golang-docs vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the golang-docs package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Improperly Controlled Sequential Memory Allocation

<0:1.22.7-1.amzn2023.0.1
  • H
Uncontrolled Recursion

<0:1.22.7-1.amzn2023.0.1
  • H
Uncontrolled Recursion

<0:1.22.7-1.amzn2023.0.1
  • M
Improper Input Validation

<0:1.22.5-1.amzn2023.0.1
  • M
Misinterpretation of Input

<0:1.22.4-1.amzn2023.0.1
  • M
Improper Input Validation

<0:1.22.4-1.amzn2023.0.1
  • M
Misinterpretation of Input

<0:1.22.3-1.amzn2023.0.1
  • M
Arbitrary Code Injection

<0:1.22.3-1.amzn2023.0.1
  • M
Improper Input Validation

<0:1.22.3-1.amzn2023.0.1
  • M
Information Exposure

<0:1.22.3-1.amzn2023.0.1
  • M
Resource Exhaustion

<0:1.22.3-1.amzn2023.0.1
  • M
Improper Input Validation

<0:1.22.3-1.amzn2023.0.1
  • M
CVE-2023-45284

<0:1.20.12-1.amzn2023.0.1
  • M
Resource Exhaustion

<0:1.20.12-1.amzn2023.0.1
  • M
Directory Traversal

<0:1.20.12-1.amzn2023.0.1
  • H
Integer Overflow or Wraparound

<0:1.19.3-2.amzn2023.0.2
  • H
Unchecked Return Value

<0:1.19.3-2.amzn2023.0.2
  • H
Incorrect Authorization

<0:1.19.3-2.amzn2023.0.2
  • H
Resource Exhaustion

<0:1.19.3-2.amzn2023.0.2
  • H
Resource Exhaustion

<0:1.20.10-1.amzn2023.0.1
  • H
Arbitrary Code Injection

<0:1.20.10-1.amzn2023.0.1
  • H
Resource Exhaustion

<0:1.20.10-1.amzn2023.0.1
  • M
Cross-site Scripting (XSS)

<0:1.20.8-1.amzn2023.0.1
  • M
Cross-site Scripting (XSS)

<0:1.20.8-1.amzn2023.0.1
  • M
Resource Exhaustion

<0:1.20.7-1.amzn2023.0.1
  • H
HTTP Response Splitting

<0:1.20.6-1.amzn2023.0.1
  • H
Arbitrary Code Injection

<0:1.20.5-1.amzn2023.0.2
  • H
Exposure of Resource to Wrong Sphere

<0:1.20.5-1.amzn2023.0.2
  • H
Arbitrary Code Injection

<0:1.20.5-1.amzn2023.0.2
  • H
Improper Handling of Unicode Encoding

<0:1.20.5-1.amzn2023.0.2
  • H
Arbitrary Code Injection

<0:1.20.5-1.amzn2023.0.2
  • H
Improper Handling of Unicode Encoding

<0:1.19.9-1.amzn2023.0.1
  • H
Improper Handling of Unicode Encoding

<0:1.19.9-1.amzn2023.0.1
  • H
Improper Handling of Unicode Encoding

<0:1.19.9-1.amzn2023.0.1
  • H
Arbitrary Code Injection

<0:1.19.8-1.amzn2023.0.1
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:1.19.8-1.amzn2023.0.1
  • H
Incorrect Calculation

<0:1.19.8-1.amzn2023.0.1
  • H
Resource Exhaustion

<0:1.19.8-1.amzn2023.0.1
  • H
Resource Exhaustion

<0:1.19.8-1.amzn2023.0.1
  • H
Resource Exhaustion

<0:1.19.8-1.amzn2023.0.1
  • H
Directory Traversal

<0:1.19.8-1.amzn2023.0.1
  • H
Resource Exhaustion

<0:1.19.8-1.amzn2023.0.1
  • H
Allocation of Resources Without Limits or Throttling

<0:1.19.8-1.amzn2023.0.1
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:1.19.8-1.amzn2023.0.1
  • H
Unchecked Return Value

<0:1.19.8-1.amzn2023.0.1
  • H
HTTP Request Smuggling

<0:1.19.8-1.amzn2023.0.1
  • H
Arbitrary Code Injection

<0:1.19.8-1.amzn2023.0.1
  • H
Incorrect Authorization

<0:1.19.8-1.amzn2023.0.1
  • H
Integer Overflow or Wraparound

<0:1.19.8-1.amzn2023.0.1
  • H
Resource Exhaustion

<0:1.19.6-1.amzn2023.0.1
  • H
CVE-2022-41716

<0:1.19.3-2.amzn2023.0.2
  • H
CVE-2022-41715

<0:1.19.3-2.amzn2023.0.2
  • H
Resource Exhaustion

<0:1.19.3-2.amzn2023.0.2
  • H
Information Exposure

<0:1.19.3-2.amzn2023.0.2
  • H
Directory Traversal

<0:1.19.3-2.amzn2023.0.2
  • H
Improperly Controlled Sequential Memory Allocation

<0:1.19.3-2.amzn2023.0.2
  • H
Improperly Controlled Sequential Memory Allocation

<0:1.19.3-2.amzn2023.0.2
  • H
Improperly Controlled Sequential Memory Allocation

<0:1.19.3-2.amzn2023.0.2
  • H
Improperly Controlled Sequential Memory Allocation

<0:1.19.3-2.amzn2023.0.2
  • H
Improperly Controlled Sequential Memory Allocation

<0:1.19.3-2.amzn2023.0.2
  • H
Improper Privilege Management

<0:1.19.3-2.amzn2023.0.2
  • H
Insufficient Entropy

<0:1.19.3-2.amzn2023.0.2
  • H
Integer Overflow or Wraparound

<0:1.19.3-2.amzn2023.0.2
  • H
Resource Exhaustion

<0:1.19.3-2.amzn2023.0.2
  • H
Allocation of Resources Without Limits or Throttling

<0:1.19.3-2.amzn2023.0.2
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:1.19.3-2.amzn2023.0.2
  • H
Buffer Overflow

<0:1.19.3-2.amzn2023.0.2
  • H
Improperly Controlled Sequential Memory Allocation

<0:1.19.3-2.amzn2023.0.2
  • H
Improperly Controlled Sequential Memory Allocation

<0:1.19.3-2.amzn2023.0.2
  • H
Information Exposure

<0:1.19.3-2.amzn2023.0.2
  • H
Resource Exhaustion

<0:1.19.3-2.amzn2023.0.2
  • H
HTTP Request Smuggling

<0:1.19.3-2.amzn2023.0.2
  • H
Authorization Bypass Through User-Controlled Key

<0:1.19.3-2.amzn2023.0.2
  • H
Improper Input Validation

<0:1.19.3-2.amzn2023.0.2
  • H
Out-of-Bounds

<0:1.19.3-2.amzn2023.0.2
  • H
Improper Input Validation

<0:1.19.3-2.amzn2023.0.2
  • H
Resource Exhaustion

<0:1.19.3-2.amzn2023.0.2