Go Vulnerability Database

Data about new vulnerabilities come directly from Go package maintainers or sources such as MITRE and GitHub. Reports are curated by the Go Security team. Learn more at go.dev/security/vuln.

Search

Recent Reports

Interchain Security: The signers of ICS messages do not need to match the provider address in github.com/cosmos/interchain-security

Path traversal vulnerability in stripe-cli in github.com/stripe/stripe-cli

Windmill HTTP Request users.rs excessive authentication in github.com/windmill-labs/windmill

sigstore-go has an unbounded loop over untrusted input can lead to endless data attack in github.com/sigstore/sigstore-go

Nuclei Template Signature Verification Bypass in github.com/projectdiscovery/nuclei

View all reports

If you don't see an existing, public Go vulnerability in a publicly importable package in our database, please let us know.

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL