govulncheck-vulndb vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the govulncheck-vulndb package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
CVE-2025-22865

<0.0.20250207T224745-150000.1.32.1
  • M
Directory Traversal

<0.0.20250207T224745-150000.1.32.1
  • H
Improper Neutralization of Special Elements in Data Query Logic

<0.0.20250207T224745-150000.1.32.1
  • H
OS Command Injection

<0.0.20250207T224745-150000.1.32.1
  • C
Directory Traversal

<0.0.20250207T224745-150000.1.32.1
  • H
Improper Check or Handling of Exceptional Conditions

<0.0.20250207T224745-150000.1.32.1
  • M
Information Exposure

<0.0.20250207T224745-150000.1.32.1
  • L
Reliance on Untrusted Inputs in a Security Decision

<0.0.20250207T224745-150000.1.32.1
  • M
CVE-2024-45341

<0.0.20250207T224745-150000.1.32.1
  • M
Improper Authorization

<0.0.20250207T224745-150000.1.32.1
  • M
Information Exposure

<0.0.20250207T224745-150000.1.32.1
  • H
CVE-2024-45340

<0.0.20250207T224745-150000.1.32.1
  • H
CVE-2024-45339

<0.0.20250207T224745-150000.1.32.1
  • M
CVE-2025-22866

<0.0.20250207T224745-150000.1.32.1
  • H
CVE-2024-9313

<0.0.20250207T224745-150000.1.32.1
  • M
CVE-2025-22867

<0.0.20250207T224745-150000.1.32.1
  • M
CVE-2024-45336

<0.0.20250207T224745-150000.1.32.1
  • H
Uncaught Exception

<0.0.20250207T224745-150000.1.32.1
  • M
Improper Neutralization

<0.0.20250207T224745-150000.1.32.1
  • H
CVE-2024-9312

<0.0.20250207T224745-150000.1.32.1
  • M
CVE-2024-50354

<0.0.20250207T224745-150000.1.32.1
  • H
Exposure of Resource to Wrong Sphere

<0.0.20250207T224745-150000.1.32.1
  • H
Improper Validation of Integrity Check Value

<0.0.20250207T224745-150000.1.32.1
  • M
Improper Privilege Management

<0.0.20250207T224745-150000.1.32.1
  • H
Improper Access Control

<0.0.20250207T224745-150000.1.32.1
  • M
CVE-2024-10846

<0.0.20250207T224745-150000.1.32.1
  • L
CVE-2024-11741

<0.0.20250207T224745-150000.1.32.1
  • M
Authentication Bypass

<0.0.20250207T224745-150000.1.32.1
  • M
CVE-2025-20086

<0.0.20250128T150132-150000.1.29.1
  • M
Server-Side Request Forgery (SSRF)

<0.0.20250128T150132-150000.1.29.1
  • H
CVE-2025-24337

<0.0.20250128T150132-150000.1.29.1
  • M
CVE-2025-20088

<0.0.20250128T150132-150000.1.29.1
  • H
CVE-2025-0377

<0.0.20250128T150132-150000.1.29.1
  • M
CVE-2025-20621

<0.0.20250128T150132-150000.1.29.1
  • M
Deserialization of Untrusted Data

<0.0.20250128T150132-150000.1.29.1
  • M
CVE-2025-20033

<0.0.20250128T150132-150000.1.29.1
  • M
CVE-2025-21088

<0.0.20250128T150132-150000.1.29.1
  • H
Improper Privilege Management

<0.0.20250128T150132-150000.1.29.1
  • L
CVE-2025-22445

<0.0.20250128T150132-150000.1.29.1
  • H
Unprotected Primary Channel

<0.0.20250128T150132-150000.1.29.1
  • L
Operation on a Resource after Expiration or Release

<0.0.20250128T150132-150000.1.29.1
  • H
Exposure of Private Information ('Privacy Violation')

<0.0.20250128T150132-150000.1.29.1
  • M
Improper Authorization

<0.0.20250128T150132-150000.1.29.1
  • M
Allocation of Resources Without Limits or Throttling

<0.0.20250128T150132-150000.1.29.1
  • H
CVE-2024-52281

<0.0.20250128T150132-150000.1.29.1
  • M
Information Exposure

<0.0.20250128T150132-150000.1.29.1
  • M
Server-Side Request Forgery (SSRF)

