Логотип exploitDog
bind:"CVE-2022-2880" OR bind:"CVE-2022-41717" OR bind:"CVE-2022-41715"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2022-2880" OR bind:"CVE-2022-41717" OR bind:"CVE-2022-41715"

Количество 55

Количество 55

oracle-oval логотип

ELSA-2024-0121

почти 2 года назад

ELSA-2024-0121: container-tools:4.0 security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-2988

больше 1 года назад

ELSA-2024-2988: container-tools:ol8 security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2022-24267

почти 3 года назад

ELSA-2022-24267: ol8addon security update (IMPORTANT)

EPSS: Низкий
github логотип

GHSA-m3hq-grv6-h853

около 3 лет назад

Requests forwarded by ReverseProxy include the raw query parameters from the inbound request, including unparseable parameters rejected by net/http. This could permit query parameter smuggling when a Go proxy forwards a parameter with an unparseable value. After fix, ReverseProxy sanitizes the query parameters in the forwarded query when the outbound request's Form field is set after the ReverseProxy. Director function returns, indicating that the proxy has parsed the query parameters. Proxies which do not parse query parameters continue to forward the original query parameters unchanged.

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2022-41717

почти 3 года назад

An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection.

CVSS3: 5.3
EPSS: Низкий
redhat логотип

CVE-2022-41717

почти 3 года назад

An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection.

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2022-41717

почти 3 года назад

An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection.

CVSS3: 5.3
EPSS: Низкий
msrc логотип

CVE-2022-41717

почти 3 года назад

CVSS3: 5.3
EPSS: Низкий
debian логотип

CVE-2022-41717

почти 3 года назад

An attacker can cause excessive memory growth in a Go server accepting ...

CVSS3: 5.3
EPSS: Низкий
ubuntu логотип

CVE-2022-41715

около 3 лет назад

Programs which compile regular expressions from untrusted sources may be vulnerable to memory exhaustion or denial of service. The parsed regexp representation is linear in the size of the input, but in some cases the constant factor can be as high as 40,000, making relatively small regexps consume much larger amounts of memory. After fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Normal use of regular expressions is unaffected.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2022-41715

около 3 лет назад

Programs which compile regular expressions from untrusted sources may be vulnerable to memory exhaustion or denial of service. The parsed regexp representation is linear in the size of the input, but in some cases the constant factor can be as high as 40,000, making relatively small regexps consume much larger amounts of memory. After fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Normal use of regular expressions is unaffected.

CVSS3: 6.5
EPSS: Низкий
nvd логотип

CVE-2022-41715

около 3 лет назад

Programs which compile regular expressions from untrusted sources may be vulnerable to memory exhaustion or denial of service. The parsed regexp representation is linear in the size of the input, but in some cases the constant factor can be as high as 40,000, making relatively small regexps consume much larger amounts of memory. After fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Normal use of regular expressions is unaffected.

CVSS3: 7.5
EPSS: Низкий
msrc логотип

CVE-2022-41715

около 3 лет назад

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2022-41715

около 3 лет назад

Programs which compile regular expressions from untrusted sources may ...

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-xrjj-mj9h-534m

почти 3 года назад

golang.org/x/net/http2 vulnerable to possible excessive memory growth

CVSS3: 5.3
EPSS: Низкий
oracle-oval логотип

ELSA-2023-2222

больше 2 лет назад

ELSA-2023-2222: conmon security and bug fix update (MODERATE)

EPSS: Низкий
fstec логотип

BDU:2024-02376

почти 3 года назад

Уязвимость пакета http2 языка программирования Go, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-5wvm-rxcf-6cg8

около 3 лет назад

Programs which compile regular expressions from untrusted sources may be vulnerable to memory exhaustion or denial of service. The parsed regexp representation is linear in the size of the input, but in some cases the constant factor can be as high as 40,000, making relatively small regexps consume much larger amounts of memory. After fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Normal use of regular expressions is unaffected.

