Логотип exploitDog
bind:"CVE-2023-45290" OR bind:"CVE-2024-24783" OR bind:"CVE-2023-45289" OR bind:"CVE-2023-45288"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2023-45290" OR bind:"CVE-2024-24783" OR bind:"CVE-2023-45289" OR bind:"CVE-2023-45288"

Количество 98

Количество 98

github логотип

GHSA-3q2c-pvp5-3cqp

больше 1 года назад

Verifying a certificate chain which contains a certificate with an unknown public key algorithm will cause Certificate.Verify to panic. This affects all crypto/tls clients, and servers that set Config.ClientAuth to VerifyClientCertIfGiven or RequireAndVerifyClientCert. The default behavior is for TLS servers to not verify client certificates.

CVSS3: 5.9
EPSS: Низкий
oracle-oval логотип

ELSA-2024-6195

около 1 года назад

ELSA-2024-6195: skopeo security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-6189

около 1 года назад

ELSA-2024-6189: buildah security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-6188

около 1 года назад

ELSA-2024-6188: runc security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-6187

около 1 года назад

ELSA-2024-6187: gvisor-tap-vsock security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-6186

около 1 года назад

ELSA-2024-6186: containernetworking-plugins security update (MODERATE)

EPSS: Низкий
fstec логотип

BDU:2024-02048

больше 1 года назад

Уязвимость пакета golang операционной системы Debian GNU/Linux, позволяющая нарушителю вызвать отказ в обслуживании (DoS)

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2023-45289

больше 1 года назад

When following an HTTP redirect to a domain which is not a subdomain match or exact match of the initial domain, an http.Client does not forward sensitive headers such as "Authorization" or "Cookie". For example, a redirect from foo.com to www.foo.com will forward the Authorization header, but a redirect to bar.com will not. A maliciously crafted HTTP redirect could cause sensitive headers to be unexpectedly forwarded.

CVSS3: 4.3
EPSS: Низкий
redhat логотип

CVE-2023-45289

больше 1 года назад

When following an HTTP redirect to a domain which is not a subdomain match or exact match of the initial domain, an http.Client does not forward sensitive headers such as "Authorization" or "Cookie". For example, a redirect from foo.com to www.foo.com will forward the Authorization header, but a redirect to bar.com will not. A maliciously crafted HTTP redirect could cause sensitive headers to be unexpectedly forwarded.

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2023-45289

больше 1 года назад

When following an HTTP redirect to a domain which is not a subdomain match or exact match of the initial domain, an http.Client does not forward sensitive headers such as "Authorization" or "Cookie". For example, a redirect from foo.com to www.foo.com will forward the Authorization header, but a redirect to bar.com will not. A maliciously crafted HTTP redirect could cause sensitive headers to be unexpectedly forwarded.

CVSS3: 4.3
EPSS: Низкий
msrc логотип

CVE-2023-45289

около 2 месяцев назад

Incorrect forwarding of sensitive headers and cookies on HTTP redirect in net/http

CVSS3: 4.3
EPSS: Низкий
debian логотип

CVE-2023-45289

больше 1 года назад

When following an HTTP redirect to a domain which is not a subdomain m ...

CVSS3: 4.3
EPSS: Низкий
oracle-oval логотип

ELSA-2024-6194

около 1 года назад

ELSA-2024-6194: podman security update (IMPORTANT)

EPSS: Низкий
ubuntu логотип

CVE-2023-45288

больше 1 года назад

An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection.

CVSS3: 7.5
EPSS: Средний
redhat логотип

CVE-2023-45288

больше 1 года назад

An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection.

CVSS3: 7.5
EPSS: Средний
nvd логотип

CVE-2023-45288

больше 1 года назад

An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection.

CVSS3: 7.5
EPSS: Средний
msrc логотип

CVE-2023-45288

около 1 года назад

CVSS3: 7.5
EPSS: Средний
debian логотип

CVE-2023-45288

больше 1 года назад

An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of ...

CVSS3: 7.5
EPSS: Средний
github логотип

GHSA-32ch-6x54-q4h9

больше 1 года назад

When following an HTTP redirect to a domain which is not a subdomain match or exact match of the initial domain, an http.Client does not forward sensitive headers such as "Authorization" or "Cookie". For example, a redirect from foo.com to www.foo.com will forward the Authorization header, but a redirect to bar.com will not. A maliciously crafted HTTP redirect could cause sensitive headers to be unexpectedly forwarded.

