Количество 60
Количество 60
CVE-2022-2880
Requests forwarded by ReverseProxy include the raw query parameters fr ...
RLSA-2024:0121
Moderate: container-tools:4.0 security update
ELSA-2024-0121
ELSA-2024-0121: container-tools:4.0 security update (MODERATE)
RLSA-2024:2988
Moderate: container-tools:rhel8 security update
ELSA-2024-2988
ELSA-2024-2988: container-tools:ol8 security update (MODERATE)
ELSA-2022-24267
ELSA-2022-24267: ol8addon security update (IMPORTANT)
GHSA-m3hq-grv6-h853
Requests forwarded by ReverseProxy include the raw query parameters from the inbound request, including unparseable parameters rejected by net/http. This could permit query parameter smuggling when a Go proxy forwards a parameter with an unparseable value. After fix, ReverseProxy sanitizes the query parameters in the forwarded query when the outbound request's Form field is set after the ReverseProxy. Director function returns, indicating that the proxy has parsed the query parameters. Proxies which do not parse query parameters continue to forward the original query parameters unchanged.
CVE-2022-41717
An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection.
CVE-2022-41717
An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection.
CVE-2022-41717
An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection.
CVE-2022-41717
CVE-2022-41717
An attacker can cause excessive memory growth in a Go server accepting ...
CVE-2022-41715
Programs which compile regular expressions from untrusted sources may be vulnerable to memory exhaustion or denial of service. The parsed regexp representation is linear in the size of the input, but in some cases the constant factor can be as high as 40,000, making relatively small regexps consume much larger amounts of memory. After fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Normal use of regular expressions is unaffected.
CVE-2022-41715
Programs which compile regular expressions from untrusted sources may be vulnerable to memory exhaustion or denial of service. The parsed regexp representation is linear in the size of the input, but in some cases the constant factor can be as high as 40,000, making relatively small regexps consume much larger amounts of memory. After fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Normal use of regular expressions is unaffected.
CVE-2022-41715
Programs which compile regular expressions from untrusted sources may be vulnerable to memory exhaustion or denial of service. The parsed regexp representation is linear in the size of the input, but in some cases the constant factor can be as high as 40,000, making relatively small regexps consume much larger amounts of memory. After fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Normal use of regular expressions is unaffected.
CVE-2022-41715
Memory exhaustion when compiling regular expressions in regexp/syntax
CVE-2022-41715
Programs which compile regular expressions from untrusted sources may ...
GHSA-xrjj-mj9h-534m
golang.org/x/net/http2 vulnerable to possible excessive memory growth
ELSA-2023-2222
ELSA-2023-2222: conmon security and bug fix update (MODERATE)
BDU:2024-02376
Уязвимость пакета http2 языка программирования Go, позволяющая нарушителю вызвать отказ в обслуживании
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2022-2880 Requests forwarded by ReverseProxy include the raw query parameters fr ... | CVSS3: 7.5 | 0% Низкий | больше 3 лет назад | |
RLSA-2024:0121 Moderate: container-tools:4.0 security update | 9 месяцев назад | |||
ELSA-2024-0121 ELSA-2024-0121: container-tools:4.0 security update (MODERATE) | около 2 лет назад | |||
RLSA-2024:2988 Moderate: container-tools:rhel8 security update | 9 месяцев назад | |||
ELSA-2024-2988 ELSA-2024-2988: container-tools:ol8 security update (MODERATE) | больше 1 года назад | |||
ELSA-2022-24267 ELSA-2022-24267: ol8addon security update (IMPORTANT) | около 3 лет назад | |||
GHSA-m3hq-grv6-h853 Requests forwarded by ReverseProxy include the raw query parameters from the inbound request, including unparseable parameters rejected by net/http. This could permit query parameter smuggling when a Go proxy forwards a parameter with an unparseable value. After fix, ReverseProxy sanitizes the query parameters in the forwarded query when the outbound request's Form field is set after the ReverseProxy. Director function returns, indicating that the proxy has parsed the query parameters. Proxies which do not parse query parameters continue to forward the original query parameters unchanged. | CVSS3: 7.5 | 0% Низкий | больше 3 лет назад | |
CVE-2022-41717 An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection. | CVSS3: 5.3 | 0% Низкий | около 3 лет назад | |
CVE-2022-41717 An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection. | CVSS3: 5.3 | 0% Низкий | около 3 лет назад | |
CVE-2022-41717 An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection. | CVSS3: 5.3 | 0% Низкий | около 3 лет назад | |
CVSS3: 5.3 | 0% Низкий | около 3 лет назад | ||
CVE-2022-41717 An attacker can cause excessive memory growth in a Go server accepting ... | CVSS3: 5.3 | 0% Низкий | около 3 лет назад | |
CVE-2022-41715 Programs which compile regular expressions from untrusted sources may be vulnerable to memory exhaustion or denial of service. The parsed regexp representation is linear in the size of the input, but in some cases the constant factor can be as high as 40,000, making relatively small regexps consume much larger amounts of memory. After fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Normal use of regular expressions is unaffected. | CVSS3: 7.5 | 0% Низкий | больше 3 лет назад | |
CVE-2022-41715 Programs which compile regular expressions from untrusted sources may be vulnerable to memory exhaustion or denial of service. The parsed regexp representation is linear in the size of the input, but in some cases the constant factor can be as high as 40,000, making relatively small regexps consume much larger amounts of memory. After fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Normal use of regular expressions is unaffected. | CVSS3: 6.5 | 0% Низкий | больше 3 лет назад | |
CVE-2022-41715 Programs which compile regular expressions from untrusted sources may be vulnerable to memory exhaustion or denial of service. The parsed regexp representation is linear in the size of the input, but in some cases the constant factor can be as high as 40,000, making relatively small regexps consume much larger amounts of memory. After fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Normal use of regular expressions is unaffected. | CVSS3: 7.5 | 0% Низкий | больше 3 лет назад | |
CVE-2022-41715 Memory exhaustion when compiling regular expressions in regexp/syntax | CVSS3: 7.5 | 0% Низкий | больше 3 лет назад | |
CVE-2022-41715 Programs which compile regular expressions from untrusted sources may ... | CVSS3: 7.5 | 0% Низкий | больше 3 лет назад | |
GHSA-xrjj-mj9h-534m golang.org/x/net/http2 vulnerable to possible excessive memory growth | CVSS3: 5.3 | 0% Низкий | около 3 лет назад | |
ELSA-2023-2222 ELSA-2023-2222: conmon security and bug fix update (MODERATE) | больше 2 лет назад | |||
BDU:2024-02376 Уязвимость пакета http2 языка программирования Go, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 5.3 | 0% Низкий | около 3 лет назад |
Уязвимостей на страницу