Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/golang-golang-x-net@1:0.0%2Bgit20210119.5f4716e%2Bdfsg-4
purl pkg:deb/debian/golang-golang-x-net@1:0.0%2Bgit20210119.5f4716e%2Bdfsg-4
Next non-vulnerable version 1:0.0+git20211209.491a49a+dfsg-1
Latest non-vulnerable version 1:0.47.0-1
Risk 4.0
Vulnerabilities affecting this package (10)
Vulnerability Summary Fixed by
VCID-3zyn-rapk-ybe8
Aliases:
CVE-2025-22872
GHSA-vvgc-356p-c3xw
golang.org/x/net vulnerable to Cross-site Scripting The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can result in content following such tags as being placed in the wrong scope during DOM construction, but only when tags are in foreign content (e.g. <math>, <svg>, etc contexts).
1:0.0+git20211209.491a49a+dfsg-1
Affected by 0 other vulnerabilities.
1:0.24.0+dfsg-1
Affected by 0 other vulnerabilities.
VCID-5kkq-5jpf-fqev
Aliases:
CVE-2022-41717
GHSA-xrjj-mj9h-534m
Multiple vulnerabilities have been discovered in HashiCorp Consul, the worst of which could result in denial of service.
1:0.0+git20211209.491a49a+dfsg-1
Affected by 0 other vulnerabilities.
VCID-73s2-6cpr-gkdu
Aliases:
CVE-2025-47911
GHSA-w4gw-w5jq-g9jh
golang.org/x/net/html has a Quadratic Parsing Complexity issue The html.Parse function in golang.org/x/net/html has quadratic parsing complexity when processing certain inputs, which can lead to Denial of Service (DoS) if an attacker provides specially crafted HTML content.
1:0.0+git20211209.491a49a+dfsg-1
Affected by 0 other vulnerabilities.
1:0.24.0+dfsg-1
Affected by 0 other vulnerabilities.
1:0.47.0-1
Affected by 0 other vulnerabilities.
VCID-aj2b-56uj-gkar
Aliases:
CVE-2023-45288
GHSA-4v7x-pqxf-cx7m
net/http, x/net/http2: close connections when receiving too many headers An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection.
1:0.0+git20211209.491a49a+dfsg-1
Affected by 0 other vulnerabilities.
1:0.24.0+dfsg-1
Affected by 0 other vulnerabilities.
VCID-asx6-ds7x-6ubz
Aliases:
CVE-2025-58190
golang.org/x/net/html: Infinite parsing loop in golang.org/x/net
1:0.0+git20211209.491a49a+dfsg-1
Affected by 0 other vulnerabilities.
1:0.24.0+dfsg-1
Affected by 0 other vulnerabilities.
1:0.47.0-1
Affected by 0 other vulnerabilities.
VCID-azr4-u36f-pbew
Aliases:
CVE-2022-27664
GHSA-69cg-p879-7622
Multiple vulnerabilities have been discovered in Go, the worst of which could result in denial of service.
1:0.0+git20211209.491a49a+dfsg-1
Affected by 0 other vulnerabilities.
VCID-g8qg-4g78-pfgn
Aliases:
CVE-2024-45338
GHSA-w32m-9786-jp63
Non-linear parsing of case-insensitive content in golang.org/x/net/html An attacker can craft an input to the Parse functions that would be processed non-linearly with respect to its length, resulting in extremely slow parsing. This could cause a denial of service.
1:0.0+git20211209.491a49a+dfsg-1
Affected by 0 other vulnerabilities.
1:0.24.0+dfsg-1
Affected by 0 other vulnerabilities.
VCID-k6de-54xk-dkfv
Aliases:
CVE-2023-3978
GHSA-2wrh-6pvc-2jm9
Improper rendering of text nodes in golang.org/x/net/html Text nodes not in the HTML namespace are incorrectly literally rendered, causing text which should be escaped to not be. This could lead to an XSS attack.
