Логотип exploitDog
bind:"CVE-2024-24791" OR bind:"CVE-2024-3727"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2024-24791" OR bind:"CVE-2024-3727"

Количество 59

Количество 59

oracle-oval логотип

ELSA-2024-9097

7 месяцев назад

ELSA-2024-9097: buildah security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-9102

7 месяцев назад

ELSA-2024-9102: podman security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-9098

7 месяцев назад

ELSA-2024-9098: skopeo security update (MODERATE)

EPSS: Низкий
ubuntu логотип

CVE-2024-3727

около 1 года назад

A flaw was found in the github.com/containers/image library. This flaw allows attackers to trigger unexpected authenticated registry accesses on behalf of a victim user, causing resource exhaustion, local path traversal, and other attacks.

CVSS3: 8.3
EPSS: Низкий
redhat логотип

CVE-2024-3727

около 1 года назад

A flaw was found in the github.com/containers/image library. This flaw allows attackers to trigger unexpected authenticated registry accesses on behalf of a victim user, causing resource exhaustion, local path traversal, and other attacks.

CVSS3: 8.3
EPSS: Низкий
nvd логотип

CVE-2024-3727

около 1 года назад

A flaw was found in the github.com/containers/image library. This flaw allows attackers to trigger unexpected authenticated registry accesses on behalf of a victim user, causing resource exhaustion, local path traversal, and other attacks.

CVSS3: 8.3
EPSS: Низкий
msrc логотип

CVE-2024-3727

7 месяцев назад

CVSS3: 8.3
EPSS: Низкий
debian логотип

CVE-2024-3727

около 1 года назад

A flaw was found in the github.com/containers/image library. This flaw ...

CVSS3: 8.3
EPSS: Низкий
ubuntu логотип

CVE-2024-24791

12 месяцев назад

The net/http HTTP/1.1 client mishandled the case where a server responds to a request with an "Expect: 100-continue" header with a non-informational (200 or higher) status. This mishandling could leave a client connection in an invalid state, where the next request sent on the connection will fail. An attacker sending a request to a net/http/httputil.ReverseProxy proxy can exploit this mishandling to cause a denial of service by sending "Expect: 100-continue" requests which elicit a non-informational response from the backend. Each such request leaves the proxy with an invalid connection, and causes one subsequent request using that connection to fail.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2024-24791

12 месяцев назад

The net/http HTTP/1.1 client mishandled the case where a server responds to a request with an "Expect: 100-continue" header with a non-informational (200 or higher) status. This mishandling could leave a client connection in an invalid state, where the next request sent on the connection will fail. An attacker sending a request to a net/http/httputil.ReverseProxy proxy can exploit this mishandling to cause a denial of service by sending "Expect: 100-continue" requests which elicit a non-informational response from the backend. Each such request leaves the proxy with an invalid connection, and causes one subsequent request using that connection to fail.

CVSS3: 5.9
EPSS: Низкий
nvd логотип

CVE-2024-24791

12 месяцев назад

The net/http HTTP/1.1 client mishandled the case where a server responds to a request with an "Expect: 100-continue" header with a non-informational (200 or higher) status. This mishandling could leave a client connection in an invalid state, where the next request sent on the connection will fail. An attacker sending a request to a net/http/httputil.ReverseProxy proxy can exploit this mishandling to cause a denial of service by sending "Expect: 100-continue" requests which elicit a non-informational response from the backend. Each such request leaves the proxy with an invalid connection, and causes one subsequent request using that connection to fail.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2024-24791

12 месяцев назад

The net/http HTTP/1.1 client mishandled the case where a server respon ...

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2548-1

11 месяцев назад

Security update for podman

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2383-1

12 месяцев назад

Security update for skopeo

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2309-1

12 месяцев назад

Security update for go1.22

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2308-1

12 месяцев назад

Security update for go1.21

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2295-1

12 месяцев назад

Security update for go1.22

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2294-1

12 месяцев назад

Security update for go1.21

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:1989-1

около 1 года назад

Security update for cdi-apiserver-container, cdi-cloner-container, cdi-controller-container, cdi-importer-container, cdi-operator-container, cdi-uploadproxy-container, cdi-uploadserver-container, containerized-data-importer

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:1988-1

около 1 года назад

Security update for cdi-apiserver-container, cdi-cloner-container, cdi-controller-container, cdi-importer-container, cdi-operator-container, cdi-uploadproxy-container, cdi-uploadserver-container, containerized-data-importer

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2024-9097

ELSA-2024-9097: buildah security update (MODERATE)

7 месяцев назад
oracle-oval логотип
ELSA-2024-9102

ELSA-2024-9102: podman security update (MODERATE)

7 месяцев назад
oracle-oval логотип
ELSA-2024-9098

ELSA-2024-9098: skopeo security update (MODERATE)

7 месяцев назад
ubuntu логотип
CVE-2024-3727

A flaw was found in the github.com/containers/image library. This flaw allows attackers to trigger unexpected authenticated registry accesses on behalf of a victim user, causing resource exhaustion, local path traversal, and other attacks.

