Show filters
157 Total Results
Displaying 131-140 of 157
Sort by:
Attacker Value
Unknown
CVE-2019-9738
Disclosure Date: March 13, 2019 (last updated November 27, 2024)
jimmykuu Gopher 2.0 has DOM-based XSS via vectors involving the '<EMBED SRC="data:image/svg+xml' substring.
0
Attacker Value
Unknown
CVE-2019-9634
Disclosure Date: March 08, 2019 (last updated November 27, 2024)
Go through 1.12 on Windows misuses certain LoadLibrary functionality, leading to DLL injection.
0
Attacker Value
Unknown
CVE-2019-6486
Disclosure Date: January 24, 2019 (last updated November 08, 2023)
Go before 1.10.8 and 1.11.x before 1.11.5 mishandles P-521 and P-384 elliptic curves, which allows attackers to cause a denial of service (CPU consumption) or possibly conduct ECDH private key recovery attacks.
0
Attacker Value
Unknown
CVE-2018-16873
Disclosure Date: December 14, 2018 (last updated November 08, 2023)
In Go before 1.10.6 and 1.11.x before 1.11.3, the "go get" command is vulnerable to remote code execution when executed with the -u flag and the import path of a malicious Go package, or a package that imports it directly or indirectly. Specifically, it is only vulnerable in GOPATH mode, but not in module mode (the distinction is documented at https://golang.org/cmd/go/#hdr-Module_aware_go_get). Using custom domains, it's possible to arrange things so that a Git repository is cloned to a folder named ".git" by using a vanity import path that ends with "/.git". If the Git repository root contains a "HEAD" file, a "config" file, an "objects" directory, a "refs" directory, with some work to ensure the proper ordering of operations, "go get -u" can be tricked into considering the parent directory as a repository root, and running Git commands on it. That will use the "config" file in the original Git repository root for its configuration, and if that config file contains malicious command…
0
Attacker Value
Unknown
CVE-2018-16875
Disclosure Date: December 14, 2018 (last updated November 08, 2023)
The crypto/x509 package of Go before 1.10.6 and 1.11.x before 1.11.3 does not limit the amount of work performed for each chain verification, which might allow attackers to craft pathological inputs leading to a CPU denial of service. Go TLS servers accepting client certificates and TLS clients are affected.
0
Attacker Value
Unknown
CVE-2018-16874
Disclosure Date: December 14, 2018 (last updated November 08, 2023)
In Go before 1.10.6 and 1.11.x before 1.11.3, the "go get" command is vulnerable to directory traversal when executed with the import path of a malicious Go package which contains curly braces (both '{' and '}' characters). Specifically, it is only vulnerable in GOPATH mode, but not in module mode (the distinction is documented at https://golang.org/cmd/go/#hdr-Module_aware_go_get). The attacker can cause an arbitrary filesystem write, which can lead to code execution.
0
Attacker Value
Unknown
CVE-2018-17846
Disclosure Date: October 01, 2018 (last updated November 08, 2023)
The html package (aka x/net/html) through 2018-09-25 in Go mishandles <table><math><select><mi><select></table>, leading to an infinite loop during an html.Parse call because inSelectIM and inSelectInTableIM do not comply with a specification.
0
Attacker Value
Unknown
CVE-2018-17848
Disclosure Date: October 01, 2018 (last updated November 08, 2023)
The html package (aka x/net/html) through 2018-09-25 in Go mishandles <math><template><mn><b></template>, leading to a "panic: runtime error" (index out of range) in (*insertionModeStack).pop in node.go, called from inHeadIM, during an html.Parse call.
0
Attacker Value
Unknown
CVE-2018-17847
Disclosure Date: October 01, 2018 (last updated November 08, 2023)
The html package (aka x/net/html) through 2018-09-25 in Go mishandles <svg><template><desc><t><svg></template>, leading to a "panic: runtime error" (index out of range) in (*nodeStack).pop in node.go, called from (*parser).clearActiveFormattingElements, during an html.Parse call.
0
Attacker Value
Unknown
CVE-2018-17143
Disclosure Date: September 17, 2018 (last updated November 08, 2023)
The html package (aka x/net/html) through 2018-09-17 in Go mishandles <template><tBody><isindex/action=0>, leading to a "panic: runtime error" in inBodyIM in parse.go during an html.Parse call.
0