO-2020-0033"
}
],
"credits": [
{
"lang": "en",
"value": "@snyff"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2022-0520.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2022-32148"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Exposure of client IP addresses in net/http",
"descriptions": [
{
"lang": "en",
"value": "Improper exposure of client IP addresses in net/http before Go 1.17.12 and Go 1.18.4 can be triggered by calling httputil.ReverseProxy.ServeHTTP with a Request.Header map containing a nil value for the X-Forwarded-For header, which causes ReverseProxy to set the client IP as the value of the X-Forwarded-For header."
}
],
"affected": [
{
"vendor": "Go standard library",
"product": "net/http",
"collectionURL": "https://pkg.go.dev",
"packageName": "net/http",
"versions": [
{
"version": "0",
"lessThan": "1.17.12",
"status": "affected",
"versionType": "semver"
},
{
"version": "1.18.0-0",
"lessThan": "1.18.4",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "Header.Clone"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-200: Information Exposure"
}
]
}
],
"references": [
{
"url": "https://go.dev/cl/412857"
},
{
"url": "https://go.googlesource.com/go/+/b2cc0fecc2ccd80e6d5d16542cc684f97b3a9c8a"
},
{
"url": "https://go.dev/issue/53423"
},
{
"url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE"
},
{
"url": "https://pkg.go.dev/vuln/GO-2022-0520"
}
],
"credits": [
{
"lang": "en",
"value": "Christian Mehlmauer"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2022-1039.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2022-41715"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Memory exhaustion when compiling regular expressions in regexp/syntax",
"descriptions": [
{
"lang": "en",
"value": "Programs which compile regular expressions from untrusted sources may be vulnerable to memory exhaustion or denial of service. The parsed regexp representation is linear in the size of the input, but in some cases the constant factor can be as high as 40,000, making relatively small regexps consume much larger amounts of memory. After fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Normal use of regular expressions is unaffected."
}
],
"affected": [
{
"vendor": "Go standard library",
"product": "regexp/syntax",
"collectionURL": "https://pkg.go.dev",
"packageName": "regexp/syntax",
"versions": [
{
"version": "0",
"lessThan": "1.18.7",
"status": "affected",
"versionType": "semver"
},
{
"version": "1.19.0-0",
"lessThan": "1.19.2",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "parser.push"
},
{
"name": "parser.repeat"
},
{
"name": "parser.factor"
},
{
"name": "parse"
},
{
"name": "Parse"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE 400: Uncontrolled Resource Consumption"
}
]
}
],
"references": [
{
"url": "https://go.dev/issue/55949"
},
{
"url": "https://go.dev/cl/439356"
},
{
"url": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU"
},
{
"url": "https://pkg.go.dev/vuln/GO-2022-1039"
},
{
"url": "https://security.gentoo.org/glsa/202311-09"
}
],
"credits": [
{
"lang": "en",
"value": "Adam Korczynski (ADA Logics)"
},
{
"lang": "en",
"value": "OSS-Fuzz"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2023-1704.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2023-24534"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Excessive memory allocation in net/http and net/textproto",
"descriptions": [
{
"lang": "en",
"value": "HTTP and MIME header parsing can allocate large amounts of memory, even when parsing small inputs, potentially leading to a denial of service. Certain unusual patterns of input data can cause the common function used to parse HTTP and MIME headers to allocate substantially more memory than required to hold the parsed headers. An attacker can exploit this behavior to cause an HTTP server to allocate large amounts of memory from a small request, potentially leading to memory exhaustion and a denial of service. With fix, header parsing now correctly allocates only the memory required to hold parsed headers."
}
],
"affected": [
{
"vendor": "Go standard library",
"product": "net/textproto",
"collectionURL": "https://pkg.go.dev",
"packageName": "net/textproto",
"versions": [
{
"version": "0",
"lessThan": "1.19.8",
"status": "affected",
"versionType": "semver"
},
{
"version": "1.20.0-0",
"lessThan": "1.20.3",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "readMIMEHeader"
},
{
"name": "Reader.upcomingHeaderNewlines"
},
{
"name": "Reader.ReadMIMEHeader"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-400: Uncontrolled Resource Consumption"
}
]
}
],
"references": [
{
"url": "https://go.dev/issue/58975"
},
{
"url": "https://go.dev/cl/481994"
},
{
"url": "https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8"
},
{
"url": "https://pkg.go.dev/vuln/GO-2023-1704"
},
{
"url": "https://security.netapp.com/advisory/ntap-20230526-0007/"
},
{
"url": "https://security.gentoo.org/glsa/202311-09"
}
],
"credits": [
{
"lang": "en",
"value": "Jakob Ackermann (@das7pad)"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2023-1751.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2023-24539"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Improper sanitization of CSS values in html/template",
"descriptions": [
{
"lang": "en",
"value": "Angle brackets (\u003c\u003e) are not considered dangerous characters when inserted into CSS contexts. Templates containing multiple actions separated by a '/' character can result in unexpectedly closing the CSS context and allowing for injection of unexpected HTML, if executed with untrusted input."
}
],
"affected": [
{
"vendor": "Go standard library",
"product": "html/template",
"collectionURL": "https://pkg.go.dev",
"packageName": "html/template",
"versions": [
{
"version": "0",
"lessThan": "1.19.9",
"status": "affected",
"versionType": "semver"
},
{
"version": "1.20.0-0",
"lessThan": "1.20.4",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "cssValueFilter"
},
{
"name": "escaper.commit"
},
{
"name": "Template.Execute"
},
{
"name": "Template.ExecuteTemplate"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-74: Improper input validation"
}
]
}
],
"references": [
{
"url": "https://go.dev/issue/59720"
},
{
"url": "https://go.dev/cl/491615"
},
{
"url": "https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU"
},
{
"url": "https://pkg.go.dev/vuln/GO-2023-1751"
}
],
"credits": [
{
"lang": "en",
"value": "Juho Nurminen of Mattermost"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2024-2687.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2023-45288"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "HTTP/2 CONTINUATION flood in net/http",
"descriptions": [
{
"lang": "en",
"value": "An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection."
}
],
"affected": [
{
"vendor": "Go standard library",
"product": "net/http",
"collectionURL": "https://pkg.go.dev",
"packageName": "net/http",
"versions": [
{
"version": "0",
"lessThan": "1.21.9",
"status": "affected",
"versionType": "semver"
},
{
"version": "1.22.0-0",
"lessThan": "1.22.2",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "http2Framer.readMetaFrame"
},
{
"name": "CanonicalHeaderKey"
},
{
"name": "Client.CloseIdleConnections"
},
{
"name": "Client.Do"
},
{
"name": "Client.Get"
},
{
"name": "Client.Head"
},
{
"name": "Client.Post"
},
{
"name": "Client.PostForm"
},
{
"name": "Cookie.String"
},
{
"name": "Cookie.Valid"
},
{
"name": "Dir.Open"
},
{
"name": "Error"
},
{
"name": "Get"
},
{
"name": "HandlerFunc.ServeHTTP"
},
{
"name": "Head"
},
{
"name": "Header.Add"
},
{
"name": "Header.Del"
},
{
"name": "Header.Get"
},
{
"name": "Header.Set"
},
{
"name": "Header.Values"
},
{
"name": "Header.Write"
},
{
"name": "Header.WriteSubset"
},
{
"name": "ListenAndServe"
},
{
"name": "ListenAndServeTLS"
},
{
"name": "NewRequest"
},
{
"name": "NewRequestWithContext"
},
{
"name": "NotFound"
},
{
"name": "ParseTime"
},
{
"name": "Post"
},
{
"name": "PostForm"
},
{
"name": "ProxyFromEnvironment"
},
{
"name": "ReadRequest"
},
{
"name": "ReadResponse"
},
{
"name": "Redirect"
},
{
"name": "Request.AddCookie"
},
{
"name": "Request.BasicAuth"
},
{
"name": "Request.FormFile"
},
{
"name": "Request.FormValue"
},
{
"name": "Request.MultipartReader"
},
{
"name": "Request.ParseForm"
},
{
"name": "Request.ParseMultipartForm"
},
{
"name": "Request.PostFormValue"
},
{
"name": "Request.Referer"
},
{
"name": "Request.SetBasicAuth"
},
{
"name": "Request.UserAgent"
},
{
"name": "Request.Write"
},
{
"name": "Request.WriteProxy"
},
{
"name": "Response.Cookies"
},
{
"name": "Response.Location"
},
{
"name": "Response.Write"
},
{
"name": "ResponseController.EnableFullDuplex"
},
{
"name": "ResponseController.Flush"
},
{
"name": "ResponseController.Hijack"
},
{
"name": "ResponseController.SetReadDeadline"
},
{
"name": "ResponseController.SetWriteDeadline"
},
{
"name": "Serve"
},
{
"name": "ServeContent"
},
{
"name": "ServeFile"
},
{
"name": "ServeMux.ServeHTTP"
},
{
"name": "ServeTLS"
},
{
"name": "Server.Close"
},
{
"name": "Server.ListenAndServe"
},
{
"name": "Server.ListenAndServeTLS"
},
{
"name": "Server.Serve"
},
{
"name": "Server.ServeTLS"
},
{
"name": "Server.SetKeepAlivesEnabled"
