Логотип exploitDog
bind:"GHSA-9f76-wg39-x86h" OR bind:"CVE-2023-39326"
Консоль
Логотип exploitDog

exploitDog

bind:"GHSA-9f76-wg39-x86h" OR bind:"CVE-2023-39326"

Количество 28

Количество 28

github логотип

GHSA-9f76-wg39-x86h

больше 1 года назад

A malicious HTTP sender can use chunk extensions to cause a receiver reading from a request or response body to read many more bytes from the network than are in the body. A malicious HTTP client can further exploit this to cause a server to automatically read a large amount of data (up to about 1GiB) when a handler fails to read the entire body of a request. Chunk extensions are a little-used HTTP feature which permit including additional metadata in a request or response body sent using the chunked encoding. The net/http chunked encoding reader discards this metadata. A sender can exploit this by inserting a large metadata segment with each byte transferred. The chunk reader now produces an error if the ratio of real body to encoded bytes grows too small.

CVSS3: 5.3
EPSS: Низкий
ubuntu логотип

CVE-2023-39326

больше 1 года назад

A malicious HTTP sender can use chunk extensions to cause a receiver reading from a request or response body to read many more bytes from the network than are in the body. A malicious HTTP client can further exploit this to cause a server to automatically read a large amount of data (up to about 1GiB) when a handler fails to read the entire body of a request. Chunk extensions are a little-used HTTP feature which permit including additional metadata in a request or response body sent using the chunked encoding. The net/http chunked encoding reader discards this metadata. A sender can exploit this by inserting a large metadata segment with each byte transferred. The chunk reader now produces an error if the ratio of real body to encoded bytes grows too small.

CVSS3: 5.3
EPSS: Низкий
redhat логотип

CVE-2023-39326

больше 1 года назад

A malicious HTTP sender can use chunk extensions to cause a receiver reading from a request or response body to read many more bytes from the network than are in the body. A malicious HTTP client can further exploit this to cause a server to automatically read a large amount of data (up to about 1GiB) when a handler fails to read the entire body of a request. Chunk extensions are a little-used HTTP feature which permit including additional metadata in a request or response body sent using the chunked encoding. The net/http chunked encoding reader discards this metadata. A sender can exploit this by inserting a large metadata segment with each byte transferred. The chunk reader now produces an error if the ratio of real body to encoded bytes grows too small.

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2023-39326

больше 1 года назад

A malicious HTTP sender can use chunk extensions to cause a receiver reading from a request or response body to read many more bytes from the network than are in the body. A malicious HTTP client can further exploit this to cause a server to automatically read a large amount of data (up to about 1GiB) when a handler fails to read the entire body of a request. Chunk extensions are a little-used HTTP feature which permit including additional metadata in a request or response body sent using the chunked encoding. The net/http chunked encoding reader discards this metadata. A sender can exploit this by inserting a large metadata segment with each byte transferred. The chunk reader now produces an error if the ratio of real body to encoded bytes grows too small.

CVSS3: 5.3
EPSS: Низкий
debian логотип

CVE-2023-39326

больше 1 года назад

A malicious HTTP sender can use chunk extensions to cause a receiver r ...

CVSS3: 5.3
EPSS: Низкий
oracle-oval логотип

ELSA-2024-12264

около 1 года назад

ELSA-2024-12264: olcne security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-12263

около 1 года назад

ELSA-2024-12263: olcne security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-12262

около 1 года назад

ELSA-2024-12262: olcne security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-12261

около 1 года назад

ELSA-2024-12261: olcne security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-12226

больше 1 года назад

ELSA-2024-12226: conmon security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-12225

больше 1 года назад

ELSA-2024-12225: conmon security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-12191

больше 1 года назад

ELSA-2024-12191: container-tools:4.0 security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-12190

больше 1 года назад

ELSA-2024-12190: conmon security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-12189

больше 1 года назад

ELSA-2024-12189: conmon security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-1149

больше 1 года назад

ELSA-2024-1149: skopeo security update (MODERATE)

EPSS: Низкий
fstec логотип

BDU:2024-00175

больше 1 года назад

Уязвимость пакета net/http языка программирования Go, позволяющая нарушителю раскрыть защищаемую информацию

CVSS3: 5.3
EPSS: Низкий
oracle-oval логотип

ELSA-2024-2272

около 1 года назад

ELSA-2024-2272: containernetworking-plugins security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-2245

около 1 года назад

ELSA-2024-2245: buildah security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-2193

около 1 года назад

ELSA-2024-2193: podman security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-1131

больше 1 года назад

ELSA-2024-1131: golang security update (MODERATE)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-9f76-wg39-x86h

A malicious HTTP sender can use chunk extensions to cause a receiver reading from a request or response body to read many more bytes from the network than are in the body. A malicious HTTP client can further exploit this to cause a server to automatically read a large amount of data (up to about 1GiB) when a handler fails to read the entire body of a request. Chunk extensions are a little-used HTTP feature which permit including additional metadata in a request or response body sent using the chunked encoding. The net/http chunked encoding reader discards this metadata. A sender can exploit this by inserting a large metadata segment with each byte transferred. The chunk reader now produces an error if the ratio of real body to encoded bytes grows too small.

