Количество 98
Количество 98

CVE-2024-24783
Verifying a certificate chain which contains a certificate with an unknown public key algorithm will cause Certificate.Verify to panic. This affects all crypto/tls clients, and servers that set Config.ClientAuth to VerifyClientCertIfGiven or RequireAndVerifyClientCert. The default behavior is for TLS servers to not verify client certificates.

CVE-2024-24783
Verify panics on certificates with an unknown public key algorithm in crypto/x509
CVE-2024-24783
Verifying a certificate chain which contains a certificate with an unk ...
ELSA-2024-5258
ELSA-2024-5258: container-tools:ol8 security update (IMPORTANT)
GHSA-3q2c-pvp5-3cqp
Verifying a certificate chain which contains a certificate with an unknown public key algorithm will cause Certificate.Verify to panic. This affects all crypto/tls clients, and servers that set Config.ClientAuth to VerifyClientCertIfGiven or RequireAndVerifyClientCert. The default behavior is for TLS servers to not verify client certificates.
ELSA-2024-6195
ELSA-2024-6195: skopeo security update (MODERATE)
ELSA-2024-6189
ELSA-2024-6189: buildah security update (MODERATE)
ELSA-2024-6188
ELSA-2024-6188: runc security update (MODERATE)
ELSA-2024-6187
ELSA-2024-6187: gvisor-tap-vsock security update (MODERATE)
ELSA-2024-6186
ELSA-2024-6186: containernetworking-plugins security update (MODERATE)

BDU:2024-02048
Уязвимость пакета golang операционной системы Debian GNU/Linux, позволяющая нарушителю вызвать отказ в обслуживании (DoS)

CVE-2023-45289
When following an HTTP redirect to a domain which is not a subdomain match or exact match of the initial domain, an http.Client does not forward sensitive headers such as "Authorization" or "Cookie". For example, a redirect from foo.com to www.foo.com will forward the Authorization header, but a redirect to bar.com will not. A maliciously crafted HTTP redirect could cause sensitive headers to be unexpectedly forwarded.

CVE-2023-45289
When following an HTTP redirect to a domain which is not a subdomain match or exact match of the initial domain, an http.Client does not forward sensitive headers such as "Authorization" or "Cookie". For example, a redirect from foo.com to www.foo.com will forward the Authorization header, but a redirect to bar.com will not. A maliciously crafted HTTP redirect could cause sensitive headers to be unexpectedly forwarded.

CVE-2023-45289
When following an HTTP redirect to a domain which is not a subdomain match or exact match of the initial domain, an http.Client does not forward sensitive headers such as "Authorization" or "Cookie". For example, a redirect from foo.com to www.foo.com will forward the Authorization header, but a redirect to bar.com will not. A maliciously crafted HTTP redirect could cause sensitive headers to be unexpectedly forwarded.

CVE-2023-45289
Incorrect forwarding of sensitive headers and cookies on HTTP redirect in net/http
CVE-2023-45289
When following an HTTP redirect to a domain which is not a subdomain m ...
ELSA-2024-6194
ELSA-2024-6194: podman security update (IMPORTANT)
GHSA-32ch-6x54-q4h9
When following an HTTP redirect to a domain which is not a subdomain match or exact match of the initial domain, an http.Client does not forward sensitive headers such as "Authorization" or "Cookie". For example, a redirect from foo.com to www.foo.com will forward the Authorization header, but a redirect to bar.com will not. A maliciously crafted HTTP redirect could cause sensitive headers to be unexpectedly forwarded.

BDU:2024-02034
Уязвимость пакета golang операционной системы Debian GNU/Linux, позволяющая нарушителю получить доступ к конфиденциальной информации

