Логотип exploitDog
bind:"CVE-2024-24785" OR bind:"CVE-2025-61729" OR bind:"CVE-2025-65637"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2024-24785" OR bind:"CVE-2025-61729" OR bind:"CVE-2025-65637"

Количество 100

Количество 100

rocky логотип

RLSA-2026:3428

27 дней назад

Important: container-tools:rhel8 security update

EPSS: Низкий
oracle-oval логотип

ELSA-2026-3428

29 дней назад

ELSA-2026-3428: container-tools:ol8 security update (IMPORTANT)

EPSS: Низкий
ubuntu логотип

CVE-2024-24785

около 2 лет назад

If errors returned from MarshalJSON methods contain user controlled data, they may be used to break the contextual auto-escaping behavior of the html/template package, allowing for subsequent actions to inject unexpected content into templates.

CVSS3: 5.4
EPSS: Низкий
redhat логотип

CVE-2024-24785

около 2 лет назад

If errors returned from MarshalJSON methods contain user controlled data, they may be used to break the contextual auto-escaping behavior of the html/template package, allowing for subsequent actions to inject unexpected content into templates.

CVSS3: 6.5
EPSS: Низкий
nvd логотип

CVE-2024-24785

около 2 лет назад

If errors returned from MarshalJSON methods contain user controlled data, they may be used to break the contextual auto-escaping behavior of the html/template package, allowing for subsequent actions to inject unexpected content into templates.

CVSS3: 5.4
EPSS: Низкий
msrc логотип

CVE-2024-24785

около 1 месяца назад

Errors returned from JSON marshaling may break template escaping in html/template

CVSS3: 5.4
EPSS: Низкий
debian логотип

CVE-2024-24785

около 2 лет назад

If errors returned from MarshalJSON methods contain user controlled da ...

CVSS3: 5.4
EPSS: Низкий
github логотип

GHSA-j6m3-gc37-6r6q

около 2 лет назад

If errors returned from MarshalJSON methods contain user controlled data, they may be used to break the contextual auto-escaping behavior of the html/template package, allowing for subsequent actions to inject unexpected content into templates.

CVSS3: 5.4
EPSS: Низкий
fstec логотип

BDU:2024-03248

около 2 лет назад

Уязвимость пакета html/template языка программирования Go, связанная с отсутствием проверки входных значений, позволяющая нарушителю вводить произвольный контент в шаблоны

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2025-65637

4 месяца назад

A denial-of-service vulnerability exists in github.com/sirupsen/logrus when using Entry.Writer() to log a single-line payload larger than 64KB without newline characters. Due to limitations in the internal bufio.Scanner, the read fails with "token too long" and the writer pipe is closed, leaving Writer() unusable and causing application unavailability (DoS). This affects versions < 1.8.3, 1.9.0, and 1.9.2. The issue is fixed in 1.8.3, 1.9.1, and 1.9.3+, where the input is chunked and the writer continues to function even if an error is logged.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2025-65637

4 месяца назад

A denial-of-service vulnerability exists in github.com/sirupsen/logrus when using Entry.Writer() to log a single-line payload larger than 64KB without newline characters. Due to limitations in the internal bufio.Scanner, the read fails with "token too long" and the writer pipe is closed, leaving Writer() unusable and causing application unavailability (DoS). This affects versions < 1.8.3, 1.9.0, and 1.9.2. The issue is fixed in 1.8.3, 1.9.1, and 1.9.3+, where the input is chunked and the writer continues to function even if an error is logged.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2025-65637

4 месяца назад

A denial-of-service vulnerability exists in github.com/sirupsen/logrus when using Entry.Writer() to log a single-line payload larger than 64KB without newline characters. Due to limitations in the internal bufio.Scanner, the read fails with "token too long" and the writer pipe is closed, leaving Writer() unusable and causing application unavailability (DoS). This affects versions < 1.8.3, 1.9.0, and 1.9.2. The issue is fixed in 1.8.3, 1.9.1, and 1.9.3+, where the input is chunked and the writer continues to function even if an error is logged.

CVSS3: 7.5
EPSS: Низкий
msrc логотип

CVE-2025-65637

4 месяца назад

A denial-of-service vulnerability exists in github.com/sirupsen/logrus when using Entry.Writer() to log a single-line payload larger than 64KB without newline characters.

CVSS3: 5.9
EPSS: Низкий
debian логотип

CVE-2025-65637

4 месяца назад

A denial-of-service vulnerability exists in github.com/sirupsen/logrus ...

CVSS3: 7.5
EPSS: Низкий
rocky логотип

RLSA-2024:9135

около 1 года назад

Moderate: toolbox security update

EPSS: Низкий
github логотип

GHSA-4f99-4q7p-p3gh

4 месяца назад

Logrus is vulnerable to DoS when using Entry.Writer()

EPSS: Низкий
ubuntu логотип

CVE-2025-61729

4 месяца назад

Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2025-61729

4 месяца назад

Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2025-61729

4 месяца назад

Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.

