CVE-2023-39319
- EPSS 0.09%
- Veröffentlicht 08.09.2023 17:15:27
- Zuletzt bearbeitet 21.11.2024 08:15:08
The html/template package does not apply the proper rules for handling occurrences of "<script", "<!--", and "</script" within JS literals in <script> contexts. This may cause the template parser to improperly consider script contexts to be terminate...
CVE-2023-39320
- EPSS 0.8%
- Veröffentlicht 08.09.2023 17:15:27
- Zuletzt bearbeitet 21.11.2024 08:15:09
The go.mod toolchain directive, introduced in Go 1.21, can be leveraged to execute scripts and binaries relative to the root of the module when the "go" command was executed within the module. This applies to modules downloaded using the "go" command...
CVE-2023-29409
- EPSS 0.13%
- Veröffentlicht 02.08.2023 20:15:11
- Zuletzt bearbeitet 21.11.2024 07:57:00
Extremely large RSA keys in certificate chains can cause a client/server to expend significant CPU time verifying signatures. With fix, the size of RSA keys transmitted during handshakes is restricted to <= 8192 bits. Based on a survey of publicly tr...
CVE-2023-29406
- EPSS 0.29%
- Veröffentlicht 11.07.2023 20:15:10
- Zuletzt bearbeitet 21.11.2024 07:56:59
The HTTP/1 client does not fully validate the contents of the Host header. A maliciously crafted Host header can inject additional headers or entire requests. With fix, the HTTP/1 client now refuses to send requests containing an invalid Request.Host...
CVE-2023-29404
- EPSS 0.08%
- Veröffentlicht 08.06.2023 21:15:17
- Zuletzt bearbeitet 06.01.2025 20:15:26
The go command may execute arbitrary code at build time when using cgo. This may occur when running "go get" on a malicious module, or when running any other command which builds untrusted code. This is can by triggered by linker flags, specified via...
CVE-2023-29405
- EPSS 0.33%
- Veröffentlicht 08.06.2023 21:15:17
- Zuletzt bearbeitet 06.01.2025 20:15:26
The go command may execute arbitrary code at build time when using cgo. This may occur when running "go get" on a malicious module, or when running any other command which builds untrusted code. This is can by triggered by linker flags, specified via...
CVE-2023-29402
- EPSS 0.12%
- Veröffentlicht 08.06.2023 21:15:16
- Zuletzt bearbeitet 06.01.2025 22:15:08
The go command may generate unexpected code at build time when using cgo. This may result in unexpected behavior when running a go program which uses cgo. This may occur when running an untrusted module which contains directories with newline charact...
CVE-2023-29403
- EPSS 0.01%
- Veröffentlicht 08.06.2023 21:15:16
- Zuletzt bearbeitet 06.01.2025 20:15:25
On Unix platforms, the Go runtime does not behave differently when a binary is run with the setuid/setgid bits. This can be dangerous in certain cases, such as when dumping memory state, or assuming the status of standard i/o file descriptors. If a s...
CVE-2023-24539
- EPSS 0.07%
- Veröffentlicht 11.05.2023 16:15:09
- Zuletzt bearbeitet 24.01.2025 17:15:10
Angle brackets (<>) are not considered dangerous characters when inserted into CSS contexts. Templates containing multiple actions separated by a '/' character can result in unexpectedly closing the CSS context and allowing for injection of unexpecte...
CVE-2023-24540
- EPSS 0.24%
- Veröffentlicht 11.05.2023 16:15:09
- Zuletzt bearbeitet 24.01.2025 17:15:10
Not all valid JavaScript whitespace characters are considered to be whitespace. Templates containing whitespace characters outside of the character set "\t\n\f\r\u0020\u2028\u2029" in JavaScript contexts that also contain actions may not be properly ...