Golang

Go

138 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.61%
  • Veröffentlicht 17.07.2020 16:15:11
  • Zuletzt bearbeitet 21.11.2024 05:05:48

Go before 1.13.13 and 1.14.x before 1.14.5 has a data race in some net/http servers, as demonstrated by the httputil.ReverseProxy Handler, because it reads a request body and writes a response at the same time.

  • EPSS 0.85%
  • Veröffentlicht 16.03.2020 21:15:12
  • Zuletzt bearbeitet 21.11.2024 05:38:00

Go before 1.12.16 and 1.13.x before 1.13.7 (and the crypto/cryptobyte package before 0.0.0-20200124225646-8b5121be2f68 for Go) allows attacks on clients (resulting in a panic) via a malformed X.509 certificate.

  • EPSS 1.75%
  • Veröffentlicht 08.02.2020 19:15:10
  • Zuletzt bearbeitet 21.11.2024 02:33:45

The net/http library in net/http/transfer.go in Go before 1.4.3 does not properly parse HTTP headers, which allows remote attackers to conduct HTTP request smuggling attacks via a request that contains Content-Length and Transfer-Encoding header fiel...

Warnung
  • EPSS 94.09%
  • Veröffentlicht 14.01.2020 23:15:30
  • Zuletzt bearbeitet 29.10.2025 14:33:49

A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) validates Elliptic Curve Cryptography (ECC) certificates.An attacker could exploit the vulnerability by using a spoofed code-signing certificate to sign a malicious executable...

Exploit
  • EPSS 2.34%
  • Veröffentlicht 24.10.2019 22:15:10
  • Zuletzt bearbeitet 21.11.2024 04:32:36

Go before 1.12.11 and 1.3.x before 1.13.2 can panic upon an attempt to process network traffic containing an invalid DSA public key. There are several attack scenarios, such as traffic from a client to a server that verifies client certificates.

  • EPSS 4.64%
  • Veröffentlicht 30.09.2019 19:15:08
  • Zuletzt bearbeitet 21.11.2024 04:30:26

Go before 1.12.10 and 1.13.x before 1.13.1 allow HTTP Request Smuggling.

Exploit
  • EPSS 1.78%
  • Veröffentlicht 13.08.2019 21:15:11
  • Zuletzt bearbeitet 21.11.2024 04:27:24

net/url in Go before 1.11.13 and 1.12.x before 1.12.8 mishandles malformed hosts in URLs, leading to an authorization bypass in some applications. This is related to a Host field with a suffix appearing in neither Hostname() nor Port(), and is relate...

  • EPSS 0.42%
  • Veröffentlicht 13.05.2019 05:29:01
  • Zuletzt bearbeitet 21.11.2024 04:21:57

Go through 1.12.5 on Windows mishandles process creation with a nil environment in conjunction with a non-nil token, which allows attackers to obtain sensitive information or gain privileges.

Exploit
  • EPSS 1.83%
  • Veröffentlicht 13.03.2019 08:29:00
  • Zuletzt bearbeitet 21.11.2024 04:52:12

An issue was discovered in net/http in Go 1.11.5. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the second argument to http.NewRequest with \r\n followed by an HTTP header or a Redis command.

Exploit
  • EPSS 0.33%
  • Veröffentlicht 08.03.2019 15:29:00
  • Zuletzt bearbeitet 21.11.2024 04:52:00

Go through 1.12 on Windows misuses certain LoadLibrary functionality, leading to DLL injection.