golang1.26

Direct Vulnerabilities

Known vulnerabilities in the golang1.26 package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • L
CVE-2025-58186

*
  • M
NULL Pointer Dereference

*
  • M
Improper Certificate Validation

*
  • M
OS Command Injection

*
  • M
Resource Exhaustion

*
  • M
Expected Behavior Violation

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Creation of Immutable Text Using String Concatenation

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Expected Behavior Violation

*
  • M
Out-of-bounds Read

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Improper Validation of Syntactic Correctness of Input

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Improper Output Neutralization for Logs

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Directory Traversal

*
  • M
Reachable Assertion

*
  • H
CVE-2025-61732

*
  • H
Excessive Platform Resource Consumption within a Loop

*
  • H
Arbitrary Argument Injection

*
  • M
Excessive Platform Resource Consumption within a Loop

*
  • M
Improper Validation of Specified Index, Position, or Offset in Input

*
  • H
Improper Validation of Syntactic Correctness of Input

*
  • M
Cross-site Scripting (XSS)

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • H
Improper Validation of Unsafe Equivalence in Input

*
  • M
Compiler Optimization Removal or Modification of Security-critical Code

*
  • M
Improper Verification of Source of a Communication Channel

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
CVE-2025-68121

*
  • H
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • H
Improper Certificate Validation

*
  • L
Directory Traversal

*
  • L
Improper Certificate Validation

*
  • M
Cross-site Scripting (XSS)

*