It was discovered that Go applications incorrectly handled uploaded content. If a user were tricked into visiting a malicious page, a remote attacker could exploit this with a crafted file to conduct cross-site scripting (XSS) attacks.
{ "availability": "No subscription required", "binaries": [ { "golang-1.10": "1.10.4-2ubuntu1~16.04.2", "golang-1.10-go": "1.10.4-2ubuntu1~16.04.2", "golang-1.10-src": "1.10.4-2ubuntu1~16.04.2", "golang-1.10-doc": "1.10.4-2ubuntu1~16.04.2", "golang-1.10-go-dbgsym": "1.10.4-2ubuntu1~16.04.2" } ] }
{ "availability": "No subscription required", "binaries": [ { "golang-1.10": "1.10.4-2ubuntu1~18.04.2", "golang-1.10-go": "1.10.4-2ubuntu1~18.04.2", "golang-1.10-src": "1.10.4-2ubuntu1~18.04.2", "golang-1.10-doc": "1.10.4-2ubuntu1~18.04.2", "golang-1.10-go-dbgsym": "1.10.4-2ubuntu1~18.04.2" } ] }
{ "availability": "No subscription required", "binaries": [ { "golang-1.14-src": "1.14.3-2ubuntu2~20.04.2", "golang-1.14-go-dbgsym": "1.14.3-2ubuntu2~20.04.2", "golang-1.14-doc": "1.14.3-2ubuntu2~20.04.2", "golang-1.14-go": "1.14.3-2ubuntu2~20.04.2", "golang-1.14": "1.14.3-2ubuntu2~20.04.2" } ] }