Golang

Go

170 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 07.05.2026 19:41:19
  • Zuletzt bearbeitet 12.05.2026 20:23:02

When using LookupCNAME with the cgo DNS resolver, a very long CNAME response can trigger a double-free of C memory and a crash.

  • EPSS 0.05%
  • Veröffentlicht 07.05.2026 19:41:19
  • Zuletzt bearbeitet 13.05.2026 15:10:58

Well-crafted inputs reaching ParseAddress, ParseAddressList, and ParseDate were able to trigger excessive CPU exhaustion and memory allocations.

  • EPSS 0.01%
  • Veröffentlicht 07.05.2026 19:41:19
  • Zuletzt bearbeitet 13.05.2026 16:58:45

CVE-2026-27142 fixed a vulnerability in which URLs were not correctly escaped inside of a <meta> tag's <content> attribute. If the URL content were to insert ASCII whitespaces around the '=' rune inside of the <content> attribute, the escaper would f...

  • EPSS 0.01%
  • Veröffentlicht 07.05.2026 19:41:19
  • Zuletzt bearbeitet 13.05.2026 16:59:07

If a trusted template author were to write a <script> tag containing an empty 'type' attribute or a 'type' attribute with an ASCII whitespace, the execution of the template would incorrectly escape any data passed into the <script> block.

  • EPSS 0.01%
  • Veröffentlicht 07.05.2026 19:41:19
  • Zuletzt bearbeitet 13.05.2026 16:59:42

A malicious module proxy can exploit a flaw in the go command's validation of module checksums to bypass checksum database validation. This vulnerability affects any user using an untrusted module proxy (GOMODPROXY) or checksum database (GOSUMDB). A ...

  • EPSS 0.01%
  • Veröffentlicht 07.05.2026 19:41:18
  • Zuletzt bearbeitet 13.05.2026 14:59:28

The "go tool pack" subcommand (usually used only by the compiler as an internal tool with known-good inputs) does not sanitize output filenames. Extracting a malicious archive file with the "pack" subcommand can write files to arbitrary locations on ...

  • EPSS 0.01%
  • Veröffentlicht 07.05.2026 19:41:18
  • Zuletzt bearbeitet 13.05.2026 15:05:41

The "go bug" command writes to two files with predictable names in the system temporary directory (for example, "/tmp"). An attacker with access to the temporary directory can create a symlink in one of these names, causing "go bug" to overwrite the ...

  • EPSS 0.01%
  • Veröffentlicht 07.05.2026 19:41:18
  • Zuletzt bearbeitet 13.05.2026 16:58:56

ReverseProxy can forward queries containing parameters not visible to Rewrite functions. When used with a Rewrite function, or a Director function which parses query parameters, ReverseProxy sanitizes the forwarded request to remove query parameters ...

  • EPSS 0.02%
  • Veröffentlicht 07.05.2026 19:41:18
  • Zuletzt bearbeitet 13.05.2026 15:11:10

The Dial and LookupPort functions panic on Windows when provided with an input containing a NUL (0).

  • EPSS 0.02%
  • Veröffentlicht 07.05.2026 19:41:18
  • Zuletzt bearbeitet 13.05.2026 16:59:17

Pathological inputs could cause DoS through consumePhrase when parsing an email address according to RFC 5322.