n.脆弱性;弱点;易伤性;可捕性; 例句:Scientists who study the birds believe it's time their particular vulnerability was formally recognised, and they want to see measures taken to ease other pressures faced by Emperors, such as the fishing activities that impinge on their food supply.
Scanning your code and 203 packages across 4 dependent modules for known vulnerabilities...
Vulnerability #1: GO-2023-2382 Denial of service via chunk extensions in net/http More info: https://pkg.go.dev/vuln/GO-2023-2382 Standard library Found in: net/http/internal@go1.21rc2 Fixed in: net/http/internal@go1.21.5 Example traces found: #1: internal/gosym/additions.go:67:25: gosym.LineTable.InlineTree calls binary.Read, which eventually calls internal.chunkedReader.Read
Vulnerability #2: GO-2023-2185 Insecure parsing of Windows paths with a \??\ prefix in path/filepath More info: https://pkg.go.dev/vuln/GO-2023-2185 Standard library Found in: internal/safefilepath@go1.21rc2 Fixed in: internal/safefilepath@go1.21.4 Platforms: windows Example traces found: #1: internal/client/source.go:85:20: client.localSource.get calls fs.ReadFile, which eventually calls safefilepath.FromFS #2: internal/client/source.go:85:20: client.localSource.get calls fs.ReadFile, which eventually calls safefilepath.FromFS #3: internal/test/buildtest.go:51:26: test.GoBuild calls filepath.Abs #4: internal/test/buildtest.go:55:50: test.GoBuild calls filepath.Base #5: internal/scan/flags.go:14:2: scan.init calls buildutil.init, which eventually calls filepath.Clean #6: internal/client/source.go:112:17: client.hybridSource.get calls filepath.Dir #7: internal/test/buildtest.go:55:28: test.GoBuild calls filepath.Join #8: internal/scan/filepath.go:24:24: scan.AbsRelShorter calls filepath.Rel #9: internal/client/source.go:110:29: client.hybridSource.get calls filepath.Split #10: internal/web/url.go:56:31: web.URLFromFilePath calls filepath.VolumeName #11: internal/client/index.go:26:28: client.indexFromDir calls filepath.WalkDir #12: internal/test/buildtest.go:51:26: test.GoBuild calls filepath.Abs #13: internal/test/buildtest.go:55:50: test.GoBuild calls filepath.Base #14: internal/scan/flags.go:14:2: scan.init calls buildutil.init, which eventually calls filepath.Clean #15: internal/client/source.go:112:17: client.hybridSource.get calls filepath.Dir #16: internal/test/buildtest.go:55:28: test.GoBuild calls filepath.Join #17: internal/scan/filepath.go:24:24: scan.AbsRelShorter calls filepath.Rel #18: internal/client/source.go:110:29: client.hybridSource.get calls filepath.Split #19: internal/web/url.go:56:31: web.URLFromFilePath calls filepath.VolumeName #20: internal/client/index.go:26:28: client.indexFromDir calls filepath.WalkDir
Vulnerability #3: GO-2023-1987 Large RSA keys can cause high CPU usage in crypto/tls More info: https://pkg.go.dev/vuln/GO-2023-1987 Standard library Found in: crypto/tls@go1.21rc2 Fixed in: crypto/tls@go1.21rc4 Example traces found: #1: internal/client/source.go:54:22: client.httpSource.get calls http.Client.Do, which eventually calls tls.Conn.HandshakeContext #2: internal/gosym/additions.go:67:25: gosym.LineTable.InlineTree calls binary.Read, which eventually calls tls.Conn.Read #3: internal/vulncheck/binary.go:62:13: vulncheck.binary calls fmt.Printf, which eventually calls tls.Conn.Write #4: internal/client/source.go:54:22: client.httpSource.get calls http.Client.Do, which eventually calls tls.Dialer.DialContext
=== Informational ===
Found 4 vulnerabilities in packages that you import, but there are no call stacks leading to the use of these vulnerabilities. You may not need to take any action. See https://pkg.go.dev/golang.org/x/vuln/cmd/govulncheck for details.
Vulnerability #1: GO-2023-2186 Incorrect detection of reserved device names on Windows in path/filepath More info: https://pkg.go.dev/vuln/GO-2023-2186 Standard library Found in: path/filepath@go1.21rc2 Fixed in: path/filepath@go1.21.4
Vulnerability #2: GO-2023-2102 HTTP/2 rapid reset can cause excessive work in net/http More info: https://pkg.go.dev/vuln/GO-2023-2102 Standard library Found in: net/http@go1.21rc2 Fixed in: net/http@go1.21.3
Vulnerability #3: GO-2023-2045 Memory exhaustion in QUIC connection handling in crypto/tls More info: https://pkg.go.dev/vuln/GO-2023-2045 Standard library Found in: crypto/tls@go1.21rc2 Fixed in: crypto/tls@go1.21.1
Vulnerability #4: GO-2023-2044 Panic when processing post-handshake message on QUIC connections in crypto/tls More info: https://pkg.go.dev/vuln/GO-2023-2044 Standard library Found in: crypto/tls@go1.21rc2 Fixed in: crypto/tls@go1.21.1
Your code is affected by 3 vulnerabilities from the Go standard library.
Share feedback at https://go.dev/s/govulncheck-feedback.