golang-tests vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the golang-tests package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Improper Output Neutralization for Logs

*
  • M
Expected Behavior Violation

<0:1.24.6-1.el10_0
  • M
Race Condition

<0:1.24.6-1.el10_0
  • H
Improper Certificate Validation

<0:1.24.4-1.el10_0
  • M
Expected Behavior Violation

*
  • M
Misinterpretation of Input

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Arbitrary Code Injection

*
  • M
Resource Exhaustion

*
  • M
Misinterpretation of Input

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • H
Arbitrary Code Injection

<0:1.24.6-1.el10_0
  • M
Improper Input Validation

*
  • M
Improper Handling of Unicode Encoding

*
  • M
Arbitrary Code Injection

*
  • M
CVE-2022-41715

*
  • M
Incorrect Calculation

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • H
Improper Handling of Unicode Encoding

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Resource Exhaustion

*
  • M
Arbitrary Code Injection

*
  • M
Improperly Controlled Sequential Memory Allocation

*
  • M
Improperly Controlled Sequential Memory Allocation

*
  • M
Uncontrolled Recursion

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
HTTP Response Splitting

*
  • H
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Information Exposure

*
  • M
Buffer Access with Incorrect Length Value

*
  • M
Information Exposure

*
  • M
Protection Mechanism Failure

*
  • M
Cross-site Scripting (XSS)

*
  • M
Improper Handling of Unicode Encoding

*
  • M
Cross-site Scripting (XSS)

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
HTTP Response Splitting

*
  • M
Arbitrary Code Injection

*
  • M
Resource Exhaustion

*
  • M
Improperly Controlled Sequential Memory Allocation

*
  • M
Information Exposure

*
  • M
Directory Traversal

*
  • M
Improperly Controlled Sequential Memory Allocation

*
  • M
Improperly Controlled Sequential Memory Allocation

*
  • M
Improperly Controlled Sequential Memory Allocation

*
  • M
Algorithmic Complexity

*
  • M
Improperly Controlled Sequential Memory Allocation

*
  • M
Integer Overflow or Wraparound

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Unchecked Return Value

*
  • M
Buffer Overflow

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
HTTP Request Smuggling

*
  • M
HTTP Request Smuggling

*
  • M
Improperly Controlled Sequential Memory Allocation

*
  • M
Information Exposure

*
  • M
Race Condition

*
  • M
Out-of-bounds Read

*
  • M
Resource Exhaustion

*
  • M
Improper Input Validation

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Improper Input Validation

*
  • M
Buffer Overflow

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Incorrect Calculation

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
Race Condition

*
  • L
Cross-site Scripting (XSS)

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
HTTP Request Smuggling

*
  • M
Improper Certificate Validation

*
  • M
Improper Authorization

*
  • H
Resource Exhaustion

*
  • H
Arbitrary Code Injection

*
  • H
Arbitrary Code Injection

*
  • H
Exposure of Resource to Wrong Sphere

*
  • H
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • H
Uncontrolled Recursion

*
  • M
CVE-2025-4673

<0:1.24.4-1.el10_0
  • M
HTTP Request Smuggling

<0:1.23.9-1.el10_0
  • M
Information Exposure

<0:1.23.7-1.el10_0
  • L
Improper Verification of Cryptographic Signature

<0:1.23.7-1.el10_0
  • M
Information Exposure

<0:1.23.7-1.el10_0