Skip to content

Commit

Permalink
data/reports: unexclude 20 reports (7)
Browse files Browse the repository at this point in the history
  - data/reports/GO-2023-1862.yaml
  - data/reports/GO-2023-1863.yaml
  - data/reports/GO-2023-1864.yaml
  - data/reports/GO-2023-1865.yaml
  - data/reports/GO-2023-1866.yaml
  - data/reports/GO-2023-1871.yaml
  - data/reports/GO-2023-1879.yaml
  - data/reports/GO-2023-1887.yaml
  - data/reports/GO-2023-1888.yaml
  - data/reports/GO-2023-1891.yaml
  - data/reports/GO-2023-1892.yaml
  - data/reports/GO-2023-1894.yaml
  - data/reports/GO-2023-1895.yaml
  - data/reports/GO-2023-1896.yaml
  - data/reports/GO-2023-1897.yaml
  - data/reports/GO-2023-1898.yaml
  - data/reports/GO-2023-1899.yaml
  - data/reports/GO-2023-1900.yaml
  - data/reports/GO-2023-1901.yaml
  - data/reports/GO-2023-1911.yaml

Updates #1862
Updates #1863
Updates #1864
Updates #1865
Updates #1866
Updates #1871
Updates #1879
Updates #1887
Updates #1888
Updates #1891
Updates #1892
Updates #1894
Updates #1895
Updates #1896
Updates #1897
Updates #1898
Updates #1899
Updates #1900
Updates #1901
Updates #1911

Change-Id: Iffcbe8e6325ef654a17298cd4c7072192626ad21
Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/606787
Auto-Submit: Tatiana Bradley <tatianabradley@google.com>
Reviewed-by: Damien Neil <dneil@google.com>
LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
  • Loading branch information
tatianab authored and gopherbot committed Aug 20, 2024
1 parent 34d5974 commit a9db2a7
Show file tree
Hide file tree
Showing 60 changed files with 1,808 additions and 159 deletions.
8 changes: 0 additions & 8 deletions data/excluded/GO-2023-1862.yaml

This file was deleted.

6 changes: 0 additions & 6 deletions data/excluded/GO-2023-1863.yaml

This file was deleted.

8 changes: 0 additions & 8 deletions data/excluded/GO-2023-1864.yaml

This file was deleted.

8 changes: 0 additions & 8 deletions data/excluded/GO-2023-1865.yaml

This file was deleted.

9 changes: 0 additions & 9 deletions data/excluded/GO-2023-1866.yaml

This file was deleted.

8 changes: 0 additions & 8 deletions data/excluded/GO-2023-1871.yaml

This file was deleted.

8 changes: 0 additions & 8 deletions data/excluded/GO-2023-1879.yaml

This file was deleted.

8 changes: 0 additions & 8 deletions data/excluded/GO-2023-1887.yaml

This file was deleted.

8 changes: 0 additions & 8 deletions data/excluded/GO-2023-1888.yaml

This file was deleted.

8 changes: 0 additions & 8 deletions data/excluded/GO-2023-1891.yaml

This file was deleted.

8 changes: 0 additions & 8 deletions data/excluded/GO-2023-1892.yaml

This file was deleted.

8 changes: 0 additions & 8 deletions data/excluded/GO-2023-1894.yaml

This file was deleted.

8 changes: 0 additions & 8 deletions data/excluded/GO-2023-1895.yaml

This file was deleted.

8 changes: 0 additions & 8 deletions data/excluded/GO-2023-1896.yaml

This file was deleted.

8 changes: 0 additions & 8 deletions data/excluded/GO-2023-1897.yaml

This file was deleted.

8 changes: 0 additions & 8 deletions data/excluded/GO-2023-1898.yaml

This file was deleted.

8 changes: 0 additions & 8 deletions data/excluded/GO-2023-1899.yaml

This file was deleted.

8 changes: 0 additions & 8 deletions data/excluded/GO-2023-1900.yaml

This file was deleted.

8 changes: 0 additions & 8 deletions data/excluded/GO-2023-1901.yaml

This file was deleted.

8 changes: 0 additions & 8 deletions data/excluded/GO-2023-1911.yaml

This file was deleted.

52 changes: 52 additions & 0 deletions data/osv/GO-2023-1862.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,52 @@
{
"schema_version": "1.3.1",
"id": "GO-2023-1862",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2023-34242",
"GHSA-r7wr-4w5q-55m6"
],
"summary": "Cilium vulnerable to information leakage via incorrect ReferenceGrant handling in github.com/cilium/cilium",
"details": "Cilium vulnerable to information leakage via incorrect ReferenceGrant handling in github.com/cilium/cilium",
"affected": [
{
"package": {
"name": "github.com/cilium/cilium",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "1.13.0"
},
{
"fixed": "1.13.4"
}
]
}
],
"ecosystem_specific": {}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cilium/cilium/security/advisories/GHSA-r7wr-4w5q-55m6"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-34242"
},
{
"type": "WEB",
"url": "https://github.com/cilium/cilium/releases/tag/v1.13.4"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2023-1862",
"review_status": "UNREVIEWED"
}
}
84 changes: 84 additions & 0 deletions data/osv/GO-2023-1863.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,84 @@
{
"schema_version": "1.3.1",
"id": "GO-2023-1863",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2023-30625",
"GHSA-3jmm-f6jj-rcc3"
],
"summary": "rudder-server is vulnerable to SQL injection in github.com/rudderlabs/rudder-server",
"details": "rudder-server is vulnerable to SQL injection in github.com/rudderlabs/rudder-server",
"affected": [
{
"package": {
"name": "github.com/rudderlabs/rudder-server",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.3.0-rc.1"
}
]
}
],
"ecosystem_specific": {}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/advisories/GHSA-3jmm-f6jj-rcc3"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-30625"
},
{
"type": "ADVISORY",
"url": "https://securitylab.github.com/advisories/GHSL-2022-097_rudder-server"
},
{
"type": "FIX",
"url": "https://github.com/rudderlabs/rudder-server/commit/0d061ff2d8c16845179d215bf8012afceba12a30"
},
{
"type": "FIX",
"url": "https://github.com/rudderlabs/rudder-server/commit/2f956b7eb3d5eb2de3e79d7df2c87405af25071e"
},
{
"type": "FIX",
"url": "https://github.com/rudderlabs/rudder-server/commit/9c009d9775abc99e72fc470f4c4c8e8f1775e82a"
},
{
"type": "FIX",
"url": "https://github.com/rudderlabs/rudder-server/pull/2652"
},
{
"type": "FIX",
"url": "https://github.com/rudderlabs/rudder-server/pull/2663"
},
{
"type": "FIX",
"url": "https://github.com/rudderlabs/rudder-server/pull/2664"
},
{
"type": "WEB",
"url": "http://packetstormsecurity.com/files/173837/Rudder-Server-SQL-Injection-Remote-Code-Execution.html"
},
{
"type": "WEB",
"url": "https://securitylab.github.com/advisories"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2023-1863",
"review_status": "UNREVIEWED"
}
}
Loading

0 comments on commit a9db2a7

Please sign in to comment.