CVE-2025-61730
- EPSS 0.02%
- Veröffentlicht 28.01.2026 19:30:30
- Zuletzt bearbeitet 03.02.2026 20:36:41
During the TLS 1.3 handshake if multiple messages are sent in records that span encryption level boundaries (for instance the Client Hello and Encrypted Extensions messages), the subsequent messages may be processed before the encryption level change...
CVE-2025-61727
- EPSS 0.01%
- Veröffentlicht 03.12.2025 19:37:15
- Zuletzt bearbeitet 18.12.2025 20:15:10
An excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate. For example a constraint that excludes the subdomain test.example.com does not prevent a leaf certificate from claiming the ...
CVE-2025-61729
- EPSS 0.02%
- Veröffentlicht 02.12.2025 18:54:10
- Zuletzt bearbeitet 19.12.2025 18:25:28
Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore...
CVE-2025-58188
- EPSS 0.02%
- Veröffentlicht 29.10.2025 22:10:14
- Zuletzt bearbeitet 29.01.2026 15:55:11
Validating certificate chains which contain DSA public keys can cause programs to panic, due to a interface cast that assumes they implement the Equal method. This affects programs which validate arbitrary certificate chains.
CVE-2025-61724
- EPSS 0.02%
- Veröffentlicht 29.10.2025 22:10:14
- Zuletzt bearbeitet 29.01.2026 15:30:53
The Reader.ReadResponse function constructs a response string through repeated string concatenation of lines. When the number of lines in a response is large, this can cause excessive CPU consumption.
CVE-2025-47912
- EPSS 0.03%
- Veröffentlicht 29.10.2025 22:10:13
- Zuletzt bearbeitet 29.01.2026 13:57:18
The Parse function permits values other than IPv6 addresses to be included in square brackets within the host component of a URL. RFC 3986 permits IPv6 addresses to be included within the host component, enclosed within square brackets. For example: ...
CVE-2025-58185
- EPSS 0.03%
- Veröffentlicht 29.10.2025 22:10:13
- Zuletzt bearbeitet 29.01.2026 13:26:08
Parsing a maliciously crafted DER payload could allocate large amounts of memory, causing memory exhaustion.
CVE-2025-61723
- EPSS 0.04%
- Veröffentlicht 29.10.2025 22:10:13
- Zuletzt bearbeitet 29.01.2026 15:49:05
The processing time for parsing some invalid inputs scales non-linearly with respect to the size of the input. This affects programs which parse untrusted PEM inputs.
CVE-2025-58187
- EPSS 0.02%
- Veröffentlicht 29.10.2025 22:10:12
- Zuletzt bearbeitet 29.01.2026 16:02:27
Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate. This affects programs which validate arbitrary certificate chains.
CVE-2025-58189
- EPSS 0.01%
- Veröffentlicht 29.10.2025 22:10:12
- Zuletzt bearbeitet 29.01.2026 15:49:24
When Conn.Handshake fails during ALPN negotiation the error contains attacker controlled information (the ALPN protocols sent by the client) which is not escaped.