Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2022-41724

Summary
Assigner-Go
Assigner Org ID-1bb62c36-49e3-4200-9d77-64a1400537cc
Published At-28 Feb, 2023 | 17:19
Updated At-07 Mar, 2025 | 17:57
Rejected At-
Credits

Panic on large handshake records in crypto/tls

Large handshake records may cause panics in crypto/tls. Both clients and servers may send large TLS handshake records which cause servers and clients, respectively, to panic when attempting to construct responses. This affects all TLS 1.3 clients, TLS 1.2 clients which explicitly enable session resumption (by setting Config.ClientSessionCache to a non-nil value), and TLS 1.3 servers which request client certificates (by setting Config.ClientAuth >= RequestClientCert).

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
â–¼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:Go
Assigner Org ID:1bb62c36-49e3-4200-9d77-64a1400537cc
Published At:28 Feb, 2023 | 17:19
Updated At:07 Mar, 2025 | 17:57
Rejected At:
â–¼CVE Numbering Authority (CNA)
Panic on large handshake records in crypto/tls

Large handshake records may cause panics in crypto/tls. Both clients and servers may send large TLS handshake records which cause servers and clients, respectively, to panic when attempting to construct responses. This affects all TLS 1.3 clients, TLS 1.2 clients which explicitly enable session resumption (by setting Config.ClientSessionCache to a non-nil value), and TLS 1.3 servers which request client certificates (by setting Config.ClientAuth >= RequestClientCert).

Affected Products
Vendor
Go standard library
Product
crypto/tls
Collection URL
https://pkg.go.dev
Package Name
crypto/tls
Program Routines
  • handshakeMessage.marshal
  • Conn.writeRecord
  • Conn.readHandshake
  • Conn.handleRenegotiation
  • Conn.handlePostHandshakeMessage
  • Conn.handleKeyUpdate
  • Conn.clientHandshake
  • Conn.loadSession
  • clientHandshakeState.handshake
  • clientHandshakeState.doFullHandshake
  • clientHandshakeState.readFinished
  • clientHandshakeState.readSessionTicket
  • clientHandshakeState.sendFinished
  • clientHandshakeStateTLS13.handshake
  • clientHandshakeStateTLS13.sendDummyChangeCipherSpec
  • clientHandshakeStateTLS13.processHelloRetryRequest
  • clientHandshakeStateTLS13.readServerParameters
  • clientHandshakeStateTLS13.readServerCertificate
  • clientHandshakeStateTLS13.readServerFinished
  • clientHandshakeStateTLS13.sendClientCertificate
  • clientHandshakeStateTLS13.sendClientFinished
  • clientHelloMsg.marshal
  • clientHelloMsg.marshalWithoutBinders
  • clientHelloMsg.updateBinders
  • serverHelloMsg.marshal
  • encryptedExtensionsMsg.marshal
  • endOfEarlyDataMsg.marshal
  • keyUpdateMsg.marshal
  • newSessionTicketMsgTLS13.marshal
  • certificateRequestMsgTLS13.marshal
  • certificateMsg.marshal
  • certificateMsgTLS13.marshal
  • serverKeyExchangeMsg.marshal
  • certificateStatusMsg.marshal
  • serverHelloDoneMsg.marshal
  • clientKeyExchangeMsg.marshal
  • finishedMsg.marshal
  • certificateRequestMsg.marshal
  • certificateVerifyMsg.marshal
  • newSessionTicketMsg.marshal
  • helloRequestMsg.marshal
  • Conn.readClientHello
  • serverHandshakeState.doResumeHandshake
  • serverHandshakeState.doFullHandshake
  • serverHandshakeState.readFinished
  • serverHandshakeState.sendSessionTicket
  • serverHandshakeState.sendFinished
  • serverHandshakeStateTLS13.checkForResumption
  • serverHandshakeStateTLS13.sendDummyChangeCipherSpec
  • serverHandshakeStateTLS13.doHelloRetryRequest
  • serverHandshakeStateTLS13.sendServerParameters
  • serverHandshakeStateTLS13.sendServerCertificate
  • serverHandshakeStateTLS13.sendServerFinished
  • serverHandshakeStateTLS13.sendSessionTickets
  • serverHandshakeStateTLS13.readClientCertificate
  • serverHandshakeStateTLS13.readClientFinished
  • cipherSuiteTLS13.expandLabel
  • sessionState.marshal
  • sessionStateTLS13.marshal
  • Conn.Handshake
  • Conn.HandshakeContext
  • Conn.Read
  • Conn.Write
  • ConnectionState.ExportKeyingMaterial
  • Dial
  • DialWithDialer
  • Dialer.Dial
  • Dialer.DialContext
Default Status
unaffected
Versions
Affected
  • From 0 before 1.19.6 (semver)
  • From 1.20.0-0 before 1.20.1 (semver)
Problem Types
TypeCWE IDDescription
N/AN/ACWE-400: Uncontrolled Resource Consumption
Type: N/A
CWE ID: N/A
Description: CWE-400: Uncontrolled Resource Consumption
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Marten Seemann
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://go.dev/issue/58001
N/A
https://go.dev/cl/468125
N/A
https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E
N/A
https://pkg.go.dev/vuln/GO-2023-1570
N/A
https://security.gentoo.org/glsa/202311-09
N/A
Hyperlink: https://go.dev/issue/58001
Resource: N/A
Hyperlink: https://go.dev/cl/468125
Resource: N/A
Hyperlink: https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E
Resource: N/A
Hyperlink: https://pkg.go.dev/vuln/GO-2023-1570
Resource: N/A
Hyperlink: https://security.gentoo.org/glsa/202311-09
Resource: N/A
â–¼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://go.dev/issue/58001
x_transferred
https://go.dev/cl/468125
x_transferred
https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E
x_transferred
https://pkg.go.dev/vuln/GO-2023-1570
x_transferred
https://security.gentoo.org/glsa/202311-09
x_transferred
Hyperlink: https://go.dev/issue/58001
Resource:
x_transferred
Hyperlink: https://go.dev/cl/468125
Resource:
x_transferred
Hyperlink: https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E
Resource:
x_transferred
Hyperlink: https://pkg.go.dev/vuln/GO-2023-1570
Resource:
x_transferred
Hyperlink: https://security.gentoo.org/glsa/202311-09
Resource:
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
â–¼National Vulnerability Database (NVD)
nvd.nist.gov
Source:security@golang.org
Published At:28 Feb, 2023 | 18:15
Updated At:25 Nov, 2023 | 11:15

Large handshake records may cause panics in crypto/tls. Both clients and servers may send large TLS handshake records which cause servers and clients, respectively, to panic when attempting to construct responses. This affects all TLS 1.3 clients, TLS 1.2 clients which explicitly enable session resumption (by setting Config.ClientSessionCache to a non-nil value), and TLS 1.3 servers which request client certificates (by setting Config.ClientAuth >= RequestClientCert).