},
{
"name": "Server.Shutdown"
},
{
"name": "SetCookie"
},
{
"name": "Transport.CancelRequest"
},
{
"name": "Transport.Clone"
},
{
"name": "Transport.CloseIdleConnections"
},
{
"name": "Transport.RoundTrip"
},
{
"name": "body.Close"
},
{
"name": "body.Read"
},
{
"name": "bodyEOFSignal.Close"
},
{
"name": "bodyEOFSignal.Read"
},
{
"name": "bodyLocked.Read"
},
{
"name": "bufioFlushWriter.Write"
},
{
"name": "cancelTimerBody.Close"
},
{
"name": "cancelTimerBody.Read"
},
{
"name": "checkConnErrorWriter.Write"
},
{
"name": "chunkWriter.Write"
},
{
"name": "connReader.Read"
},
{
"name": "connectMethodKey.String"
},
{
"name": "expectContinueReader.Close"
},
{
"name": "expectContinueReader.Read"
},
{
"name": "extraHeader.Write"
},
{
"name": "fileHandler.ServeHTTP"
},
{
"name": "fileTransport.RoundTrip"
},
{
"name": "globalOptionsHandler.ServeHTTP"
},
{
"name": "gzipReader.Close"
},
{
"name": "gzipReader.Read"
},
{
"name": "http2ClientConn.Close"
},
{
"name": "http2ClientConn.Ping"
},
{
"name": "http2ClientConn.RoundTrip"
},
{
"name": "http2ClientConn.Shutdown"
},
{
"name": "http2ConnectionError.Error"
},
{
"name": "http2ErrCode.String"
},
{
"name": "http2FrameHeader.String"
},
{
"name": "http2FrameType.String"
},
{
"name": "http2FrameWriteRequest.String"
},
{
"name": "http2Framer.ReadFrame"
},
{
"name": "http2Framer.WriteContinuation"
},
{
"name": "http2Framer.WriteData"
},
{
"name": "http2Framer.WriteDataPadded"
},
{
"name": "http2Framer.WriteGoAway"
},
{
"name": "http2Framer.WriteHeaders"
},
{
"name": "http2Framer.WritePing"
},
{
"name": "http2Framer.WritePriority"
},
{
"name": "http2Framer.WritePushPromise"
},
{
"name": "http2Framer.WriteRSTStream"
},
{
"name": "http2Framer.WriteRawFrame"
},
{
"name": "http2Framer.WriteSettings"
},
{
"name": "http2Framer.WriteSettingsAck"
},
{
"name": "http2Framer.WriteWindowUpdate"
},
{
"name": "http2GoAwayError.Error"
},
{
"name": "http2Server.ServeConn"
},
{
"name": "http2Setting.String"
},
{
"name": "http2SettingID.String"
},
{
"name": "http2SettingsFrame.ForeachSetting"
},
{
"name": "http2StreamError.Error"
},
{
"name": "http2Transport.CloseIdleConnections"
},
{
"name": "http2Transport.NewClientConn"
},
{
"name": "http2Transport.RoundTrip"
},
{
"name": "http2Transport.RoundTripOpt"
},
{
"name": "http2bufferedWriter.Flush"
},
{
"name": "http2bufferedWriter.Write"
},
{
"name": "http2chunkWriter.Write"
},
{
"name": "http2clientConnPool.GetClientConn"
},
{
"name": "http2connError.Error"
},
{
"name": "http2dataBuffer.Read"
},
{
"name": "http2duplicatePseudoHeaderError.Error"
},
{
"name": "http2gzipReader.Close"
},
{
"name": "http2gzipReader.Read"
},
{
"name": "http2headerFieldNameError.Error"
},
{
"name": "http2headerFieldValueError.Error"
},
{
"name": "http2noDialClientConnPool.GetClientConn"
},
{
"name": "http2noDialH2RoundTripper.RoundTrip"
},
{
"name": "http2pipe.Read"
},
{
"name": "http2priorityWriteScheduler.CloseStream"
},
{
"name": "http2priorityWriteScheduler.OpenStream"
},
{
"name": "http2pseudoHeaderError.Error"
},
{
"name": "http2requestBody.Close"
},
{
"name": "http2requestBody.Read"
},
{
"name": "http2responseWriter.Flush"
},
{
"name": "http2responseWriter.FlushError"
},
{
"name": "http2responseWriter.Push"
},
{
"name": "http2responseWriter.SetReadDeadline"
},
{
"name": "http2responseWriter.SetWriteDeadline"
},
{
"name": "http2responseWriter.Write"
},
{
"name": "http2responseWriter.WriteHeader"
},
{
"name": "http2responseWriter.WriteString"
},
{
"name": "http2roundRobinWriteScheduler.OpenStream"
},
{
"name": "http2serverConn.CloseConn"
},
{
"name": "http2serverConn.Flush"
},
{
"name": "http2stickyErrWriter.Write"
},
{
"name": "http2transportResponseBody.Close"
},
{
"name": "http2transportResponseBody.Read"
},
{
"name": "http2writeData.String"
},
{
"name": "initALPNRequest.ServeHTTP"
},
{
"name": "loggingConn.Close"
},
{
"name": "loggingConn.Read"
},
{
"name": "loggingConn.Write"
},
{
"name": "maxBytesReader.Close"
},
{
"name": "maxBytesReader.Read"
},
{
"name": "onceCloseListener.Close"
},
{
"name": "persistConn.Read"
},
{
"name": "persistConnWriter.ReadFrom"
},
{
"name": "persistConnWriter.Write"
},
{
"name": "populateResponse.Write"
},
{
"name": "populateResponse.WriteHeader"
},
{
"name": "readTrackingBody.Close"
},
{
"name": "readTrackingBody.Read"
},
{
"name": "readWriteCloserBody.Read"
},
{
"name": "redirectHandler.ServeHTTP"
},
{
"name": "response.Flush"
},
{
"name": "response.FlushError"
},
{
"name": "response.Hijack"
},
{
"name": "response.ReadFrom"
},
{
"name": "response.Write"
},
{
"name": "response.WriteHeader"
},
{
"name": "response.WriteString"
},
{
"name": "serverHandler.ServeHTTP"
},
{
"name": "socksDialer.DialWithConn"
},
{
"name": "socksUsernamePassword.Authenticate"
},
{
"name": "stringWriter.WriteString"
},
{
"name": "timeoutHandler.ServeHTTP"
},
{
"name": "timeoutWriter.Write"
},
{
"name": "timeoutWriter.WriteHeader"
},
{
"name": "transportReadFromServerError.Error"
}
],
"defaultStatus": "unaffected"
},
{
"vendor": "golang.org/x/net",
"product": "golang.org/x/net/http2",
"collectionURL": "https://pkg.go.dev",
"packageName": "golang.org/x/net/http2",
"versions": [
{
"version": "0",
"lessThan": "0.23.0",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "Framer.readMetaFrame"
},
{
"name": "ClientConn.Close"
},
{
"name": "ClientConn.Ping"
},
{
"name": "ClientConn.RoundTrip"
},
{
"name": "ClientConn.Shutdown"
},
{
"name": "ConfigureServer"
},
{
"name": "ConfigureTransport"
},
{
"name": "ConfigureTransports"
},
{
"name": "ConnectionError.Error"
},
{
"name": "ErrCode.String"
},
{
"name": "FrameHeader.String"
},
{
"name": "FrameType.String"
},
{
"name": "FrameWriteRequest.String"
},
{
"name": "Framer.ReadFrame"
},
{
"name": "Framer.WriteContinuation"
},
{
"name": "Framer.WriteData"
},
{
"name": "Framer.WriteDataPadded"
},
{
"name": "Framer.WriteGoAway"
},
{
"name": "Framer.WriteHeaders"
},
{
"name": "Framer.WritePing"
},
{
"name": "Framer.WritePriority"
},
{
"name": "Framer.WritePushPromise"
},
{
"name": "Framer.WriteRSTStream"
},
{
"name": "Framer.WriteRawFrame"
},
{
"name": "Framer.WriteSettings"
},
{
"name": "Framer.WriteSettingsAck"
},
{
"name": "Framer.WriteWindowUpdate"
},
{
"name": "GoAwayError.Error"
},
{
"name": "ReadFrameHeader"
},
{
"name": "Server.ServeConn"
},
{
"name": "Setting.String"
},
{
"name": "SettingID.String"
},
{
"name": "SettingsFrame.ForeachSetting"
},
{
"name": "StreamError.Error"
},
{
"name": "Transport.CloseIdleConnections"
},
{
"name": "Transport.NewClientConn"
},
{
"name": "Transport.RoundTrip"
},
{
"name": "Transport.RoundTripOpt"
},
{
"name": "bufferedWriter.Flush"
},
{
"name": "bufferedWriter.Write"
},
{
"name": "chunkWriter.Write"
},
{
"name": "clientConnPool.GetClientConn"
},
{
"name": "connError.Error"
},
{
"name": "dataBuffer.Read"
},
{
"name": "duplicatePseudoHeaderError.Error"
},
{
"name": "gzipReader.Close"
},
{
"name": "gzipReader.Read"
},
{
"name": "headerFieldNameError.Error"
},
{
"name": "headerFieldValueError.Error"
},
{
"name": "noDialClientConnPool.GetClientConn"
},
{
"name": "noDialH2RoundTripper.RoundTrip"
},
{
"name": "pipe.Read"
},
{
"name": "priorityWriteScheduler.CloseStream"
},
{
"name": "priorityWriteScheduler.OpenStream"
},
{
"name": "pseudoHeaderError.Error"
},
{
"name": "requestBody.Close"
},
{
"name": "requestBody.Read"
},
{
"name": "responseWriter.Flush"
},
{
"name": "responseWriter.FlushError"
},
{
"name": "responseWriter.Push"
},
{
"name": "responseWriter.SetReadDeadline"
},
{
"name": "responseWriter.SetWriteDeadline"
},
{
"name": "responseWriter.Write"
},
{
"name": "responseWriter.WriteHeader"
},
{
"name": "responseWriter.WriteString"
},
{
"name": "roundRobinWriteScheduler.OpenStream"
},
{
"name": "serverConn.CloseConn"
},
{
"name": "serverConn.Flush"
},
{
"name": "stickyErrWriter.Write"
},
{
"name": "transportResponseBody.Close"
},
{
"name": "transportResponseBody.Read"
},
{
"name": "writeData.String"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-400: Uncontrolled Resource Consumption"
}
]
}
],
"references": [
{
"url": "https://go.dev/issue/65051"
},
{
"url": "https://go.dev/cl/576155"
},
{
"url": "https://groups.google.com/g/golang-announce/c/YgW0sx8mN3M"
},
{
"url": "https://pkg.go.dev/vuln/GO-2024-2687"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240419-0009/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QRYFHIQ6XRKRYBI2F5UESH67BJBQXUPT/"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/05/4"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/03/16"
}
],
"credits": [
{
"lang": "en",
"value": "Bartek Nowotarski (https://nowotarski.info/)"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2022-0979.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2022-3346"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Incorrect DNSSEC validation due to unchecked owner names in github.com/peterzen/goresolver",
"descriptions": [
{
"lang": "en",
"value": "DNSSEC validation is not performed correctly. An attacker can cause this package to report successful validation for invalid, attacker-controlled records. The owner name of RRSIG RRs is not validated, permitting an attacker to present the RRSIG for an attacker-controlled domain in a response for any other domain."
}
],
"affected": [
{
"vendor": "github.com/peterzen/goresolver",
"product": "github.com/peterzen/goresolver",
"collectionURL": "https://pkg.go.dev",
"packageName": "github.com/peterzen/goresolver",
"defaultStatus": "affected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE 347: Improper Verification of Cryptographic Signature"
}
]
}
],
"references": [
{
"url": "https://github.com/peterzen/goresolver/issues/5"
},
{
"url": "https://pkg.go.dev/vuln/GO-2022-0979"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2023-1753.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2023-29400"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Improper handling of empty HTML attributes in html/template",
"descriptions": [
{
"lang": "en",
"value": "Templates containing actions in unquoted HTML attributes (e.g. \"attr={{.}}\") executed with empty input can result in output with unexpected results when parsed due to HTML normalization rules. This may allow injection of arbitrary attributes into tags."
}
],
"affected": [
{
"vendor": "Go standard library",
"product": "html/template",
"collectionURL": "https://pkg.go.dev",
"packageName": "html/template",
"versions": [
{
"version": "0",
"lessThan": "1.19.9",
"status": "affected",
"versionType": "semver"
},
{
"version": "1.20.0-0",
"lessThan": "1.20.4",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "appendCmd"
},
{
"name": "htmlNospaceEscaper"
},
{
"name": "Template.Execute"
},
{
"name": "Template.ExecuteTemplate"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-74: Improper input validation"
}
]
}
],
"references": [
{
"url": "https://go.dev/issue/59722"
},
{
"url": "https://go.dev/cl/491617"
},
{
"url": "https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU"
},
{
"url": "https://pkg.go.dev/vuln/GO-2023-1753"
}
],
"credits": [
{
"lang": "en",
"value": "Juho Nurminen of Mattermost"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2022-0521.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2022-28131"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Stack exhaustion from deeply nested XML documents in encoding/xml",
"descriptions": [
{
"lang": "en",
"value": "Uncontrolled recursion in Decoder.Skip in encoding/xml before Go 1.17.12 and Go 1.18.4 allows an attacker to cause a panic due to stack exhaustion via a deeply nested XML document."
}
],
"affected": [
{
"vendor": "Go standard library",
"product": "encoding/xml",
"collectionURL": "https://pkg.go.dev",
"packageName": "encoding/xml",
"versions": [
{
"version": "0",
"lessThan": "1.17.12",
"status": "affected",
"versionType": "semver"
},
{
"version": "1.18.0-0",
"lessThan": "1.18.4",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "Decoder.Skip"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-674: Uncontrolled Recursion"
}
]
}
],
"references": [
{
"url": "https://go.dev/cl/417062"
},
{
"url": "https://go.googlesource.com/go/+/08c46ed43d80bbb67cb904944ea3417989be4af3"
},
{
"url": "https://go.dev/issue/53614"
},
{
"url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE"
},
{
"url": "https://pkg.go.dev/vuln/GO-2022-0521"
}
],
"credits": [
{
"lang": "en",
"value": "Go Security Team"
},
{
"lang": "en",
"value": "Juho Nurminen of Mattermost"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2022-0525.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2022-1705"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Improper sanitization of Transfer-Encoding headers in net/http",
"descriptions": [
{
"lang": "en",
"value": "Acceptance of some invalid Transfer-Encoding headers in the HTTP/1 client in net/http before Go 1.17.12 and Go 1.18.4 allows HTTP request smuggling if combined with an intermediate server that also improperly fails to reject the header as invalid."
}
],
"affected": [
{
"vendor": "Go standard library",
"product": "net/http",
"collectionURL": "https://pkg.go.dev",
"packageName": "net/http",
"versions": [
{
"version": "0",
"lessThan": "1.17.12",
"status": "affected",
"versionType": "semver"
},
{
"version": "1.18.0-0",
"lessThan": "1.18.4",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "transferReader.parseTransferEncoding"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')"
}
]
}
],
"references": [
{
"url": "https://go.dev/cl/409874"
},
{
"url": "https://go.googlesource.com/go/+/e5017a93fcde94f09836200bca55324af037ee5f"
},
{
"url": "https://go.dev/issue/53188"
},
{
"url": "https://go.dev/cl/410714"
},
{
"url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE"
},
{
"url": "https://pkg.go.dev/vuln/GO-2022-0525"
}
],
"credits": [
{
"lang": "en",
"value": "Zeyu Zhang (https://www.zeyu2001.com/)"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2022-0533.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2022-29804"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Path traversal via Clean on Windows in path/filepath",
"descriptions": [
{
"lang": "en",
"value": "Incorrect conversion of certain invalid paths to valid, absolute paths in Clean in path/filepath before Go 1.17.11 and Go 1.18.3 on Windows allows potential directory traversal attack."
}
],
"affected": [
{
"vendor": "Go standard library",
"product": "path/filepath",
"collectionURL": "https://pkg.go.dev",
"packageName": "path/filepath",
"versions": [
{
"version": "0",
"lessThan": "1.17.11",
"status": "affected",
"versionType": "semver"
},
{
"version": "1.18.0-0",
"lessThan": "1.18.3",
"status": "affected",
"versionType": "semver"
}
],
"platforms": [
"windows"
],
"programRoutines": [
{
"name": "Clean"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')"
}
]
}
],
"references": [
{
"url": "https://go.dev/cl/401595"
},
{
"url": "https://go.googlesource.com/go/+/9cd1818a7d019c02fa4898b3e45a323e35033290"
},
{
"url": "https://go.dev/issue/52476"
},
{
"url": "https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg/m/IWz5T6x7AAAJ"
},
{
"url": "https://pkg.go.dev/vuln/GO-2022-0533"
}
],
"credits": [
{
"lang": "en",
"value": "Unrud"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2022-0515.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2022-1962"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Stack exhaustion due to deeply nested types in go/parser",
"descriptions": [
{
"lang": "en",
"value": "Uncontrolled recursion in the Parse functions in go/parser before Go 1.17.12 and Go 1.18.4 allow an attacker to cause a panic due to stack exhaustion via deeply nested types or declarations."
}
],
"affected": [
{
"vendor": "Go standard library",
"product": "go/parser",
"collectionURL": "https://pkg.go.dev",
"packageName": "go/parser",
"versions": [
{
"version": "0",
"lessThan": "1.17.12",
"status": "affected",
"versionType": "semver"
},
{
"version": "1.18.0-0",
"lessThan": "1.18.4",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "ParseFile"
},
{
"name": "ParseExprFrom"
},
{
"name": "parser.tryIdentOrType"
},
{
"name": "parser.parsePrimaryExpr"
},
{
"name": "parser.parseUnaryExpr"
},
{
"name": "parser.parseBinaryExpr"
},
{
"name": "parser.parseIfStmt"
},
{
"name": "parser.parseStmt"
},
{
"name": "resolver.openScope"
},
{
"name": "resolver.closeScope"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-674: Uncontrolled Recursion"
}
]
}
],
"references": [
{
"url": "https://go.dev/cl/417063"
},
{
"url": "https://go.googlesource.com/go/+/695be961d57508da5a82217f7415200a11845879"
},
{
"url": "https://go.dev/issue/53616"
},
{
"url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE"
},
{
"url": "https://pkg.go.dev/vuln/GO-2022-0515"
}
],
"credits": [
{
"lang": "en",
"value": "Juho Nurminen of Mattermost"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2023-2041.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2023-39318"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Improper handling of HTML-like comments in script contexts in html/template",
"descriptions": [
{
"lang": "en",
"value": "The html/template package does not properly handle HTML-like \"\" comment tokens, nor hashbang \"#!\" comment tokens, in \u003cscript\u003e contexts. This may cause the template parser to improperly interpret the contents of \u003cscript\u003e contexts, causing actions to be improperly escaped. This may be leveraged to perform an XSS attack."
}
],
"affected": [
{
"vendor": "Go standard library",
"product": "html/template",
"collectionURL": "https://pkg.go.dev",
"packageName": "html/template",
"versions": [
{
"version": "0",
"lessThan": "1.20.8",
"status": "affected",
"versionType": "semver"
},
{
"version": "1.21.0-0",
"lessThan": "1.21.1",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "isComment"
},
{
"name": "escaper.escapeText"
},
{
"name": "tJS"
},
{
"name": "tLineCmt"
},
{
"name": "Template.Execute"
},
{
"name": "Template.ExecuteTemplate"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')"
}
]
}
],
"references": [
{
"url": "https://go.dev/issue/62196"
},
{
"url": "https://go.dev/cl/526156"
},
{
"url": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ"
},
{
"url": "https://pkg.go.dev/vuln/GO-2023-2041"
},
{
"url": "https://security.netapp.com/advisory/ntap-20231020-0009/"
},
{
"url": "https://security.gentoo.org/glsa/202311-09"
}
],
"credits": [
{
"lang": "en",
"value": "Takeshi Kaneko (GMO Cybersecurity by Ierae, Inc.)"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2020-0045.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2016-15005"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Cryptographically weak random number generation in github.com/dinever/golf",
"descriptions": [
{
"lang": "en",
"value": "CSRF tokens are generated using math/rand, which is not a cryptographically secure random number generator, allowing an attacker to predict values and bypass CSRF protections with relatively few requests."
}
],
"affected": [
{
"vendor": "github.com/dinever/golf",
"product": "github.com/dinever/golf",
"collectionURL": "https://pkg.go.dev",
"packageName": "github.com/dinever/golf",
"versions": [
{
"version": "0",
"lessThan": "0.3.0",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "randomBytes"
},
{
"name": "Context.Render"
},
{
"name": "Context.RenderFromString"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE 338: Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)"
}
]
}
],
"references": [
{
"url": "https://github.com/dinever/golf/pull/24"
},
{
"url": "https://github.com/dinever/golf/commit/3776f338be48b5bc5e8cf9faff7851fc52a3f1fe"
},
{
"url": "https://github.com/dinever/golf/issues/20"
},
{
"url": "https://pkg.go.dev/vuln/GO-2020-0045"
}
],
"credits": [
{
"lang": "en",
"value": "@elithrar"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2024-2888.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2024-24789"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Mishandling of corrupt central directory record in archive/zip",
"descriptions": [
{
"lang": "en",
"value": "The archive/zip package's handling of certain types of invalid zip files differs from the behavior of most zip implementations. This misalignment could be exploited to create an zip file with contents that vary depending on the implementation reading the file. The archive/zip package now rejects files containing these errors."
}
],
"affected": [
{
"vendor": "Go standard library",
"product": "archive/zip",
"collectionURL": "https://pkg.go.dev",
"packageName": "archive/zip",
"versions": [
{
"version": "0",
"lessThan": "1.21.11",
"status": "affected",
"versionType": "semver"
},
{
"version": "1.22.0-0",
"lessThan": "1.22.4",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "findSignatureInBlock"
},
{
"name": "NewReader"
},
{
"name": "OpenReader"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-390: Detection of Error Condition Without Action"
}
]
}
],
"references": [
{
"url": "https://go.dev/cl/585397"
},
{
"url": "https://go.dev/issue/66869"
},
{
"url": "https://groups.google.com/g/golang-announce/c/XbxouI9gY7k/m/TuoGEhxIEwAJ"
},
{
"url": "https://pkg.go.dev/vuln/GO-2024-2888"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/06/04/1"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U5YAEIA6IUHUNGJ7AIXXPQT6D2GYENX7/"
}
],
"credits": [
{
"lang": "en",
"value": "Yufan You (@ouuan)"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2020-0004.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2020-36569"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Authentication bypass in github.com/nanobox-io/golang-nanoauth",
"descriptions": [
{
"lang": "en",
"value": "Authentication is globally bypassed in github.com/nanobox-io/golang-nanoauth between v0.0.0-20160722212129-ac0cc4484ad4 and v0.0.0-20200131131040-063a3fb69896 if ListenAndServe is called with an empty token."
}
],
"affected": [
{
"vendor": "github.com/nanobox-io/golang-nanoauth",
"product": "github.com/nanobox-io/golang-nanoauth",
"collectionURL": "https://pkg.go.dev",
"packageName": "github.com/nanobox-io/golang-nanoauth",
"versions": [
{
"version": "0.0.0-20160722212129-ac0cc4484ad4",
"lessThan": "0.0.0-20200131131040-063a3fb69896",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "Auth.ServeHTTP"
},
{
"name": "Auth.ListenAndServeTLS"
},
{
"name": "Auth.ListenAndServe"
},
{
"name": "ListenAndServe"
},
{
"name": "ListenAndServeTLS"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-305: Authentication Bypass by Primary Weakness"
}
]
}
],
"references": [
{
"url": "https://github.com/nanobox-io/golang-nanoauth/pull/5"
},
{
"url": "https://github.com/nanobox-io/golang-nanoauth/commit/063a3fb69896acf985759f0fe3851f15973993f3"
},
{
"url": "https://pkg.go.dev/vuln/GO-2020-0004"
}
],
"credits": [
{
"lang": "en",
"value": "@bouk"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2022-1095.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2022-41716"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Unsanitized NUL in environment variables on Windows in syscall and os/exec",
"descriptions": [
{
"lang": "en",
"value": "Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string \"A=B\\x00C=D\" sets the variables \"A=B\" and \"C=D\"."
}
],
"affected": [
{
"vendor": "Go standard library",
"product": "syscall",
"collectionURL": "https://pkg.go.dev",
"packageName": "syscall",
"versions": [
{
"version": "0",
"lessThan": "1.18.8",
"status": "affected",
"versionType": "semver"
},
{
"version": "1.19.0-0",
"lessThan": "1.19.3",
"status": "affected",
"versionType": "semver"
}
],
"platforms": [
"windows"
],
"programRoutines": [
{
"name": "StartProcess"
}
],
"defaultStatus": "unaffected"
},
{
"vendor": "Go standard library",
"product": "os/exec",
"collectionURL": "https://pkg.go.dev",
"packageName": "os/exec",
"versions": [
{
"version": "0",
"lessThan": "1.18.8",
"status": "affected",
"versionType": "semver"
},
{
"version": "1.19.0-0",
"lessThan": "1.19.3",
"status": "affected",
"versionType": "semver"
}
],
"platforms": [
"windows"
],
"programRoutines": [
{
"name": "Cmd.environ"
},
{
"name": "dedupEnv"
},
{
"name": "dedupEnvCase"
},
{
"name": "Cmd.CombinedOutput"
},
{
"name": "Cmd.Environ"
},
{
"name": "Cmd.Output"
},
{
"name": "Cmd.Run"
},
{
"name": "Cmd.Start"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-158: Improper Neutralization of Null Byte or NUL Character"
}
]
}
],
"references": [
{
"url": "https://go.dev/issue/56284"
},
{
"url": "https://go.dev/cl/446916"
},
{
"url": "https://groups.google.com/g/golang-announce/c/mbHY1UY3BaM/m/hSpmRzk-AgAJ"
},
{
"url": "https://pkg.go.dev/vuln/GO-2022-1095"
}
],
"credits": [
{
"lang": "en",
"value": "RyotaK (https://twitter.com/ryotkak)"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2022-1026.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2022-3347"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Incorrect validation of root DNSSEC public keys in github.com/peterzen/goresolver",
"descriptions": [
{
"lang": "en",
"value": "DNSSEC validation is not performed correctly. An attacker can cause this package to report successful validation for invalid, attacker-controlled records. Root DNSSEC public keys are not validated, permitting an attacker to present a self-signed root key and delegation chain."
