Логотип exploitDog
bind:"CVE-2022-2880" OR bind:"CVE-2022-41717" OR bind:"CVE-2022-41715"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2022-2880" OR bind:"CVE-2022-41717" OR bind:"CVE-2022-41715"

Количество 60

Количество 60

debian логотип

CVE-2022-2880

больше 3 лет назад

Requests forwarded by ReverseProxy include the raw query parameters fr ...

CVSS3: 7.5
EPSS: Низкий
rocky логотип

RLSA-2024:0121

9 месяцев назад

Moderate: container-tools:4.0 security update

EPSS: Низкий
oracle-oval логотип

ELSA-2024-0121

около 2 лет назад

ELSA-2024-0121: container-tools:4.0 security update (MODERATE)

EPSS: Низкий
rocky логотип

RLSA-2024:2988

9 месяцев назад

Moderate: container-tools:rhel8 security update

EPSS: Низкий
oracle-oval логотип

ELSA-2024-2988

больше 1 года назад

ELSA-2024-2988: container-tools:ol8 security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2022-24267

около 3 лет назад

ELSA-2022-24267: ol8addon security update (IMPORTANT)

EPSS: Низкий
github логотип

GHSA-m3hq-grv6-h853

больше 3 лет назад

Requests forwarded by ReverseProxy include the raw query parameters from the inbound request, including unparseable parameters rejected by net/http. This could permit query parameter smuggling when a Go proxy forwards a parameter with an unparseable value. After fix, ReverseProxy sanitizes the query parameters in the forwarded query when the outbound request's Form field is set after the ReverseProxy. Director function returns, indicating that the proxy has parsed the query parameters. Proxies which do not parse query parameters continue to forward the original query parameters unchanged.

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2022-41717

около 3 лет назад

An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection.

CVSS3: 5.3
EPSS: Низкий
redhat логотип

CVE-2022-41717

около 3 лет назад

An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection.

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2022-41717

около 3 лет назад

An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection.

CVSS3: 5.3
EPSS: Низкий
msrc логотип

CVE-2022-41717

около 3 лет назад

CVSS3: 5.3
EPSS: Низкий
debian логотип

CVE-2022-41717

около 3 лет назад

An attacker can cause excessive memory growth in a Go server accepting ...

CVSS3: 5.3
EPSS: Низкий
ubuntu логотип

CVE-2022-41715

больше 3 лет назад

Programs which compile regular expressions from untrusted sources may be vulnerable to memory exhaustion or denial of service. The parsed regexp representation is linear in the size of the input, but in some cases the constant factor can be as high as 40,000, making relatively small regexps consume much larger amounts of memory. After fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Normal use of regular expressions is unaffected.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2022-41715

больше 3 лет назад

Programs which compile regular expressions from untrusted sources may be vulnerable to memory exhaustion or denial of service. The parsed regexp representation is linear in the size of the input, but in some cases the constant factor can be as high as 40,000, making relatively small regexps consume much larger amounts of memory. After fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Normal use of regular expressions is unaffected.

CVSS3: 6.5
EPSS: Низкий
nvd логотип

CVE-2022-41715

больше 3 лет назад

Programs which compile regular expressions from untrusted sources may be vulnerable to memory exhaustion or denial of service. The parsed regexp representation is linear in the size of the input, but in some cases the constant factor can be as high as 40,000, making relatively small regexps consume much larger amounts of memory. After fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Normal use of regular expressions is unaffected.

CVSS3: 7.5
EPSS: Низкий
msrc логотип

CVE-2022-41715

больше 3 лет назад

Memory exhaustion when compiling regular expressions in regexp/syntax

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2022-41715

больше 3 лет назад

Programs which compile regular expressions from untrusted sources may ...

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-xrjj-mj9h-534m

около 3 лет назад

golang.org/x/net/http2 vulnerable to possible excessive memory growth

CVSS3: 5.3
EPSS: Низкий
oracle-oval логотип

ELSA-2023-2222

больше 2 лет назад

ELSA-2023-2222: conmon security and bug fix update (MODERATE)

EPSS: Низкий
fstec логотип

BDU:2024-02376

около 3 лет назад

Уязвимость пакета http2 языка программирования Go, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
debian логотип
CVE-2022-2880

Requests forwarded by ReverseProxy include the raw query parameters fr ...

