| golang.org/x/crypto |
CVE-2024-45337 |
严重 |
v0.18.0 |
0.31.0 |
golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45337
镜像层: sha256:7d7478d27a1af7e8cca540983eaa062d9a599c557567fef2fd85fd6b522fc912
发布日期: 2024-12-12 02:02 修改: 2025-02-18 21:15
|
| stdlib |
CVE-2024-24790 |
严重 |
1.22.1 |
1.21.11, 1.22.4 |
golang: net/netip: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-24790
镜像层: sha256:7d7478d27a1af7e8cca540983eaa062d9a599c557567fef2fd85fd6b522fc912
发布日期: 2024-06-05 16:15 修改: 2024-11-21 08:59
|
| golang.org/x/oauth2 |
CVE-2025-22868 |
高危 |
v0.16.0 |
0.27.0 |
golang.org/x/oauth2/jws: Unexpected memory consumption during token parsing in golang.org/x/oauth2/jws
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22868
镜像层: sha256:7d7478d27a1af7e8cca540983eaa062d9a599c557567fef2fd85fd6b522fc912
发布日期: 2025-02-26 08:14 修改: 2025-05-01 19:27
|
| golang.org/x/crypto |
CVE-2025-22869 |
高危 |
v0.18.0 |
0.35.0 |
golang.org/x/crypto/ssh: Denial of Service in the Key Exchange of golang.org/x/crypto/ssh
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22869
镜像层: sha256:7d7478d27a1af7e8cca540983eaa062d9a599c557567fef2fd85fd6b522fc912
发布日期: 2025-02-26 08:14 修改: 2025-05-01 19:28
|
| stdlib |
CVE-2023-45288 |
高危 |
1.22.1 |
1.21.9, 1.22.2 |
golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45288
镜像层: sha256:7d7478d27a1af7e8cca540983eaa062d9a599c557567fef2fd85fd6b522fc912
发布日期: 2024-04-04 21:15 修改: 2025-11-04 19:16
|
| stdlib |
CVE-2024-24788 |
高危 |
1.22.1 |
1.22.3 |
golang: net: malformed DNS message can cause infinite loop
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-24788
镜像层: sha256:7d7478d27a1af7e8cca540983eaa062d9a599c557567fef2fd85fd6b522fc912
发布日期: 2024-05-08 16:15 修改: 2024-11-21 16:15
|
| stdlib |
CVE-2024-34156 |
高危 |
1.22.1 |
1.22.7, 1.23.1 |
encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34156
镜像层: sha256:7d7478d27a1af7e8cca540983eaa062d9a599c557567fef2fd85fd6b522fc912
发布日期: 2024-09-06 21:15 修改: 2024-11-21 09:18
|
| stdlib |
CVE-2025-47907 |
高危 |
1.22.1 |
1.23.12, 1.24.6 |
database/sql: Postgres Scan Race Condition
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-47907
镜像层: sha256:7d7478d27a1af7e8cca540983eaa062d9a599c557567fef2fd85fd6b522fc912
发布日期: 2025-08-07 16:15 修改: 2025-11-04 22:16
|
| stdlib |
CVE-2025-58183 |
高危 |
1.22.1 |
1.24.8, 1.25.2 |
golang: archive/tar: Unbounded allocation when parsing GNU sparse map
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-58183
镜像层: sha256:7d7478d27a1af7e8cca540983eaa062d9a599c557567fef2fd85fd6b522fc912
发布日期: 2025-10-29 23:16 修改: 2025-11-04 22:16
|
| stdlib |
CVE-2025-61729 |
高危 |
1.22.1 |
1.24.11, 1.25.5 |
crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-61729
镜像层: sha256:7d7478d27a1af7e8cca540983eaa062d9a599c557567fef2fd85fd6b522fc912
发布日期: 2025-12-02 19:15 修改: 2025-12-19 18:25
|
| golang.org/x/net |
CVE-2025-22870 |
中危 |
v0.20.0 |
0.36.0 |
golang.org/x/net/proxy: golang.org/x/net/http/httpproxy: HTTP Proxy bypass using IPv6 Zone IDs in golang.org/x/net
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22870
镜像层: sha256:7d7478d27a1af7e8cca540983eaa062d9a599c557567fef2fd85fd6b522fc912
发布日期: 2025-03-12 19:15 修改: 2025-05-09 20:15
|
| golang.org/x/net |
CVE-2025-22872 |
中危 |
v0.20.0 |
0.38.0 |
golang.org/x/net/html: Incorrect Neutralization of Input During Web Page Generation in x/net in golang.org/x/net
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22872
镜像层: sha256:7d7478d27a1af7e8cca540983eaa062d9a599c557567fef2fd85fd6b522fc912
发布日期: 2025-04-16 18:16 修改: 2025-05-16 23:15
|
| golang.org/x/crypto |
CVE-2025-47914 |
中危 |
v0.18.0 |
0.45.0 |
golang.org/x/crypto/ssh/agent: in golang.org/x/crypto/ssh/agent
