Логотип exploitDog
bind:"CVE-2025-61726" OR bind:"CVE-2025-61728" OR bind:"CVE-2025-61729" OR bind:"CVE-2025-68121"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2025-61726" OR bind:"CVE-2025-61728" OR bind:"CVE-2025-61729" OR bind:"CVE-2025-68121"

Количество 132

Количество 132

redos логотип

ROS-20260209-73-0044

около 2 месяцев назад

Уязвимость golang

CVSS3: 6.5
EPSS: Низкий
ubuntu логотип

CVE-2025-61729

4 месяца назад

Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2025-61729

4 месяца назад

Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2025-61729

4 месяца назад

Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.

CVSS3: 7.5
EPSS: Низкий
msrc логотип

CVE-2025-61729

4 месяца назад

Excessive resource consumption when printing error string for host certificate validation in crypto/x509

EPSS: Низкий
debian логотип

CVE-2025-61729

4 месяца назад

Within HostnameError.Error(), when constructing an error string, there ...

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2025-68121

около 2 месяцев назад

During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.

CVSS3: 10
EPSS: Низкий
redhat логотип

CVE-2025-68121

около 2 месяцев назад

During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.

CVSS3: 7.4
EPSS: Низкий
nvd логотип

CVE-2025-68121

около 2 месяцев назад

During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.

CVSS3: 10
EPSS: Низкий
msrc логотип

CVE-2025-68121

21 день назад

Unexpected session resumption in crypto/tls

EPSS: Низкий
debian логотип

CVE-2025-68121

около 2 месяцев назад

During session resumption in crypto/tls, if the underlying Config has ...

CVSS3: 10
EPSS: Низкий
rocky логотип

RLSA-2026:2323

около 1 месяца назад

Important: git-lfs security update

EPSS: Низкий
rocky логотип

RLSA-2026:1908

около 2 месяцев назад

Important: opentelemetry-collector security update

EPSS: Низкий
rocky логотип

RLSA-2026:1715

около 2 месяцев назад

Important: golang-github-openprinting-ipp-usb security update

EPSS: Низкий
rocky логотип

RLSA-2026:1518

около 2 месяцев назад

Important: grafana-pcp security update

EPSS: Низкий
rocky логотип

RLSA-2026:1344

около 2 месяцев назад

Important: grafana security update

EPSS: Низкий
rocky логотип

RLSA-2026:0923

2 месяца назад

Important: golang security update

EPSS: Низкий
rocky логотип

RLSA-2026:0922

2 месяца назад

Important: golang security update

EPSS: Низкий
rocky логотип

RLSA-2026:0921

2 месяца назад

Important: go-toolset:rhel8 security update

EPSS: Низкий
github логотип

GHSA-7c64-f9jr-v9h2

4 месяца назад

Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redos логотип
ROS-20260209-73-0044

Уязвимость golang

CVSS3: 6.5
0%
Низкий
около 2 месяцев назад
ubuntu логотип
CVE-2025-61729

Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.

CVSS3: 7.5
0%
Низкий
4 месяца назад
redhat логотип
CVE-2025-61729

Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.

CVSS3: 7.5
0%
Низкий
4 месяца назад
nvd логотип
CVE-2025-61729

Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.

CVSS3: 7.5
0%
Низкий
4 месяца назад
msrc логотип
CVE-2025-61729

Excessive resource consumption when printing error string for host certificate validation in crypto/x509

0%
Низкий
4 месяца назад
debian логотип
CVE-2025-61729

Within HostnameError.Error(), when constructing an error string, there ...

CVSS3: 7.5
0%
Низкий
4 месяца назад
ubuntu логотип
CVE-2025-68121

During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.

CVSS3: 10
0%
Низкий
около 2 месяцев назад
redhat логотип
CVE-2025-68121

During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.

CVSS3: 7.4
0%
Низкий
около 2 месяцев назад
nvd логотип
CVE-2025-68121

During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.

CVSS3: 10
0%
Низкий
около 2 месяцев назад
msrc логотип
CVE-2025-68121

Unexpected session resumption in crypto/tls

0%
Низкий
21 день назад
debian логотип
CVE-2025-68121

During session resumption in crypto/tls, if the underlying Config has ...

CVSS3: 10
0%
Низкий
около 2 месяцев назад
rocky логотип
RLSA-2026:2323

Important: git-lfs security update

0%
Низкий
около 1 месяца назад
rocky логотип
RLSA-2026:1908

Important: opentelemetry-collector security update

0%
Низкий
около 2 месяцев назад
rocky логотип
RLSA-2026:1715

Important: golang-github-openprinting-ipp-usb security update

0%
Низкий
около 2 месяцев назад
rocky логотип
RLSA-2026:1518

Important: grafana-pcp security update

0%
Низкий
около 2 месяцев назад
rocky логотип
RLSA-2026:1344

Important: grafana security update

0%
Низкий
около 2 месяцев назад
rocky логотип
RLSA-2026:0923

Important: golang security update

0%
Низкий
2 месяца назад
rocky логотип
RLSA-2026:0922

Important: golang security update

0%
Низкий
2 месяца назад
rocky логотип
RLSA-2026:0921

Important: go-toolset:rhel8 security update

0%
Низкий
2 месяца назад
github логотип
GHSA-7c64-f9jr-v9h2

Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.

CVSS3: 7.5
0%
Низкий
4 месяца назад

Уязвимостей на страницу