CVSS3: 8.3
0%
Низкий
около 1 года назад
redhat логотип
CVE-2024-3727

A flaw was found in the github.com/containers/image library. This flaw allows attackers to trigger unexpected authenticated registry accesses on behalf of a victim user, causing resource exhaustion, local path traversal, and other attacks.

CVSS3: 8.3
0%
Низкий
около 1 года назад
nvd логотип
CVE-2024-3727

A flaw was found in the github.com/containers/image library. This flaw allows attackers to trigger unexpected authenticated registry accesses on behalf of a victim user, causing resource exhaustion, local path traversal, and other attacks.

CVSS3: 8.3
0%
Низкий
около 1 года назад
msrc логотип
CVSS3: 8.3
0%
Низкий
7 месяцев назад
debian логотип
CVE-2024-3727

A flaw was found in the github.com/containers/image library. This flaw ...

CVSS3: 8.3
0%
Низкий
около 1 года назад
ubuntu логотип
CVE-2024-24791

The net/http HTTP/1.1 client mishandled the case where a server responds to a request with an "Expect: 100-continue" header with a non-informational (200 or higher) status. This mishandling could leave a client connection in an invalid state, where the next request sent on the connection will fail. An attacker sending a request to a net/http/httputil.ReverseProxy proxy can exploit this mishandling to cause a denial of service by sending "Expect: 100-continue" requests which elicit a non-informational response from the backend. Each such request leaves the proxy with an invalid connection, and causes one subsequent request using that connection to fail.

CVSS3: 7.5
0%
Низкий
12 месяцев назад
redhat логотип
CVE-2024-24791

The net/http HTTP/1.1 client mishandled the case where a server responds to a request with an "Expect: 100-continue" header with a non-informational (200 or higher) status. This mishandling could leave a client connection in an invalid state, where the next request sent on the connection will fail. An attacker sending a request to a net/http/httputil.ReverseProxy proxy can exploit this mishandling to cause a denial of service by sending "Expect: 100-continue" requests which elicit a non-informational response from the backend. Each such request leaves the proxy with an invalid connection, and causes one subsequent request using that connection to fail.

CVSS3: 5.9
0%
Низкий
12 месяцев назад
nvd логотип
CVE-2024-24791

The net/http HTTP/1.1 client mishandled the case where a server responds to a request with an "Expect: 100-continue" header with a non-informational (200 or higher) status. This mishandling could leave a client connection in an invalid state, where the next request sent on the connection will fail. An attacker sending a request to a net/http/httputil.ReverseProxy proxy can exploit this mishandling to cause a denial of service by sending "Expect: 100-continue" requests which elicit a non-informational response from the backend. Each such request leaves the proxy with an invalid connection, and causes one subsequent request using that connection to fail.

CVSS3: 7.5
0%
Низкий
12 месяцев назад
debian логотип
CVE-2024-24791

The net/http HTTP/1.1 client mishandled the case where a server respon ...

CVSS3: 7.5
0%
Низкий
12 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:2548-1

Security update for podman

0%
Низкий
11 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:2383-1

Security update for skopeo

0%
Низкий
12 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:2309-1

Security update for go1.22

0%
Низкий
12 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:2308-1

Security update for go1.21

0%
Низкий
12 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:2295-1

Security update for go1.22

0%
Низкий
12 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:2294-1

Security update for go1.21

0%
Низкий
12 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:1989-1

Security update for cdi-apiserver-container, cdi-cloner-container, cdi-controller-container, cdi-importer-container, cdi-operator-container, cdi-uploadproxy-container, cdi-uploadserver-container, containerized-data-importer

0%
Низкий
около 1 года назад
suse-cvrf логотип
SUSE-SU-2024:1988-1

Security update for cdi-apiserver-container, cdi-cloner-container, cdi-controller-container, cdi-importer-container, cdi-operator-container, cdi-uploadproxy-container, cdi-uploadserver-container, containerized-data-importer

0%
Низкий
около 1 года назад

Уязвимостей на страницу