Golang

Go

125 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Published 11.06.2025 17:17:25
  • Last modified 08.08.2025 14:53:03

os.OpenFile(path, os.O_CREATE|O_EXCL) behaved differently on Unix and Windows systems when the target path was a dangling symlink. On Unix systems, OpenFile with O_CREATE and O_EXCL flags never follows symlinks. On Windows, when the target path was a...

  • EPSS 0.01%
  • Published 05.06.2024 16:15:10
  • Last modified 31.01.2025 15:15:12

The archive/zip package's handling of certain types of invalid zip files differs from the behavior of most zip implementations. This misalignment could be exploited to create an zip file with contents that vary depending on the implementation reading...

  • EPSS 0.07%
  • Published 05.06.2024 16:15:10
  • Last modified 21.11.2024 08:59:42

The various Is methods (IsPrivate, IsLoopback, etc) did not work as expected for IPv4-mapped IPv6 addresses, returning false for addresses which would return true in their traditional IPv4 forms.

  • EPSS 2.14%
  • Published 08.05.2024 16:15:08
  • Last modified 21.11.2024 08:59:42

On Darwin, building a Go module which contains CGO can trigger arbitrary code execution when using the Apple version of ld, due to usage of the -lto_library flag in a "#cgo LDFLAGS" directive.

Exploit
  • EPSS 5.83%
  • Published 10.04.2024 16:15:16
  • Last modified 25.06.2025 20:24:12

A command inject vulnerability allows an attacker to perform command injection on Windows applications that indirectly depend on the CreateProcess function when the specific conditions are satisfied.

  • EPSS 0.23%
  • Published 05.03.2024 23:15:07
  • Last modified 21.11.2024 08:59:42

The protojson.Unmarshal function can enter an infinite loop when unmarshaling certain forms of invalid JSON. This condition can occur when unmarshaling into a message which contains a google.protobuf.Any value, or when the UnmarshalOptions.DiscardUnk...

  • EPSS 0.05%
  • Published 06.12.2023 17:15:07
  • Last modified 21.11.2024 08:15:09

A malicious HTTP sender can use chunk extensions to cause a receiver reading from a request or response body to read many more bytes from the network than are in the body. A malicious HTTP client can further exploit this to cause a server to automati...

  • EPSS 0.06%
  • Published 06.12.2023 17:15:07
  • Last modified 21.11.2024 08:26:41

Using go get to fetch a module with the ".git" suffix may unexpectedly fallback to the insecure "git://" protocol if the module is unavailable via the secure "https://" and "git+ssh://" protocols, even if GOINSECURE is not set for said module. This o...

  • EPSS 0.19%
  • Published 05.12.2023 17:15:08
  • Last modified 21.11.2024 08:26:42

Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the r...

  • EPSS 0.06%
  • Published 09.11.2023 17:15:08
  • Last modified 21.11.2024 08:26:41

The filepath package does not recognize paths with a \??\ prefix as special. On Windows, a path beginning with \??\ is a Root Local Device path equivalent to a path beginning with \\?\. Paths with a \??\ prefix may be used to access arbitrary locatio...