}
],
"affected": [
{
"vendor": "github.com/peterzen/goresolver",
"product": "github.com/peterzen/goresolver",
"collectionURL": "https://pkg.go.dev",
"packageName": "github.com/peterzen/goresolver",
"defaultStatus": "affected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE 295: Improper Certificate Validation"
}
]
}
],
"references": [
{
"url": "https://github.com/peterzen/goresolver/issues/5#issuecomment-1150214257"
},
{
"url": "https://pkg.go.dev/vuln/GO-2022-1026"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2024-2887.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2024-24790"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses in net/netip",
"descriptions": [
{
"lang": "en",
"value": "The various Is methods (IsPrivate, IsLoopback, etc) did not work as expected for IPv4-mapped IPv6 addresses, returning false for addresses which would return true in their traditional IPv4 forms."
}
],
"affected": [
{
"vendor": "Go standard library",
"product": "net/netip",
"collectionURL": "https://pkg.go.dev",
"packageName": "net/netip",
"versions": [
{
"version": "0",
"lessThan": "1.21.11",
"status": "affected",
"versionType": "semver"
},
{
"version": "1.22.0-0",
"lessThan": "1.22.4",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "Addr.IsLoopback"
},
{
"name": "Addr.IsMulticast"
},
{
"name": "Addr.IsInterfaceLocalMulticast"
},
{
"name": "Addr.IsLinkLocalMulticast"
},
{
"name": "Addr.IsGlobalUnicast"
},
{
"name": "Addr.IsPrivate"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-180: Incorrect Behavior Order: Validate Before Canonicalize"
}
]
}
],
"references": [
{
"url": "https://go.dev/cl/590316"
},
{
"url": "https://go.dev/issue/67680"
},
{
"url": "https://groups.google.com/g/golang-announce/c/XbxouI9gY7k/m/TuoGEhxIEwAJ"
},
{
"url": "https://pkg.go.dev/vuln/GO-2024-2887"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/06/04/1"
}
],
"credits": [
{
"lang": "en",
"value": "Enze Wang of Alioth (@zer0yu)"
},
{
"lang": "en",
"value": "Jianjun Chen of Zhongguancun Lab (@chenjj)"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2024-2937.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2024-24792"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Panic when parsing invalid palette-color images in golang.org/x/image",
"descriptions": [
{
"lang": "en",
"value": "Parsing a corrupt or malicious image with invalid color indices can cause a panic."
}
],
"affected": [
{
"vendor": "golang.org/x/image",
"product": "golang.org/x/image/tiff",
"collectionURL": "https://pkg.go.dev",
"packageName": "golang.org/x/image/tiff",
"versions": [
{
"version": "0",
"lessThan": "0.18.0",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "decoder.decode"
},
{
"name": "Decode"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-125: Out-of-bounds Read"
}
]
}
],
"references": [
{
"url": "https://go.dev/cl/588115"
},
{
"url": "https://go.dev/issue/67624"
},
{
"url": "https://pkg.go.dev/vuln/GO-2024-2937"
}
],
"credits": [
{
"lang": "en",
"value": "John Wright \u003cjsw@google.com\u003e"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2023-1878.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2023-29406"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Insufficient sanitization of Host header in net/http",
"descriptions": [
{
"lang": "en",
"value": "The HTTP/1 client does not fully validate the contents of the Host header. A maliciously crafted Host header can inject additional headers or entire requests. With fix, the HTTP/1 client now refuses to send requests containing an invalid Request.Host or Request.URL.Host value."
}
],
"affected": [
{
"vendor": "Go standard library",
"product": "net/http",
"collectionURL": "https://pkg.go.dev",
"packageName": "net/http",
"versions": [
{
"version": "0",
"lessThan": "1.19.11",
"status": "affected",
"versionType": "semver"
},
{
"version": "1.20.0-0",
"lessThan": "1.20.6",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "Request.write"
},
{
"name": "Client.CloseIdleConnections"
},
{
"name": "Client.Do"
},
{
"name": "Client.Get"
},
{
"name": "Client.Head"
},
{
"name": "Client.Post"
},
{
"name": "Client.PostForm"
},
{
"name": "Get"
},
{
"name": "Head"
},
{
"name": "Post"
},
{
"name": "PostForm"
},
{
"name": "Request.Write"
},
{
"name": "Request.WriteProxy"
},
{
"name": "Transport.CancelRequest"
},
{
"name": "Transport.CloseIdleConnections"
},
{
"name": "Transport.RoundTrip"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting')"
}
]
}
],
"references": [
{
"url": "https://go.dev/issue/60374"
},
{
"url": "https://go.dev/cl/506996"
},
{
"url": "https://groups.google.com/g/golang-announce/c/2q13H6LEEx0"
},
{
"url": "https://pkg.go.dev/vuln/GO-2023-1878"
},
{
"url": "https://security.netapp.com/advisory/ntap-20230814-0002/"
},
{
"url": "https://security.gentoo.org/glsa/202311-09"
}
],
"credits": [
{
"lang": "en",
"value": "Bartek Nowotarski"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2022-0956.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2022-3064"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Excessive resource consumption in gopkg.in/yaml.v2",
"descriptions": [
{
"lang": "en",
"value": "Parsing malicious or large YAML documents can consume excessive amounts of CPU or memory."
}
],
"affected": [
{
"vendor": "gopkg.in/yaml.v2",
"product": "gopkg.in/yaml.v2",
"collectionURL": "https://pkg.go.dev",
"packageName": "gopkg.in/yaml.v2",
"versions": [
{
"version": "0",
"lessThan": "2.2.4",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "decoder.unmarshal"
},
{
"name": "yaml_parser_increase_flow_level"
},
{
"name": "yaml_parser_roll_indent"
},
{
"name": "Decoder.Decode"
},
{
"name": "Unmarshal"
},
{
"name": "UnmarshalStrict"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE 400: Uncontrolled Resource Consumption"
}
]
}
],
"references": [
{
"url": "https://github.com/go-yaml/yaml/commit/f221b8435cfb71e54062f6c6e99e9ade30b124d5"
},
{
"url": "https://github.com/go-yaml/yaml/releases/tag/v2.2.4"
},
{
"url": "https://pkg.go.dev/vuln/GO-2022-0956"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00001.html"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTE4ITXXPIWZEQ4HYQCB6N6GZIMWXDAI/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4SBIUECMLNC572P23DDOKJNKPJVX26SP/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PW3XC47AUW5J5M2ULJX7WCCL3B2ETLMT/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYZOKMMVX4SIEHPJW3SJUQGMO5YZCPHC/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XNF4OLYZRQE75EB5TW5N42FSXHBXGWFE/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ANIOPUXWIHVRA6CEWXCGOMX3YYS6KFHG/"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2023-2044.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2023-39321"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Panic when processing post-handshake message on QUIC connections in crypto/tls",
"descriptions": [
{
"lang": "en",
"value": "Processing an incomplete post-handshake message for a QUIC connection can cause a panic."
}
],
"affected": [
{
"vendor": "Go standard library",
"product": "crypto/tls",
"collectionURL": "https://pkg.go.dev",
"packageName": "crypto/tls",
"versions": [
{
"version": "1.21.0-0",
"lessThan": "1.21.1",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "QUICConn.HandleData"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-400: Uncontrolled Resource Consumption"
}
]
}
],
"references": [
{
"url": "https://go.dev/issue/62266"
},
{
"url": "https://go.dev/cl/523039"
},
{
"url": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ"
},
{
"url": "https://pkg.go.dev/vuln/GO-2023-2044"
},
{
"url": "https://security.netapp.com/advisory/ntap-20231020-0004/"
},
{
"url": "https://security.gentoo.org/glsa/202311-09"
}
],
"credits": [
{
"lang": "en",
"value": "Marten Seemann"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2023-2383.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2023-45285"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Command 'go get' may unexpectedly fallback to insecure git in cmd/go",
"descriptions": [
{
"lang": "en",
"value": "Using go get to fetch a module with the \".git\" suffix may unexpectedly fallback to the insecure \"git://\" protocol if the module is unavailable via the secure \"https://\" and \"git+ssh://\" protocols, even if GOINSECURE is not set for said module. This only affects users who are not using the module proxy and are fetching modules directly (i.e. GOPROXY=off)."