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Type: Primary
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CPE Matches

Go
golang
>>go>>Versions before 1.19.6(exclusive)
cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*
Go
golang
>>go>>1.20.0
cpe:2.3:a:golang:go:1.20.0:-:*:*:*:*:*:*
Go
golang
>>go>>1.20.0
cpe:2.3:a:golang:go:1.20.0:rc1:*:*:*:*:*:*
Go
golang
>>go>>1.20.0
cpe:2.3:a:golang:go:1.20.0:rc2:*:*:*:*:*:*
Go
golang
>>go>>1.20.0
cpe:2.3:a:golang:go:1.20.0:rc3:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-400Primarynvd@nist.gov
CWE ID: CWE-400
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://go.dev/cl/468125security@golang.org
Patch
Release Notes
https://go.dev/issue/58001security@golang.org
Issue Tracking
Patch
Vendor Advisory
https://groups.google.com/g/golang-announce/c/V0aBFqaFs_Esecurity@golang.org
Mailing List
Vendor Advisory
https://pkg.go.dev/vuln/GO-2023-1570security@golang.org
Vendor Advisory
https://security.gentoo.org/glsa/202311-09security@golang.org
N/A
Hyperlink: https://go.dev/cl/468125
Source: security@golang.org
Resource:
Patch
Release Notes
Hyperlink: https://go.dev/issue/58001
Source: security@golang.org
Resource:
Issue Tracking
Patch
Vendor Advisory
Hyperlink: https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E
Source: security@golang.org
Resource:
Mailing List
Vendor Advisory
Hyperlink: https://pkg.go.dev/vuln/GO-2023-1570
Source: security@golang.org
Resource:
Vendor Advisory
Hyperlink: https://security.gentoo.org/glsa/202311-09
Source: security@golang.org
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

1276Records found

CVE-2023-44487
Matching Score-10
Assigner-MITRE Corporation
ShareView Details
Matching Score-10
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-94.46% / 99.99%
||
7 Day CHG+0.06%
Published-10 Oct, 2023 | 00:00
Updated-07 Nov, 2025 | 19:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2023-10-31||Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.

