| Bug | Description |
|---|
| CVE-2026-33810 | When verifying a certificate chain containing excluded DNS constraints ... |
| CVE-2026-32289 | Context was not properly tracked across template branches for JS templ ... |
| CVE-2026-32288 | tar.Reader can allocate an unbounded amount of memory when reading a m ... |
| CVE-2026-32283 | If one side of the TLS connection sends multiple key update messages p ... |
| CVE-2026-32282 | On Linux, if the target of Root.Chmod is replaced with a symlink while ... |
| CVE-2026-32281 | Validating certificate chains which use policies is unexpectedly ineff ... |
| CVE-2026-32280 | During chain building, the amount of work that is done is not correctl ... |
| CVE-2026-27144 | The compiler is meant to unwrap pointers which are the operands of a m ... |
| CVE-2026-27143 | Arithmetic over induction variables in loops were not correctly checke ... |
| CVE-2026-27142 | Actions which insert URLs into the content attribute of HTML meta tags ... |
| CVE-2026-27140 | SWIG file names containing 'cgo' and well-crafted payloads could lead ... |
| CVE-2026-27139 | On Unix platforms, when listing the contents of a directory using File ... |
| CVE-2026-27138 | Certificate verification can panic when a certificate in the chain has ... |
| CVE-2026-27137 | When verifying a certificate chain which contains a certificate contai ... |
| CVE-2026-25679 | url.Parse insufficiently validated the host/authority component and ac ... |
| CVE-2025-68121 | During session resumption in crypto/tls, if the underlying Config has ... |
| CVE-2025-68119 | Downloading and building modules with malicious version strings can ca ... |
| CVE-2025-61732 | A discrepancy between how Go and C/C++ comments were parsed allowed fo ... |
| CVE-2025-61731 | Building a malicious file with cmd/go can cause can cause a write to a ... |
| CVE-2025-61730 | During the TLS 1.3 handshake if multiple messages are sent in records ... |
| CVE-2025-61729 | Within HostnameError.Error(), when constructing an error string, there ... |
| CVE-2025-61728 | archive/zip uses a super-linear file name indexing algorithm that is i ... |
| CVE-2025-61727 | An excluded subdomain constraint in a certificate chain does not restr ... |
| CVE-2025-61726 | The net/url package does not set a limit on the number of query parame ... |
| CVE-2025-61725 | The ParseAddress function constructs domain-literal address components ... |
| CVE-2025-61724 | The Reader.ReadResponse function constructs a response string through ... |
| CVE-2025-61723 | The processing time for parsing some invalid inputs scales non-linearl ... |
| CVE-2025-58189 | When Conn.Handshake fails during ALPN negotiation the error contains a ... |
| CVE-2025-58188 | Validating certificate chains which contain DSA public keys can cause ... |
| CVE-2025-58187 | Due to the design of the name constraint checking algorithm, the proce ... |
| CVE-2025-58186 | Despite HTTP headers having a default limit of 1MB, the number of cook ... |
| CVE-2025-58185 | Parsing a maliciously crafted DER payload could allocate large amounts ... |
| CVE-2025-58183 | tar.Reader does not set a maximum size on the number of sparse region ... |
| CVE-2025-47912 | The Parse function permits values other than IPv6 addresses to be incl ... |
| CVE-2025-47910 | When using http.CrossOriginProtection, the AddInsecureBypassPattern me ... |