CVSS3: 4.3
EPSS: Низкий
fstec логотип

BDU:2024-02034

больше 1 года назад

Уязвимость пакета golang операционной системы Debian GNU/Linux, позволяющая нарушителю получить доступ к конфиденциальной информации

CVSS3: 3.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-3q2c-pvp5-3cqp

Verifying a certificate chain which contains a certificate with an unknown public key algorithm will cause Certificate.Verify to panic. This affects all crypto/tls clients, and servers that set Config.ClientAuth to VerifyClientCertIfGiven or RequireAndVerifyClientCert. The default behavior is for TLS servers to not verify client certificates.

CVSS3: 5.9
0%
Низкий
больше 1 года назад
oracle-oval логотип
ELSA-2024-6195

ELSA-2024-6195: skopeo security update (MODERATE)

около 1 года назад
oracle-oval логотип
ELSA-2024-6189

ELSA-2024-6189: buildah security update (MODERATE)

около 1 года назад
oracle-oval логотип
ELSA-2024-6188

ELSA-2024-6188: runc security update (MODERATE)

около 1 года назад
oracle-oval логотип
ELSA-2024-6187

ELSA-2024-6187: gvisor-tap-vsock security update (MODERATE)

около 1 года назад
oracle-oval логотип
ELSA-2024-6186

ELSA-2024-6186: containernetworking-plugins security update (MODERATE)

около 1 года назад
fstec логотип
BDU:2024-02048

Уязвимость пакета golang операционной системы Debian GNU/Linux, позволяющая нарушителю вызвать отказ в обслуживании (DoS)

CVSS3: 7.5
0%
Низкий
больше 1 года назад
ubuntu логотип
CVE-2023-45289

When following an HTTP redirect to a domain which is not a subdomain match or exact match of the initial domain, an http.Client does not forward sensitive headers such as "Authorization" or "Cookie". For example, a redirect from foo.com to www.foo.com will forward the Authorization header, but a redirect to bar.com will not. A maliciously crafted HTTP redirect could cause sensitive headers to be unexpectedly forwarded.

CVSS3: 4.3
0%
Низкий
больше 1 года назад
redhat логотип
CVE-2023-45289

When following an HTTP redirect to a domain which is not a subdomain match or exact match of the initial domain, an http.Client does not forward sensitive headers such as "Authorization" or "Cookie". For example, a redirect from foo.com to www.foo.com will forward the Authorization header, but a redirect to bar.com will not. A maliciously crafted HTTP redirect could cause sensitive headers to be unexpectedly forwarded.

CVSS3: 5.3
0%
Низкий
больше 1 года назад
nvd логотип
CVE-2023-45289

When following an HTTP redirect to a domain which is not a subdomain match or exact match of the initial domain, an http.Client does not forward sensitive headers such as "Authorization" or "Cookie". For example, a redirect from foo.com to www.foo.com will forward the Authorization header, but a redirect to bar.com will not. A maliciously crafted HTTP redirect could cause sensitive headers to be unexpectedly forwarded.

CVSS3: 4.3
0%
Низкий
больше 1 года назад
msrc логотип
CVE-2023-45289

Incorrect forwarding of sensitive headers and cookies on HTTP redirect in net/http

CVSS3: 4.3
0%
Низкий
около 2 месяцев назад
debian логотип
CVE-2023-45289

When following an HTTP redirect to a domain which is not a subdomain m ...

CVSS3: 4.3
0%
Низкий
больше 1 года назад
oracle-oval логотип
ELSA-2024-6194

ELSA-2024-6194: podman security update (IMPORTANT)

около 1 года назад
ubuntu логотип
CVE-2023-45288

An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection.

CVSS3: 7.5
67%
Средний
больше 1 года назад
redhat логотип
CVE-2023-45288

An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection.

CVSS3: 7.5
67%
Средний
больше 1 года назад
nvd логотип
CVE-2023-45288

An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection.

CVSS3: 7.5
67%
Средний
больше 1 года назад
msrc логотип
CVSS3: 7.5
67%
Средний
около 1 года назад
debian логотип
CVE-2023-45288

An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of ...

CVSS3: 7.5
67%
Средний
больше 1 года назад
github логотип
GHSA-32ch-6x54-q4h9

When following an HTTP redirect to a domain which is not a subdomain match or exact match of the initial domain, an http.Client does not forward sensitive headers such as "Authorization" or "Cookie". For example, a redirect from foo.com to www.foo.com will forward the Authorization header, but a redirect to bar.com will not. A maliciously crafted HTTP redirect could cause sensitive headers to be unexpectedly forwarded.

CVSS3: 4.3
0%
Низкий
больше 1 года назад
fstec логотип
BDU:2024-02034

Уязвимость пакета golang операционной системы Debian GNU/Linux, позволяющая нарушителю получить доступ к конфиденциальной информации

CVSS3: 3.1
0%
Низкий
больше 1 года назад

Уязвимостей на страницу