Action-Not Available
Vendor-nghttp2akkaprojectcontourkonghqtraefikkazu-yamamotoistiocaddyserverenvoyproxyamazongrpclinecorpvarnish_cache_projectdenalinkerdopenrestyn/aApple Inc.Cisco Systems, Inc.F5, Inc.Eclipse Foundation AISBLGoThe Apache Software FoundationMicrosoft CorporationFacebookFedora ProjectJenkinsThe IETF Administration LLC (IETF LLC)The Netty ProjectRed Hat, Inc.Debian GNU/LinuxNode.js (OpenJS Foundation)NetApp, Inc.
Product-big-ip_application_security_managerunified_contact_center_domain_managernexus_93108tc-ex_switchnexus_3172pq-xlnexus_3132qcrosswork_zero_touch_provisioninggrpcjboss_a-mqopenshift_service_meshnexus_93180lc-exnexus_3064-tenvoynginxansible_automation_platformiot_field_network_directorapisixnexus_3232nexus_9316d-gxnexus_3464cnexus_9336pq_acinexus_9500_supervisor_a\+nexus_93180yc-ex_switchnexus_3524-x\/xlnexus_3164qintegration_service_registrywindows_server_2022jboss_fusenexus_93128txnexus_9500_8-slotios_xrbig-ip_websafeunified_contact_center_enterprise_-_live_data_servernexus_31108pv-vnexus_9336pq_aci_spine_switchsecure_dynamic_attributes_connectornginx_ingress_controlleropenshift_dev_spacesnexus_9336c-fx2nexus_3132q-x\/3132q-xlnexus_92304qc_switchvarnish_cachenexus_3172pq\/pq-xlnexus_9348d-gx2ajettyhttp2jboss_a-mq_streamsnexus_3600nexus_3064-xnexus_9332d-gx2bnexus_3132q-xarmeriaswiftnio_http\/2ios_xenexus_3048nexus_3172tqopenshift_secondary_scheduler_operatornexus_92304qch2onexus_9336c-fx2-efog_directornexus_3100vtomcatcert-manager_operator_for_red_hat_openshiftlogging_subsystem_for_red_hat_openshiftazure_kubernetes_servicesecure_web_appliance_firmwarenexus_9272qnexus_9508crosswork_situation_managernexus_31108pc-vnexus_3524-xnexus_3200nexus_3064nexus_9348gc-fx3nexus_9716d-gxnode_healthcheck_operatorfirepower_threat_defensenexus_9516.netnexus_3172tq-xlhttpopenshift_api_for_data_protectionnexus_93216tc-fx2big-ip_domain_name_systemnexus_93240yc-fx2nexus_3548-xunified_contact_center_enterprisebig-ip_advanced_firewall_managerbig-ip_ssl_orchestratornexus_3064tnexus_9200windows_server_2019nexus_93108tc-fxbig-ip_analyticswindows_10_1607nexus_93128tx_switchwindows_10_1809nexus_31128pqnexus_3432d-snetwork_observability_operatornexus_9500_16-slotnexus_9804nexus_3132q-vnexus_9396pxopenshift_container_platform_assisted_installeroncommand_insightprime_access_registrarnexus_9500_4-slotopenshift_container_platformnode_maintenance_operatorbig-ip_ddos_hybrid_defendernexus_3172pqintegration_camel_knexus_9332pqnexus_3524service_telemetry_frameworknexus_9221cnexus_9516_switchnexus_92160yc-xnexus_92300yc_switchnexus_93180lc-ex_switchnexus_3132q-xlopenrestynexus_93108tc-fx3hnexus_34180ycceph_storagenexus_9348gc-fxpmigration_toolkit_for_applicationsnexus_3132c-zasp.net_corenode.jssecure_malware_analyticsnexus_9272q_switchbig-ip_policy_enforcement_managernexus_3524-xlistiodecision_managernexus_93180yc-fx3nexus_9000vnexus_9372tx_switchopenshift_developer_tools_and_servicesnexus_93180yc-fx3hnexus_3016qnexus_3232c_nexus_3548-x\/xlenterprise_chat_and_emailintegration_camel_for_spring_bootnexus_9408openshift_virtualizationnexus_93180yc-ex-24nginx_plusnexus_9500_supervisor_anexus_9500_supervisor_bnexus_9800build_of_optaplannerbig-ip_application_acceleration_managernexus_9332cnexus_31108tc-vcryostatself_node_remediation_operatorgoprime_cable_provisioningnexus_9636pqultra_cloud_core_-_serving_gateway_functionnexus_3400support_for_spring_bootopenshift_gitopsnexus_93180yc-fxnexus_9432pqbig-ip_local_traffic_managernexus_93108tc-fx-24nexus_9504_switchprocess_automationnexus_9372txwindows_11_21h2windows_11_22h2fedoratraefikfence_agents_remediation_operatorcrosswork_data_gatewaybig-ip_global_traffic_managerlinkerdjboss_data_gridnexus_9508_switchnexus_93180tc-exnexus_9332d-h2radvanced_cluster_management_for_kubernetesultra_cloud_core_-_policy_control_functionsatelliteadvanced_cluster_securitybig-ip_advanced_web_application_firewallnexus_9396tx_switchnexus_3064-32tnexus_9500_supervisor_b\+connected_mobile_experiencesnexus_3232cnexus_9372px-enexus_34200yc-smopenshift_distributed_tracingnexus_9336pq_aci_spinecertification_for_red_hat_enterprise_linuxnexus_9504nexus_93128nexus_3100-zultra_cloud_core_-_session_management_functionweb_terminalbig-ip_access_policy_managernexus_3500service_interconnectnexus_3636c-rnexus_3408-sbig-ip_fraud_protection_servicebig-ip_carrier-grade_natopenstack_platformnexus_92348gc-xnexus_9372tx-ejboss_enterprise_application_platformwindows_10_21h2nexus_3548-xltraffic_servernx-osopenshiftenterprise_linuxcbl-marinerastra_control_centerbig-ip_application_visibility_and_reportingjenkinsjboss_core_servicesexpresswaynexus_9372tx-e_switchquaynexus_92300ycrun_once_duration_override_operatornexus_9236c_switchnexus_3064xnexus_9200ycopenshift_sandboxed_containerstelepresence_video_communication_serverprime_network_registrarwindows_server_2016proxygennexus_93108tc-fx3pnexus_93600cd-gxcost_managementbig-ip_webacceleratornexus_9396txnexus_9372pxnexus_9500nexus_9232enexus_3100networkingnexus_93108tc-exopenshift_serverlessbig-ip_nextsolrnexus_93120txbusiness_process_automationnexus_93180yc-exnexus_9364c-gxopensearch_data_preppernexus_9364d-gx2anexus_9236c3scale_api_management_platformopenshift_pipelinesnexus_3548nexus_3100-vnexus_9396px_switchbuild_of_quarkusnghttp2nexus_3172tq-32tsingle_sign-onnexus_9300nexus_93180yc-fx3snexus_9372px-e_switchnexus_36180yc-ropenshift_data_sciencebig-ip_next_service_proxy_for_kuberneteshttp_serverdata_center_network_managernexus_93108tc-ex-24debian_linuxsecure_web_appliancewindows_10_22h2nexus_92160yc_switchnexus_9372px_switchnexus_93240tc-fx2contournexus_3264qnexus_9332pq_switchnexus_9808unified_contact_center_management_portalnexus_9500rkong_gatewaynexus_9536pqnexus_3172nexus_9736pqnexus_3016nexus_93120tx_switchvisual_studio_2022nexus_9364cnexus_9336pqmachine_deletion_remediation_operatornexus_93180yc-fx-24caddynettybig-ip_link_controllermigration_toolkit_for_virtualizationnexus_93360yc-fx2nexus_3264c-emigration_toolkit_for_containersprime_infrastructureunified_attendant_console_advancedn/ahttpHTTP/2
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2023-24534
Matching Score-10
Assigner-Go Project
ShareView Details
Matching Score-10
Assigner-Go Project
CVSS Score-7.5||HIGH
EPSS-0.16% / 36.58%
||
7 Day CHG~0.00%
Published-06 Apr, 2023 | 15:50
Updated-13 Feb, 2025 | 16:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Excessive memory allocation in net/http and net/textproto

HTTP and MIME header parsing can allocate large amounts of memory, even when parsing small inputs, potentially leading to a denial of service. Certain unusual patterns of input data can cause the common function used to parse HTTP and MIME headers to allocate substantially more memory than required to hold the parsed headers. An attacker can exploit this behavior to cause an HTTP server to allocate large amounts of memory from a small request, potentially leading to memory exhaustion and a denial of service. With fix, header parsing now correctly allocates only the memory required to hold parsed headers.

Action-Not Available
Vendor-Go standard libraryGo
Product-gonet/textproto
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2021-44716
Matching Score-10
Assigner-MITRE Corporation
ShareView Details
Matching Score-10
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.09% / 24.78%
||
7 Day CHG~0.00%
Published-01 Jan, 2022 | 00:00
Updated-04 Aug, 2024 | 04:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

net/http in Go before 1.16.12 and 1.17.x before 1.17.5 allows uncontrolled memory consumption in the header canonicalization cache via HTTP/2 requests.

Action-Not Available
Vendor-n/aNetApp, Inc.GoDebian GNU/Linux
Product-gocloud_insights_telegrafdebian_linuxn/a
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2023-39321
Matching Score-10
Assigner-Go Project
ShareView Details
Matching Score-10
Assigner-Go Project
CVSS Score-7.5||HIGH
EPSS-0.06% / 17.00%
||
7 Day CHG~0.00%
Published-08 Sep, 2023 | 16:13
Updated-13 Feb, 2025 | 17:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Panic when processing post-handshake message on QUIC connections in crypto/tls

Processing an incomplete post-handshake message for a QUIC connection can cause a panic.

Action-Not Available
Vendor-Go standard libraryGo
Product-gocrypto/tls
CWE ID-CWE-400
Uncontrolled Resource Consumption
CVE-2022-41723
Matching Score-8
Assigner-Go Project
ShareView Details
Matching Score-8
Assigner-Go Project
CVSS Score-7.5||HIGH
EPSS-0.27% / 49.87%
||
7 Day CHG~0.00%
Published-28 Feb, 2023 | 17:19
Updated-05 May, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Denial of service via crafted HTTP/2 stream in net/http and golang.org/x/net

A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests.

Action-Not Available
Vendor-Go standard librarygolang.org/x/netGo
Product-gohpackhttp2golang.org/x/net/http2golang.org/x/net/http2/hpacknet/http
CVE-2022-41721
Matching Score-8
Assigner-Go Project
ShareView Details
Matching Score-8
Assigner-Go Project
CVSS Score-7.5||HIGH
EPSS-0.07% / 22.17%
||
7 Day CHG~0.00%
Published-13 Jan, 2023 | 22:46
Updated-04 Apr, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Request smuggling due to improper request handling in golang.org/x/net/http2/h2c

A request smuggling attack is possible when using MaxBytesHandler. When using MaxBytesHandler, the body of an HTTP request is not fully consumed. When the server attempts to read HTTP2 frames from the connection, it will instead be reading the body of the HTTP request, which could be attacker-manipulated to represent arbitrary HTTP2 requests.

Action-Not Available
Vendor-golang.org/x/netGo
Product-h2cgolang.org/x/net/http2/h2c
CWE ID-CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
CVE-2026-32283
Matching Score-8
Assigner-Go Project
ShareView Details
Matching Score-8
Assigner-Go Project
CVSS Score-7.5||HIGH
EPSS-0.02% / 4.29%
||
7 Day CHG~0.00%
Published-08 Apr, 2026 | 01:06
Updated-16 Apr, 2026 | 19:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Unauthenticated TLS 1.3 KeyUpdate record can cause persistent connection retention and DoS in crypto/tls

If one side of the TLS connection sends multiple key update messages post-handshake in a single record, the connection can deadlock, causing uncontrolled consumption of resources. This can lead to a denial of service. This only affects TLS 1.3.

Action-Not Available
Vendor-Go standard libraryGo
Product-gocrypto/tls
CWE ID-CWE-770
Allocation of Resources Without Limits or Throttling
CVE-2026-32280
Matching Score-8
Assigner-Go Project
ShareView Details
Matching Score-8
Assigner-Go Project
CVSS Score-7.5||HIGH
EPSS-0.02% / 4.46%
||
7 Day CHG~0.00%
Published-08 Apr, 2026 | 01:06
Updated-16 Apr, 2026 | 19:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Unexpected work during chain building in crypto/x509

During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions.Intermediates, which can lead to a denial of service. This affects both direct users of crypto/x509 and users of crypto/tls.

Action-Not Available
Vendor-Go standard libraryGo
Product-gocrypto/x509
CWE ID-CWE-770
Allocation of Resources Without Limits or Throttling
CVE-2022-30630
Matching Score-8
Assigner-Go Project
ShareView Details
Matching Score-8
Assigner-Go Project
CVSS Score-7.5||HIGH
EPSS-0.04% / 11.22%
||
7 Day CHG~0.00%
Published-09 Aug, 2022 | 20:17
Updated-06 Mar, 2026 | 18:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Stack exhaustion in Glob on certain paths in io/fs

Uncontrolled recursion in Glob in io/fs before Go 1.17.12 and Go 1.18.4 allows an attacker to cause a panic due to stack exhaustion via a path which contains a large number of path separators.

Action-Not Available
Vendor-Go standard libraryGo
Product-goio/fs
CWE ID-CWE-674
Uncontrolled Recursion
CVE-2022-30633
Matching Score-8
Assigner-Go Project
ShareView Details
Matching Score-8
Assigner-Go Project
CVSS Score-7.5||HIGH
EPSS-0.10% / 26.15%
||
7 Day CHG~0.00%
Published-09 Aug, 2022 | 20:16
Updated-09 Mar, 2026 | 16:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Stack exhaustion when unmarshaling certain documents in encoding/xml

Uncontrolled recursion in Unmarshal in encoding/xml before Go 1.17.12 and Go 1.18.4 allows an attacker to cause a panic due to stack exhaustion via unmarshalling an XML document into a Go struct which has a nested field that uses the 'any' field tag.

Action-Not Available
Vendor-Go standard libraryGo
Product-goencoding/xml
CWE ID-CWE-674
Uncontrolled Recursion
CVE-2022-30632
Matching Score-8
Assigner-Go Project
ShareView Details
Matching Score-8
Assigner-Go Project
CVSS Score-7.5||HIGH
EPSS-0.10% / 26.15%
||
7 Day CHG~0.00%
Published-09 Aug, 2022 | 20:15
Updated-03 Aug, 2024 | 06:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Stack exhaustion on crafted paths in path/filepath

Uncontrolled recursion in Glob in path/filepath before Go 1.17.12 and Go 1.18.4 allows an attacker to cause a panic due to stack exhaustion via a path containing a large number of path separators.

Action-Not Available
Vendor-Go standard libraryGo
Product-gopath/filepath
CWE ID-CWE-674
Uncontrolled Recursion
CVE-2022-28327
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.18% / 38.55%
||
7 Day CHG~0.00%
Published-20 Apr, 2022 | 00:00
Updated-03 Aug, 2024 | 05:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The generic P-256 feature in crypto/elliptic in Go before 1.17.9 and 1.18.x before 1.18.1 allows a panic via long scalar input.

Action-Not Available
Vendor-n/aFedora ProjectGo
Product-goextra_packages_for_enterprise_linuxfedoran/a
CVE-2022-2879
Matching Score-8
Assigner-Go Project
ShareView Details
Matching Score-8
Assigner-Go Project
CVSS Score-7.5||HIGH
EPSS-0.02% / 3.48%
||
7 Day CHG~0.00%
Published-14 Oct, 2022 | 00:00
Updated-13 Feb, 2025 | 16:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Unbounded memory consumption when reading headers in archive/tar

Reader.Read does not set a limit on the maximum size of file headers. A maliciously crafted archive could cause Read to allocate unbounded amounts of memory, potentially causing resource exhaustion or panics. After fix, Reader.Read limits the maximum size of header blocks to 1 MiB.

Action-Not Available
Vendor-Go standard libraryGo
Product-goarchive/tar
CWE ID-CWE-770
Allocation of Resources Without Limits or Throttling
CVE-2022-28131
Matching Score-8
Assigner-Go Project
ShareView Details
Matching Score-8
Assigner-Go Project
CVSS Score-7.5||HIGH
EPSS-0.01% / 3.26%
||
7 Day CHG~0.00%
Published-09 Aug, 2022 | 00:00
Updated-03 Aug, 2024 | 05:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Stack exhaustion from deeply nested XML documents in encoding/xml

Uncontrolled recursion in Decoder.Skip in encoding/xml before Go 1.17.12 and Go 1.18.4 allows an attacker to cause a panic due to stack exhaustion via a deeply nested XML document.

Action-Not Available
Vendor-Go standard libraryNetApp, Inc.Fedora ProjectGo
Product-gocloud_insights_telegraffedoraencoding/xml
CWE ID-CWE-674
Uncontrolled Recursion
CVE-2022-27536
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.46% / 63.96%
||
7 Day CHG~0.00%
Published-20 Apr, 2022 | 00:00
Updated-03 Aug, 2024 | 05:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Certificate.Verify in crypto/x509 in Go 1.18.x before 1.18.1 can be caused to panic on macOS when presented with certain malformed certificates. This allows a remote TLS server to cause a TLS client to panic.

Action-Not Available
Vendor-n/aApple Inc.Go
Product-gomacosn/a
CWE ID-CWE-295
Improper Certificate Validation
CVE-2022-27664
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.13% / 32.37%
||
7 Day CHG~0.00%
Published-06 Sep, 2022 | 17:29
Updated-03 Aug, 2024 | 05:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In net/http in Go before 1.18.6 and 1.19.x before 1.19.1, attackers can cause a denial of service because an HTTP/2 connection can hang during closing if shutdown were preempted by a fatal error.

Action-Not Available
Vendor-n/aFedora ProjectGo
Product-gofedoran/a
CVE-2022-27191
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.09% / 25.03%
||
7 Day CHG~0.00%
Published-18 Mar, 2022 | 06:03
Updated-03 Aug, 2024 | 05:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The golang.org/x/crypto/ssh package before 0.0.0-20220314234659-1baeb1ce4c0b for Go allows an attacker to crash a server in certain circumstances involving AddHostKey.

Action-Not Available
Vendor-n/aFedora ProjectGoRed Hat, Inc.
Product-extra_packages_for_enterprise_linuxfedoraenterprise_linuxsshadvanced_cluster_management_for_kubernetesn/a
CVE-2026-27137
Matching Score-8
Assigner-Go Project
ShareView Details
Matching Score-8
Assigner-Go Project
CVSS Score-7.5||HIGH
EPSS-0.01% / 3.12%
||
7 Day CHG~0.00%
Published-06 Mar, 2026 | 21:28
Updated-21 Apr, 2026 | 14:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Incorrect enforcement of email constraints in crypto/x509

When verifying a certificate chain which contains a certificate containing multiple email address constraints which share common local portions but different domain portions, these constraints will not be properly applied, and only the last constraint will be considered.

Action-Not Available
Vendor-Go standard libraryGo
Product-gocrypto/x509
CWE ID-CWE-295
Improper Certificate Validation
CVE-2022-24675
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.13% / 32.44%
||
7 Day CHG-0.04%
Published-20 Apr, 2022 | 00:00
Updated-03 Aug, 2024 | 04:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

encoding/pem in Go before 1.17.9 and 1.18.x before 1.18.1 has a Decode stack overflow via a large amount of PEM data.

Action-Not Available
Vendor-n/aNetApp, Inc.Fedora ProjectGo
Product-gofedorakubernetes_monitoring_operatorn/a
CWE ID-CWE-674
Uncontrolled Recursion
CVE-2022-24921
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.02% / 4.84%
||
7 Day CHG~0.00%
Published-05 Mar, 2022 | 00:00
Updated-03 Aug, 2024 | 04:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

regexp.Compile in Go before 1.16.15 and 1.17.x before 1.17.8 allows stack exhaustion via a deeply nested expression.

Action-Not Available
Vendor-n/aNetApp, Inc.GoDebian GNU/Linux
Product-godebian_linuxastra_tridentn/a
CWE ID-CWE-674
Uncontrolled Recursion
CVE-2018-17142
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.65% / 70.97%
||
7 Day CHG~0.00%
Published-17 Sep, 2018 | 14:00
Updated-05 Aug, 2024 | 10:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The html package (aka x/net/html) through 2018-09-17 in Go mishandles <math><template><mo><template>, leading to a "panic: runtime error" in parseCurrentToken in parse.go during an html.Parse call.

Action-Not Available
Vendor-n/aFedora ProjectGo
Product-fedoranetn/a
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2022-23772
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.04% / 11.01%
||
7 Day CHG~0.00%
Published-11 Feb, 2022 | 00:11
Updated-03 Aug, 2024 | 03:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Rat.SetString in math/big in Go before 1.16.14 and 1.17.x before 1.17.7 has an overflow that can lead to Uncontrolled Memory Consumption.

