Go module
github.com/moov-io/base
history
arrow_drop_downv0.21.0
Newer version availableSecurity Advisories
40
In the dependencies
Similar advisories
opencontainers runc contains procfs race condition with a shared volume mount
5.9 MODERATE·GHSA-fh74-hm69-rqjw
Similar advisories
golang.org/x/text/language Out-of-bounds Read vulnerability
7.5 HIGH·GHSA-ppp9-7jff-5vj2
Similar advisories
golang.org/x/net/html Infinite Loop vulnerability
7.5 HIGH·GHSA-83g2-8m93-v3w7
Similar advisories
golang.org/x/net/http/httpguts vulnerable to Uncontrolled Recursion
5.9 MODERATE·GHSA-h86h-8ppg-mxmh
Similar advisories
Uncontrolled Resource Consumption in promhttp
7.5 HIGH·GHSA-cg3q-j54f-5p7p
Similar advisories
Moby (Docker Engine) started with non-empty inheritable Linux process capabilities
5.9 MODERATE·GHSA-2mm7-x5h6-5pvq
Similar advisories
Default inheritable capabilities for linux container should be empty
5.9 MODERATE·GHSA-f3fp-gc8g-vw66
Similar advisories
golang.org/x/sys/unix has Incorrect privilege reporting in syscall
5.3 MODERATE·GHSA-p782-xgp4-8hr8
Panic in gopkg.in/yaml.v3
GO-2022-0603
Similar advisories
gopkg.in/yaml.v3 Denial of Service
7.5 HIGH·GHSA-hp87-p4gw-j4gq
Similar advisories
mount destinations can be swapped via symlink-exchange to cause mounts outside the rootfs
7.6 HIGH·GHSA-c3xm-pvg7-gh7r
Similar advisories
golang.org/x/net/http2 Denial of Service vulnerability
7.5 HIGH·GHSA-69cg-p879-7622
Similar advisories
Docker supplementary group permissions not set up properly, allowing attackers to bypass primary group restrictions
5.3 MODERATE·GHSA-rc4r-wh2q-q6c4
Similar advisories
golang.org/x/text/language Denial of service via crafted Accept-Language header
7.5 HIGH·GHSA-69ch-w2m2-3vjp
Similar advisories
Container build can leak any path on the host into the container
LOW·GHSA-vp35-85q5-9f25
Similar advisories
golang.org/x/net/http2 vulnerable to possible excessive memory growth
5.3 MODERATE·GHSA-xrjj-mj9h-534m
Similar advisories
golang.org/x/net vulnerable to Uncontrolled Resource Consumption
7.5 HIGH·GHSA-vvpx-j8f3-3w6h
Similar advisories
rootless: `/sys/fs/cgroup` is writable when cgroupns isn't unshared in runc
2.5 LOW·GHSA-m8cg-xc2p-r3fc
Similar advisories
runc AppArmor bypass with symlinked /proc
6.1 MODERATE·GHSA-g2j6-57v7-gm8c
Similar advisories
Docker Swarm encrypted overlay network may be unauthenticated
7.5 HIGH·GHSA-232p-vwff-86mp
Similar advisories
Docker Swarm encrypted overlay network traffic may be unencrypted
6.8 MODERATE·GHSA-33pg-m6jh-5237
Similar advisories
Docker Swarm encrypted overlay network with a single endpoint is unauthenticated
6.8 MODERATE·GHSA-6wrf-mxfj-pf5p
Similar advisories
Improper rendering of text nodes in golang.org/x/net/html
6.1 MODERATE·GHSA-2wrh-6pvc-2jm9
Similar advisories
HTTP/2 rapid reset can cause excessive work in net/http
7.5 HIGH·GHSA-4374-p667-p6c8
Similar advisories
Moby (Docker Engine) Insufficiently restricted permissions on data directory
5.9 MODERATE·GHSA-3fwx-pjgw-3558
Similar advisories
Classic builder cache poisoning
6.9 MODERATE·GHSA-xw73-rw38-6vjc
Similar advisories
Golang protojson.Unmarshal function infinite loop when unmarshaling certain forms of invalid JSON
7.5 MODERATE·GHSA-8r3f-844c-mc37
Similar advisories
net/http, x/net/http2: close connections when receiving too many headers
5.3 MODERATE·GHSA-4v7x-pqxf-cx7m
Similar advisories
Docker CLI leaks private registry credentials to registry-1.docker.io
5.4 MODERATE·GHSA-99pg-grm5-qq3v
Similar advisories
`docker cp` allows unexpected chmod of host files in Moby Docker Engine
2.8 LOW·GHSA-v994-f8vw-g7j4
Similar advisories
Moby (Docker Engine) is vulnerable to Ambiguous OCI manifest parsing
MODERATE·GHSA-xmmx-7jpf-fx42
Similar advisories
runc can be confused to create empty files/directories on the host
3.6 MODERATE·GHSA-jfvp-7x6p-h2pv
Similar advisories
Non-linear parsing of case-insensitive content in golang.org/x/net/html
HIGH·GHSA-w32m-9786-jp63
Clarify `mediaType` handling
3 LOW·GHSA-77vh-xpmg-72qh
/sys/devices/virtual/powercap accessible by default to containers
MODERATE·GHSA-jq35-85cj-fj4p
Moby's external DNS requests from 'internal' networks could lead to data exfiltration
5.9 MODERATE·GHSA-mq39-4gv4-mvpx
HTTP/2 Stream Cancellation Attack
5.3 MODERATE·GHSA-qppj-fm5r-hxr3
Dependents
This package has no known dependents.
Package metadata as of .
Projects
moov-io/base
GitHub
core libraries used in Moov projects
call_split 19 forks
star 19 stars
OpenSSF scorecard
The Open Source Security Foundation is a cross-industry collaboration to improve the security of open source software (OSS). The Scorecard provides security health metrics for open source projects.
View information about checks and how to fix failures.
Score
5.4/10
Scorecard as of .
Maintained
1/10
Determines if the project is "actively maintained".
Reasoning
2 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 1
Code-Review
2/10
Determines if the project requires human code review before pull requests (aka merge requests) are merged.
Reasoning
Found 2/9 approved changesets -- score normalized to 2
Dangerous-Workflow
10/10
Determines if the project's GitHub Action workflows avoid dangerous patterns.
Reasoning
no dangerous workflow patterns detected
Binary-Artifacts
10/10
Determines if the project has generated executable (binary) artifacts in the source repository.
Reasoning
no binaries found in the repo
Token-Permissions
0/10
Determines if the project's workflows follow the principle of least privilege.
Reasoning
detected GitHub workflow tokens with excessive permissions
CII-Best-Practices
0/10
Determines if the project has an OpenSSF (formerly CII) Best Practices Badge.
Reasoning
no effort to earn an OpenSSF best practices badge detected
Fuzzing
0/10
Determines if the project uses fuzzing.
Reasoning
project is not fuzzed
License
10/10
Determines if the project has defined a license.
Reasoning
license file detected
Pinned-Dependencies
0/10
Determines if the project has declared and pinned the dependencies of its build process.
Reasoning
dependency not pinned by hash detected -- score normalized to 0
Security-Policy
10/10
Determines if the project has published a security policy.
Reasoning
security policy file detected
SAST
10/10
Determines if the project uses static code analysis.
Reasoning
SAST tool is run on all commits
Vulnerabilities
9/10
Determines if the project has open, known unfixed vulnerabilities.
Reasoning
1 existing vulnerabilities detected
Project metadata as of .