Show filters
157 Total Results
Displaying 121-130 of 157
Sort by:
Attacker Value
Unknown
CVE-2020-9283
Disclosure Date: February 20, 2020 (last updated February 21, 2025)
golang.org/x/crypto before v0.0.0-20200220183623-bac4c82f6975 for Go allows a panic during signature verification in the golang.org/x/crypto/ssh package. A client can attack an SSH server that accepts public keys. Also, a server can attack any SSH client.
0
Attacker Value
Unknown
CVE-2015-5741
Disclosure Date: February 08, 2020 (last updated February 21, 2025)
The net/http library in net/http/transfer.go in Go before 1.4.3 does not properly parse HTTP headers, which allows remote attackers to conduct HTTP request smuggling attacks via a request that contains Content-Length and Transfer-Encoding header fields.
0
Attacker Value
Unknown
CVE-2019-17596
Disclosure Date: October 24, 2019 (last updated November 08, 2023)
Go before 1.12.11 and 1.3.x before 1.13.2 can panic upon an attempt to process network traffic containing an invalid DSA public key. There are several attack scenarios, such as traffic from a client to a server that verifies client certificates.
0
Attacker Value
Unknown
CVE-2019-16276
Disclosure Date: September 30, 2019 (last updated November 08, 2023)
Go before 1.12.10 and 1.13.x before 1.13.1 allow HTTP Request Smuggling.
0
Attacker Value
Unknown
CVE-2019-14809
Disclosure Date: August 13, 2019 (last updated November 08, 2023)
net/url in Go before 1.11.13 and 1.12.x before 1.12.8 mishandles malformed hosts in URLs, leading to an authorization bypass in some applications. This is related to a Host field with a suffix appearing in neither Hostname() nor Port(), and is related to a non-numeric port number. For example, an attacker can compose a crafted javascript:// URL that results in a hostname of google.com.
0
Attacker Value
Unknown
CVE-2019-11841
Disclosure Date: May 22, 2019 (last updated November 27, 2024)
A message-forgery issue was discovered in crypto/openpgp/clearsign/clearsign.go in supplementary Go cryptography libraries 2019-03-25. According to the OpenPGP Message Format specification in RFC 4880 chapter 7, a cleartext signed message can contain one or more optional "Hash" Armor Headers. The "Hash" Armor Header specifies the message digest algorithm(s) used for the signature. However, the Go clearsign package ignores the value of this header, which allows an attacker to spoof it. Consequently, an attacker can lead a victim to believe the signature was generated using a different message digest algorithm than what was actually used. Moreover, since the library skips Armor Header parsing in general, an attacker can not only embed arbitrary Armor Headers, but also prepend arbitrary text to cleartext messages without invalidating the signatures.
0
Attacker Value
Unknown
CVE-2019-11888
Disclosure Date: May 13, 2019 (last updated November 27, 2024)
Go through 1.12.5 on Windows mishandles process creation with a nil environment in conjunction with a non-nil token, which allows attackers to obtain sensitive information or gain privileges.
0
Attacker Value
Unknown
CVE-2019-11840
Disclosure Date: May 09, 2019 (last updated May 10, 2024)
An issue was discovered in the supplementary Go cryptography library, golang.org/x/crypto, before v0.0.0-20190320223903-b7391e95e576. A flaw was found in the amd64 implementation of the golang.org/x/crypto/salsa20 and golang.org/x/crypto/salsa20/salsa packages. If more than 256 GiB of keystream is generated, or if the counter otherwise grows greater than 32 bits, the amd64 implementation will first generate incorrect output, and then cycle back to previously generated keystream. Repeated keystream bytes can lead to loss of confidentiality in encryption applications, or to predictability in CSPRNG applications.
0
Attacker Value
Unknown
CVE-2017-18367
Disclosure Date: April 24, 2019 (last updated November 27, 2024)
libseccomp-golang 0.9.0 and earlier incorrectly generates BPFs that OR multiple arguments rather than ANDing them. A process running under a restrictive seccomp filter that specified multiple syscall arguments could bypass intended access restrictions by specifying a single matching argument.
0
Attacker Value
Unknown
CVE-2019-9741
Disclosure Date: March 13, 2019 (last updated November 08, 2023)
An issue was discovered in net/http in Go 1.11.5. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the second argument to http.NewRequest with \r\n followed by an HTTP header or a Redis command.
0