Action-Not Available
Vendor-n/aNetApp, Inc.GoDebian GNU/Linux
Product-debian_linuxcloud_insights_telegraf_agentbeegfs_csi_drivergostoragegridkubernetes_monitoring_operatorn/a
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2020-29652
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.03% / 8.69%
||
7 Day CHG~0.00%
Published-17 Dec, 2020 | 04:12
Updated-04 Aug, 2024 | 16:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A nil pointer dereference in the golang.org/x/crypto/ssh component through v0.0.0-20201203163018-be400aefbc4c for Go allows remote attackers to cause a denial of service against SSH servers.

Action-Not Available
Vendor-n/aGo
Product-sshn/a
CWE ID-CWE-476
NULL Pointer Dereference
CVE-2026-32281
Matching Score-8
Assigner-Go Project
ShareView Details
Matching Score-8
Assigner-Go Project
CVSS Score-7.5||HIGH
EPSS-0.02% / 4.69%
||
7 Day CHG~0.00%
Published-08 Apr, 2026 | 01:06
Updated-16 Apr, 2026 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Inefficient policy validation in crypto/x509

Validating certificate chains which use policies is unexpectedly inefficient when certificates in the chain contain a very large number of policy mappings, possibly causing denial of service. This only affects validation of otherwise trusted certificate chains, issued by a root CA in the VerifyOptions.Roots CertPool, or in the system certificate pool.

Action-Not Available
Vendor-Go standard libraryGo
Product-gocrypto/x509
CWE ID-CWE-295
Improper Certificate Validation
CVE-2022-32189
Matching Score-8
Assigner-Go Project
ShareView Details
Matching Score-8
Assigner-Go Project
CVSS Score-7.5||HIGH
EPSS-0.11% / 29.39%
||
7 Day CHG~0.00%
Published-09 Aug, 2022 | 20:17
Updated-03 Aug, 2024 | 07:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Panic when decoding Float and Rat types in math/big

A too-short encoded message can cause a panic in Float.GobDecode and Rat GobDecode in math/big in Go before 1.17.13 and 1.18.5, potentially allowing a denial of service.

Action-Not Available
Vendor-Go standard libraryGo
Product-gomath/big
CVE-2021-43565
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.03% / 9.32%
||
7 Day CHG+0.02%
Published-06 Sep, 2022 | 17:03
Updated-04 Aug, 2024 | 04:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The x/crypto/ssh package before 0.0.0-20211202192323-5770296d904e of golang.org/x/crypto allows an attacker to panic an SSH server.

Action-Not Available
Vendor-n/aGo
Product-sshn/a
CVE-2021-41771
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.87% / 75.25%
||
7 Day CHG~0.00%
Published-08 Nov, 2021 | 00:00
Updated-04 Aug, 2024 | 03:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ImportedSymbols in debug/macho (for Open or OpenFat) in Go before 1.16.10 and 1.17.x before 1.17.3 Accesses a Memory Location After the End of a Buffer, aka an out-of-bounds slice situation.

Action-Not Available
Vendor-n/aDebian GNU/LinuxFedora ProjectGo
Product-godebian_linuxfedoran/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2022-30635
Matching Score-8
Assigner-Go Project
ShareView Details
Matching Score-8
Assigner-Go Project
CVSS Score-7.5||HIGH
EPSS-0.11% / 29.48%
||
7 Day CHG~0.00%
Published-09 Aug, 2022 | 20:16
Updated-06 Mar, 2026 | 18:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Stack exhaustion when decoding certain messages in encoding/gob

Uncontrolled recursion in Decoder.Decode in encoding/gob before Go 1.17.12 and Go 1.18.4 allows an attacker to cause a panic due to stack exhaustion via a message which contains deeply nested structures.

Action-Not Available
Vendor-Go standard libraryGo
Product-goencoding/gob
CWE ID-CWE-674
Uncontrolled Recursion
CVE-2022-30634
Matching Score-8
Assigner-Go Project
ShareView Details
Matching Score-8
Assigner-Go Project
CVSS Score-7.5||HIGH
EPSS-0.08% / 23.12%
||
7 Day CHG~0.00%
Published-15 Jul, 2022 | 19:36
Updated-03 Aug, 2024 | 06:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Indefinite hang with large buffers on Windows in crypto/rand

Infinite loop in Read in crypto/rand before Go 1.17.11 and Go 1.18.3 on Windows allows attacker to cause an indefinite hang by passing a buffer larger than 1 << 32 - 1 bytes.

Action-Not Available
Vendor-Go standard libraryNetApp, Inc.GoMicrosoft Corporation
Product-gowindowscloud_insights_telegraf_agentcrypto/rand
CWE ID-CWE-835
Loop with Unreachable Exit Condition ('Infinite Loop')
CVE-2020-28851
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.14% / 33.21%
||
7 Day CHG~0.00%
Published-02 Jan, 2021 | 05:42
Updated-04 Aug, 2024 | 16:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In x/text in Go 1.15.4, an "index out of range" panic occurs in language.ParseAcceptLanguage while parsing the -u- extension. (x/text/language is supposed to be able to parse an HTTP Accept-Language header.)

Action-Not Available
Vendor-n/aGo
Product-gon/a
CWE ID-CWE-129
Improper Validation of Array Index
CVE-2020-28852
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.11% / 28.45%
||
7 Day CHG~0.00%
Published-02 Jan, 2021 | 05:45
Updated-04 Aug, 2024 | 16:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In x/text in Go before v0.3.5, a "slice bounds out of range" panic occurs in language.ParseAcceptLanguage while processing a BCP 47 tag. (x/text/language is supposed to be able to parse an HTTP Accept-Language header.)

Action-Not Available
Vendor-n/aGo
Product-textn/a
CWE ID-CWE-129
Improper Validation of Array Index
CVE-2026-25679
Matching Score-8
Assigner-Go Project
ShareView Details
Matching Score-8
Assigner-Go Project
CVSS Score-7.5||HIGH
EPSS-0.05% / 15.84%
||
7 Day CHG~0.00%
Published-06 Mar, 2026 | 21:28
Updated-21 Apr, 2026 | 14:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Incorrect parsing of IPv6 host literals in net/url

url.Parse insufficiently validated the host/authority component and accepted some invalid URLs.

