CVE-2023-29406
- EPSS 0.23%
- Published 11.07.2023 20:15:10
- Last modified 21.11.2024 07:56:59
The HTTP/1 client does not fully validate the contents of the Host header. A maliciously crafted Host header can inject additional headers or entire requests. With fix, the HTTP/1 client now refuses to send requests containing an invalid Request.Host...
CVE-2023-29404
- EPSS 0.08%
- Published 08.06.2023 21:15:17
- Last modified 06.01.2025 20:15:26
The go command may execute arbitrary code at build time when using cgo. This may occur when running "go get" on a malicious module, or when running any other command which builds untrusted code. This is can by triggered by linker flags, specified via...
CVE-2023-29405
- EPSS 0.33%
- Published 08.06.2023 21:15:17
- Last modified 06.01.2025 20:15:26
The go command may execute arbitrary code at build time when using cgo. This may occur when running "go get" on a malicious module, or when running any other command which builds untrusted code. This is can by triggered by linker flags, specified via...
CVE-2023-29402
- EPSS 0.12%
- Published 08.06.2023 21:15:16
- Last modified 06.01.2025 22:15:08
The go command may generate unexpected code at build time when using cgo. This may result in unexpected behavior when running a go program which uses cgo. This may occur when running an untrusted module which contains directories with newline charact...
CVE-2023-29403
- EPSS 0.01%
- Published 08.06.2023 21:15:16
- Last modified 06.01.2025 20:15:25
On Unix platforms, the Go runtime does not behave differently when a binary is run with the setuid/setgid bits. This can be dangerous in certain cases, such as when dumping memory state, or assuming the status of standard i/o file descriptors. If a s...
CVE-2023-24539
- EPSS 0.07%
- Published 11.05.2023 16:15:09
- Last modified 24.01.2025 17:15:10
Angle brackets (<>) are not considered dangerous characters when inserted into CSS contexts. Templates containing multiple actions separated by a '/' character can result in unexpectedly closing the CSS context and allowing for injection of unexpecte...
CVE-2023-24540
- EPSS 0.24%
- Published 11.05.2023 16:15:09
- Last modified 24.01.2025 17:15:10
Not all valid JavaScript whitespace characters are considered to be whitespace. Templates containing whitespace characters outside of the character set "\t\n\f\r\u0020\u2028\u2029" in JavaScript contexts that also contain actions may not be properly ...
CVE-2023-29400
- EPSS 0.05%
- Published 11.05.2023 16:15:09
- Last modified 24.01.2025 17:15:12
Templates containing actions in unquoted HTML attributes (e.g. "attr={{.}}") executed with empty input can result in output with unexpected results when parsed due to HTML normalization rules. This may allow injection of arbitrary attributes into tag...
CVE-2023-24534
- EPSS 0.05%
- Published 06.04.2023 16:15:07
- Last modified 12.02.2025 18:15:19
HTTP and MIME header parsing can allocate large amounts of memory, even when parsing small inputs, potentially leading to a denial of service. Certain unusual patterns of input data can cause the common function used to parse HTTP and MIME headers to...
CVE-2023-24536
- EPSS 0.07%
- Published 06.04.2023 16:15:07
- Last modified 12.02.2025 18:15:20
Multipart form parsing can consume large amounts of CPU and memory when processing form inputs containing very large numbers of parts. This stems from several causes: 1. mime/multipart.Reader.ReadForm limits the total memory a parsed multipart form c...