go-toolset vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the go-toolset package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Use of Uninitialized Variable

*
  • H
Improperly Controlled Sequential Memory Allocation

<0:1.21.13-3.el9_4
  • H
Uncontrolled Recursion

<0:1.21.13-3.el9_4
  • H
Uncontrolled Recursion

<0:1.21.13-3.el9_4
  • H
Improper Input Validation

<0:1.21.13-3.el9_4
  • M
Improper Input Validation

<0:1.21.11-1.el9_4
  • M
Misinterpretation of Input

<0:1.21.11-1.el9_4
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Allocation of Resources Without Limits or Throttling

<0:1.20.10-1.el9_3
  • M
CVE-2023-39321

<0:1.20.10-1.el9_3
  • M
Cross-site Scripting (XSS)

<0:1.20.10-1.el9_3
  • H
Resource Exhaustion

<0:1.21.9-2.el9_4
  • M
Cross-site Scripting (XSS)

<0:1.20.10-1.el9_3
  • H
Memory Leak

<0:1.21.9-2.el9_4
  • M
Protection Mechanism Failure

<0:1.20.12-1.el9_3
  • M
Resource Exhaustion

<0:1.20.12-1.el9_3
  • H
Arbitrary Code Injection

<0:1.21.9-2.el9_4
  • H
Improper Input Validation

<0:1.21.9-2.el9_4
  • H
Misinterpretation of Input

<0:1.21.9-2.el9_4
  • H
Improper Input Validation

<0:1.21.9-2.el9_4
  • H
Information Exposure

<0:1.21.9-2.el9_4
  • C
Arbitrary Code Injection

<0:1.19.10-1.el9_2
  • C
Arbitrary Code Injection

<0:1.19.10-1.el9_2
  • C
Arbitrary Code Injection

<0:1.19.10-1.el9_2
  • C
Exposure of Resource to Wrong Sphere

<0:1.19.10-1.el9_2
  • M
Information Exposure

*
  • M
Improperly Controlled Sequential Memory Allocation

*
  • M
Improperly Controlled Sequential Memory Allocation

*
  • M
Improperly Controlled Sequential Memory Allocation

*
  • M
Improperly Controlled Sequential Memory Allocation

*
  • M
Improperly Controlled Sequential Memory Allocation

*
  • M
Improperly Controlled Sequential Memory Allocation

*
  • M
Improperly Controlled Sequential Memory Allocation

*
  • M
HTTP Request Smuggling

*
  • H
Insufficient Entropy

<0:1.17.12-1.el9_0
  • H
Improper Privilege Management

<0:1.17.12-1.el9_0
  • H
Integer Overflow or Wraparound

<0:1.17.12-1.el9_0
  • H
Buffer Overflow

<0:1.17.12-1.el9_0
  • H
Resource Exhaustion

<0:1.17.12-1.el9_0
  • M
Improper Certificate Validation

*