It was discovered that Go applications incorrectly handled uploaded content. If
a user were tricked into visiting a malicious page, a remote attacker could
exploit this with a crafted file to conduct cross-site scripting (XSS) attacks.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 20.10 | noarch | golang-1.14 | < 1.14.7-2ubuntu1.1 | UNKNOWN |
Ubuntu | 20.10 | noarch | golang-1.14-doc | < 1.14.7-2ubuntu1.1 | UNKNOWN |
Ubuntu | 20.10 | noarch | golang-1.14-go | < 1.14.7-2ubuntu1.1 | UNKNOWN |
Ubuntu | 20.10 | noarch | golang-1.14-src | < 1.14.7-2ubuntu1.1 | UNKNOWN |
Ubuntu | 20.04 | noarch | golang-1.14 | < 1.14.3-2ubuntu2~20.04.2 | UNKNOWN |
Ubuntu | 20.04 | noarch | golang-1.14-doc | < 1.14.3-2ubuntu2~20.04.2 | UNKNOWN |
Ubuntu | 20.04 | noarch | golang-1.14-go | < 1.14.3-2ubuntu2~20.04.2 | UNKNOWN |
Ubuntu | 20.04 | noarch | golang-1.14-src | < 1.14.3-2ubuntu2~20.04.2 | UNKNOWN |
Ubuntu | 18.04 | noarch | golang-1.10 | < 1.10.4-2ubuntu1~18.04.2 | UNKNOWN |
Ubuntu | 18.04 | noarch | golang-1.10-doc | < 1.10.4-2ubuntu1~18.04.2 | UNKNOWN |