Action-Not Available
Vendor-Go standard libraryGo
Product-gonet/url
CWE ID-CWE-425
Direct Request ('Forced Browsing')
CVE-2017-1000098
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.43% / 62.85%
||
7 Day CHG~0.00%
Published-04 Oct, 2017 | 01:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The net/http package's Request.ParseMultipartForm method starts writing to temporary files once the request body size surpasses the given "maxMemory" limit. It was possible for an attacker to generate a multipart request crafted such that the server ran out of file descriptors.

Action-Not Available
Vendor-n/aGo
Product-gon/a
CWE ID-CWE-769
DEPRECATED: Uncontrolled File Descriptor Consumption
CVE-2022-30631
Matching Score-8
Assigner-Go Project
ShareView Details
Matching Score-8
Assigner-Go Project
CVSS Score-7.5||HIGH
EPSS-0.04% / 12.15%
||
7 Day CHG~0.00%
Published-09 Aug, 2022 | 20:16
Updated-20 Oct, 2025 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Stack exhaustion when reading certain archives in compress/gzip

Uncontrolled recursion in Reader.Read in compress/gzip before Go 1.17.12 and Go 1.18.4 allows an attacker to cause a panic due to stack exhaustion via an archive containing a large number of concatenated 0-length compressed files.

Action-Not Available
Vendor-Go standard libraryGo
Product-gocompress/gzip
CWE ID-CWE-674
Uncontrolled Recursion
CVE-2023-45288
Matching Score-8
Assigner-Go Project
ShareView Details
Matching Score-8
Assigner-Go Project
CVSS Score-7.5||HIGH
EPSS-69.91% / 98.68%
||
7 Day CHG+3.27%
Published-04 Apr, 2024 | 20:37
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
HTTP/2 CONTINUATION flood in net/http

An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection.

Action-Not Available
Vendor-Go standard librarygolang.org/x/netgo_standard_libraryGo
Product-golang.org/x/net/http2net/httphttp2net\/http
CVE-2020-16845
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.15% / 34.70%
||
7 Day CHG~0.00%
Published-06 Aug, 2020 | 17:03
Updated-04 Aug, 2024 | 13:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Go before 1.13.15 and 14.x before 1.14.7 can have an infinite read loop in ReadUvarint and ReadVarint in encoding/binary via invalid inputs.

Action-Not Available
Vendor-n/aDebian GNU/LinuxFedora ProjectGoopenSUSE
Product-godebian_linuxfedoraleapn/a
CWE ID-CWE-835
Loop with Unreachable Exit Condition ('Infinite Loop')
CVE-2020-14040
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.01% / 0.69%
||
7 Day CHG~0.00%
Published-17 Jun, 2020 | 19:22
Updated-04 Aug, 2024 | 12:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The x/text package before 0.3.3 for Go has a vulnerability in encoding/unicode that could lead to the UTF-16 decoder entering an infinite loop, causing the program to crash or run out of memory. An attacker could provide a single byte to a UTF16 decoder instantiated with UseBOM or ExpectBOM to trigger an infinite loop if the String function on the Decoder is called, or the Decoder is passed to golang.org/x/text/transform.String.

Action-Not Available
Vendor-n/aFedora ProjectGo
Product-textfedoran/a
CWE ID-CWE-835
Loop with Unreachable Exit Condition ('Infinite Loop')
CVE-2023-39325
Matching Score-8
Assigner-Go Project
ShareView Details
Matching Score-8
Assigner-Go Project
CVSS Score-7.5||HIGH
EPSS-0.16% / 36.76%
||
7 Day CHG~0.00%
Published-11 Oct, 2023 | 21:15
Updated-13 Feb, 2025 | 17:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
HTTP/2 rapid reset can cause excessive work in net/http

A malicious HTTP/2 client which rapidly creates requests and immediately resets them can cause excessive server resource consumption. While the total number of requests is bounded by the http2.Server.MaxConcurrentStreams setting, resetting an in-progress request allows the attacker to create a new request while the existing one is still executing. With the fix applied, HTTP/2 servers now bound the number of simultaneously executing handler goroutines to the stream concurrency limit (MaxConcurrentStreams). New requests arriving when at the limit (which can only happen after the client has reset an existing, in-flight request) will be queued until a handler exits. If the request queue grows too large, the server will terminate the connection. This issue is also fixed in golang.org/x/net/http2 for users manually configuring HTTP/2. The default stream concurrency limit is 250 streams (requests) per HTTP/2 connection. This value may be adjusted using the golang.org/x/net/http2 package; see the Server.MaxConcurrentStreams setting and the ConfigureServer function.

Action-Not Available
Vendor-Go standard librarygolang.org/x/netNetApp, Inc.Fedora ProjectGo
Product-astra_trident_autosupportfedoraastra_tridentgohttp2golang.org/x/net/http2net/http
CWE ID-CWE-770
Allocation of Resources Without Limits or Throttling
CVE-2024-34156
Matching Score-8
Assigner-Go Project
ShareView Details
Matching Score-8
Assigner-Go Project
CVSS Score-7.5||HIGH
EPSS-0.30% / 53.10%
||
7 Day CHG~0.00%
Published-06 Sep, 2024 | 20:42
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Stack exhaustion in Decoder.Decode in encoding/gob

Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion. This is a follow-up to CVE-2022-30635.

Action-Not Available
Vendor-Go standard librarygo_standard_library
Product-encoding/gobencoding\/gob
CVE-2024-34158
Matching Score-8
Assigner-Go Project
ShareView Details
Matching Score-8
Assigner-Go Project
CVSS Score-7.5||HIGH
EPSS-0.16% / 36.76%
||
7 Day CHG~0.00%
Published-06 Sep, 2024 | 20:42
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Stack exhaustion in Parse in go/build/constraint

Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion.

