Количество 100
Количество 100
SUSE-SU-2026:0298-1
Security update for go1.25-openssl
SUSE-SU-2026:0297-1
Security update for go1.25-openssl
CVE-2025-61726
The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse large URL-encoded forms. Parsing a large form containing many unique query parameters can cause excessive memory consumption.
CVE-2025-61726
The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse large URL-encoded forms. Parsing a large form containing many unique query parameters can cause excessive memory consumption.
CVE-2025-61726
The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse large URL-encoded forms. Parsing a large form containing many unique query parameters can cause excessive memory consumption.
CVE-2025-61726
The net/url package does not set a limit on the number of query parame ...
RLSA-2026:3669
Important: go-rpm-macros security update
RLSA-2026:3668
Important: go-rpm-macros security update
GHSA-gm9r-q53w-2gh4
The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse large URL-encoded forms. Parsing a large form containing many unique query parameters can cause excessive memory consumption.
ELSA-2026-3669
ELSA-2026-3669: go-rpm-macros security update (IMPORTANT)
ELSA-2026-3668
ELSA-2026-3668: go-rpm-macros security update (IMPORTANT)
BDU:2026-03409
Уязвимость языка программирования Golang, связанная с неограниченным распределением ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
ROS-20260320-73-0009
Уязвимость etcd
ROS-20260209-73-0043
Уязвимость golang
CVE-2025-61728
archive/zip uses a super-linear file name indexing algorithm that is invoked the first time a file in an archive is opened. This can lead to a denial of service when consuming a maliciously constructed ZIP archive.
CVE-2025-61728
archive/zip uses a super-linear file name indexing algorithm that is invoked the first time a file in an archive is opened. This can lead to a denial of service when consuming a maliciously constructed ZIP archive.
CVE-2025-61728
archive/zip uses a super-linear file name indexing algorithm that is invoked the first time a file in an archive is opened. This can lead to a denial of service when consuming a maliciously constructed ZIP archive.
CVE-2025-61728
archive/zip uses a super-linear file name indexing algorithm that is i ...
CVE-2025-68121
During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.
CVE-2025-68121
During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
SUSE-SU-2026:0298-1 Security update for go1.25-openssl | около 2 месяцев назад | |||
SUSE-SU-2026:0297-1 Security update for go1.25-openssl | около 2 месяцев назад | |||
CVE-2025-61726 The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse large URL-encoded forms. Parsing a large form containing many unique query parameters can cause excessive memory consumption. | CVSS3: 7.5 | 0% Низкий | около 2 месяцев назад | |
CVE-2025-61726 The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse large URL-encoded forms. Parsing a large form containing many unique query parameters can cause excessive memory consumption. | CVSS3: 7.5 | 0% Низкий | около 2 месяцев назад | |
CVE-2025-61726 The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse large URL-encoded forms. Parsing a large form containing many unique query parameters can cause excessive memory consumption. | CVSS3: 7.5 | 0% Низкий | около 2 месяцев назад | |
CVE-2025-61726 The net/url package does not set a limit on the number of query parame ... | CVSS3: 7.5 | 0% Низкий | около 2 месяцев назад | |
RLSA-2026:3669 Important: go-rpm-macros security update | 0% Низкий | 21 день назад | ||
RLSA-2026:3668 Important: go-rpm-macros security update | 0% Низкий | 21 день назад | ||
GHSA-gm9r-q53w-2gh4 The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse large URL-encoded forms. Parsing a large form containing many unique query parameters can cause excessive memory consumption. | CVSS3: 7.5 | 0% Низкий | около 2 месяцев назад | |
ELSA-2026-3669 ELSA-2026-3669: go-rpm-macros security update (IMPORTANT) | 24 дня назад | |||
ELSA-2026-3668 ELSA-2026-3668: go-rpm-macros security update (IMPORTANT) | 24 дня назад | |||
BDU:2026-03409 Уязвимость языка программирования Golang, связанная с неограниченным распределением ресурсов, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 7.5 | 0% Низкий | около 2 месяцев назад | |
ROS-20260320-73-0009 Уязвимость etcd | CVSS3: 7.5 | 0% Низкий | 7 дней назад | |
ROS-20260209-73-0043 Уязвимость golang | CVSS3: 7.5 | 0% Низкий | около 2 месяцев назад | |
CVE-2025-61728 archive/zip uses a super-linear file name indexing algorithm that is invoked the first time a file in an archive is opened. This can lead to a denial of service when consuming a maliciously constructed ZIP archive. | CVSS3: 6.5 | 0% Низкий | около 2 месяцев назад | |
CVE-2025-61728 archive/zip uses a super-linear file name indexing algorithm that is invoked the first time a file in an archive is opened. This can lead to a denial of service when consuming a maliciously constructed ZIP archive. | CVSS3: 7.5 | 0% Низкий | около 2 месяцев назад | |
CVE-2025-61728 archive/zip uses a super-linear file name indexing algorithm that is invoked the first time a file in an archive is opened. This can lead to a denial of service when consuming a maliciously constructed ZIP archive. | CVSS3: 6.5 | 0% Низкий | около 2 месяцев назад | |
CVE-2025-61728 archive/zip uses a super-linear file name indexing algorithm that is i ... | CVSS3: 6.5 | 0% Низкий | около 2 месяцев назад | |
CVE-2025-68121 During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake. | CVSS3: 10 | 0% Низкий | около 2 месяцев назад | |
CVE-2025-68121 During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake. | CVSS3: 7.4 | 0% Низкий | около 2 месяцев назад |
Уязвимостей на страницу