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-47914
镜像层: sha256:7d7478d27a1af7e8cca540983eaa062d9a599c557567fef2fd85fd6b522fc912
发布日期: 2025-11-19 21:15 修改: 2025-12-11 19:36
|
| golang.org/x/crypto |
CVE-2025-58181 |
中危 |
v0.18.0 |
0.45.0 |
golang.org/x/crypto/ssh: in golang.org/x/crypto/ssh
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-58181
镜像层: sha256:7d7478d27a1af7e8cca540983eaa062d9a599c557567fef2fd85fd6b522fc912
发布日期: 2025-11-19 21:15 修改: 2025-12-11 19:29
|
| golang.org/x/net |
CVE-2023-45288 |
中危 |
v0.20.0 |
0.23.0 |
golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45288
镜像层: sha256:7d7478d27a1af7e8cca540983eaa062d9a599c557567fef2fd85fd6b522fc912
发布日期: 2024-04-04 21:15 修改: 2025-11-04 19:16
|
| stdlib |
CVE-2024-24789 |
中危 |
1.22.1 |
1.21.11, 1.22.4 |
golang: archive/zip: Incorrect handling of certain ZIP files
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-24789
镜像层: sha256:7d7478d27a1af7e8cca540983eaa062d9a599c557567fef2fd85fd6b522fc912
发布日期: 2024-06-05 16:15 修改: 2025-01-31 15:15
|
| stdlib |
CVE-2024-24791 |
中危 |
1.22.1 |
1.21.12, 1.22.5 |
net/http: Denial of service due to improper 100-continue handling in net/http
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-24791
镜像层: sha256:7d7478d27a1af7e8cca540983eaa062d9a599c557567fef2fd85fd6b522fc912
发布日期: 2024-07-02 22:15 修改: 2024-11-21 08:59
|
| stdlib |
CVE-2024-34155 |
中危 |
1.22.1 |
1.22.7, 1.23.1 |
go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34155
镜像层: sha256:7d7478d27a1af7e8cca540983eaa062d9a599c557567fef2fd85fd6b522fc912
发布日期: 2024-09-06 21:15 修改: 2024-11-21 09:18
|
| stdlib |
CVE-2024-34158 |
中危 |
1.22.1 |
1.22.7, 1.23.1 |
go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34158
镜像层: sha256:7d7478d27a1af7e8cca540983eaa062d9a599c557567fef2fd85fd6b522fc912
发布日期: 2024-09-06 21:15 修改: 2024-11-21 09:18
|
| stdlib |
CVE-2024-45336 |
中危 |
1.22.1 |
1.22.11, 1.23.5, 1.24.0-rc.2 |
golang: net/http: net/http: sensitive headers incorrectly sent after cross-domain redirect
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45336
镜像层: sha256:7d7478d27a1af7e8cca540983eaa062d9a599c557567fef2fd85fd6b522fc912
发布日期: 2025-01-28 02:15 修改: 2025-02-21 18:15
|
| stdlib |
CVE-2024-45341 |
中危 |
1.22.1 |
1.22.11, 1.23.5, 1.24.0-rc.2 |
golang: crypto/x509: crypto/x509: usage of IPv6 zone IDs can bypass URI name constraints
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45341
镜像层: sha256:7d7478d27a1af7e8cca540983eaa062d9a599c557567fef2fd85fd6b522fc912
发布日期: 2025-01-28 02:15 修改: 2025-02-21 18:15
|
| stdlib |
CVE-2025-0913 |
中危 |
1.22.1 |
1.23.10, 1.24.4 |
Inconsistent handling of O_CREATE|O_EXCL on Unix and Windows in os in syscall
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-0913
镜像层: sha256:7d7478d27a1af7e8cca540983eaa062d9a599c557567fef2fd85fd6b522fc912
发布日期: 2025-06-11 18:15 修改: 2025-08-08 14:53
|
| stdlib |
CVE-2025-22866 |
中危 |
1.22.1 |
1.22.12, 1.23.6, 1.24.0-rc.3 |
crypto/internal/nistec: golang: Timing sidechannel for P-256 on ppc64le in crypto/internal/nistec
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22866
镜像层: sha256:7d7478d27a1af7e8cca540983eaa062d9a599c557567fef2fd85fd6b522fc912
发布日期: 2025-02-06 17:15 修改: 2025-02-21 18:15
|
| stdlib |
CVE-2025-22871 |
中危 |
1.22.1 |
1.23.8, 1.24.2 |
net/http: Request smuggling due to acceptance of invalid chunked data in net/http
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22871
镜像层: sha256:7d7478d27a1af7e8cca540983eaa062d9a599c557567fef2fd85fd6b522fc912
发布日期: 2025-04-08 20:15 修改: 2025-04-18 15:15
|
| stdlib |
CVE-2025-4673 |
中危 |
1.22.1 |
1.23.10, 1.24.4 |
net/http: Sensitive headers not cleared on cross-origin redirect in net/http
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-4673