}
],
"affected": [
{
"vendor": "Go toolchain",
"product": "cmd/go",
"collectionURL": "https://pkg.go.dev",
"packageName": "cmd/go",
"versions": [
{
"version": "0",
"lessThan": "1.20.12",
"status": "affected",
"versionType": "semver"
},
{
"version": "1.21.0-0",
"lessThan": "1.21.5",
"status": "affected",
"versionType": "semver"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-636: Not Failing Securely ('Failing Open')"
}
]
}
],
"references": [
{
"url": "https://groups.google.com/g/golang-dev/c/6ypN5EjibjM/m/KmLVYH_uAgAJ"
},
{
"url": "https://go.dev/issue/63845"
},
{
"url": "https://go.dev/cl/540257"
},
{
"url": "https://pkg.go.dev/vuln/GO-2023-2383"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UIU6HOGV6RRIKWM57LOXQA75BGZSIH6G/"
}
],
"credits": [
{
"lang": "en",
"value": "David Leadbeater"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2023-1705.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2023-24536"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Excessive resource consumption in net/http, net/textproto and mime/multipart",
"descriptions": [
{
"lang": "en",
"value": "Multipart form parsing can consume large amounts of CPU and memory when processing form inputs containing very large numbers of parts. This stems from several causes: 1. mime/multipart.Reader.ReadForm limits the total memory a parsed multipart form can consume. ReadForm can undercount the amount of memory consumed, leading it to accept larger inputs than intended. 2. Limiting total memory does not account for increased pressure on the garbage collector from large numbers of small allocations in forms with many parts. 3. ReadForm can allocate a large number of short-lived buffers, further increasing pressure on the garbage collector. The combination of these factors can permit an attacker to cause an program that parses multipart forms to consume large amounts of CPU and memory, potentially resulting in a denial of service. This affects programs that use mime/multipart.Reader.ReadForm, as well as form parsing in the net/http package with the Request methods FormFile, FormValue, ParseMultipartForm, and PostFormValue. With fix, ReadForm now does a better job of estimating the memory consumption of parsed forms, and performs many fewer short-lived allocations. In addition, the fixed mime/multipart.Reader imposes the following limits on the size of parsed forms: 1. Forms parsed with ReadForm may contain no more than 1000 parts. This limit may be adjusted with the environment variable GODEBUG=multipartmaxparts=. 2. Form parts parsed with NextPart and NextRawPart may contain no more than 10,000 header fields. In addition, forms parsed with ReadForm may contain no more than 10,000 header fields across all parts. This limit may be adjusted with the environment variable GODEBUG=multipartmaxheaders=."
}
],
"affected": [
{
"vendor": "Go standard library",
"product": "mime/multipart",
"collectionURL": "https://pkg.go.dev",
"packageName": "mime/multipart",
"versions": [
{
"version": "0",
"lessThan": "1.19.8",
"status": "affected",
"versionType": "semver"
},
{
"version": "1.20.0-0",
"lessThan": "1.20.3",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "Reader.readForm"
},
{
"name": "mimeHeaderSize"
},
{
"name": "newPart"
},
{
"name": "Part.populateHeaders"
},
{
"name": "Reader.NextPart"
},
{
"name": "Reader.NextRawPart"
},
{
"name": "Reader.nextPart"
},
{
"name": "readMIMEHeader"
},
{
"name": "Reader.ReadForm"
}
],
"defaultStatus": "unaffected"
},
{
"vendor": "Go standard library",
"product": "net/textproto",
"collectionURL": "https://pkg.go.dev",
"packageName": "net/textproto",
"versions": [
{
"version": "0",
"lessThan": "1.19.8",
"status": "affected",
"versionType": "semver"
},
{
"version": "1.20.0-0",
"lessThan": "1.20.3",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "readMIMEHeader"
},
{
"name": "Reader.ReadMIMEHeader"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-400: Uncontrolled Resource Consumption"
}
]
}
],
"references": [
{
"url": "https://go.dev/issue/59153"
},
{
"url": "https://go.dev/cl/482076"
},
{
"url": "https://go.dev/cl/482075"
},
{
"url": "https://go.dev/cl/482077"
},
{
"url": "https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8"
},
{
"url": "https://pkg.go.dev/vuln/GO-2023-1705"
},
{
"url": "https://security.netapp.com/advisory/ntap-20230526-0007/"
},
{
"url": "https://security.gentoo.org/glsa/202311-09"
}
],
"credits": [
{
"lang": "en",
"value": "Jakob Ackermann (@das7pad)"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2023-2386.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2023-45292"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Captcha verification bypass in github.com/mojocn/base64Captcha",
"descriptions": [
{
"lang": "en",
"value": "When using the default implementation of Verify to check a Captcha, verification can be bypassed. For example, if the first parameter is a non-existent id, the second parameter is an empty string, and the third parameter is true, the function will always consider the Captcha to be correct."
}
],
"affected": [
{
"vendor": "github.com/mojocn/base64Captcha",
"product": "github.com/mojocn/base64Captcha",
"collectionURL": "https://pkg.go.dev",
"packageName": "github.com/mojocn/base64Captcha",
"versions": [
{
"version": "0",
"lessThan": "1.3.6",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "memoryStore.Verify"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-305: Authentication Bypass by Primary Weakness"
}
]
}
],
"references": [
{
"url": "https://github.com/mojocn/base64Captcha/issues/120"
},
{
"url": "https://github.com/mojocn/base64Captcha/commit/9b11012caca58925f1e47c770f79f2fa47e3ad13"
},
{
"url": "https://github.com/mojocn/base64Captcha/commit/5ab86bd6f333aad3936f912fc52b411168dcd4a7"
},
{
"url": "https://pkg.go.dev/vuln/GO-2023-2386"
}
],
"credits": [
{
"lang": "en",
"value": "@cangkuai"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2020-0001.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2020-36567"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Arbitrary log line injection in github.com/gin-gonic/gin",
"descriptions": [
{
"lang": "en",
"value": "Unsanitized input in the default logger in github.com/gin-gonic/gin before v1.6.0 allows remote attackers to inject arbitrary log lines."
}
],
"affected": [
{
"vendor": "github.com/gin-gonic/gin",
"product": "github.com/gin-gonic/gin",
"collectionURL": "https://pkg.go.dev",
"packageName": "github.com/gin-gonic/gin",
"versions": [
{
"version": "0",
"lessThan": "1.6.0",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "LoggerWithConfig"
},
{
"name": "Default"
},
{
"name": "Logger"
},
{
"name": "LoggerWithFormatter"
},
{
"name": "LoggerWithWriter"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-117 Improper Output Neutralization for Logs"
}
]
}
],
"references": [
{
"url": "https://github.com/gin-gonic/gin/pull/2237"
},
{
"url": "https://github.com/gin-gonic/gin/commit/a71af9c144f9579f6dbe945341c1df37aaf09c0d"
},
{
"url": "https://pkg.go.dev/vuln/GO-2020-0001"
}
],
"credits": [
{
"lang": "en",
"value": "@thinkerou \u003cthinkerou@gmail.com\u003e"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2024-2600.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2023-45289"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Incorrect forwarding of sensitive headers and cookies on HTTP redirect in net/http",
"descriptions": [
{
"lang": "en",
"value": "When following an HTTP redirect to a domain which is not a subdomain match or exact match of the initial domain, an http.Client does not forward sensitive headers such as \"Authorization\" or \"Cookie\". For example, a redirect from foo.com to www.foo.com will forward the Authorization header, but a redirect to bar.com will not. A maliciously crafted HTTP redirect could cause sensitive headers to be unexpectedly forwarded."
}
],
"affected": [
{
"vendor": "Go standard library",
"product": "net/http",
"collectionURL": "https://pkg.go.dev",
"packageName": "net/http",
"versions": [
{
"version": "0",
"lessThan": "1.21.8",
"status": "affected",
"versionType": "semver"
},
{
"version": "1.22.0-0",
"lessThan": "1.22.1",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "isDomainOrSubdomain"
},
{
"name": "Client.Do"
},
{
"name": "Client.Get"
},
{
"name": "Client.Head"
},
{
"name": "Client.Post"
},
{
"name": "Client.PostForm"
},
{
"name": "Get"
},
{
"name": "Head"
},
{
"name": "Post"
},
{
"name": "PostForm"
}
],
"defaultStatus": "unaffected"
},
{
"vendor": "Go standard library",
"product": "net/http/cookiejar",
"collectionURL": "https://pkg.go.dev",
"packageName": "net/http/cookiejar",
"versions": [
{
"version": "0",
"lessThan": "1.21.8",
"status": "affected",
"versionType": "semver"
},
{
"version": "1.22.0-0",
"lessThan": "1.22.1",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "isIP"
},
{
"name": "Jar.Cookies"
},
{
"name": "Jar.SetCookies"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-212: Improper Removal of Sensitive Information Before Storage or Transfer"
}
]
}
],
"references": [
{
"url": "https://go.dev/issue/65065"
},
{
"url": "https://go.dev/cl/569340"
},
{
"url": "https://groups.google.com/g/golang-announce/c/5pwGVUPoMbg"
},
{
"url": "https://pkg.go.dev/vuln/GO-2024-2600"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240329-0006/"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/03/08/4"
}
],
"credits": [
{
"lang": "en",
"value": "Juho Nurminen of Mattermost"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2023-1595.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2023-24533"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Incorrect multiplication of unreduced P-256 scalars in filippo.io/nistec",
"descriptions": [
{
"lang": "en",
"value": "Multiplication of certain unreduced P-256 scalars produce incorrect results. There are no protocols known at this time that can be attacked due to this."
}
],
"affected": [
{
"vendor": "filippo.io/nistec",
"product": "filippo.io/nistec",
"collectionURL": "https://pkg.go.dev",
"packageName": "filippo.io/nistec",
"versions": [
{
"version": "0",
"lessThan": "0.0.2",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "p256OrdInverse"
},
{
"name": "P256Point.ScalarBaseMult"
},
{
"name": "P256Point.ScalarMult"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-682: Incorrect Calculation"
}
]
}
],
"references": [
{
"url": "https://go.dev/issue/58647"
},
{
"url": "https://github.com/FiloSottile/nistec/commit/c58aa1223ccf3943513e1e661cebce95af137244"
},
{
"url": "https://pkg.go.dev/vuln/GO-2023-1595"
}
],
"credits": [
{
"lang": "en",
"value": "Guido Vranken via the Ethereum Foundation bug bounty program"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2022-0526.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2022-30635"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Stack exhaustion when decoding certain messages in encoding/gob",
"descriptions": [
{
"lang": "en",
"value": "Uncontrolled recursion in Decoder.Decode in encoding/gob before Go 1.17.12 and Go 1.18.4 allows an attacker to cause a panic due to stack exhaustion via a message which contains deeply nested structures."
