Логотип exploitDog
bind:"CVE-2022-2880" OR bind:"CVE-2022-41717" OR bind:"CVE-2022-41715"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2022-2880" OR bind:"CVE-2022-41717" OR bind:"CVE-2022-41715"

Количество 55

Количество 55

oracle-oval логотип

ELSA-2024-0121

больше 1 года назад

ELSA-2024-0121: container-tools:4.0 security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-2988

около 1 года назад

ELSA-2024-2988: container-tools:ol8 security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2022-24267

больше 2 лет назад

ELSA-2022-24267: ol8addon security update (IMPORTANT)

EPSS: Низкий
github логотип

GHSA-m3hq-grv6-h853

больше 2 лет назад

Requests forwarded by ReverseProxy include the raw query parameters from the inbound request, including unparseable parameters rejected by net/http. This could permit query parameter smuggling when a Go proxy forwards a parameter with an unparseable value. After fix, ReverseProxy sanitizes the query parameters in the forwarded query when the outbound request's Form field is set after the ReverseProxy. Director function returns, indicating that the proxy has parsed the query parameters. Proxies which do not parse query parameters continue to forward the original query parameters unchanged.

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2022-41717

больше 2 лет назад

An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection.

CVSS3: 5.3
EPSS: Низкий
redhat логотип

CVE-2022-41717

больше 2 лет назад

An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection.

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2022-41717

больше 2 лет назад

An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection.

CVSS3: 5.3
EPSS: Низкий
msrc логотип

CVE-2022-41717

больше 2 лет назад

CVSS3: 5.3
EPSS: Низкий
debian логотип

CVE-2022-41717

больше 2 лет назад

An attacker can cause excessive memory growth in a Go server accepting ...

CVSS3: 5.3
EPSS: Низкий
ubuntu логотип

CVE-2022-41715

больше 2 лет назад

Programs which compile regular expressions from untrusted sources may be vulnerable to memory exhaustion or denial of service. The parsed regexp representation is linear in the size of the input, but in some cases the constant factor can be as high as 40,000, making relatively small regexps consume much larger amounts of memory. After fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Normal use of regular expressions is unaffected.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2022-41715

больше 2 лет назад

Programs which compile regular expressions from untrusted sources may be vulnerable to memory exhaustion or denial of service. The parsed regexp representation is linear in the size of the input, but in some cases the constant factor can be as high as 40,000, making relatively small regexps consume much larger amounts of memory. After fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Normal use of regular expressions is unaffected.

CVSS3: 6.5
EPSS: Низкий
nvd логотип

CVE-2022-41715

больше 2 лет назад

Programs which compile regular expressions from untrusted sources may be vulnerable to memory exhaustion or denial of service. The parsed regexp representation is linear in the size of the input, but in some cases the constant factor can be as high as 40,000, making relatively small regexps consume much larger amounts of memory. After fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Normal use of regular expressions is unaffected.

CVSS3: 7.5
EPSS: Низкий
msrc логотип

CVE-2022-41715

больше 2 лет назад

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2022-41715

больше 2 лет назад

Programs which compile regular expressions from untrusted sources may ...

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-xrjj-mj9h-534m

больше 2 лет назад

golang.org/x/net/http2 vulnerable to possible excessive memory growth

CVSS3: 5.3
EPSS: Низкий
oracle-oval логотип

ELSA-2023-2222

около 2 лет назад

ELSA-2023-2222: conmon security and bug fix update (MODERATE)

EPSS: Низкий
fstec логотип

BDU:2024-02376

больше 2 лет назад

Уязвимость пакета http2 языка программирования Go, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-5wvm-rxcf-6cg8

больше 2 лет назад

Programs which compile regular expressions from untrusted sources may be vulnerable to memory exhaustion or denial of service. The parsed regexp representation is linear in the size of the input, but in some cases the constant factor can be as high as 40,000, making relatively small regexps consume much larger amounts of memory. After fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Normal use of regular expressions is unaffected.