镜像层: sha256:7d7478d27a1af7e8cca540983eaa062d9a599c557567fef2fd85fd6b522fc912
发布日期: 2025-06-11 17:15 修改: 2025-06-12 16:06
|
| stdlib |
CVE-2025-47906 |
中危 |
1.22.1 |
1.23.12, 1.24.6 |
os/exec: Unexpected paths returned from LookPath in os/exec
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-47906
镜像层: sha256:7d7478d27a1af7e8cca540983eaa062d9a599c557567fef2fd85fd6b522fc912
发布日期: 2025-09-18 19:15 修改: 2025-11-04 22:16
|
| stdlib |
CVE-2025-47912 |
中危 |
1.22.1 |
1.24.8, 1.25.2 |
net/url: Insufficient validation of bracketed IPv6 hostnames in net/url
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-47912
镜像层: sha256:7d7478d27a1af7e8cca540983eaa062d9a599c557567fef2fd85fd6b522fc912
发布日期: 2025-10-29 23:16 修改: 2025-11-04 22:16
|
| stdlib |
CVE-2025-58185 |
中危 |
1.22.1 |
1.24.8, 1.25.2 |
encoding/asn1: Parsing DER payload can cause memory exhaustion in encoding/asn1
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-58185
镜像层: sha256:7d7478d27a1af7e8cca540983eaa062d9a599c557567fef2fd85fd6b522fc912
发布日期: 2025-10-29 23:16 修改: 2025-11-04 22:16
|
| stdlib |
CVE-2025-58186 |
中危 |
1.22.1 |
1.24.8, 1.25.2 |
golang.org/net/http: Lack of limit when parsing cookies can cause memory exhaustion in net/http
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-58186
镜像层: sha256:7d7478d27a1af7e8cca540983eaa062d9a599c557567fef2fd85fd6b522fc912
发布日期: 2025-10-29 23:16 修改: 2025-11-04 22:16
|
| stdlib |
CVE-2025-58187 |
中危 |
1.22.1 |
1.24.9, 1.25.3 |
crypto/x509: Quadratic complexity when checking name constraints in crypto/x509
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-58187
镜像层: sha256:7d7478d27a1af7e8cca540983eaa062d9a599c557567fef2fd85fd6b522fc912
发布日期: 2025-10-29 23:16 修改: 2025-11-20 23:15
|
| stdlib |
CVE-2025-58188 |
中危 |
1.22.1 |
1.24.8, 1.25.2 |
crypto/x509: golang: Panic when validating certificates with DSA public keys in crypto/x509
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-58188
镜像层: sha256:7d7478d27a1af7e8cca540983eaa062d9a599c557567fef2fd85fd6b522fc912
发布日期: 2025-10-29 23:16 修改: 2025-11-04 22:16
|
| stdlib |
CVE-2025-58189 |
中危 |
1.22.1 |
1.24.8, 1.25.2 |
crypto/tls: go crypto/tls ALPN negotiation error contains attacker controlled information
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-58189
镜像层: sha256:7d7478d27a1af7e8cca540983eaa062d9a599c557567fef2fd85fd6b522fc912
发布日期: 2025-10-29 23:16 修改: 2025-11-04 22:16
|
| stdlib |
CVE-2025-61723 |
中危 |
1.22.1 |
1.24.8, 1.25.2 |
encoding/pem: Quadratic complexity when parsing some invalid inputs in encoding/pem
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-61723
镜像层: sha256:7d7478d27a1af7e8cca540983eaa062d9a599c557567fef2fd85fd6b522fc912
发布日期: 2025-10-29 23:16 修改: 2025-11-04 22:16
|
| stdlib |
CVE-2025-61724 |
中危 |
1.22.1 |
1.24.8, 1.25.2 |
net/textproto: Excessive CPU consumption in Reader.ReadResponse in net/textproto
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-61724
镜像层: sha256:7d7478d27a1af7e8cca540983eaa062d9a599c557567fef2fd85fd6b522fc912
发布日期: 2025-10-29 23:16 修改: 2025-11-04 22:16
|
| stdlib |
CVE-2025-61725 |
中危 |
1.22.1 |
1.24.8, 1.25.2 |
net/mail: Excessive CPU consumption in ParseAddress in net/mail
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-61725
镜像层: sha256:7d7478d27a1af7e8cca540983eaa062d9a599c557567fef2fd85fd6b522fc912
发布日期: 2025-10-29 23:16 修改: 2025-12-09 18:15
|
| stdlib |
CVE-2025-61727 |
中危 |
1.22.1 |
1.24.11, 1.25.5 |
golang: crypto/x509: excluded subdomain constraint does not restrict wildcard SANs
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-61727
镜像层: sha256:7d7478d27a1af7e8cca540983eaa062d9a599c557567fef2fd85fd6b522fc912
发布日期: 2025-12-03 20:16 修改: 2025-12-18 20:15
|