}
],
"affected": [
{
"vendor": "Go standard library",
"product": "encoding/gob",
"collectionURL": "https://pkg.go.dev",
"packageName": "encoding/gob",
"versions": [
{
"version": "0",
"lessThan": "1.17.12",
"status": "affected",
"versionType": "semver"
},
{
"version": "1.18.0-0",
"lessThan": "1.18.4",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "Decoder.decIgnoreOpFor"
},
{
"name": "Decoder.compileIgnoreSingle"
},
{
"name": "Decoder.compileDec"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-674: Uncontrolled Recursion"
}
]
}
],
"references": [
{
"url": "https://go.dev/cl/417064"
},
{
"url": "https://go.googlesource.com/go/+/6fa37e98ea4382bf881428ee0c150ce591500eb7"
},
{
"url": "https://go.dev/issue/53615"
},
{
"url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE"
},
{
"url": "https://pkg.go.dev/vuln/GO-2022-0526"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2021-0107.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2021-4236"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Panic or authentication bypass in github.com/ecnepsnai/web",
"descriptions": [
{
"lang": "en",
"value": "Web Sockets do not execute any AuthenticateMethod methods which may be set, leading to a nil pointer dereference if the returned UserData pointer is assumed to be non-nil, or authentication bypass. This issue only affects WebSockets with an AuthenticateMethod hook. Request handlers that do not explicitly use WebSockets are not vulnerable."
}
],
"affected": [
{
"vendor": "github.com/ecnepsnai/web",
"product": "github.com/ecnepsnai/web",
"collectionURL": "https://pkg.go.dev",
"packageName": "github.com/ecnepsnai/web",
"versions": [
{
"version": "1.4.0",
"lessThan": "1.5.2",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "Server.socketHandler"
},
{
"name": "Server.Socket"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-400: Uncontrolled Resource Consumption"
}
]
}
],
"references": [
{
"url": "https://github.com/ecnepsnai/web/commit/5a78f8d5c41ce60dcf9f61aaf47a7a8dc3e0002f"
},
{
"url": "https://pkg.go.dev/vuln/GO-2021-0107"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2023-1703.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2023-24538"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Backticks not treated as string delimiters in html/template",
"descriptions": [
{
"lang": "en",
"value": "Templates do not properly consider backticks (`) as Javascript string delimiters, and do not escape them as expected. Backticks are used, since ES6, for JS template literals. If a template contains a Go template action within a Javascript template literal, the contents of the action can be used to terminate the literal, injecting arbitrary Javascript code into the Go template. As ES6 template literals are rather complex, and themselves can do string interpolation, the decision was made to simply disallow Go template actions from being used inside of them (e.g. \"var a = {{.}}\"), since there is no obviously safe way to allow this behavior. This takes the same approach as github.com/google/safehtml. With fix, Template.Parse returns an Error when it encounters templates like this, with an ErrorCode of value 12. This ErrorCode is currently unexported, but will be exported in the release of Go 1.21. Users who rely on the previous behavior can re-enable it using the GODEBUG flag jstmpllitinterp=1, with the caveat that backticks will now be escaped. This should be used with caution."
}
],
"affected": [
{
"vendor": "Go standard library",
"product": "html/template",
"collectionURL": "https://pkg.go.dev",
"packageName": "html/template",
"versions": [
{
"version": "0",
"lessThan": "1.19.8",
"status": "affected",
"versionType": "semver"
},
{
"version": "1.20.0-0",
"lessThan": "1.20.3",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "tJS"
},
{
"name": "tJSDelimited"
},
{
"name": "Template.Execute"
},
{
"name": "Template.ExecuteTemplate"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-94: Improper Control of Generation of Code ('Code Injection')"
}
]
}
],
"references": [
{
"url": "https://go.dev/issue/59234"
},
{
"url": "https://go.dev/cl/482079"
},
{
"url": "https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8"
},
{
"url": "https://pkg.go.dev/vuln/GO-2023-1703"
},
{
"url": "https://security.gentoo.org/glsa/202311-09"
}
],
"credits": [
{
"lang": "en",
"value": "Sohom Datta, Manipal Institute of Technology"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2022-0475.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2020-28366"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Arbitrary code execution in go command with cgo in cmd/go and cmd/cgo",
"descriptions": [
{
"lang": "en",
"value": "Code injection in the go command with cgo before Go 1.14.12 and Go 1.15.5 allows arbitrary code execution at build time via a malicious unquoted symbol name in a linked object file."
}
],
"affected": [
{
"vendor": "Go toolchain",
"product": "cmd/go",
"collectionURL": "https://pkg.go.dev",
"packageName": "cmd/go",
"versions": [
{
"version": "0",
"lessThan": "1.14.12",
"status": "affected",
"versionType": "semver"
},
{
"version": "1.15.0-0",
"lessThan": "1.15.5",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "Builder.cgo"
}
],
"defaultStatus": "unaffected"
},
{
"vendor": "Go toolchain",
"product": "cmd/cgo",
"collectionURL": "https://pkg.go.dev",
"packageName": "cmd/cgo",
"versions": [
{
"version": "0",
"lessThan": "1.14.12",
"status": "affected",
"versionType": "semver"
},
{
"version": "1.15.0-0",
"lessThan": "1.15.5",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "dynimport"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-94: Improper Control of Generation of Code ('Code Injection')"
}
]
}
],
"references": [
{
"url": "https://go.dev/cl/269658"
},
{
"url": "https://go.googlesource.com/go/+/062e0e5ce6df339dc26732438ad771f73dbf2292"
},
{
"url": "https://go.dev/issue/42559"
},
{
"url": "https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM"
},
{
"url": "https://pkg.go.dev/vuln/GO-2022-0475"
}
],
"credits": [
{
"lang": "en",
"value": "Chris Brown (Tempus Ex)"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2023-2102.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2023-39325"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "HTTP/2 rapid reset can cause excessive work in net/http",
"descriptions": [
{
"lang": "en",
"value": "A malicious HTTP/2 client which rapidly creates requests and immediately resets them can cause excessive server resource consumption. While the total number of requests is bounded by the http2.Server.MaxConcurrentStreams setting, resetting an in-progress request allows the attacker to create a new request while the existing one is still executing. With the fix applied, HTTP/2 servers now bound the number of simultaneously executing handler goroutines to the stream concurrency limit (MaxConcurrentStreams). New requests arriving when at the limit (which can only happen after the client has reset an existing, in-flight request) will be queued until a handler exits. If the request queue grows too large, the server will terminate the connection. This issue is also fixed in golang.org/x/net/http2 for users manually configuring HTTP/2. The default stream concurrency limit is 250 streams (requests) per HTTP/2 connection. This value may be adjusted using the golang.org/x/net/http2 package; see the Server.MaxConcurrentStreams setting and the ConfigureServer function."