CVSS3: 5.3
0%
Низкий
больше 1 года назад
ubuntu логотип
CVE-2023-39326

A malicious HTTP sender can use chunk extensions to cause a receiver reading from a request or response body to read many more bytes from the network than are in the body. A malicious HTTP client can further exploit this to cause a server to automatically read a large amount of data (up to about 1GiB) when a handler fails to read the entire body of a request. Chunk extensions are a little-used HTTP feature which permit including additional metadata in a request or response body sent using the chunked encoding. The net/http chunked encoding reader discards this metadata. A sender can exploit this by inserting a large metadata segment with each byte transferred. The chunk reader now produces an error if the ratio of real body to encoded bytes grows too small.

CVSS3: 5.3
0%
Низкий
больше 1 года назад
redhat логотип
CVE-2023-39326

A malicious HTTP sender can use chunk extensions to cause a receiver reading from a request or response body to read many more bytes from the network than are in the body. A malicious HTTP client can further exploit this to cause a server to automatically read a large amount of data (up to about 1GiB) when a handler fails to read the entire body of a request. Chunk extensions are a little-used HTTP feature which permit including additional metadata in a request or response body sent using the chunked encoding. The net/http chunked encoding reader discards this metadata. A sender can exploit this by inserting a large metadata segment with each byte transferred. The chunk reader now produces an error if the ratio of real body to encoded bytes grows too small.

CVSS3: 5.3
0%
Низкий
больше 1 года назад
nvd логотип
CVE-2023-39326

A malicious HTTP sender can use chunk extensions to cause a receiver reading from a request or response body to read many more bytes from the network than are in the body. A malicious HTTP client can further exploit this to cause a server to automatically read a large amount of data (up to about 1GiB) when a handler fails to read the entire body of a request. Chunk extensions are a little-used HTTP feature which permit including additional metadata in a request or response body sent using the chunked encoding. The net/http chunked encoding reader discards this metadata. A sender can exploit this by inserting a large metadata segment with each byte transferred. The chunk reader now produces an error if the ratio of real body to encoded bytes grows too small.

CVSS3: 5.3
0%
Низкий
больше 1 года назад
debian логотип
CVE-2023-39326

A malicious HTTP sender can use chunk extensions to cause a receiver r ...

CVSS3: 5.3
0%
Низкий
больше 1 года назад
oracle-oval логотип
ELSA-2024-12264

ELSA-2024-12264: olcne security update (IMPORTANT)

около 1 года назад
oracle-oval логотип
ELSA-2024-12263

ELSA-2024-12263: olcne security update (IMPORTANT)

около 1 года назад
oracle-oval логотип
ELSA-2024-12262

ELSA-2024-12262: olcne security update (IMPORTANT)

около 1 года назад
oracle-oval логотип
ELSA-2024-12261

ELSA-2024-12261: olcne security update (IMPORTANT)

около 1 года назад
oracle-oval логотип
ELSA-2024-12226

ELSA-2024-12226: conmon security update (IMPORTANT)

больше 1 года назад
oracle-oval логотип
ELSA-2024-12225

ELSA-2024-12225: conmon security update (IMPORTANT)

больше 1 года назад
oracle-oval логотип
ELSA-2024-12191

ELSA-2024-12191: container-tools:4.0 security update (MODERATE)

больше 1 года назад
oracle-oval логотип
ELSA-2024-12190

ELSA-2024-12190: conmon security update (IMPORTANT)

больше 1 года назад
oracle-oval логотип
ELSA-2024-12189

ELSA-2024-12189: conmon security update (IMPORTANT)

больше 1 года назад
oracle-oval логотип
ELSA-2024-1149

ELSA-2024-1149: skopeo security update (MODERATE)

больше 1 года назад
fstec логотип
BDU:2024-00175

Уязвимость пакета net/http языка программирования Go, позволяющая нарушителю раскрыть защищаемую информацию

CVSS3: 5.3
0%
Низкий
больше 1 года назад
oracle-oval логотип
ELSA-2024-2272

ELSA-2024-2272: containernetworking-plugins security update (MODERATE)

около 1 года назад
oracle-oval логотип
ELSA-2024-2245

ELSA-2024-2245: buildah security update (MODERATE)

около 1 года назад
oracle-oval логотип
ELSA-2024-2193

ELSA-2024-2193: podman security update (MODERATE)

около 1 года назад
oracle-oval логотип
ELSA-2024-1131

ELSA-2024-1131: golang security update (MODERATE)

больше 1 года назад

Уязвимостей на страницу