Количество 28
Количество 28

BDU:2024-00175
Уязвимость пакета net/http языка программирования Go, позволяющая нарушителю раскрыть защищаемую информацию

ROS-20240402-17
Множественные уязвимости golang

ROS-20240805-03
Множественные уязвимости consul

CVE-2023-39326
A malicious HTTP sender can use chunk extensions to cause a receiver reading from a request or response body to read many more bytes from the network than are in the body. A malicious HTTP client can further exploit this to cause a server to automatically read a large amount of data (up to about 1GiB) when a handler fails to read the entire body of a request. Chunk extensions are a little-used HTTP feature which permit including additional metadata in a request or response body sent using the chunked encoding. The net/http chunked encoding reader discards this metadata. A sender can exploit this by inserting a large metadata segment with each byte transferred. The chunk reader now produces an error if the ratio of real body to encoded bytes grows too small.

CVE-2023-39326
A malicious HTTP sender can use chunk extensions to cause a receiver reading from a request or response body to read many more bytes from the network than are in the body. A malicious HTTP client can further exploit this to cause a server to automatically read a large amount of data (up to about 1GiB) when a handler fails to read the entire body of a request. Chunk extensions are a little-used HTTP feature which permit including additional metadata in a request or response body sent using the chunked encoding. The net/http chunked encoding reader discards this metadata. A sender can exploit this by inserting a large metadata segment with each byte transferred. The chunk reader now produces an error if the ratio of real body to encoded bytes grows too small.

