Логотип exploitDog
bind:"CVE-2023-45290" OR bind:"CVE-2024-24783" OR bind:"CVE-2023-45289" OR bind:"CVE-2023-45288"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2023-45290" OR bind:"CVE-2024-24783" OR bind:"CVE-2023-45289" OR bind:"CVE-2023-45288"

Количество 91

Количество 91

oracle-oval логотип

ELSA-2024-6187

10 месяцев назад

ELSA-2024-6187: gvisor-tap-vsock security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-6186

10 месяцев назад

ELSA-2024-6186: containernetworking-plugins security update (MODERATE)

EPSS: Низкий
fstec логотип

BDU:2024-02048

больше 1 года назад

Уязвимость пакета golang операционной системы Debian GNU/Linux, позволяющая нарушителю вызвать отказ в обслуживании (DoS)

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2023-45289

больше 1 года назад

When following an HTTP redirect to a domain which is not a subdomain match or exact match of the initial domain, an http.Client does not forward sensitive headers such as "Authorization" or "Cookie". For example, a redirect from foo.com to www.foo.com will forward the Authorization header, but a redirect to bar.com will not. A maliciously crafted HTTP redirect could cause sensitive headers to be unexpectedly forwarded.

CVSS3: 4.3
EPSS: Низкий
nvd логотип

CVE-2023-45289

больше 1 года назад

When following an HTTP redirect to a domain which is not a subdomain match or exact match of the initial domain, an http.Client does not forward sensitive headers such as "Authorization" or "Cookie". For example, a redirect from foo.com to www.foo.com will forward the Authorization header, but a redirect to bar.com will not. A maliciously crafted HTTP redirect could cause sensitive headers to be unexpectedly forwarded.

CVSS3: 4.3
EPSS: Низкий
debian логотип

CVE-2023-45289

больше 1 года назад

When following an HTTP redirect to a domain which is not a subdomain m ...

CVSS3: 4.3
EPSS: Низкий
oracle-oval логотип

ELSA-2024-6194

10 месяцев назад

ELSA-2024-6194: podman security update (IMPORTANT)

EPSS: Низкий
ubuntu логотип

CVE-2023-45288

около 1 года назад

An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection.

CVSS3: 7.5
EPSS: Средний
nvd логотип

CVE-2023-45288

около 1 года назад

An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection.

CVSS3: 7.5
EPSS: Средний
msrc логотип

CVE-2023-45288

9 месяцев назад

CVSS3: 7.5
EPSS: Средний
debian логотип

CVE-2023-45288

около 1 года назад

An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of ...

CVSS3: 7.5
EPSS: Средний
github логотип

GHSA-32ch-6x54-q4h9

больше 1 года назад

When following an HTTP redirect to a domain which is not a subdomain match or exact match of the initial domain, an http.Client does not forward sensitive headers such as "Authorization" or "Cookie". For example, a redirect from foo.com to www.foo.com will forward the Authorization header, but a redirect to bar.com will not. A maliciously crafted HTTP redirect could cause sensitive headers to be unexpectedly forwarded.

CVSS3: 4.3
EPSS: Низкий
fstec логотип

BDU:2024-02034

больше 1 года назад

Уязвимость пакета golang операционной системы Debian GNU/Linux, позволяющая нарушителю получить доступ к конфиденциальной информации

CVSS3: 3.1
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0581-1

4 месяца назад

Security update for buildah

EPSS: Средний
suse-cvrf логотип

SUSE-SU-2025:0299-1

5 месяцев назад

Security update for ignition

EPSS: Средний
suse-cvrf логотип

SUSE-SU-2024:3155-1

10 месяцев назад

Security update for kubernetes1.26

EPSS: Средний
suse-cvrf логотип

SUSE-SU-2024:2108-1

12 месяцев назад

Security update for containerd

EPSS: Средний
suse-cvrf логотип

SUSE-SU-2024:1161-1

около 1 года назад

Security update for go1.21

EPSS: Средний
suse-cvrf логотип

SUSE-SU-2024:1160-1

около 1 года назад

Security update for go1.22

EPSS: Средний
suse-cvrf логотип

SUSE-SU-2024:1122-1

около 1 года назад

Security update for go1.21

EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2024-6187

ELSA-2024-6187: gvisor-tap-vsock security update (MODERATE)