<0.0.20250128T150132-150000.1.29.1
  • H
CVE-2024-45340

<0.0.20250128T150132-150000.1.29.1
  • M
Uncontrolled Memory Allocation

<0.0.20250128T150132-150000.1.29.1
  • M
Server-Side Request Forgery (SSRF)

<0.0.20250128T150132-150000.1.29.1
  • M
CVE-2024-45336

<0.0.20250128T150132-150000.1.29.1
  • H
CVE-2025-22865

<0.0.20250128T150132-150000.1.29.1
  • L
CVE-2025-22449

<0.0.20250128T150132-150000.1.29.1
  • L
Improper Check or Handling of Exceptional Conditions

<0.0.20250128T150132-150000.1.29.1
  • L
Improper Check for Certificate Revocation

<0.0.20250128T150132-150000.1.29.1
  • H
Arbitrary Code Injection

<0.0.20250128T150132-150000.1.29.1
  • H
CVE-2024-45339

<0.0.20250128T150132-150000.1.29.1
  • H
Improper Privilege Management

<0.0.20250128T150132-150000.1.29.1
  • M
Improper Authentication

<0.0.20250128T150132-150000.1.29.1
  • M
Allocation of Resources Without Limits or Throttling

<0.0.20250128T150132-150000.1.29.1
  • M
CVE-2024-45341

<0.0.20250128T150132-150000.1.29.1
  • M
Directory Traversal

<0.0.20250108T191942-150000.1.26.1
  • H
Trust Boundary Violation

<0.0.20250108T191942-150000.1.26.1
  • M
Directory Traversal

<0.0.20250108T191942-150000.1.26.1
  • H
Arbitrary Argument Injection

<0.0.20250108T191942-150000.1.26.1
  • H
Incomplete Cleanup

<0.0.20250108T191942-150000.1.26.1
  • H
Resource Exhaustion

<0.0.20250108T191942-150000.1.26.1
  • H
Directory Traversal

<0.0.20250108T191942-150000.1.26.1
  • H
Improper Input Validation

<0.0.20250108T191942-150000.1.26.1
  • H
CVE-2024-55196

<0.0.20250108T191942-150000.1.26.1
  • C
Directory Traversal

<0.0.20250108T191942-150000.1.26.1
  • H
CVE-2024-12678

<0.0.20250108T191942-150000.1.26.1
  • H
Cleartext Storage of Sensitive Information

<0.0.20250108T191942-150000.1.26.1
  • H
Incorrect Privilege Assignment

<0.0.20250108T191942-150000.1.26.1
  • C
SQL Injection

<0.0.20250108T191942-150000.1.26.1
  • H
CVE-2024-45338

<0.0.20250108T191942-150000.1.26.1
  • M
CVE-2024-43803

<0.0.20250108T191942-150000.1.26.1
  • C
CVE-2024-28892

<0.0.20250108T191942-150000.1.26.1
  • H
Improper Access Control

<0.0.20250108T191942-150000.1.26.1
  • L
SUSE-SU-2024:4433-1

<0.0.20241218T202206-150000.1.23.1
  • L
SUSE-SU-2024:4299-1

<0.0.20241209T183251-150000.1.20.1
  • L
Improper Handling of Exceptional Conditions

<0.0.20241112T145010-150000.1.17.1
  • M
CVE-2024-48057

<0.0.20241112T145010-150000.1.17.1
  • H
Cross-site Scripting (XSS)

<0.0.20241112T145010-150000.1.17.1
  • H
CVE-2024-10975

<0.0.20241112T145010-150000.1.17.1
  • L
Use of Incorrectly-Resolved Name or Reference

<0.0.20241112T145010-150000.1.17.1
  • H
SQL Injection

<0.0.20241112T145010-150000.1.17.1
  • M
CVE-2024-10389

<0.0.20241112T145010-150000.1.17.1
  • H
CVE-2024-8185

<0.0.20241104T154416-150000.1.12.1
  • H
CVE-2024-39720

<0.0.20241104T154416-150000.1.12.1
  • M
Cross-site Request Forgery (CSRF)

<0.0.20241104T154416-150000.1.12.1
  • M
CVE-2024-50052

<0.0.20241104T154416-150000.1.12.1
  • M
Time-of-check Time-of-use (TOCTOU)

<0.0.20241104T154416-150000.1.12.1
  • H
Time-of-check Time-of-use (TOCTOU)

<0.0.20241104T154416-150000.1.12.1
  • M
CVE-2024-47401

<0.0.20241104T154416-150000.1.12.1
  • M
CVE-2024-50354

<0.0.20241104T154416-150000.1.12.1
  • H
Improper Encoding or Escaping of Output

<0.0.20241104T154416-150000.1.12.1
  • M
Cross-site Scripting (XSS)

