Логотип exploitDog
bind:"CVE-2024-3727" OR bind:"CVE-2024-24791" OR bind:"CVE-2024-6104" OR bind:"CVE-2024-24788"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2024-3727" OR bind:"CVE-2024-24791" OR bind:"CVE-2024-6104" OR bind:"CVE-2024-24788"

Количество 95

Количество 95

redos логотип

ROS-20240711-02

11 месяцев назад

Уязвимость buildah

CVSS3: 8.3
EPSS: Низкий
github логотип

GHSA-6wvf-f2vw-3425

около 1 года назад

github.com/containers/image allows unexpected authenticated registry accesses

CVSS3: 8.3
EPSS: Низкий
fstec логотип

BDU:2024-05780

около 1 года назад

Уязвимость библиотеки github.com/containers/image, связанная с неправильной проверкой значения целостности, позволяющая нарушителю вызвать отказ в обслуживании, выполнить атаку обхода локального пути или оказать иное воздействие

CVSS3: 8.3
EPSS: Низкий
oracle-oval логотип

ELSA-2024-6969

9 месяцев назад

ELSA-2024-6969: container-tools:ol8 security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-7256

около 1 месяца назад

ELSA-2025-7256: git-lfs security update (MODERATE)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0313-1

5 месяцев назад

Security update for apptainer

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2090-1

около 1 года назад

Security update for podman

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2050-2

11 месяцев назад

Security update for podman

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2050-1

11 месяцев назад

Security update for podman

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2031-1

около 1 года назад

Security update for podman

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:1987-1

около 1 года назад

Security update for skopeo

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2024:0244-1

10 месяцев назад

Security update for apptainer

EPSS: Низкий
ubuntu логотип

CVE-2024-24791

12 месяцев назад

The net/http HTTP/1.1 client mishandled the case where a server responds to a request with an "Expect: 100-continue" header with a non-informational (200 or higher) status. This mishandling could leave a client connection in an invalid state, where the next request sent on the connection will fail. An attacker sending a request to a net/http/httputil.ReverseProxy proxy can exploit this mishandling to cause a denial of service by sending "Expect: 100-continue" requests which elicit a non-informational response from the backend. Each such request leaves the proxy with an invalid connection, and causes one subsequent request using that connection to fail.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2024-24791

12 месяцев назад

The net/http HTTP/1.1 client mishandled the case where a server responds to a request with an "Expect: 100-continue" header with a non-informational (200 or higher) status. This mishandling could leave a client connection in an invalid state, where the next request sent on the connection will fail. An attacker sending a request to a net/http/httputil.ReverseProxy proxy can exploit this mishandling to cause a denial of service by sending "Expect: 100-continue" requests which elicit a non-informational response from the backend. Each such request leaves the proxy with an invalid connection, and causes one subsequent request using that connection to fail.

CVSS3: 5.9
EPSS: Низкий
nvd логотип

CVE-2024-24791

12 месяцев назад

The net/http HTTP/1.1 client mishandled the case where a server responds to a request with an "Expect: 100-continue" header with a non-informational (200 or higher) status. This mishandling could leave a client connection in an invalid state, where the next request sent on the connection will fail. An attacker sending a request to a net/http/httputil.ReverseProxy proxy can exploit this mishandling to cause a denial of service by sending "Expect: 100-continue" requests which elicit a non-informational response from the backend. Each such request leaves the proxy with an invalid connection, and causes one subsequent request using that connection to fail.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2024-24791

12 месяцев назад

The net/http HTTP/1.1 client mishandled the case where a server respon ...

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3186-1

9 месяцев назад

Security update for buildah

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3151-1

10 месяцев назад

Security update for buildah

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3938-1

8 месяцев назад

Security update for go1.22-openssl

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3772-1

8 месяцев назад

Security update for go1.22-openssl

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redos логотип
ROS-20240711-02

Уязвимость buildah

CVSS3: 8.3
0%
Низкий
11 месяцев назад
github логотип
GHSA-6wvf-f2vw-3425

github.com/containers/image allows unexpected authenticated registry accesses

CVSS3: 8.3
0%
Низкий
около 1 года назад
fstec логотип
BDU:2024-05780

Уязвимость библиотеки github.com/containers/image, связанная с неправильной проверкой значения целостности, позволяющая нарушителю вызвать отказ в обслуживании, выполнить атаку обхода локального пути или оказать иное воздействие

CVSS3: 8.3
0%
Низкий
около 1 года назад
oracle-oval логотип
ELSA-2024-6969

ELSA-2024-6969: container-tools:ol8 security update (MODERATE)

9 месяцев назад
oracle-oval логотип
ELSA-2025-7256

ELSA-2025-7256: git-lfs security update (MODERATE)

около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2025:0313-1

Security update for apptainer

5 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:2090-1

Security update for podman

около 1 года назад
suse-cvrf логотип
SUSE-SU-2024:2050-2

Security update for podman

11 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:2050-1

Security update for podman

11 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:2031-1

Security update for podman

около 1 года назад
suse-cvrf логотип
SUSE-SU-2024:1987-1

Security update for skopeo

около 1 года назад
suse-cvrf логотип
openSUSE-SU-2024:0244-1

Security update for apptainer

10 месяцев назад
ubuntu логотип
CVE-2024-24791

The net/http HTTP/1.1 client mishandled the case where a server responds to a request with an "Expect: 100-continue" header with a non-informational (200 or higher) status. This mishandling could leave a client connection in an invalid state, where the next request sent on the connection will fail. An attacker sending a request to a net/http/httputil.ReverseProxy proxy can exploit this mishandling to cause a denial of service by sending "Expect: 100-continue" requests which elicit a non-informational response from the backend. Each such request leaves the proxy with an invalid connection, and causes one subsequent request using that connection to fail.

CVSS3: 7.5
0%
Низкий
12 месяцев назад
redhat логотип
CVE-2024-24791

The net/http HTTP/1.1 client mishandled the case where a server responds to a request with an "Expect: 100-continue" header with a non-informational (200 or higher) status. This mishandling could leave a client connection in an invalid state, where the next request sent on the connection will fail. An attacker sending a request to a net/http/httputil.ReverseProxy proxy can exploit this mishandling to cause a denial of service by sending "Expect: 100-continue" requests which elicit a non-informational response from the backend. Each such request leaves the proxy with an invalid connection, and causes one subsequent request using that connection to fail.

CVSS3: 5.9
0%
Низкий
12 месяцев назад
nvd логотип
CVE-2024-24791

The net/http HTTP/1.1 client mishandled the case where a server responds to a request with an "Expect: 100-continue" header with a non-informational (200 or higher) status. This mishandling could leave a client connection in an invalid state, where the next request sent on the connection will fail. An attacker sending a request to a net/http/httputil.ReverseProxy proxy can exploit this mishandling to cause a denial of service by sending "Expect: 100-continue" requests which elicit a non-informational response from the backend. Each such request leaves the proxy with an invalid connection, and causes one subsequent request using that connection to fail.

CVSS3: 7.5
0%
Низкий
12 месяцев назад
debian логотип
CVE-2024-24791

The net/http HTTP/1.1 client mishandled the case where a server respon ...

CVSS3: 7.5
0%
Низкий
12 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3186-1

Security update for buildah

9 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3151-1

Security update for buildah

10 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3938-1

Security update for go1.22-openssl

8 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3772-1

Security update for go1.22-openssl

8 месяцев назад

Уязвимостей на страницу