Show filters
15 Total Results
Displaying 1-10 of 15
Sort by:
Attacker Value
Unknown
CVE-2025-22866
Disclosure Date: February 06, 2025 (last updated February 07, 2025)
Due to the usage of a variable time instruction in the assembly implementation of an internal function, a small number of bits of secret scalars are leaked on the ppc64le architecture. Due to the way this function is used, we do not believe this leakage is enough to allow recovery of the private key when P-256 is used in any well known protocols.
0
Attacker Value
Unknown
CVE-2025-22865
Disclosure Date: January 28, 2025 (last updated January 28, 2025)
Using ParsePKCS1PrivateKey to parse a RSA key that is missing the CRT values would panic when verifying that the key is well formed.
0
Attacker Value
Unknown
CVE-2024-45341
Disclosure Date: January 28, 2025 (last updated January 28, 2025)
A certificate with a URI which has a IPv6 address with a zone ID may incorrectly satisfy a URI name constraint that applies to the certificate chain. Certificates containing URIs are not permitted in the web PKI, so this only affects users of private PKIs which make use of URIs.
0
Attacker Value
Unknown
CVE-2024-45336
Disclosure Date: January 28, 2025 (last updated January 28, 2025)
The HTTP client drops sensitive headers after following a cross-domain redirect. For example, a request to a.com/ containing an Authorization header which is redirected to b.com/ will not send that header to b.com. In the event that the client received a subsequent same-domain redirect, however, the sensitive headers would be restored. For example, a chain of redirects from a.com/, to b.com/1, and finally to b.com/2 would incorrectly send the Authorization header to b.com/2.
0
Attacker Value
Unknown
CVE-2024-34158
Disclosure Date: September 06, 2024 (last updated September 07, 2024)
Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion.
0
Attacker Value
Unknown
CVE-2024-34156
Disclosure Date: September 06, 2024 (last updated September 07, 2024)
Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion. This is a follow-up to CVE-2022-30635.
0
Attacker Value
Unknown
CVE-2024-34155
Disclosure Date: September 06, 2024 (last updated September 07, 2024)
Calling any of the Parse functions on Go source code which contains deeply nested literals can cause a panic due to stack exhaustion.
0
Attacker Value
Unknown
CVE-2024-24791
Disclosure Date: July 02, 2024 (last updated July 03, 2024)
The net/http HTTP/1.1 client mishandled the case where a server responds to a request with an "Expect: 100-continue" header with a non-informational (200 or higher) status. This mishandling could leave a client connection in an invalid state, where the next request sent on the connection will fail. An attacker sending a request to a net/http/httputil.ReverseProxy proxy can exploit this mishandling to cause a denial of service by sending "Expect: 100-continue" requests which elicit a non-informational response from the backend. Each such request leaves the proxy with an invalid connection, and causes one subsequent request using that connection to fail.
0
Attacker Value
Unknown
CVE-2024-24788
Disclosure Date: May 08, 2024 (last updated May 09, 2024)
A malformed DNS message in response to a query can cause the Lookup functions to get stuck in an infinite loop.
0
Attacker Value
Unknown
CVE-2023-45288
Disclosure Date: April 04, 2024 (last updated April 10, 2024)
An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection.
0