CVE-2023-39326
A malicious HTTP sender can use chunk extensions to cause a receiver reading from a request or response body to read many more bytes from the network than are in the body. A malicious HTTP client can further exploit this to cause a server to automatically read a large amount of data (up to about 1GiB) when a handler fails to read the entire body of a request. Chunk extensions are a little-used HTTP feature which permit including additional metadata in a request or response body sent using the chunked encoding. The net/http chunked encoding reader discards this metadata. A sender can exploit this by inserting a large metadata segment with each byte transferred. The chunk reader now produces an error if the ratio of real body to encoded bytes grows too small.
CVE-2023-39326
A malicious HTTP sender can use chunk extensions to cause a receiver r ...
GHSA-9f76-wg39-x86h
A malicious HTTP sender can use chunk extensions to cause a receiver reading from a request or response body to read many more bytes from the network than are in the body. A malicious HTTP client can further exploit this to cause a server to automatically read a large amount of data (up to about 1GiB) when a handler fails to read the entire body of a request. Chunk extensions are a little-used HTTP feature which permit including additional metadata in a request or response body sent using the chunked encoding. The net/http chunked encoding reader discards this metadata. A sender can exploit this by inserting a large metadata segment with each byte transferred. The chunk reader now produces an error if the ratio of real body to encoded bytes grows too small.
ELSA-2024-12264
ELSA-2024-12264: olcne security update (IMPORTANT)
ELSA-2024-12263
ELSA-2024-12263: olcne security update (IMPORTANT)
ELSA-2024-12262
ELSA-2024-12262: olcne security update (IMPORTANT)
ELSA-2024-12261
ELSA-2024-12261: olcne security update (IMPORTANT)
ELSA-2024-12226
ELSA-2024-12226: conmon security update (IMPORTANT)
ELSA-2024-12225
ELSA-2024-12225: conmon security update (IMPORTANT)
ELSA-2024-12191
ELSA-2024-12191: container-tools:4.0 security update (MODERATE)
ELSA-2024-12190
ELSA-2024-12190: conmon security update (IMPORTANT)
ELSA-2024-12189
ELSA-2024-12189: conmon security update (IMPORTANT)
ELSA-2024-1149
ELSA-2024-1149: skopeo security update (MODERATE)
ELSA-2024-2272
ELSA-2024-2272: containernetworking-plugins security update (MODERATE)
ELSA-2024-2245
ELSA-2024-2245: buildah security update (MODERATE)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | BDU:2024-00175 Уязвимость пакета net/http языка программирования Go, позволяющая нарушителю раскрыть защищаемую информацию | CVSS3: 5.3 | 0% Низкий | больше 1 года назад |
![]() | ROS-20240402-17 Множественные уязвимости golang | CVSS3: 7.5 | около 1 года назад | |
![]() | ROS-20240805-03 Множественные уязвимости consul | CVSS3: 7.5 | 11 месяцев назад | |
![]() | CVE-2023-39326 A malicious HTTP sender can use chunk extensions to cause a receiver reading from a request or response body to read many more bytes from the network than are in the body. A malicious HTTP client can further exploit this to cause a server to automatically read a large amount of data (up to about 1GiB) when a handler fails to read the entire body of a request. Chunk extensions are a little-used HTTP feature which permit including additional metadata in a request or response body sent using the chunked encoding. The net/http chunked encoding reader discards this metadata. A sender can exploit this by inserting a large metadata segment with each byte transferred. The chunk reader now produces an error if the ratio of real body to encoded bytes grows too small. | CVSS3: 5.3 | 0% Низкий | больше 1 года назад |
![]() | CVE-2023-39326 A malicious HTTP sender can use chunk extensions to cause a receiver reading from a request or response body to read many more bytes from the network than are in the body. A malicious HTTP client can further exploit this to cause a server to automatically read a large amount of data (up to about 1GiB) when a handler fails to read the entire body of a request. Chunk extensions are a little-used HTTP feature which permit including additional metadata in a request or response body sent using the chunked encoding. The net/http chunked encoding reader discards this metadata. A sender can exploit this by inserting a large metadata segment with each byte transferred. The chunk reader now produces an error if the ratio of real body to encoded bytes grows too small. | CVSS3: 5.3 | 0% Низкий | больше 1 года назад |
![]() | CVE-2023-39326 A malicious HTTP sender can use chunk extensions to cause a receiver reading from a request or response body to read many more bytes from the network than are in the body. A malicious HTTP client can further exploit this to cause a server to automatically read a large amount of data (up to about 1GiB) when a handler fails to read the entire body of a request. Chunk extensions are a little-used HTTP feature which permit including additional metadata in a request or response body sent using the chunked encoding. The net/http chunked encoding reader discards this metadata. A sender can exploit this by inserting a large metadata segment with each byte transferred. The chunk reader now produces an error if the ratio of real body to encoded bytes grows too small. | CVSS3: 5.3 | 0% Низкий | больше 1 года назад |
CVE-2023-39326 A malicious HTTP sender can use chunk extensions to cause a receiver r ... | CVSS3: 5.3 | 0% Низкий | больше 1 года назад | |
GHSA-9f76-wg39-x86h A malicious HTTP sender can use chunk extensions to cause a receiver reading from a request or response body to read many more bytes from the network than are in the body. A malicious HTTP client can further exploit this to cause a server to automatically read a large amount of data (up to about 1GiB) when a handler fails to read the entire body of a request. Chunk extensions are a little-used HTTP feature which permit including additional metadata in a request or response body sent using the chunked encoding. The net/http chunked encoding reader discards this metadata. A sender can exploit this by inserting a large metadata segment with each byte transferred. The chunk reader now produces an error if the ratio of real body to encoded bytes grows too small. | CVSS3: 5.3 | 0% Низкий | больше 1 года назад | |
ELSA-2024-12264 ELSA-2024-12264: olcne security update (IMPORTANT) | около 1 года назад | |||
ELSA-2024-12263 ELSA-2024-12263: olcne security update (IMPORTANT) | около 1 года назад | |||
ELSA-2024-12262 ELSA-2024-12262: olcne security update (IMPORTANT) | около 1 года назад | |||
ELSA-2024-12261 ELSA-2024-12261: olcne security update (IMPORTANT) | около 1 года назад | |||
ELSA-2024-12226 ELSA-2024-12226: conmon security update (IMPORTANT) | больше 1 года назад | |||
ELSA-2024-12225 ELSA-2024-12225: conmon security update (IMPORTANT) | больше 1 года назад | |||
ELSA-2024-12191 ELSA-2024-12191: container-tools:4.0 security update (MODERATE) | больше 1 года назад | |||
ELSA-2024-12190 ELSA-2024-12190: conmon security update (IMPORTANT) | больше 1 года назад | |||
ELSA-2024-12189 ELSA-2024-12189: conmon security update (IMPORTANT) | больше 1 года назад | |||
ELSA-2024-1149 ELSA-2024-1149: skopeo security update (MODERATE) | больше 1 года назад | |||
ELSA-2024-2272 ELSA-2024-2272: containernetworking-plugins security update (MODERATE) | около 1 года назад | |||
ELSA-2024-2245 ELSA-2024-2245: buildah security update (MODERATE) | около 1 года назад |
Уязвимостей на страницу