### [CVE-2024-34155](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34155) ![](https://img.shields.io/static/v1?label=Product&message=go%2Fparser&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=1.23.0-0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-674%3A%20Uncontrolled%20Recursion&color=brightgreen) ### Description Calling any of the Parse functions on Go source code which contains deeply nested literals can cause a panic due to stack exhaustion. ### POC #### Reference No PoCs from references. #### Github - https://github.com/8-cm/kube-dump - https://github.com/ARPSyndicate/cve-scores - https://github.com/CodingSimia/jenkins-shiftleft - https://github.com/adegoodyer/kubernetes-admin-toolkit - https://github.com/drewtwitchell/scancompare - https://github.com/kaisensan/desafio-girus-pick