Количество 125
Количество 125
SUSE-SU-2026:0219-1
Security update for go1.24
SUSE-SU-2026:0218-1
Security update for go1.25
CVE-2025-61726
The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse large URL-encoded forms. Parsing a large form containing many unique query parameters can cause excessive memory consumption.
CVE-2025-61726
The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse large URL-encoded forms. Parsing a large form containing many unique query parameters can cause excessive memory consumption.
CVE-2025-61726
The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse large URL-encoded forms. Parsing a large form containing many unique query parameters can cause excessive memory consumption.
CVE-2025-61726
The net/url package does not set a limit on the number of query parame ...
RLSA-2026:3669
Important: go-rpm-macros security update
RLSA-2026:3668
Important: go-rpm-macros security update
GHSA-gm9r-q53w-2gh4
The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse large URL-encoded forms. Parsing a large form containing many unique query parameters can cause excessive memory consumption.
ELSA-2026-3669
ELSA-2026-3669: go-rpm-macros security update (IMPORTANT)
ELSA-2026-3668
ELSA-2026-3668: go-rpm-macros security update (IMPORTANT)
BDU:2026-03409
Уязвимость языка программирования Golang, связанная с неограниченным распределением ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
ROS-20260320-73-0009
Уязвимость etcd
ROS-20260209-73-0043
Уязвимость golang
CVE-2025-61729
Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.
CVE-2025-61729
Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.
CVE-2025-61729
Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.
CVE-2025-61729
Excessive resource consumption when printing error string for host certificate validation in crypto/x509
CVE-2025-61729
Within HostnameError.Error(), when constructing an error string, there ...
CVE-2025-68121
During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
SUSE-SU-2026:0219-1 Security update for go1.24 | 2 месяца назад | |||
SUSE-SU-2026:0218-1 Security update for go1.25 | 2 месяца назад | |||
CVE-2025-61726 The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse large URL-encoded forms. Parsing a large form containing many unique query parameters can cause excessive memory consumption. | CVSS3: 7.5 | 0% Низкий | около 2 месяцев назад | |
CVE-2025-61726 The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse large URL-encoded forms. Parsing a large form containing many unique query parameters can cause excessive memory consumption. | CVSS3: 7.5 | 0% Низкий | около 2 месяцев назад | |
CVE-2025-61726 The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse large URL-encoded forms. Parsing a large form containing many unique query parameters can cause excessive memory consumption. | CVSS3: 7.5 | 0% Низкий | около 2 месяцев назад | |
CVE-2025-61726 The net/url package does not set a limit on the number of query parame ... | CVSS3: 7.5 | 0% Низкий | около 2 месяцев назад | |
RLSA-2026:3669 Important: go-rpm-macros security update | 0% Низкий | 21 день назад | ||
RLSA-2026:3668 Important: go-rpm-macros security update | 0% Низкий | 21 день назад | ||
GHSA-gm9r-q53w-2gh4 The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse large URL-encoded forms. Parsing a large form containing many unique query parameters can cause excessive memory consumption. | CVSS3: 7.5 | 0% Низкий | около 2 месяцев назад | |
ELSA-2026-3669 ELSA-2026-3669: go-rpm-macros security update (IMPORTANT) | 24 дня назад | |||
ELSA-2026-3668 ELSA-2026-3668: go-rpm-macros security update (IMPORTANT) | 24 дня назад | |||
BDU:2026-03409 Уязвимость языка программирования Golang, связанная с неограниченным распределением ресурсов, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 7.5 | 0% Низкий | около 2 месяцев назад | |
ROS-20260320-73-0009 Уязвимость etcd | CVSS3: 7.5 | 0% Низкий | 7 дней назад | |
ROS-20260209-73-0043 Уязвимость golang | CVSS3: 7.5 | 0% Низкий | около 2 месяцев назад | |
CVE-2025-61729 Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption. | CVSS3: 7.5 | 0% Низкий | 4 месяца назад | |
CVE-2025-61729 Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption. | CVSS3: 7.5 | 0% Низкий | 4 месяца назад | |
CVE-2025-61729 Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption. | CVSS3: 7.5 | 0% Низкий | 4 месяца назад | |
CVE-2025-61729 Excessive resource consumption when printing error string for host certificate validation in crypto/x509 | 0% Низкий | 4 месяца назад | ||
CVE-2025-61729 Within HostnameError.Error(), when constructing an error string, there ... | CVSS3: 7.5 | 0% Низкий | 4 месяца назад | |
CVE-2025-68121 During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake. | CVSS3: 10 | 0% Низкий | около 2 месяцев назад |
Уязвимостей на страницу