CVSS3: 7.5
0%
Низкий
больше 3 лет назад
rocky логотип
RLSA-2024:0121

Moderate: container-tools:4.0 security update

9 месяцев назад
oracle-oval логотип
ELSA-2024-0121

ELSA-2024-0121: container-tools:4.0 security update (MODERATE)

около 2 лет назад
rocky логотип
RLSA-2024:2988

Moderate: container-tools:rhel8 security update

9 месяцев назад
oracle-oval логотип
ELSA-2024-2988

ELSA-2024-2988: container-tools:ol8 security update (MODERATE)

больше 1 года назад
oracle-oval логотип
ELSA-2022-24267

ELSA-2022-24267: ol8addon security update (IMPORTANT)

около 3 лет назад
github логотип
GHSA-m3hq-grv6-h853

Requests forwarded by ReverseProxy include the raw query parameters from the inbound request, including unparseable parameters rejected by net/http. This could permit query parameter smuggling when a Go proxy forwards a parameter with an unparseable value. After fix, ReverseProxy sanitizes the query parameters in the forwarded query when the outbound request's Form field is set after the ReverseProxy. Director function returns, indicating that the proxy has parsed the query parameters. Proxies which do not parse query parameters continue to forward the original query parameters unchanged.

CVSS3: 7.5
0%
Низкий
больше 3 лет назад
ubuntu логотип
CVE-2022-41717

An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection.

CVSS3: 5.3
0%
Низкий
около 3 лет назад
redhat логотип
CVE-2022-41717

An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection.

CVSS3: 5.3
0%
Низкий
около 3 лет назад
nvd логотип
CVE-2022-41717

An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection.

CVSS3: 5.3
0%
Низкий
около 3 лет назад
msrc логотип
CVSS3: 5.3
0%
Низкий
около 3 лет назад
debian логотип
CVE-2022-41717

An attacker can cause excessive memory growth in a Go server accepting ...

CVSS3: 5.3
0%
Низкий
около 3 лет назад
ubuntu логотип
CVE-2022-41715

Programs which compile regular expressions from untrusted sources may be vulnerable to memory exhaustion or denial of service. The parsed regexp representation is linear in the size of the input, but in some cases the constant factor can be as high as 40,000, making relatively small regexps consume much larger amounts of memory. After fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Normal use of regular expressions is unaffected.

CVSS3: 7.5
0%
Низкий
больше 3 лет назад
redhat логотип
CVE-2022-41715

Programs which compile regular expressions from untrusted sources may be vulnerable to memory exhaustion or denial of service. The parsed regexp representation is linear in the size of the input, but in some cases the constant factor can be as high as 40,000, making relatively small regexps consume much larger amounts of memory. After fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Normal use of regular expressions is unaffected.

CVSS3: 6.5
0%
Низкий
больше 3 лет назад
nvd логотип
CVE-2022-41715

Programs which compile regular expressions from untrusted sources may be vulnerable to memory exhaustion or denial of service. The parsed regexp representation is linear in the size of the input, but in some cases the constant factor can be as high as 40,000, making relatively small regexps consume much larger amounts of memory. After fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Normal use of regular expressions is unaffected.

CVSS3: 7.5
0%
Низкий
больше 3 лет назад
msrc логотип
CVE-2022-41715

Memory exhaustion when compiling regular expressions in regexp/syntax

CVSS3: 7.5
0%
Низкий
больше 3 лет назад
debian логотип
CVE-2022-41715

Programs which compile regular expressions from untrusted sources may ...

CVSS3: 7.5
0%
Низкий
больше 3 лет назад
github логотип
GHSA-xrjj-mj9h-534m

golang.org/x/net/http2 vulnerable to possible excessive memory growth

CVSS3: 5.3
0%
Низкий
около 3 лет назад
oracle-oval логотип
ELSA-2023-2222

ELSA-2023-2222: conmon security and bug fix update (MODERATE)

больше 2 лет назад
fstec логотип
BDU:2024-02376

Уязвимость пакета http2 языка программирования Go, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.3
0%
Низкий
около 3 лет назад

Уязвимостей на страницу