Skip to content

Commit e715f25

Browse files
tatianabgopherbot
authored andcommitted
data/reports: unexclude 20 reports (21)
- data/reports/GO-2022-0642.yaml - data/reports/GO-2022-0644.yaml - data/reports/GO-2022-0645.yaml - data/reports/GO-2022-0647.yaml - data/reports/GO-2022-0649.yaml - data/reports/GO-2022-0700.yaml - data/reports/GO-2022-0703.yaml - data/reports/GO-2022-0704.yaml - data/reports/GO-2022-0705.yaml - data/reports/GO-2022-0707.yaml - data/reports/GO-2022-0708.yaml - data/reports/GO-2022-0709.yaml - data/reports/GO-2022-0732.yaml - data/reports/GO-2022-0749.yaml - data/reports/GO-2022-0751.yaml - data/reports/GO-2022-0752.yaml - data/reports/GO-2022-0759.yaml - data/reports/GO-2022-0760.yaml - data/reports/GO-2022-0769.yaml - data/reports/GO-2022-0770.yaml Updates #642 Updates #644 Updates #645 Updates #647 Updates #649 Updates #700 Updates #703 Updates #704 Updates #705 Updates #707 Updates #708 Updates #709 Updates #732 Updates #749 Updates #751 Updates #752 Updates #759 Updates #760 Updates #769 Updates #770 Change-Id: I3dabcc907fd498009a9bd4cf865198037615717e Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/607223 LUCI-TryBot-Result: Go LUCI <[email protected]> Auto-Submit: Tatiana Bradley <[email protected]> Reviewed-by: Damien Neil <[email protected]>
1 parent ad9da11 commit e715f25

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

60 files changed

+2006
-160
lines changed

data/excluded/GO-2022-0642.yaml

-8
This file was deleted.

data/excluded/GO-2022-0644.yaml

-8
This file was deleted.

data/excluded/GO-2022-0645.yaml

-8
This file was deleted.

data/excluded/GO-2022-0647.yaml

-8
This file was deleted.

data/excluded/GO-2022-0649.yaml

-8
This file was deleted.

data/excluded/GO-2022-0700.yaml

-8
This file was deleted.

data/excluded/GO-2022-0703.yaml

-8
This file was deleted.

data/excluded/GO-2022-0704.yaml

-8
This file was deleted.

data/excluded/GO-2022-0705.yaml

-8
This file was deleted.

data/excluded/GO-2022-0707.yaml

-8
This file was deleted.

data/excluded/GO-2022-0708.yaml

-8
This file was deleted.

data/excluded/GO-2022-0709.yaml

-8
This file was deleted.

data/excluded/GO-2022-0732.yaml

-8
This file was deleted.

data/excluded/GO-2022-0749.yaml

-8
This file was deleted.

data/excluded/GO-2022-0751.yaml

-8
This file was deleted.

data/excluded/GO-2022-0752.yaml

-8
This file was deleted.

data/excluded/GO-2022-0759.yaml

-8
This file was deleted.

data/excluded/GO-2022-0760.yaml

-8
This file was deleted.

data/excluded/GO-2022-0769.yaml

-8
This file was deleted.

data/excluded/GO-2022-0770.yaml

-8
This file was deleted.

data/osv/GO-2022-0642.json

+72
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,72 @@
1+
{
2+
"schema_version": "1.3.1",
3+
"id": "GO-2022-0642",
4+
"modified": "0001-01-01T00:00:00Z",
5+
"published": "0001-01-01T00:00:00Z",
6+
"aliases": [
7+
"CVE-2014-8683",
8+
"GHSA-9hx4-qm7h-x84j"
9+
],
10+
"summary": "Cross-site Scripting in Gogs in gogs.io/gogs",
11+
"details": "Cross-site Scripting in Gogs in gogs.io/gogs",
12+
"affected": [
13+
{
14+
"package": {
15+
"name": "gogs.io/gogs",
16+
"ecosystem": "Go"
17+
},
18+
"ranges": [
19+
{
20+
"type": "SEMVER",
21+
"events": [
22+
{
23+
"introduced": "0.3.1"
24+
},
25+
{
26+
"fixed": "0.5.8"
27+
}
28+
]
29+
}
30+
],
31+
"ecosystem_specific": {}
32+
}
33+
],
34+
"references": [
35+
{
36+
"type": "ADVISORY",
37+
"url": "https://github.com/advisories/GHSA-9hx4-qm7h-x84j"
38+
},
39+
{
40+
"type": "ADVISORY",
41+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-8683"
42+
},
43+
{
44+
"type": "WEB",
45+
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98693"
46+
},
47+
{
48+
"type": "WEB",
49+
"url": "https://github.com/gogits/gogs/commit/3abc41cccab2486012b46305827433ad6f5deade"
50+
},
51+
{
52+
"type": "WEB",
53+
"url": "https://github.com/gogits/gogs/releases/tag/v0.5.8"
54+
},
55+
{
56+
"type": "WEB",
57+
"url": "https://packetstormsecurity.com/files/129118/Gogs-Markdown-Renderer-Cross-Site-Scripting.html"
58+
},
59+
{
60+
"type": "WEB",
61+
"url": "https://seclists.org/fulldisclosure/2014/Nov/31"
62+
},
63+
{
64+
"type": "WEB",
65+
"url": "https://seclists.org/fulldisclosure/2014/Nov/34"
66+
}
67+
],
68+
"database_specific": {
69+
"url": "https://pkg.go.dev/vuln/GO-2022-0642",
70+
"review_status": "UNREVIEWED"
71+
}
72+
}

data/osv/GO-2022-0644.json

+64
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,64 @@
1+
{
2+
"schema_version": "1.3.1",
3+
"id": "GO-2022-0644",
4+
"modified": "0001-01-01T00:00:00Z",
5+
"published": "0001-01-01T00:00:00Z",
6+
"aliases": [
7+
"CVE-2018-20321",
8+
"GHSA-9qq2-xhmc-h9qr"
9+
],
10+
"summary": "Access Control Bypass in github.com/rancher/rancher",
11+
"details": "Access Control Bypass in github.com/rancher/rancher",
12+
"affected": [
13+
{
14+
"package": {
15+
"name": "github.com/rancher/rancher",
16+
"ecosystem": "Go"
17+
},
18+
"ranges": [
19+
{
20+
"type": "SEMVER",
21+
"events": [
22+
{
23+
"introduced": "2.0.0+incompatible"
24+
},
25+
{
26+
"fixed": "2.1.6+incompatible"
27+
}
28+
]
29+
}
30+
],
31+
"ecosystem_specific": {}
32+
}
33+
],
34+
"references": [
35+
{
36+
"type": "ADVISORY",
37+
"url": "https://github.com/advisories/GHSA-9qq2-xhmc-h9qr"
38+
},
39+
{
40+
"type": "ADVISORY",
41+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-20321"
42+
},
43+
{
44+
"type": "FIX",
45+
"url": "https://github.com/rancher/rancher/commit/6ea187fcc2309d5a7a14ed47de5688bf6573f448"
46+
},
47+
{
48+
"type": "WEB",
49+
"url": "https://forums.rancher.com/c/announcements"
50+
},
51+
{
52+
"type": "WEB",
53+
"url": "https://github.com/rancher/rancher/releases/tag/v2.1.6"
54+
},
55+
{
56+
"type": "WEB",
57+
"url": "https://rancher.com/blog/2019/2019-01-29-explaining-security-vulnerabilities-addressed-in-rancher-v2-1-6-and-v2-0-11"
58+
}
59+
],
60+
"database_specific": {
61+
"url": "https://pkg.go.dev/vuln/GO-2022-0644",
62+
"review_status": "UNREVIEWED"
63+
}
64+
}

data/osv/GO-2022-0645.json

+60
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,60 @@
1+
{
2+
"schema_version": "1.3.1",
3+
"id": "GO-2022-0645",
4+
"modified": "0001-01-01T00:00:00Z",
5+
"published": "0001-01-01T00:00:00Z",
6+
"aliases": [
7+
"CVE-2021-3495",
8+
"GHSA-mv55-23xp-3wp8"
9+
],
10+
"summary": "Access control flaw in Kiali in github.com/kiali/kiali",
11+
"details": "Access control flaw in Kiali in github.com/kiali/kiali",
12+
"affected": [
13+
{
14+
"package": {
15+
"name": "github.com/kiali/kiali",
16+
"ecosystem": "Go"
17+
},
18+
"ranges": [
19+
{
20+
"type": "SEMVER",
21+
"events": [
22+
{
23+
"introduced": "0"
24+
},
25+
{
26+
"fixed": "1.33.0"
27+
}
28+
]
29+
}
30+
],
31+
"ecosystem_specific": {}
32+
}
33+
],
34+
"references": [
35+
{
36+
"type": "ADVISORY",
37+
"url": "https://github.com/advisories/GHSA-mv55-23xp-3wp8"
38+
},
39+
{
40+
"type": "ADVISORY",
41+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3495"
42+
},
43+
{
44+
"type": "WEB",
45+
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1947361"
46+
},
47+
{
48+
"type": "WEB",
49+
"url": "https://github.com/kiali/kiali-operator/pull/278"
50+
},
51+
{
52+
"type": "WEB",
53+
"url": "https://kiali.io/news/security-bulletins/kiali-security-003"
54+
}
55+
],
56+
"database_specific": {
57+
"url": "https://pkg.go.dev/vuln/GO-2022-0645",
58+
"review_status": "UNREVIEWED"
59+
}
60+
}

0 commit comments

Comments
 (0)