4
0
8
0
Vulnerability Timeline
4 vulnerabilities discovered over time for Go
Severity Distribution
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2022-30635 | 7.5 | An attacker can cause a program using certain versions of Go to crash by sending it a message with deeply nested data structures, which overwhelms the system's memory. This vulnerability requires the attacker to be able to send specially crafted messages to the affected application. | golanggo | Exploit Available | over 3 years agoAug 10, 2022 |
| CVE-2022-30633 | 7.5 | An attacker can crash a Go application by sending a specially crafted XML document that causes excessive nesting in the data structure being processed. This vulnerability affects versions of Go before 1.17.12 and 1.18.4, and it requires the application to use the 'any' field tag in its data structures. | golanggo | Exploit Available | over 3 years agoAug 10, 2022 |
| CVE-2022-30630 | 7.5 | An attacker can crash a Go application by sending it a specially crafted file path with many separators, which causes the program to run out of memory and stop working. This issue affects versions of Go before 1.17.12 and 1.18.4, so using an outdated version increases the risk. | golanggo | Exploit Available | over 3 years agoAug 10, 2022 |
| CVE-2022-30580 | 7.8 | This vulnerability allows an attacker to execute malicious binaries in the working directory if they are named with the extensions "..com" or "..exe" when certain commands are run without specifying a path. This can happen in specific versions of Go when using functions that start or run commands, making it crucial for users to ensure they set the command path properly to avoid exploitation. | golanggo | Exploit Available | over 3 years agoAug 10, 2022 |
About Golang Go Security
This page provides comprehensive security vulnerability tracking for Golang Go. Our database includes all CVEs affecting this product, updated in real-time from official sources.
Each vulnerability listing includes detailed CVSS severity analysis, exploit availability status, AI-generated explanations, and direct links to official security patches and vendor advisories.
Security Recommendations
- • Always keep Go updated to the latest version
- • Subscribe to security advisories from Golang
- • Monitor this page for new vulnerabilities affecting your version
- • Prioritize patching critical and high severity issues immediately