contexts. This may cause the template parser to improperly consider script contexts to be terminated early, causing actions to be improperly escaped. This could be leveraged to perform an XSS attack. "> ,contexts.,This,may,cause,the,template,parser,to,improperly consider,script,contexts,to,be,terminated,early,,causing,actions,to,be improperly,escaped.,This,could,be,leveraged,to,perform,an,XSS,attack. "> SecuritySpace - CVE-2023-39319
 
 
 Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

CVE ID:CVE-2023-39319
Description:The html/template package does not apply the proper rules for handling occurrences of " contexts. This may cause the template parser to improperly consider script contexts to be terminated early, causing actions to be improperly escaped. This could be leveraged to perform an XSS attack.
Test IDs: None available
Cross References: Common Vulnerability Exposure (CVE) ID: CVE-2023-39319
https://security.gentoo.org/glsa/202311-09
https://go.dev/cl/526157
https://go.dev/cl/526157
https://go.dev/issue/62197
https://go.dev/issue/62197
https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ
https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ
https://pkg.go.dev/vuln/GO-2023-2043
https://pkg.go.dev/vuln/GO-2023-2043




© 1998-2025 E-Soft Inc. All rights reserved.