Go version before 1.14.14 and 1.15.x before 1.15.7 on Windows is vulnerable to Command Injection and remote code execution
Reporter | Title | Published | Views | Family All 72 |
---|---|---|---|---|
![]() | Arbitrary Code Execution | 22 Jan 202108:28 | – | veracode |
![]() | Photon OS 3.0: Go PHSA-2021-3.0-0200 | 27 Feb 202100:00 | – | nessus |
![]() | SUSE SLED15 / SLES15 Security Update : go1.14 (SUSE-SU-2021:0222-1) | 27 Jan 202100:00 | – | nessus |
![]() | SUSE SLED15 / SLES15 Security Update : go1.15 (SUSE-SU-2021:0223-1) | 27 Jan 202100:00 | – | nessus |
![]() | openSUSE Security Update : go1.14 (openSUSE-2021-190) | 1 Feb 202100:00 | – | nessus |
![]() | RHEL 8 : go-toolset:rhel8 (RHSA-2021:1746) | 19 May 202100:00 | – | nessus |
![]() | Rocky Linux 8 : go-toolset:rhel8 (RLSA-2021:1746) | 7 Nov 202300:00 | – | nessus |
![]() | Fedora 33 : golang (2021-e435a8bb88) | 8 Feb 202100:00 | – | nessus |
![]() | CentOS 8 : go-toolset:rhel8 (CESA-2021:1746) | 28 May 202100:00 | – | nessus |
![]() | Oracle Linux 8 : go-toolset:ol8 (ELSA-2021-1746) | 26 May 202100:00 | – | nessus |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo