Affected by GO-2023-1986
and 21 other vulnerabilities
GO-2023-1986 : HashiCorp Vault and Vault Enterprise vulnerable to user enumeration in github.com/hashicorp/vault
GO-2023-2063 : HashiCorp Vault Improper Input Validation vulnerability in github.com/hashicorp/vault
GO-2023-2088 : Hashicorp Vault Incorrect Permission Assignment for Critical Resource vulnerability in github.com/hashicorp/vault
GO-2023-2329 : HashiCorp Vault Missing Release of Memory after Effective Lifetime vulnerability in github.com/hashicorp/vault
GO-2024-2617 : Authentication bypass in github.com/hashicorp/vault
GO-2024-2690 : HashiCorpVault does not correctly validate OCSP responses in github.com/hashicorp/vault
GO-2024-2921 : HashiCorp Vault Incorrectly Validated JSON Web Tokens (JWT) Audience Claims in github.com/hashicorp/vault
GO-2024-2982 : Hashicorp Vault vulnerable to Improper Check or Handling of Exceptional Conditions in github.com/hashicorp/vault
GO-2024-3162 : Vault SSH Secrets Engine Configuration Did Not Restrict Valid Principals By Default in github.com/hashicorp/vault
GO-2024-3191 : Vault Community Edition privilege escalation vulnerability in github.com/hashicorp/vault
GO-2024-3246 : Hashicorp Vault vulnerable to denial of service through memory exhaustion in github.com/hashicorp/vault
GO-2025-3662 : Hashicorp Vault Community vulnerable to Incorrect Authorization in github.com/hashicorp/vault
GO-2025-3663 : Hashicorp Vault Community vulnerable to Generation of Error Message Containing Sensitive Information in github.com/hashicorp/vault
GO-2025-3836 : Hashicorp Vault has Incorrect Validation for Non-CA Certificates in github.com/hashicorp/vault
GO-2025-3837 : Hashicorp Vault has Privilege Escalation Vulnerability in github.com/hashicorp/vault
GO-2025-3838 : Hashicorp Vault has Code Execution Vulnerability via Plugin Configuration in github.com/hashicorp/vault
GO-2025-3839 : Hashicorp Vault has an Observable Discrepancy on Existing and Non-Existing Users in github.com/hashicorp/vault
GO-2025-3841 : Hashicorp Vault's TOTP Secrets Engine Susceptible to Code Reuse in github.com/hashicorp/vault
GO-2025-3842 : Hashicorp Vault has Login MFA Rate Limit Bypass Vulnerability in github.com/hashicorp/vault
GO-2025-3848 : HashiCorp Vault ldap auth method may not have correctly enforced MFA in github.com/hashicorp/vault
GO-2025-3924 : HashiCorp Vault Community Edition Denial of Service Though Complex JSON Payloads in github.com/hashicorp/vault
GO-2025-4070 : HashiCorp Vault and Vault Enterprise's AWS Auth method may be susceptible to authentication bypass in github.com/hashicorp/vault
Discover Packages
github.com/hashicorp/vault
helper
timeutil
package
Version:
v1.12.7
Opens a new window with list of versions in this module.
Published: Jun 7, 2023
License: MPL-2.0
Opens a new window with license information.
Imports: 6
Opens a new window with list of imports.
Imported by: 6
Opens a new window with list of known importers.
Documentation
Documentation
¶
GetMostRecentContinuousMonths finds the start time of the most
recent set of continguous months.
For example, if the most recent start time is Aug 15, then that range is just 1 month
If the recent start times are Aug 1 and July 1 and June 15, then that range is
three months and we return June 15.
note: return slice will be nil if :startTimes: is nil
:startTimes: must be sorted in decreasing order (see unit test for examples)
IsCurrentMonth checks if :t: is in the current month, as defined by :compare:
generally, pass in time.Now().UTC() as :compare:
IsMonthStart checks if :t: is the start of the month
IsPreviousMonth checks if :t: is in the month directly before :toCompare:
Compute the N-month period before the given date.
For example, if it is currently April 2020, then 12 months is April 2019 through March 2020.
ParseTimeFromPath returns a UTC time from a path of the form '<timestamp>/',
where <timestamp> is a Unix timestamp
Skip this test if too close to the end of a month!
Source Files
¶
Click to show internal directories.
Click to hide internal directories.