Go Vulnerabilities

Security vulnerability tracking for Golang Go

Last updated: Aug 10, 2022
Total CVEs

3

Critical

0

With Exploits

8

Last 30 Days

0

Vulnerability Timeline

3 vulnerabilities discovered over time for Go

Severity Distribution

Critical0
0%
High4
133%
Medium3
100%
Low1
33%
DescriptionVendor / ProductExploit Status
CVE-2022-321486.5

This vulnerability allows an attacker to manipulate the X-Forwarded-For header, potentially exposing the true client IP address when using the Go ReverseProxy feature. It occurs if the header is set to a nil value, which can happen in certain configurations before specific versions of Go are used.

golanggo
Exploit Available
over 3 years agoAug 10, 2022
CVE-2022-19625.5

An attacker can exploit this vulnerability to crash a Go application by sending it deeply nested types or declarations, which can overwhelm the system's memory. This issue affects specific versions of Go before updates were released, so using an outdated version increases the risk.

golanggo
Exploit Available
over 3 years agoAug 10, 2022
CVE-2022-17056.5

This vulnerability allows an attacker to sneak malicious requests past a server by exploiting certain invalid headers in HTTP requests, but it only works if there’s an intermediate server that also fails to properly reject those headers. To be successful, the attacker needs to carefully craft the requests and rely on the misconfiguration of the servers involved.

golanggo
Exploit Available
over 3 years agoAug 10, 2022

About Golang Go Security

This page provides comprehensive security vulnerability tracking for Golang Go. Our database includes all CVEs affecting this product, updated in real-time from official sources.

Each vulnerability listing includes detailed CVSS severity analysis, exploit availability status, AI-generated explanations, and direct links to official security patches and vendor advisories.

Security Recommendations

  • • Always keep Go updated to the latest version
  • • Subscribe to security advisories from Golang
  • • Monitor this page for new vulnerabilities affecting your version
  • • Prioritize patching critical and high severity issues immediately