Golang

Go

138 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.18%
  • Veröffentlicht 05.10.2017 01:29:03
  • Zuletzt bearbeitet 20.04.2025 01:37:25

On Darwin, user's trust preferences for root certificates were not honored. If the user had a root certificate loaded in their Keychain that was explicitly not trusted, a Go program would still verify a connection using that root certificate.

  • EPSS 0.43%
  • Veröffentlicht 05.10.2017 01:29:03
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The net/http package's Request.ParseMultipartForm method starts writing to temporary files once the request body size surpasses the given "maxMemory" limit. It was possible for an attacker to generate a multipart request crafted such that the server ...

  • EPSS 2.02%
  • Veröffentlicht 06.07.2017 16:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

A bug in the standard library ScalarMult implementation of curve P-256 for amd64 architectures in Go before 1.7.6 and 1.8.x before 1.8.2 causes incorrect results to be generated for specific input points. An adaptive attack can be mounted to progress...

  • EPSS 81.56%
  • Veröffentlicht 19.07.2016 02:00:18
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The net/http package in Go through 1.6 does not attempt to address RFC 3875 section 4.1.18 namespace conflicts and therefore does not protect CGI applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which mi...

  • EPSS 2.47%
  • Veröffentlicht 23.05.2016 19:59:04
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The Verify function in crypto/dsa/dsa.go in Go before 1.5.4 and 1.6.x before 1.6.1 does not properly check parameters passed to the big integer library, which might allow remote attackers to cause a denial of service (infinite loop) via a crafted pub...

  • EPSS 0.15%
  • Veröffentlicht 23.05.2016 19:59:03
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Untrusted search path vulnerability in Go before 1.5.4 and 1.6.x before 1.6.1 on Windows allows local users to gain privileges via a Trojan horse DLL in the current working directory, related to use of the LoadLibrary function.

  • EPSS 0.74%
  • Veröffentlicht 27.01.2016 20:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The Int.Exp Montgomery code in the math/big library in Go 1.5.x before 1.5.3 mishandles carry propagation and produces incorrect output, which makes it easier for attackers to obtain private RSA keys via unspecified vectors.

  • EPSS 0.29%
  • Veröffentlicht 07.10.2014 14:55:07
  • Zuletzt bearbeitet 12.04.2025 10:46:40

crpyto/tls in Go 1.1 before 1.3.2, when SessionTicketsDisabled is enabled, allows man-in-the-middle attackers to spoof clients via unspecified vectors.