10 месяцев назад
oracle-oval логотип
ELSA-2024-6186

ELSA-2024-6186: containernetworking-plugins security update (MODERATE)

10 месяцев назад
fstec логотип
BDU:2024-02048

Уязвимость пакета golang операционной системы Debian GNU/Linux, позволяющая нарушителю вызвать отказ в обслуживании (DoS)

CVSS3: 7.5
0%
Низкий
больше 1 года назад
ubuntu логотип
CVE-2023-45289

When following an HTTP redirect to a domain which is not a subdomain match or exact match of the initial domain, an http.Client does not forward sensitive headers such as "Authorization" or "Cookie". For example, a redirect from foo.com to www.foo.com will forward the Authorization header, but a redirect to bar.com will not. A maliciously crafted HTTP redirect could cause sensitive headers to be unexpectedly forwarded.

CVSS3: 4.3
0%
Низкий
больше 1 года назад
nvd логотип
CVE-2023-45289

When following an HTTP redirect to a domain which is not a subdomain match or exact match of the initial domain, an http.Client does not forward sensitive headers such as "Authorization" or "Cookie". For example, a redirect from foo.com to www.foo.com will forward the Authorization header, but a redirect to bar.com will not. A maliciously crafted HTTP redirect could cause sensitive headers to be unexpectedly forwarded.

CVSS3: 4.3
0%
Низкий
больше 1 года назад
debian логотип
CVE-2023-45289

When following an HTTP redirect to a domain which is not a subdomain m ...

CVSS3: 4.3
0%
Низкий
больше 1 года назад
oracle-oval логотип
ELSA-2024-6194

ELSA-2024-6194: podman security update (IMPORTANT)

10 месяцев назад
ubuntu логотип
CVE-2023-45288

An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection.

CVSS3: 7.5
65%
Средний
около 1 года назад
nvd логотип
CVE-2023-45288

An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection.

CVSS3: 7.5
65%
Средний
около 1 года назад
msrc логотип
CVSS3: 7.5
65%
Средний
9 месяцев назад
debian логотип
CVE-2023-45288

An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of ...

CVSS3: 7.5
65%
Средний
около 1 года назад
github логотип
GHSA-32ch-6x54-q4h9

When following an HTTP redirect to a domain which is not a subdomain match or exact match of the initial domain, an http.Client does not forward sensitive headers such as "Authorization" or "Cookie". For example, a redirect from foo.com to www.foo.com will forward the Authorization header, but a redirect to bar.com will not. A maliciously crafted HTTP redirect could cause sensitive headers to be unexpectedly forwarded.

CVSS3: 4.3
0%
Низкий
больше 1 года назад
fstec логотип
BDU:2024-02034

Уязвимость пакета golang операционной системы Debian GNU/Linux, позволяющая нарушителю получить доступ к конфиденциальной информации

CVSS3: 3.1
0%
Низкий
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2025:0581-1

Security update for buildah

65%
Средний
4 месяца назад
suse-cvrf логотип
SUSE-SU-2025:0299-1

Security update for ignition

65%
Средний
5 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3155-1

Security update for kubernetes1.26

65%
Средний
10 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:2108-1

Security update for containerd

65%
Средний
12 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:1161-1

Security update for go1.21

65%
Средний
около 1 года назад
suse-cvrf логотип
SUSE-SU-2024:1160-1

Security update for go1.22

65%
Средний
около 1 года назад
suse-cvrf логотип
SUSE-SU-2024:1122-1

Security update for go1.21

65%
Средний
около 1 года назад

Уязвимостей на страницу