CVSS3: 7.5
EPSS: Низкий
oracle-oval логотип

ELSA-2023-2592

больше 2 лет назад

ELSA-2023-2592: golang-github-cpuguy83-md2man security, bug fix, and enhancement update (MODERATE)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:4398-1

почти 3 года назад

Security update for go1.18

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2024-0121

ELSA-2024-0121: container-tools:4.0 security update (MODERATE)

почти 2 года назад
oracle-oval логотип
ELSA-2024-2988

ELSA-2024-2988: container-tools:ol8 security update (MODERATE)

больше 1 года назад
oracle-oval логотип
ELSA-2022-24267

ELSA-2022-24267: ol8addon security update (IMPORTANT)

почти 3 года назад
github логотип
GHSA-m3hq-grv6-h853

Requests forwarded by ReverseProxy include the raw query parameters from the inbound request, including unparseable parameters rejected by net/http. This could permit query parameter smuggling when a Go proxy forwards a parameter with an unparseable value. After fix, ReverseProxy sanitizes the query parameters in the forwarded query when the outbound request's Form field is set after the ReverseProxy. Director function returns, indicating that the proxy has parsed the query parameters. Proxies which do not parse query parameters continue to forward the original query parameters unchanged.

CVSS3: 7.5
0%
Низкий
около 3 лет назад
ubuntu логотип
CVE-2022-41717

An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection.

CVSS3: 5.3
0%
Низкий
почти 3 года назад
redhat логотип
CVE-2022-41717

An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection.

CVSS3: 5.3
0%
Низкий
почти 3 года назад
nvd логотип
CVE-2022-41717

An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection.

CVSS3: 5.3
0%
Низкий
почти 3 года назад
msrc логотип
CVSS3: 5.3
0%
Низкий
почти 3 года назад
debian логотип
CVE-2022-41717

An attacker can cause excessive memory growth in a Go server accepting ...

CVSS3: 5.3
0%
Низкий
почти 3 года назад
ubuntu логотип
CVE-2022-41715

Programs which compile regular expressions from untrusted sources may be vulnerable to memory exhaustion or denial of service. The parsed regexp representation is linear in the size of the input, but in some cases the constant factor can be as high as 40,000, making relatively small regexps consume much larger amounts of memory. After fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Normal use of regular expressions is unaffected.

CVSS3: 7.5
0%
Низкий
около 3 лет назад
redhat логотип
CVE-2022-41715

Programs which compile regular expressions from untrusted sources may be vulnerable to memory exhaustion or denial of service. The parsed regexp representation is linear in the size of the input, but in some cases the constant factor can be as high as 40,000, making relatively small regexps consume much larger amounts of memory. After fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Normal use of regular expressions is unaffected.

CVSS3: 6.5
0%
Низкий
около 3 лет назад
nvd логотип
CVE-2022-41715

Programs which compile regular expressions from untrusted sources may be vulnerable to memory exhaustion or denial of service. The parsed regexp representation is linear in the size of the input, but in some cases the constant factor can be as high as 40,000, making relatively small regexps consume much larger amounts of memory. After fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Normal use of regular expressions is unaffected.

CVSS3: 7.5
0%
Низкий
около 3 лет назад
msrc логотип
CVSS3: 7.5
0%
Низкий
около 3 лет назад
debian логотип
CVE-2022-41715

Programs which compile regular expressions from untrusted sources may ...

CVSS3: 7.5
0%
Низкий
около 3 лет назад
github логотип
GHSA-xrjj-mj9h-534m

golang.org/x/net/http2 vulnerable to possible excessive memory growth

CVSS3: 5.3
0%
Низкий
почти 3 года назад
oracle-oval логотип
ELSA-2023-2222

ELSA-2023-2222: conmon security and bug fix update (MODERATE)

больше 2 лет назад
fstec логотип
BDU:2024-02376

Уязвимость пакета http2 языка программирования Go, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.3
0%
Низкий
почти 3 года назад
github логотип
GHSA-5wvm-rxcf-6cg8

Programs which compile regular expressions from untrusted sources may be vulnerable to memory exhaustion or denial of service. The parsed regexp representation is linear in the size of the input, but in some cases the constant factor can be as high as 40,000, making relatively small regexps consume much larger amounts of memory. After fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Normal use of regular expressions is unaffected.

CVSS3: 7.5
0%
Низкий
около 3 лет назад
oracle-oval логотип
ELSA-2023-2592

ELSA-2023-2592: golang-github-cpuguy83-md2man security, bug fix, and enhancement update (MODERATE)

больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2022:4398-1

Security update for go1.18

почти 3 года назад

Уязвимостей на страницу