CVE-2023-45290
When parsing a multipart form (either explicitly with Request.ParseMultipartForm or implicitly with Request.FormValue, Request.PostFormValue, or Request.FormFile), limits on the total size of the parsed form were not applied to the memory consumed while reading a single form line. This permits a maliciously crafted input containing very long lines to cause allocation of arbitrarily large amounts of memory, potentially leading to memory exhaustion. With fix, the ParseMultipartForm function now correctly limits the maximum size of form lines.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2024-24783 Verifying a certificate chain which contains a certificate with an unknown public key algorithm will cause Certificate.Verify to panic. This affects all crypto/tls clients, and servers that set Config.ClientAuth to VerifyClientCertIfGiven or RequireAndVerifyClientCert. The default behavior is for TLS servers to not verify client certificates. | CVSS3: 5.9 | 0% Низкий | больше 1 года назад |
![]() | CVE-2024-24783 Verify panics on certificates with an unknown public key algorithm in crypto/x509 | CVSS3: 5.9 | 0% Низкий | около 2 месяцев назад |
CVE-2024-24783 Verifying a certificate chain which contains a certificate with an unk ... | CVSS3: 5.9 | 0% Низкий | больше 1 года назад | |
ELSA-2024-5258 ELSA-2024-5258: container-tools:ol8 security update (IMPORTANT) | около 1 года назад | |||
GHSA-3q2c-pvp5-3cqp Verifying a certificate chain which contains a certificate with an unknown public key algorithm will cause Certificate.Verify to panic. This affects all crypto/tls clients, and servers that set Config.ClientAuth to VerifyClientCertIfGiven or RequireAndVerifyClientCert. The default behavior is for TLS servers to not verify client certificates. | CVSS3: 5.9 | 0% Низкий | больше 1 года назад | |
ELSA-2024-6195 ELSA-2024-6195: skopeo security update (MODERATE) | около 1 года назад | |||
ELSA-2024-6189 ELSA-2024-6189: buildah security update (MODERATE) | около 1 года назад | |||
ELSA-2024-6188 ELSA-2024-6188: runc security update (MODERATE) | около 1 года назад | |||
ELSA-2024-6187 ELSA-2024-6187: gvisor-tap-vsock security update (MODERATE) | около 1 года назад | |||
ELSA-2024-6186 ELSA-2024-6186: containernetworking-plugins security update (MODERATE) | около 1 года назад | |||
![]() | BDU:2024-02048 Уязвимость пакета golang операционной системы Debian GNU/Linux, позволяющая нарушителю вызвать отказ в обслуживании (DoS) | CVSS3: 7.5 | 0% Низкий | больше 1 года назад |
![]() | CVE-2023-45289 When following an HTTP redirect to a domain which is not a subdomain match or exact match of the initial domain, an http.Client does not forward sensitive headers such as "Authorization" or "Cookie". For example, a redirect from foo.com to www.foo.com will forward the Authorization header, but a redirect to bar.com will not. A maliciously crafted HTTP redirect could cause sensitive headers to be unexpectedly forwarded. | CVSS3: 4.3 | 0% Низкий | больше 1 года назад |
![]() | CVE-2023-45289 When following an HTTP redirect to a domain which is not a subdomain match or exact match of the initial domain, an http.Client does not forward sensitive headers such as "Authorization" or "Cookie". For example, a redirect from foo.com to www.foo.com will forward the Authorization header, but a redirect to bar.com will not. A maliciously crafted HTTP redirect could cause sensitive headers to be unexpectedly forwarded. | CVSS3: 5.3 | 0% Низкий | больше 1 года назад |
![]() | CVE-2023-45289 When following an HTTP redirect to a domain which is not a subdomain match or exact match of the initial domain, an http.Client does not forward sensitive headers such as "Authorization" or "Cookie". For example, a redirect from foo.com to www.foo.com will forward the Authorization header, but a redirect to bar.com will not. A maliciously crafted HTTP redirect could cause sensitive headers to be unexpectedly forwarded. | CVSS3: 4.3 | 0% Низкий | больше 1 года назад |
![]() | CVE-2023-45289 Incorrect forwarding of sensitive headers and cookies on HTTP redirect in net/http | CVSS3: 4.3 | 0% Низкий | около 2 месяцев назад |
CVE-2023-45289 When following an HTTP redirect to a domain which is not a subdomain m ... | CVSS3: 4.3 | 0% Низкий | больше 1 года назад | |
ELSA-2024-6194 ELSA-2024-6194: podman security update (IMPORTANT) | около 1 года назад | |||
GHSA-32ch-6x54-q4h9 When following an HTTP redirect to a domain which is not a subdomain match or exact match of the initial domain, an http.Client does not forward sensitive headers such as "Authorization" or "Cookie". For example, a redirect from foo.com to www.foo.com will forward the Authorization header, but a redirect to bar.com will not. A maliciously crafted HTTP redirect could cause sensitive headers to be unexpectedly forwarded. | CVSS3: 4.3 | 0% Низкий | больше 1 года назад | |
![]() | BDU:2024-02034 Уязвимость пакета golang операционной системы Debian GNU/Linux, позволяющая нарушителю получить доступ к конфиденциальной информации | CVSS3: 3.1 | 0% Низкий | больше 1 года назад |
![]() | CVE-2023-45290 When parsing a multipart form (either explicitly with Request.ParseMultipartForm or implicitly with Request.FormValue, Request.PostFormValue, or Request.FormFile), limits on the total size of the parsed form were not applied to the memory consumed while reading a single form line. This permits a maliciously crafted input containing very long lines to cause allocation of arbitrarily large amounts of memory, potentially leading to memory exhaustion. With fix, the ParseMultipartForm function now correctly limits the maximum size of form lines. | CVSS3: 6.5 | 0% Низкий | больше 1 года назад |
Уязвимостей на страницу