CVSS3: 7.5
EPSS: Низкий
oracle-oval логотип

ELSA-2023-2592

около 2 лет назад

ELSA-2023-2592: golang-github-cpuguy83-md2man security, bug fix, and enhancement update (MODERATE)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:4398-1

больше 2 лет назад

Security update for go1.18

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2024-0121

ELSA-2024-0121: container-tools:4.0 security update (MODERATE)

больше 1 года назад
oracle-oval логотип
ELSA-2024-2988

ELSA-2024-2988: container-tools:ol8 security update (MODERATE)

около 1 года назад
oracle-oval логотип
ELSA-2022-24267

ELSA-2022-24267: ol8addon security update (IMPORTANT)

больше 2 лет назад
github логотип
GHSA-m3hq-grv6-h853

Requests forwarded by ReverseProxy include the raw query parameters from the inbound request, including unparseable parameters rejected by net/http. This could permit query parameter smuggling when a Go proxy forwards a parameter with an unparseable value. After fix, ReverseProxy sanitizes the query parameters in the forwarded query when the outbound request's Form field is set after the ReverseProxy. Director function returns, indicating that the proxy has parsed the query parameters. Proxies which do not parse query parameters continue to forward the original query parameters unchanged.

CVSS3: 7.5
0%
Низкий
больше 2 лет назад
ubuntu логотип
CVE-2022-41717

An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection.

CVSS3: 5.3
0%
Низкий
больше 2 лет назад
redhat логотип
CVE-2022-41717

An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection.

CVSS3: 5.3
0%
Низкий
больше 2 лет назад
nvd логотип
CVE-2022-41717

An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection.

CVSS3: 5.3
0%
Низкий
больше 2 лет назад
msrc логотип
CVSS3: 5.3
0%
Низкий
больше 2 лет назад
debian логотип
CVE-2022-41717

An attacker can cause excessive memory growth in a Go server accepting ...

CVSS3: 5.3
0%
Низкий
больше 2 лет назад
ubuntu логотип
CVE-2022-41715

Programs which compile regular expressions from untrusted sources may be vulnerable to memory exhaustion or denial of service. The parsed regexp representation is linear in the size of the input, but in some cases the constant factor can be as high as 40,000, making relatively small regexps consume much larger amounts of memory. After fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Normal use of regular expressions is unaffected.

CVSS3: 7.5
0%
Низкий
больше 2 лет назад
redhat логотип
CVE-2022-41715

Programs which compile regular expressions from untrusted sources may be vulnerable to memory exhaustion or denial of service. The parsed regexp representation is linear in the size of the input, but in some cases the constant factor can be as high as 40,000, making relatively small regexps consume much larger amounts of memory. After fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Normal use of regular expressions is unaffected.

CVSS3: 6.5
0%
Низкий
больше 2 лет назад
nvd логотип
CVE-2022-41715

Programs which compile regular expressions from untrusted sources may be vulnerable to memory exhaustion or denial of service. The parsed regexp representation is linear in the size of the input, but in some cases the constant factor can be as high as 40,000, making relatively small regexps consume much larger amounts of memory. After fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Normal use of regular expressions is unaffected.

CVSS3: 7.5
0%
Низкий
больше 2 лет назад
msrc логотип
CVSS3: 7.5
0%
Низкий
больше 2 лет назад
debian логотип
CVE-2022-41715

Programs which compile regular expressions from untrusted sources may ...

CVSS3: 7.5
0%
Низкий
больше 2 лет назад
github логотип
GHSA-xrjj-mj9h-534m

golang.org/x/net/http2 vulnerable to possible excessive memory growth

CVSS3: 5.3
0%
Низкий
больше 2 лет назад
oracle-oval логотип
ELSA-2023-2222

ELSA-2023-2222: conmon security and bug fix update (MODERATE)

около 2 лет назад
fstec логотип
BDU:2024-02376

Уязвимость пакета http2 языка программирования Go, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.3
0%
Низкий
больше 2 лет назад
github логотип
GHSA-5wvm-rxcf-6cg8

Programs which compile regular expressions from untrusted sources may be vulnerable to memory exhaustion or denial of service. The parsed regexp representation is linear in the size of the input, but in some cases the constant factor can be as high as 40,000, making relatively small regexps consume much larger amounts of memory. After fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Normal use of regular expressions is unaffected.

CVSS3: 7.5
0%
Низкий
больше 2 лет назад
oracle-oval логотип
ELSA-2023-2592

ELSA-2023-2592: golang-github-cpuguy83-md2man security, bug fix, and enhancement update (MODERATE)

около 2 лет назад
suse-cvrf логотип
SUSE-SU-2022:4398-1

Security update for go1.18

больше 2 лет назад

Уязвимостей на страницу