CVSS3: 7.5
EPSS: Низкий
msrc логотип

CVE-2025-61729

4 месяца назад

Excessive resource consumption when printing error string for host certificate validation in crypto/x509

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
rocky логотип
RLSA-2026:3428

Important: container-tools:rhel8 security update

27 дней назад
oracle-oval логотип
ELSA-2026-3428

ELSA-2026-3428: container-tools:ol8 security update (IMPORTANT)

29 дней назад
ubuntu логотип
CVE-2024-24785

If errors returned from MarshalJSON methods contain user controlled data, they may be used to break the contextual auto-escaping behavior of the html/template package, allowing for subsequent actions to inject unexpected content into templates.

CVSS3: 5.4
1%
Низкий
около 2 лет назад
redhat логотип
CVE-2024-24785

If errors returned from MarshalJSON methods contain user controlled data, they may be used to break the contextual auto-escaping behavior of the html/template package, allowing for subsequent actions to inject unexpected content into templates.

CVSS3: 6.5
1%
Низкий
около 2 лет назад
nvd логотип
CVE-2024-24785

If errors returned from MarshalJSON methods contain user controlled data, they may be used to break the contextual auto-escaping behavior of the html/template package, allowing for subsequent actions to inject unexpected content into templates.

CVSS3: 5.4
1%
Низкий
около 2 лет назад
msrc логотип
CVE-2024-24785

Errors returned from JSON marshaling may break template escaping in html/template

CVSS3: 5.4
1%
Низкий
около 1 месяца назад
debian логотип
CVE-2024-24785

If errors returned from MarshalJSON methods contain user controlled da ...

CVSS3: 5.4
1%
Низкий
около 2 лет назад
github логотип
GHSA-j6m3-gc37-6r6q

If errors returned from MarshalJSON methods contain user controlled data, they may be used to break the contextual auto-escaping behavior of the html/template package, allowing for subsequent actions to inject unexpected content into templates.

CVSS3: 5.4
1%
Низкий
около 2 лет назад
fstec логотип
BDU:2024-03248

Уязвимость пакета html/template языка программирования Go, связанная с отсутствием проверки входных значений, позволяющая нарушителю вводить произвольный контент в шаблоны

CVSS3: 7.5
1%
Низкий
около 2 лет назад
ubuntu логотип
CVE-2025-65637

A denial-of-service vulnerability exists in github.com/sirupsen/logrus when using Entry.Writer() to log a single-line payload larger than 64KB without newline characters. Due to limitations in the internal bufio.Scanner, the read fails with "token too long" and the writer pipe is closed, leaving Writer() unusable and causing application unavailability (DoS). This affects versions < 1.8.3, 1.9.0, and 1.9.2. The issue is fixed in 1.8.3, 1.9.1, and 1.9.3+, where the input is chunked and the writer continues to function even if an error is logged.

CVSS3: 7.5
0%
Низкий
4 месяца назад
redhat логотип
CVE-2025-65637

A denial-of-service vulnerability exists in github.com/sirupsen/logrus when using Entry.Writer() to log a single-line payload larger than 64KB without newline characters. Due to limitations in the internal bufio.Scanner, the read fails with "token too long" and the writer pipe is closed, leaving Writer() unusable and causing application unavailability (DoS). This affects versions < 1.8.3, 1.9.0, and 1.9.2. The issue is fixed in 1.8.3, 1.9.1, and 1.9.3+, where the input is chunked and the writer continues to function even if an error is logged.

CVSS3: 7.5
0%
Низкий
4 месяца назад
nvd логотип
CVE-2025-65637

A denial-of-service vulnerability exists in github.com/sirupsen/logrus when using Entry.Writer() to log a single-line payload larger than 64KB without newline characters. Due to limitations in the internal bufio.Scanner, the read fails with "token too long" and the writer pipe is closed, leaving Writer() unusable and causing application unavailability (DoS). This affects versions < 1.8.3, 1.9.0, and 1.9.2. The issue is fixed in 1.8.3, 1.9.1, and 1.9.3+, where the input is chunked and the writer continues to function even if an error is logged.

CVSS3: 7.5
0%
Низкий
4 месяца назад
msrc логотип
CVE-2025-65637

A denial-of-service vulnerability exists in github.com/sirupsen/logrus when using Entry.Writer() to log a single-line payload larger than 64KB without newline characters.

CVSS3: 5.9
0%
Низкий
4 месяца назад
debian логотип
CVE-2025-65637

A denial-of-service vulnerability exists in github.com/sirupsen/logrus ...

CVSS3: 7.5
0%
Низкий
4 месяца назад
rocky логотип
RLSA-2024:9135

Moderate: toolbox security update

около 1 года назад
github логотип
GHSA-4f99-4q7p-p3gh

Logrus is vulnerable to DoS when using Entry.Writer()

0%
Низкий
4 месяца назад
ubuntu логотип
CVE-2025-61729

Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.

CVSS3: 7.5
0%
Низкий
4 месяца назад
redhat логотип
CVE-2025-61729

Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.

CVSS3: 7.5
0%
Низкий
4 месяца назад
nvd логотип
CVE-2025-61729

Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.

CVSS3: 7.5
0%
Низкий
4 месяца назад
msrc логотип
CVE-2025-61729

Excessive resource consumption when printing error string for host certificate validation in crypto/x509

0%
Низкий
4 месяца назад

Уязвимостей на страницу