| Bug | Description |
|---|
| CVE-2025-61725 | The ParseAddress function constructs domain-literal address components ... |
| CVE-2025-61724 | The Reader.ReadResponse function constructs a response string through ... |
| CVE-2025-61723 | The processing time for parsing some invalid inputs scales non-linearl ... |
| CVE-2025-58189 | When Conn.Handshake fails during ALPN negotiation the error contains a ... |
| CVE-2025-58188 | Validating certificate chains which contain DSA public keys can cause ... |
| CVE-2025-58187 | Due to the design of the name constraint checking algorithm, the proce ... |
| CVE-2025-58186 | Despite HTTP headers having a default limit of 1MB, the number of cook ... |
| CVE-2025-58185 | Parsing a maliciously crafted DER payload could allocate large amounts ... |
| CVE-2025-58183 | tar.Reader does not set a maximum size on the number of sparse region ... |
| CVE-2025-47912 | The Parse function permits values other than IPv6 addresses to be incl ... |
| CVE-2025-47910 | When using http.CrossOriginProtection, the AddInsecureBypassPattern me ... |