1:0.0+git20211209.491a49a+dfsg-1
Affected by 0 other vulnerabilities.
1:0.24.0+dfsg-1
Affected by 0 other vulnerabilities.
VCID-sdd3-35ng-g7a3
Aliases:
CVE-2022-41723
GHSA-vvpx-j8f3-3w6h
golang.org/x/net vulnerable to Uncontrolled Resource Consumption A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests.
1:0.0+git20211209.491a49a+dfsg-1
Affected by 0 other vulnerabilities.
VCID-w53f-uad6-gqdn
Aliases:
CVE-2021-44716
GHSA-vc3p-29h2-gpcp
Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution.
1:0.0+git20211209.491a49a+dfsg-1
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T12:23:22.085597+00:00 Debian Importer Affected by VCID-k6de-54xk-dkfv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:03:38.247861+00:00 Debian Importer Affected by VCID-aj2b-56uj-gkar https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:24:02.183189+00:00 Debian Importer Affected by VCID-5kkq-5jpf-fqev https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:22:47.839301+00:00 Debian Importer Affected by VCID-sdd3-35ng-g7a3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:09:03.048183+00:00 Debian Importer Affected by VCID-w53f-uad6-gqdn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:06:38.584333+00:00 Debian Importer Affected by VCID-azr4-u36f-pbew https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:03:02.147481+00:00 Debian Importer Affected by VCID-asx6-ds7x-6ubz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:55:32.249387+00:00 Debian Importer Affected by VCID-73s2-6cpr-gkdu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:42:59.529601+00:00 Debian Importer Affected by VCID-g8qg-4g78-pfgn https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:39:21.075854+00:00 Debian Importer Affected by VCID-3zyn-rapk-ybe8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T08:28:38.741672+00:00 Debian Importer Affected by VCID-k6de-54xk-dkfv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:14:27.959399+00:00 Debian Importer Affected by VCID-aj2b-56uj-gkar https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:00:38.177480+00:00 Debian Importer Affected by VCID-5kkq-5jpf-fqev https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:59:35.423933+00:00 Debian Importer Affected by VCID-sdd3-35ng-g7a3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:49:09.131349+00:00 Debian Importer Affected by VCID-w53f-uad6-gqdn https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:47:18.725452+00:00 Debian Importer Affected by VCID-azr4-u36f-pbew https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:44:31.936567+00:00 Debian Importer Affected by VCID-asx6-ds7x-6ubz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:38:37.508437+00:00 Debian Importer Affected by VCID-73s2-6cpr-gkdu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:28:59.584240+00:00 Debian Importer Affected by VCID-g8qg-4g78-pfgn https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:49:08.337758+00:00 Debian Importer Affected by VCID-3zyn-rapk-ybe8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-08T19:47:10.857271+00:00 Debian Importer Affected by VCID-aj2b-56uj-gkar https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:38:50.978398+00:00 Debian Importer Affected by VCID-k6de-54xk-dkfv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:37:34.341642+00:00 Debian Importer Affected by VCID-g8qg-4g78-pfgn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:10:07.649556+00:00 Debian Importer Affected by VCID-sdd3-35ng-g7a3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:08:04.154613+00:00 Debian Importer Affected by VCID-5kkq-5jpf-fqev https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T19:00:20.191824+00:00 Debian Importer Affected by VCID-w53f-uad6-gqdn https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:40:32.974749+00:00 Debian Importer Affected by VCID-asx6-ds7x-6ubz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:30:51.601923+00:00 Debian Importer Affected by VCID-azr4-u36f-pbew https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-08T18:25:01.411760+00:00 Debian Importer Affected by VCID-73s2-6cpr-gkdu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-07T05:49:20.627792+00:00 Debian Importer Affected by VCID-3zyn-rapk-ybe8 https://security-tracker.debian.org/tracker/data/json 38.1.0