Golang : Security Vulnerabilities (Overflow)
# |
CVE ID
|
CWE ID
|
# of Exploits
|
Vulnerability Type(s)
|
Publish Date
|
Update Date
|
Score
|
Gained Access Level
|
Access
|
Complexity
|
Authentication
|
Conf.
|
Integ.
|
Avail.
|
1 |
CVE-2022-24675 |
770 |
|
Overflow |
2022-04-20 |
2023-02-14 |
5.0 |
None |
Remote |
Low |
Not required |
None |
None |
Partial |
encoding/pem in Go before 1.17.9 and 1.18.x before 1.18.1 has a Decode stack overflow via a large amount of PEM data. |
2 |
CVE-2022-23772 |
190 |
|
Overflow |
2022-02-11 |
2022-11-09 |
7.8 |
None |
Remote |
Low |
Not required |
None |
None |
Complete |
Rat.SetString in math/big in Go before 1.16.14 and 1.17.x before 1.17.7 has an overflow that can lead to Uncontrolled Memory Consumption. |
3 |
CVE-2021-41771 |
119 |
|
Overflow |
2021-11-08 |
2023-02-14 |
5.0 |
None |
Remote |
Low |
Not required |
None |
None |
Partial |
ImportedSymbols in debug/macho (for Open or OpenFat) in Go before 1.16.10 and 1.17.x before 1.17.3 Accesses a Memory Location After the End of a Buffer, aka an out-of-bounds slice situation. |
4 |
CVE-2021-38297 |
120 |
|
Overflow |
2021-10-18 |
2022-09-08 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
Go before 1.16.9 and 1.17.x before 1.17.2 has a Buffer Overflow via large arguments in a function invocation from a WASM module, when GOARCH=wasm GOOS=js is used. |
5 |
CVE-2018-17847 |
119 |
|
Overflow |
2018-10-01 |
2020-08-24 |
5.0 |
None |
Remote |
Low |
Not required |
None |
None |
Partial |
The html package (aka x/net/html) through 2018-09-25 in Go mishandles <svg><template><desc><t><svg></template>, leading to a "panic: runtime error" (index out of range) in (*nodeStack).pop in node.go, called from (*parser).clearActiveFormattingElements, during an html.Parse call. |
6 |
CVE-2018-17143 |
119 |
|
Overflow |
2018-09-17 |
2020-08-24 |
5.0 |
None |
Remote |
Low |
Not required |
None |
None |
Partial |
The html package (aka x/net/html) through 2018-09-17 in Go mishandles <template><tBody><isindex/action=0>, leading to a "panic: runtime error" in inBodyIM in parse.go during an html.Parse call. |
Total number of vulnerabilities :
6
Page :
1
(This Page)