}
],
"affected": [
{
"vendor": "Go standard library",
"product": "net/http",
"collectionURL": "https://pkg.go.dev",
"packageName": "net/http",
"versions": [
{
"version": "0",
"lessThan": "1.20.10",
"status": "affected",
"versionType": "semver"
},
{
"version": "1.21.0-0",
"lessThan": "1.21.3",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "http2serverConn.serve"
},
{
"name": "http2serverConn.processHeaders"
},
{
"name": "http2serverConn.upgradeRequest"
},
{
"name": "http2serverConn.runHandler"
},
{
"name": "ListenAndServe"
},
{
"name": "ListenAndServeTLS"
},
{
"name": "Serve"
},
{
"name": "ServeTLS"
},
{
"name": "Server.ListenAndServe"
},
{
"name": "Server.ListenAndServeTLS"
},
{
"name": "Server.Serve"
},
{
"name": "Server.ServeTLS"
},
{
"name": "http2Server.ServeConn"
}
],
"defaultStatus": "unaffected"
},
{
"vendor": "golang.org/x/net",
"product": "golang.org/x/net/http2",
"collectionURL": "https://pkg.go.dev",
"packageName": "golang.org/x/net/http2",
"versions": [
{
"version": "0",
"lessThan": "0.17.0",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "serverConn.serve"
},
{
"name": "serverConn.processHeaders"
},
{
"name": "serverConn.upgradeRequest"
},
{
"name": "serverConn.runHandler"
},
{
"name": "Server.ServeConn"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-400: Uncontrolled Resource Consumption"
}
]
}
],
"references": [
{
"url": "https://go.dev/issue/63417"
},
{
"url": "https://go.dev/cl/534215"
},
{
"url": "https://go.dev/cl/534235"
},
{
"url": "https://groups.google.com/g/golang-announce/c/iNNxDTCjZvo/m/UDd7VKQuAAAJ"
},
{
"url": "https://pkg.go.dev/vuln/GO-2023-2102"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/"
},
{
"url": "https://security.netapp.com/advisory/ntap-20231110-0008/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OXGWPQOJ3JNDW2XIYKIVJ7N7QUIFNM2Q/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZQIELEIRSZUYTFFH5KTH2YJ4IIQG2KE/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QF5QSYAOPDOWLY6DUHID56Q4HQFYB45I/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XTNLSL44Y5FB6JWADSZH6DCV4JJAAEQY/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ECRC75BQJP6FJN2L7KCKYZW4DSBD7QSD/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4BUK2ZIAGCULOOYDNH25JPU6JBES5NF2/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YRKEXKANQ7BKJW2YTAMP625LJUJZLJ4P/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D2BBIDR2ZMB3X5BC7SR4SLQMHRMVPY6L/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7N5GV4CHH6WAGX3GFMDD3COEOVCZ4RI/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/REMHVVIBDNKSRKNOTV7EQSB7CYQWOUOU/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UTT7DG3QOF5ZNJLUGHDNLRUIN6OWZARP/"
},
{
"url": "https://security.gentoo.org/glsa/202311-09"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ULQQONMSCQSH5Z5OWFFQHCGEZ3NL4DRJ/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R3UETKPUB3V5JS5TLZOF3SMTGT5K5APS/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3SZN67IL7HMGMNAVLOTIXLIHUDXZK4LH/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NG7IMPL55MVWU3LCI4JQJT3K2U5CHDV7/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GSY7SXFFTPZFWDM6XELSDSHZLVW3AHK7/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WCNCBYKZXLDFGAJUB7ZP5VLC3YTHJNVH/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AVZDNSMVDAQJ64LJC5I5U5LDM5753647/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZSVEMQV5ROY5YW5QE3I57HT3ITWG5GCV/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CHHITS4PUOZAKFIUBQAQZC7JWXMOYE4B/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3OVW5V2DM5K5IC3H7O42YDUGNJ74J35O/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KEOTKBUPZXHE3F352JBYNTSNRXYLWD6P/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MZQYOOKHQDQ57LV2IAG6NRFOVXKHJJ3Z/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5RSKA2II6QTD4YUKUNDVJQSRYSFC4VFR/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FTMJ3NJIDAZFWJQQSP3L22MUFJ3UP2PT/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPWCNYB5PQ5PCVZ4NJT6G56ZYFZ5QBU6/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W2LZSWTV4NV4SNQARNXG5T6LRHP26EW2/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PJCUNGIQDUMZ4Z6HWVYIMR66A35F5S74/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L5E5JSJBZLYXOTZWXHJKRVCIXIHVWKJ6/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YJWHBLVZDM5KQSDFRBFRKU5KSSOLIRQ4/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3WJ4QVX2AMUJ2F2S27POOAHRC4K3CHU4/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ODBY7RVMGZCBSTWF2OZGIZS57FNFUL67/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QXOU2JZUBEBP7GBKAYIJRPRBZSJCD7ST/"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2020-0047.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2020-36563"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Weak hash (SHA-1) in github.com/RobotsAndPencils/go-saml",
"descriptions": [
{
"lang": "en",
"value": "XML Digital Signatures generated and validated using this package use SHA-1, which may allow an attacker to craft inputs which cause hash collisions depending on their control over the input."
}
],
"affected": [
{
"vendor": "github.com/RobotsAndPencils/go-saml",
"product": "github.com/RobotsAndPencils/go-saml",
"collectionURL": "https://pkg.go.dev",
"packageName": "github.com/RobotsAndPencils/go-saml",
"programRoutines": [
{
"name": "AuthnRequest.Validate"
},
{
"name": "NewAuthnRequest"
},
{
"name": "NewSignedResponse"
},
{
"name": "ServiceProviderSettings.GetAuthnRequest"
}
],
"defaultStatus": "affected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE 328: Use of Weak Hash"
}
]
}
],
"references": [
{
"url": "https://github.com/RobotsAndPencils/go-saml/pull/38"
},
{
"url": "https://pkg.go.dev/vuln/GO-2020-0047"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2022-1143.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2022-41720"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Restricted file access on Windows in os and net/http",
"descriptions": [
{
"lang": "en",
"value": "On Windows, restricted files can be accessed via os.DirFS and http.Dir. The os.DirFS function and http.Dir type provide access to a tree of files rooted at a given directory. These functions permit access to Windows device files under that root. For example, os.DirFS(\"C:/tmp\").Open(\"COM1\") opens the COM1 device. Both os.DirFS and http.Dir only provide read-only filesystem access. In addition, on Windows, an os.DirFS for the directory (the root of the current drive) can permit a maliciously crafted path to escape from the drive and access any path on the system. With fix applied, the behavior of os.DirFS(\"\") has changed. Previously, an empty root was treated equivalently to \"/\", so os.DirFS(\"\").Open(\"tmp\") would open the path \"/tmp\". This now returns an error."
}
],
"affected": [
{
"vendor": "Go standard library",
"product": "os",
"collectionURL": "https://pkg.go.dev",
"packageName": "os",
"versions": [
{
"version": "0",
"lessThan": "1.18.9",
"status": "affected",
"versionType": "semver"
},
{
"version": "1.19.0-0",
"lessThan": "1.19.4",
"status": "affected",
"versionType": "semver"
}
],
"platforms": [
"windows"
],
"programRoutines": [
{
"name": "dirFS.Open"
},
{
"name": "dirFS.Stat"
},
{
"name": "DirFS"
}
],
"defaultStatus": "unaffected"
},
{
"vendor": "Go standard library",
"product": "net/http",
"collectionURL": "https://pkg.go.dev",
"packageName": "net/http",
"versions": [
{
"version": "0",
"lessThan": "1.18.9",
"status": "affected",
"versionType": "semver"
},
{
"version": "1.19.0-0",
"lessThan": "1.19.4",
"status": "affected",
"versionType": "semver"
}
],
"platforms": [
"windows"
],
"programRoutines": [
{
"name": "Dir.Open"
},
{
"name": "ServeFile"
},
{
"name": "fileHandler.ServeHTTP"
},
{
"name": "fileTransport.RoundTrip"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE 22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')"
}
]
}
],
"references": [
{
"url": "https://go.dev/issue/56694"
},
{
"url": "https://go.dev/cl/455716"
},
{
"url": "https://groups.google.com/g/golang-announce/c/L_3rmdT0BMU/m/yZDrXjIiBQAJ"
},
{
"url": "https://pkg.go.dev/vuln/GO-2022-1143"
}
]
}
}
}
|
v5
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/cve/v5/GO-2024-2824.json
|
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2024-24788"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Malformed DNS message can cause infinite loop in net",
"descriptions": [
{
"lang": "en",
"value": "A malformed DNS message in response to a query can cause the Lookup functions to get stuck in an infinite loop."
}
],
"affected": [
{
"vendor": "Go standard library",
"product": "net",
"collectionURL": "https://pkg.go.dev",
"packageName": "net",
"versions": [
{
"version": "1.22.0-0",
"lessThan": "1.22.3",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "extractExtendedRCode"
},
{
"name": "Dial"
},
{
"name": "DialTimeout"
},
{
"name": "Dialer.Dial"
},
{
"name": "Dialer.DialContext"
},
{
"name": "Listen"
},
{
"name": "ListenConfig.Listen"
},
{
"name": "ListenConfig.ListenPacket"
},
{
"name": "ListenPacket"
},
{
"name": "LookupAddr"
},
{
"name": "LookupCNAME"
},
{
"name": "LookupHost"
},
{
"name": "LookupIP"
},
{
"name": "LookupMX"
},
{
"name": "LookupNS"
},
{
"name": "LookupSRV"
},
{
"name": "LookupTXT"
},
{
"name": "ResolveIPAddr"
},
{
"name": "ResolveTCPAddr"
},
{
"name": "ResolveUDPAddr"
},
{
"name": "Resolver.LookupAddr"
},
{
"name": "Resolver.LookupCNAME"
},
{
"name": "Resolver.LookupHost"
},
{
"name": "Resolver.LookupIP"
},
{
"name": "Resolver.LookupIPAddr"
},
{
"name": "Resolver.LookupMX"
},
{
"name": "Resolver.LookupNS"
},
{
"name": "Resolver.LookupNetIP"
},
{
"name": "Resolver.LookupSRV"
},
{
"name": "Resolver.LookupTXT"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE 400: Uncontrolled Resource Consumption"
}
]
}
],
"references": [
{
"url": "https://go.dev/issue/66754"
},
{
"url": "https://go.dev/cl/578375"
},
{
"url": "https://groups.google.com/g/golang-announce/c/wkkO4P9stm0"
},
{
"url": "https://pkg.go.dev/vuln/GO-2024-2824"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/05/08/3"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240605-0002/"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240614-0001/"
}
],
"credits": [
{
"lang": "en",
"value": "@long-name-let-people-remember-you"
},
{
"lang": "en",
"value": "Mateusz Poliwczak"
}
]
}
}
}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.