Количество 8
Количество 8
CVE-2023-39320
The go.mod toolchain directive, introduced in Go 1.21, can be leveraged to execute scripts and binaries relative to the root of the module when the "go" command was executed within the module. This applies to modules downloaded using the "go" command from the module proxy, as well as modules downloaded directly using VCS software.
CVE-2023-39320
The go.mod toolchain directive, introduced in Go 1.21, can be leveraged to execute scripts and binaries relative to the root of the module when the "go" command was executed within the module. This applies to modules downloaded using the "go" command from the module proxy, as well as modules downloaded directly using VCS software.
CVE-2023-39320
The go.mod toolchain directive, introduced in Go 1.21, can be leveraged to execute scripts and binaries relative to the root of the module when the "go" command was executed within the module. This applies to modules downloaded using the "go" command from the module proxy, as well as modules downloaded directly using VCS software.
CVE-2023-39320
The go.mod toolchain directive, introduced in Go 1.21, can be leverage ...
GHSA-rxv8-v965-v333
The go.mod toolchain directive, introduced in Go 1.21, can be leveraged to execute scripts and binaries relative to the root of the module when the "go" command was executed within the module. This applies to modules downloaded using the "go" command from the module proxy, as well as modules downloaded directly using VCS software.
BDU:2023-05718
Уязвимость файла go.mod языка программирования Go, позволяющая нарушителю повысить свои привилегии и выполнить произвольный код
SUSE-SU-2023:3701-1
Security update for go1.21
SUSE-SU-2023:4469-1
Security update for go1.21-openssl
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2023-39320 The go.mod toolchain directive, introduced in Go 1.21, can be leveraged to execute scripts and binaries relative to the root of the module when the "go" command was executed within the module. This applies to modules downloaded using the "go" command from the module proxy, as well as modules downloaded directly using VCS software. | CVSS3: 9.8 | 1% Низкий | больше 2 лет назад | |
CVE-2023-39320 The go.mod toolchain directive, introduced in Go 1.21, can be leveraged to execute scripts and binaries relative to the root of the module when the "go" command was executed within the module. This applies to modules downloaded using the "go" command from the module proxy, as well as modules downloaded directly using VCS software. | CVSS3: 8.8 | 1% Низкий | больше 2 лет назад | |
CVE-2023-39320 The go.mod toolchain directive, introduced in Go 1.21, can be leveraged to execute scripts and binaries relative to the root of the module when the "go" command was executed within the module. This applies to modules downloaded using the "go" command from the module proxy, as well as modules downloaded directly using VCS software. | CVSS3: 9.8 | 1% Низкий | больше 2 лет назад | |
CVE-2023-39320 The go.mod toolchain directive, introduced in Go 1.21, can be leverage ... | CVSS3: 9.8 | 1% Низкий | больше 2 лет назад | |
GHSA-rxv8-v965-v333 The go.mod toolchain directive, introduced in Go 1.21, can be leveraged to execute scripts and binaries relative to the root of the module when the "go" command was executed within the module. This applies to modules downloaded using the "go" command from the module proxy, as well as modules downloaded directly using VCS software. | CVSS3: 9.8 | 1% Низкий | больше 2 лет назад | |
BDU:2023-05718 Уязвимость файла go.mod языка программирования Go, позволяющая нарушителю повысить свои привилегии и выполнить произвольный код | CVSS3: 9.8 | 1% Низкий | больше 2 лет назад | |
SUSE-SU-2023:3701-1 Security update for go1.21 | больше 2 лет назад | |||
SUSE-SU-2023:4469-1 Security update for go1.21-openssl | около 2 лет назад |
Уязвимостей на страницу