Количество 91
Количество 91
ELSA-2024-6187
ELSA-2024-6187: gvisor-tap-vsock security update (MODERATE)
ELSA-2024-6186
ELSA-2024-6186: containernetworking-plugins security update (MODERATE)

BDU:2024-02048
Уязвимость пакета golang операционной системы Debian GNU/Linux, позволяющая нарушителю вызвать отказ в обслуживании (DoS)

CVE-2023-45289
When following an HTTP redirect to a domain which is not a subdomain match or exact match of the initial domain, an http.Client does not forward sensitive headers such as "Authorization" or "Cookie". For example, a redirect from foo.com to www.foo.com will forward the Authorization header, but a redirect to bar.com will not. A maliciously crafted HTTP redirect could cause sensitive headers to be unexpectedly forwarded.

CVE-2023-45289
When following an HTTP redirect to a domain which is not a subdomain match or exact match of the initial domain, an http.Client does not forward sensitive headers such as "Authorization" or "Cookie". For example, a redirect from foo.com to www.foo.com will forward the Authorization header, but a redirect to bar.com will not. A maliciously crafted HTTP redirect could cause sensitive headers to be unexpectedly forwarded.
CVE-2023-45289
When following an HTTP redirect to a domain which is not a subdomain m ...
ELSA-2024-6194
ELSA-2024-6194: podman security update (IMPORTANT)

CVE-2023-45288
An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection.

CVE-2023-45288
An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection.

CVE-2023-45288
CVE-2023-45288
An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of ...
GHSA-32ch-6x54-q4h9
When following an HTTP redirect to a domain which is not a subdomain match or exact match of the initial domain, an http.Client does not forward sensitive headers such as "Authorization" or "Cookie". For example, a redirect from foo.com to www.foo.com will forward the Authorization header, but a redirect to bar.com will not. A maliciously crafted HTTP redirect could cause sensitive headers to be unexpectedly forwarded.

BDU:2024-02034
Уязвимость пакета golang операционной системы Debian GNU/Linux, позволяющая нарушителю получить доступ к конфиденциальной информации

SUSE-SU-2025:0581-1
Security update for buildah

SUSE-SU-2025:0299-1
Security update for ignition

SUSE-SU-2024:3155-1
Security update for kubernetes1.26

SUSE-SU-2024:2108-1
Security update for containerd

SUSE-SU-2024:1161-1
Security update for go1.21

SUSE-SU-2024:1160-1
Security update for go1.22

SUSE-SU-2024:1122-1
Security update for go1.21
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
ELSA-2024-6187 ELSA-2024-6187: gvisor-tap-vsock security update (MODERATE) | 10 месяцев назад | |||
ELSA-2024-6186 ELSA-2024-6186: containernetworking-plugins security update (MODERATE) | 10 месяцев назад | |||
![]() | BDU:2024-02048 Уязвимость пакета golang операционной системы Debian GNU/Linux, позволяющая нарушителю вызвать отказ в обслуживании (DoS) | CVSS3: 7.5 | 0% Низкий | больше 1 года назад |
![]() | CVE-2023-45289 When following an HTTP redirect to a domain which is not a subdomain match or exact match of the initial domain, an http.Client does not forward sensitive headers such as "Authorization" or "Cookie". For example, a redirect from foo.com to www.foo.com will forward the Authorization header, but a redirect to bar.com will not. A maliciously crafted HTTP redirect could cause sensitive headers to be unexpectedly forwarded. | CVSS3: 4.3 | 0% Низкий | больше 1 года назад |
![]() | CVE-2023-45289 When following an HTTP redirect to a domain which is not a subdomain match or exact match of the initial domain, an http.Client does not forward sensitive headers such as "Authorization" or "Cookie". For example, a redirect from foo.com to www.foo.com will forward the Authorization header, but a redirect to bar.com will not. A maliciously crafted HTTP redirect could cause sensitive headers to be unexpectedly forwarded. | CVSS3: 4.3 | 0% Низкий | больше 1 года назад |
CVE-2023-45289 When following an HTTP redirect to a domain which is not a subdomain m ... | CVSS3: 4.3 | 0% Низкий | больше 1 года назад | |
ELSA-2024-6194 ELSA-2024-6194: podman security update (IMPORTANT) | 10 месяцев назад | |||
![]() | CVE-2023-45288 An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection. | CVSS3: 7.5 | 65% Средний | около 1 года назад |
![]() | CVE-2023-45288 An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection. | CVSS3: 7.5 | 65% Средний | около 1 года назад |
![]() | CVSS3: 7.5 | 65% Средний | 9 месяцев назад | |
CVE-2023-45288 An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of ... | CVSS3: 7.5 | 65% Средний | около 1 года назад | |
GHSA-32ch-6x54-q4h9 When following an HTTP redirect to a domain which is not a subdomain match or exact match of the initial domain, an http.Client does not forward sensitive headers such as "Authorization" or "Cookie". For example, a redirect from foo.com to www.foo.com will forward the Authorization header, but a redirect to bar.com will not. A maliciously crafted HTTP redirect could cause sensitive headers to be unexpectedly forwarded. | CVSS3: 4.3 | 0% Низкий | больше 1 года назад | |
![]() | BDU:2024-02034 Уязвимость пакета golang операционной системы Debian GNU/Linux, позволяющая нарушителю получить доступ к конфиденциальной информации | CVSS3: 3.1 | 0% Низкий | больше 1 года назад |
![]() | SUSE-SU-2025:0581-1 Security update for buildah | 65% Средний | 4 месяца назад | |
![]() | SUSE-SU-2025:0299-1 Security update for ignition | 65% Средний | 5 месяцев назад | |
![]() | SUSE-SU-2024:3155-1 Security update for kubernetes1.26 | 65% Средний | 10 месяцев назад | |
![]() | SUSE-SU-2024:2108-1 Security update for containerd | 65% Средний | 12 месяцев назад | |
![]() | SUSE-SU-2024:1161-1 Security update for go1.21 | 65% Средний | около 1 года назад | |
![]() | SUSE-SU-2024:1160-1 Security update for go1.22 | 65% Средний | около 1 года назад | |
![]() | SUSE-SU-2024:1122-1 Security update for go1.21 | 65% Средний | около 1 года назад |
Уязвимостей на страницу