The crypto/tls package of Go through 1.16.5 does not properly assert that the type of public key in an X.509 certificate matches the expected type when doing a RSA based key exchange, allowing a malicious TLS server to cause a TLS client to panic.
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://github.com/0day404/vulnerability-poc
- https://github.com/20142995/sectool
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ArrestX/--POC
- https://github.com/JakubWierzchowski/manier
- https://github.com/KayCHENvip/vulnerability-poc
- https://github.com/Miraitowa70/POC-Notes
- https://github.com/Threekiii/Awesome-POC
- https://github.com/agadecki/malware-cryptominer-container
- https://github.com/alexzorin/cve-2021-34558
- https://github.com/d4n-sec/d4n-sec.github.io
- https://github.com/henriquebesing/container-security
- https://github.com/kb5fls/container-security
- https://github.com/n0-traces/cve_monitor
- https://github.com/ruzickap/malware-cryptominer-container
- https://github.com/taielab/awesome-hacking-lists