Golang

Go

170 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 3.34%
  • Veröffentlicht 13.03.2019 08:29:00
  • Zuletzt bearbeitet 21.11.2024 04:52:12

An issue was discovered in net/http in Go 1.11.5. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the second argument to http.NewRequest with \r\n followed by an HTTP header or a Redis command.

Exploit
  • EPSS 0.53%
  • Veröffentlicht 08.03.2019 15:29:00
  • Zuletzt bearbeitet 21.11.2024 04:52:00

Go through 1.12 on Windows misuses certain LoadLibrary functionality, leading to DLL injection.

  • EPSS 0.85%
  • Veröffentlicht 24.01.2019 05:29:00
  • Zuletzt bearbeitet 21.11.2024 04:46:32

Go before 1.10.8 and 1.11.x before 1.11.5 mishandles P-521 and P-384 elliptic curves, which allows attackers to cause a denial of service (CPU consumption) or possibly conduct ECDH private key recovery attacks.

  • EPSS 56.8%
  • Veröffentlicht 14.12.2018 14:29:00
  • Zuletzt bearbeitet 21.11.2024 03:53:29

In Go before 1.10.6 and 1.11.x before 1.11.3, the "go get" command is vulnerable to remote code execution when executed with the -u flag and the import path of a malicious Go package, or a package that imports it directly or indirectly. Specifically,...

  • EPSS 5.74%
  • Veröffentlicht 14.12.2018 14:29:00
  • Zuletzt bearbeitet 21.11.2024 03:53:30

In Go before 1.10.6 and 1.11.x before 1.11.3, the "go get" command is vulnerable to directory traversal when executed with the import path of a malicious Go package which contains curly braces (both '{' and '}' characters). Specifically, it is only v...

  • EPSS 0.92%
  • Veröffentlicht 14.12.2018 14:29:00
  • Zuletzt bearbeitet 21.11.2024 03:53:30

The crypto/x509 package of Go before 1.10.6 and 1.11.x before 1.11.3 does not limit the amount of work performed for each chain verification, which might allow attackers to craft pathological inputs leading to a CPU denial of service. Go TLS servers ...

Exploit
  • EPSS 7.59%
  • Veröffentlicht 16.02.2018 17:29:00
  • Zuletzt bearbeitet 21.11.2024 04:11:45

The "go get" implementation in Go 1.9.4, when the -insecure command-line option is used, does not validate the import path (get/vcs.go only checks for "://" anywhere in the string), which allows remote attackers to execute arbitrary OS commands via a...

Exploit
  • EPSS 36.79%
  • Veröffentlicht 07.02.2018 21:29:00
  • Zuletzt bearbeitet 21.11.2024 04:10:55

Go before 1.8.7, Go 1.9.x before 1.9.4, and Go 1.10 pre-releases before Go 1.10rc2 allow "go get" remote command execution during source code build, by leveraging the gcc or clang plugin feature, because -fplugin= and -plugin= arguments were not bloc...

  • EPSS 11.88%
  • Veröffentlicht 18.10.2017 20:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The net/http library in net/textproto/reader.go in Go before 1.4.3 does not properly parse HTTP header keys, which allows remote attackers to conduct HTTP request smuggling attacks via a space instead of a hyphen, as demonstrated by "Content Length" ...

  • EPSS 4.27%
  • Veröffentlicht 18.10.2017 20:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The net/http library in net/http/transfer.go in Go before 1.4.3 does not properly parse HTTP headers, which allows remote attackers to conduct HTTP request smuggling attacks via a request with two Content-length headers.