Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Go standard library — Vulnerabilities & Security Advisories 100

Browse all 100 CVE security advisories affecting Go standard library. AI-powered Chinese analysis, POCs, and references for each vulnerability.

CVE IDTitleCVSSSeverityPublished
CVE-2023-39322 Memory exhaustion in QUIC connection handling in crypto/tls — crypto/tls 7.5 -2023-09-08
CVE-2023-39321 Panic when processing post-handshake message on QUIC connections in crypto/tls — crypto/tls 7.5 -2023-09-08
CVE-2023-39319 Improper handling of special tags within script contexts in html/template — html/template 6.1 -2023-09-08
CVE-2023-39318 Improper handling of HTML-like comments in script contexts in html/template — html/template 6.1 -2023-09-08
CVE-2023-29409 Large RSA keys can cause high CPU usage in crypto/tls — crypto/tls 7.5 -2023-08-02
CVE-2023-29406 Insufficient sanitization of Host header in net/http — net/http 7.5 -2023-07-11
CVE-2023-29403 Unsafe behavior in setuid/setgid binaries in runtime — runtime 7.8 -2023-06-08
CVE-2023-24539 Improper sanitization of CSS values in html/template — html/template 7.2 -2023-05-11
CVE-2023-24540 Improper handling of JavaScript whitespace in html/template — html/template 9.8 -2023-05-11
CVE-2023-29400 Improper handling of empty HTML attributes in html/template — html/template 5.3 -2023-05-11
CVE-2023-24537 Infinite loop in parsing in go/scanner — go/scanner 7.5 -2023-04-06
CVE-2023-24538 Backticks not treated as string delimiters in html/template — html/template 10.0 -2023-04-06
CVE-2023-24534 Excessive memory allocation in net/http and net/textproto — net/textproto 7.5 -2023-04-06
CVE-2023-24536 Excessive resource consumption in net/http, net/textproto and mime/multipart — mime/multipart 7.5 -2023-04-06
CVE-2023-24532 Incorrect calculation on P256 curves in crypto/internal/nistec — crypto/internal/nistec 6.5 -2023-03-08
CVE-2022-41723 Denial of service via crafted HTTP/2 stream in net/http and golang.org/x/net — net/http 7.5 -2023-02-28
CVE-2022-41724 Panic on large handshake records in crypto/tls — crypto/tls 7.5 -2023-02-28
CVE-2022-41725 Excessive resource consumption in mime/multipart — mime/multipart 7.5 -2023-02-28
CVE-2022-41722 Path traversal on Windows in path/filepath — path/filepath 7.5 -2023-02-28
CVE-2022-41717 Excessive memory growth in net/http and golang.org/x/net/http2 — net/http 5.3 -2022-12-08
CVE-2022-41720 Restricted file access on Windows in os and net/http — os 7.1 -2022-12-07
CVE-2022-41716 Unsanitized NUL in environment variables on Windows in syscall and os/exec — syscall 9.1 -2022-11-02
CVE-2022-41715 Memory exhaustion when compiling regular expressions in regexp/syntax — regexp/syntax 7.5 -2022-10-14
CVE-2022-2879 Unbounded memory consumption when reading headers in archive/tar — archive/tar 6.5 -2022-10-14
CVE-2022-2880 Incorrect sanitization of forwarded query parameters in net/http/httputil — net/http/httputil 5.3 -2022-10-14
CVE-2022-32190 Failure to strip relative path components in net/url — net/url 7.5 -2022-09-13
CVE-2022-32148 Exposure of client IP addresses in net/http — net/http--2022-08-09
CVE-2022-1962 Stack exhaustion due to deeply nested types in go/parser — go/parser 6.2 -2022-08-09
CVE-2022-30580 Empty Cmd.Path can trigger unintended binary in os/exec on Windows — os/exec 8.4 -2022-08-09
CVE-2022-32189 Panic when decoding Float and Rat types in math/big — math/big 7.5 -2022-08-09

This page lists every published CVE security advisory associated with Go standard library. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.