{"id":"AZL-79024","summary":"CVE-2024-24785 affecting package golang 1.25.7-1","details":"If errors returned from MarshalJSON methods contain user controlled data, they may be used to break the contextual auto-escaping behavior of the html/template package, allowing for subsequent actions to inject unexpected content into templates.","modified":"2026-04-01T05:23:21.315043Z","published":"2024-03-05T23:15:07Z","upstream":["CVE-2024-24785"],"references":[{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-24785"}],"affected":[{"package":{"name":"golang","ecosystem":"Azure Linux:3","purl":"pkg:rpm/azure-linux/golang"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"last_affected":"1.25.7-1"}]}],"database_specific":{"source":"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-79024.json"}}],"schema_version":"1.7.5"}