<0.0.20241104T154416-150000.1.12.1
  • L
Authorization Bypass Through User-Controlled Key

<0.0.20241104T154416-150000.1.12.1
  • H
Directory Traversal

<0.0.20241104T154416-150000.1.12.1
  • M
Link Following

<0.0.20241030T212825-150000.1.9.1
  • M
Directory Traversal

<0.0.20241030T212825-150000.1.9.1
  • H
Use of Hard-coded Credentials

<0.0.20241030T212825-150000.1.9.1
  • H
Unquoted Search Path or Element

<0.0.20241030T212825-150000.1.9.1
  • H
CVE-2024-9180

<0.0.20241030T212825-150000.1.9.1
  • C
Use of Hard-coded Credentials

<0.0.20241030T212825-150000.1.9.1
  • M
Improper Input Validation

<0.0.20241030T212825-150000.1.9.1
  • M
CVE-2024-50312

<0.0.20241030T212825-150000.1.9.1
  • H
CVE-2024-9312

<0.0.20241030T212825-150000.1.9.1
  • H
CVE-2024-9313

<0.0.20241030T212825-150000.1.9.1
  • C
Arbitrary Command Injection

<0.0.20241030T212825-150000.1.9.1
  • H
CVE-2024-7594

<0.0.20241030T212825-150000.1.9.1
  • M
Directory Traversal

<0.0.20241030T212825-150000.1.9.1
  • M
Use of Uninitialized Variable

<0.0.20241030T212825-150000.1.9.1
  • H
Unquoted Search Path or Element

<0.0.20241030T212825-150000.1.9.1
  • H
CVE-2024-8901

<0.0.20241030T212825-150000.1.9.1
  • M
CVE-2024-8037

<0.0.20241030T212825-150000.1.9.1
  • L
CVE-2024-48909

<0.0.20241030T212825-150000.1.9.1
  • M
Excessive Reliance on Global Variables

<0.0.20241030T212825-150000.1.9.1
  • H
Directory Traversal

<0.0.20241030T212825-150000.1.9.1
  • M
Improper Input Validation

<0.0.20241030T212825-150000.1.9.1
  • L
CVE-2024-10214

<0.0.20241030T212825-150000.1.9.1
  • H
Arbitrary Code Injection

<0.0.20241030T212825-150000.1.9.1
  • C
Improper Verification of Cryptographic Signature

<0.0.20241030T212825-150000.1.9.1
  • H
CVE-2024-8038

<0.0.20241030T212825-150000.1.9.1
  • H
Improper Authentication

<0.0.20241030T212825-150000.1.9.1
  • H
CVE-2024-7558

<0.0.20241030T212825-150000.1.9.1
  • H
Race Condition

<0.0.20241030T212825-150000.1.9.1
  • H
CVE-2024-47825

<0.0.20241030T212825-150000.1.9.1
  • M
CVE-2024-47003

<0.0.20241030T212825-150000.1.9.1
  • H
Incorrect Authorization

<0.0.20241030T212825-150000.1.9.1
  • H
CVE-2024-22036

<0.0.20241030T212825-150000.1.9.1
  • H
Inadequate Encryption Strength

<0.0.20241030T212825-150000.1.9.1
  • C
CVE-2022-45157

<0.0.20241030T212825-150000.1.9.1
  • M
Incorrect Authorization

<0.0.20241030T212825-150000.1.9.1
  • C
CVE-2024-39223

<0.0.20241030T212825-150000.1.9.1
  • H
Improper Certificate Validation

<0.0.20241030T212825-150000.1.9.1
  • M
CVE-2024-36814

<0.0.20241030T212825-150000.1.9.1
  • M
Cross-site Scripting (XSS)

<0.0.20241030T212825-150000.1.9.1
  • H
CVE-2024-33662

<0.0.20241030T212825-150000.1.9.1
  • H
Always-Incorrect Control Flow Implementation

<0.0.20241030T212825-150000.1.9.1
  • H
CVE-2023-32197

<0.0.20241030T212825-150000.1.9.1
  • M
CVE-2024-10241

<0.0.20241030T212825-150000.1.9.1
  • C
Generation of Incorrect Security Tokens

<0.0.20241030T212825-150000.1.9.1
  • L
SUSE-SU-2024:3811-1

<0.0.20241028T152002-150000.1.6.1