Golang

Go

138 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.06%
  • Veröffentlicht 06.12.2023 17:15:07
  • Zuletzt bearbeitet 21.11.2024 08:26:41

Using go get to fetch a module with the ".git" suffix may unexpectedly fallback to the insecure "git://" protocol if the module is unavailable via the secure "https://" and "git+ssh://" protocols, even if GOINSECURE is not set for said module. This o...

  • EPSS 0.19%
  • Veröffentlicht 05.12.2023 17:15:08
  • Zuletzt bearbeitet 21.11.2024 08:26:42

Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the r...

  • EPSS 0.08%
  • Veröffentlicht 09.11.2023 17:15:08
  • Zuletzt bearbeitet 21.11.2024 08:26:41

The filepath package does not recognize paths with a \??\ prefix as special. On Windows, a path beginning with \??\ is a Root Local Device path equivalent to a path beginning with \\?\. Paths with a \??\ prefix may be used to access arbitrary locatio...

  • EPSS 0.04%
  • Veröffentlicht 09.11.2023 17:15:08
  • Zuletzt bearbeitet 21.11.2024 08:26:41

On Windows, The IsLocal function does not correctly detect reserved device names in some cases. Reserved names followed by spaces, such as "COM1 ", and reserved names "COM" and "LPT" followed by superscript 1, 2, or 3, are incorrectly reported as loc...

  • EPSS 0.09%
  • Veröffentlicht 11.10.2023 22:15:09
  • Zuletzt bearbeitet 21.11.2024 08:15:09

A malicious HTTP/2 client which rapidly creates requests and immediately resets them can cause excessive server resource consumption. While the total number of requests is bounded by the http2.Server.MaxConcurrentStreams setting, resetting an in-prog...

Warnung Medienbericht Exploit
  • EPSS 94.36%
  • Veröffentlicht 10.10.2023 14:15:10
  • Zuletzt bearbeitet 07.11.2025 19:00:41

The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.

  • EPSS 0.06%
  • Veröffentlicht 05.10.2023 21:15:11
  • Zuletzt bearbeitet 12.06.2025 16:15:20

Line directives ("//line") can be used to bypass the restrictions on "//go:cgo_" directives, allowing blocked linker and compiler flags to be passed during compilation. This can result in unexpected execution of arbitrary code when running "go build"...

  • EPSS 0.06%
  • Veröffentlicht 08.09.2023 17:15:28
  • Zuletzt bearbeitet 21.11.2024 08:15:09

Processing an incomplete post-handshake message for a QUIC connection can cause a panic.

  • EPSS 0.04%
  • Veröffentlicht 08.09.2023 17:15:28
  • Zuletzt bearbeitet 21.11.2024 08:15:09

QUIC connections do not set an upper bound on the amount of data buffered when reading post-handshake messages, allowing a malicious QUIC connection to cause unbounded memory growth. With fix, connections now consistently reject messages larger than ...

  • EPSS 0.09%
  • Veröffentlicht 08.09.2023 17:15:27
  • Zuletzt bearbeitet 21.11.2024 08:15:08

The html/template package does not properly handle HTML-like "" comment tokens, nor hashbang "#!" comment tokens, in <script> contexts. This may cause the template parser to improperly interpret the contents of <script> contexts, causing actions to b...