Action-Not Available
Vendor-Go standard librarygo_build_constraint
Product-go/build/constraintgo_standard_library
CWE ID-CWE-674
Uncontrolled Recursion
CVE-2025-61726
Matching Score-8
Assigner-Go Project
ShareView Details
Matching Score-8
Assigner-Go Project
CVSS Score-7.5||HIGH
EPSS-0.03% / 9.78%
||
7 Day CHG~0.00%
Published-28 Jan, 2026 | 19:30
Updated-06 Feb, 2026 | 18:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Memory exhaustion in query parameter parsing in net/url

The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse large URL-encoded forms. Parsing a large form containing many unique query parameters can cause excessive memory consumption.

Action-Not Available
Vendor-Go standard libraryGo
Product-gonet/url
CWE ID-CWE-770
Allocation of Resources Without Limits or Throttling
CVE-2025-61729
Matching Score-8
Assigner-Go Project
ShareView Details
Matching Score-8
Assigner-Go Project
CVSS Score-7.5||HIGH
EPSS-0.01% / 1.53%
||
7 Day CHG-0.01%
Published-02 Dec, 2025 | 18:54
Updated-19 Dec, 2025 | 18:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Excessive resource consumption when printing error string for host certificate validation in crypto/x509

Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.

Action-Not Available
Vendor-Go standard libraryGo
Product-gocrypto/x509
CWE ID-CWE-295
Improper Certificate Validation
CVE-2025-61723
Matching Score-8
Assigner-Go Project
ShareView Details
Matching Score-8
Assigner-Go Project
CVSS Score-7.5||HIGH
EPSS-0.04% / 11.36%
||
7 Day CHG~0.00%
Published-29 Oct, 2025 | 22:10
Updated-29 Jan, 2026 | 15:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Quadratic complexity when parsing some invalid inputs in encoding/pem

The processing time for parsing some invalid inputs scales non-linearly with respect to the size of the input. This affects programs which parse untrusted PEM inputs.

Action-Not Available
Vendor-Go standard libraryGo
Product-goencoding/pem
CWE ID-CWE-770
Allocation of Resources Without Limits or Throttling
CVE-2021-39293
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.04% / 11.45%
||
7 Day CHG~0.00%
Published-24 Jan, 2022 | 00:00
Updated-04 Aug, 2024 | 02:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In archive/zip in Go before 1.16.8 and 1.17.x before 1.17.1, a crafted archive header (falsely designating that many files are present) can cause a NewReader or OpenReader panic. NOTE: this issue exists because of an incomplete fix for CVE-2021-33196.

Action-Not Available
Vendor-n/aNetApp, Inc.Go
Product-gocloud_insights_telegrafn/a
CWE ID-CWE-770
Allocation of Resources Without Limits or Throttling
CVE-2025-58188
Matching Score-8
Assigner-Go Project
ShareView Details
Matching Score-8
Assigner-Go Project
CVSS Score-7.5||HIGH
EPSS-0.01% / 0.91%
||
7 Day CHG~0.00%
Published-29 Oct, 2025 | 22:10
Updated-29 Jan, 2026 | 15:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Panic when validating certificates with DSA public keys in crypto/x509

Validating certificate chains which contain DSA public keys can cause programs to panic, due to a interface cast that assumes they implement the Equal method. This affects programs which validate arbitrary certificate chains.

Action-Not Available
Vendor-Go standard libraryGo
Product-gocrypto/x509
CWE ID-CWE-295
Improper Certificate Validation
CVE-2025-58187
Matching Score-8
Assigner-Go Project
ShareView Details
Matching Score-8
Assigner-Go Project
CVSS Score-7.5||HIGH
EPSS-0.02% / 4.84%
||
7 Day CHG~0.00%
Published-29 Oct, 2025 | 22:10
Updated-29 Jan, 2026 | 16:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Quadratic complexity when checking name constraints in crypto/x509

Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate. This affects programs which validate arbitrary certificate chains.

Action-Not Available
Vendor-Go standard libraryGo
Product-gocrypto/x509
CWE ID-CWE-407
Inefficient Algorithmic Complexity
CVE-2019-17596
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-2.34% / 84.94%
||
7 Day CHG~0.00%
Published-24 Oct, 2019 | 21:07
Updated-05 Aug, 2024 | 01:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Go before 1.12.11 and 1.3.x before 1.13.2 can panic upon an attempt to process network traffic containing an invalid DSA public key. There are several attack scenarios, such as traffic from a client to a server that verifies client certificates.

Action-Not Available
Vendor-n/aArista Networks, Inc.Fedora ProjectDebian GNU/LinuxGoopenSUSERed Hat, Inc.
Product-enterprise_linux_serverterminattrdebian_linuxdeveloper_toolscloudvision_portalfedoraenterprise_linuxgoeosmosleapn/a
CWE ID-CWE-436
Interpretation Conflict
CVE-2024-24792
Matching Score-8
Assigner-Go Project
ShareView Details
Matching Score-8
Assigner-Go Project
CVSS Score-7.5||HIGH
EPSS-0.16% / 36.56%
||
7 Day CHG~0.00%
Published-27 Jun, 2024 | 17:37
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Panic when parsing invalid palette-color images in golang.org/x/image

Parsing a corrupt or malicious image with invalid color indices can cause a panic.

Action-Not Available
Vendor-golang.org/x/imageGo
Product-golang.org/x/image/tiffimage
CVE-2021-38561
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.05% / 16.29%
||
7 Day CHG~0.00%
Published-26 Dec, 2022 | 00:00
Updated-14 Apr, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

golang.org/x/text/language in golang.org/x/text before 0.3.7 can panic with an out-of-bounds read during BCP 47 language tag parsing. Index calculation is mishandled. If parsing untrusted user input, this can be used as a vector for a denial-of-service attack.

Action-Not Available
Vendor-n/aGo
Product-textn/a
CWE ID-CWE-125
Out-of-bounds Read
CVE-2021-33198
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.03% / 8.77%
||
7 Day CHG~0.00%
Published-02 Aug, 2021 | 18:55
Updated-03 Aug, 2024 | 23:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Go before 1.15.13 and 1.16.x before 1.16.5, there can be a panic for a large exponent to the math/big.Rat SetString or UnmarshalText method.

Action-Not Available
Vendor-n/aGo
Product-gon/a
  • Previous
  • 1
  • 2
  • 3
  • ...
  • 25
  • 26
  • Next
Details not found