{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-11T11:37:04.337","vulnerabilities":[{"cve":{"id":"CVE-2026-27138","sourceIdentifier":"security@golang.org","published":"2026-03-06T22:16:00.963","lastModified":"2026-04-21T14:39:28.073","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Certificate verification can panic when a certificate in the chain has an empty DNS name and another certificate in the chain has excluded name constraints. This can crash programs that are either directly verifying X.509 certificate chains, or those that use TLS."},{"lang":"es","value":"La verificación de certificados puede entrar en pánico cuando un certificado en la cadena tiene un nombre DNS vacío y otro certificado en la cadena tiene restricciones de nombre excluidas. Esto puede bloquear programas que están verificando directamente cadenas de certificados X.509, o aquellos que usan TLS."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":5.9,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.2,"impactScore":3.6}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-295"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:golang:go:1.26.0:*:*:*:*:*:*:*","matchCriteriaId":"A40FE3CB-0D03-462B-8A19-4DF1920ABE82"}]}]}],"references":[{"url":"https://go.dev/cl/752183","source":"security@golang.org","tags":["Mailing List"]},{"url":"https://go.dev/issue/77953","source":"security@golang.org","tags":["Issue Tracking"]},{"url":"https://groups.google.com/g/golang-announce/c/EdhZqrQ98hk","source":"security@golang.org","tags":["Release Notes"]},{"url":"https://pkg.go.dev/vuln/GO-2026-4600","source":"security@golang.org","tags":["Vendor Advisory"]}]}}]}