Количество 86
Количество 86
ELSA-2024-2724
ELSA-2024-2724: git-lfs security update (IMPORTANT)
ELSA-2024-9115
ELSA-2024-9115: grafana security update (MODERATE)
ELSA-2025-7256
ELSA-2025-7256: git-lfs security update (MODERATE)
GHSA-j6m3-gc37-6r6q
If errors returned from MarshalJSON methods contain user controlled data, they may be used to break the contextual auto-escaping behavior of the html/template package, allowing for subsequent actions to inject unexpected content into templates.

BDU:2024-03248
Уязвимость пакета html/template языка программирования Go, связанная с отсутствием проверки входных значений, позволяющая нарушителю вводить произвольный контент в шаблоны
ELSA-2024-5258
ELSA-2024-5258: container-tools:ol8 security update (IMPORTANT)

CVE-2024-24788
A malformed DNS message in response to a query can cause the Lookup functions to get stuck in an infinite loop.

CVE-2024-24788
A malformed DNS message in response to a query can cause the Lookup functions to get stuck in an infinite loop.

CVE-2024-24788
A malformed DNS message in response to a query can cause the Lookup functions to get stuck in an infinite loop.

CVE-2024-24788
Malformed DNS message can cause infinite loop in net
CVE-2024-24788
A malformed DNS message in response to a query can cause the Lookup fu ...

CVE-2024-24791
The net/http HTTP/1.1 client mishandled the case where a server responds to a request with an "Expect: 100-continue" header with a non-informational (200 or higher) status. This mishandling could leave a client connection in an invalid state, where the next request sent on the connection will fail. An attacker sending a request to a net/http/httputil.ReverseProxy proxy can exploit this mishandling to cause a denial of service by sending "Expect: 100-continue" requests which elicit a non-informational response from the backend. Each such request leaves the proxy with an invalid connection, and causes one subsequent request using that connection to fail.

CVE-2024-24791
The net/http HTTP/1.1 client mishandled the case where a server responds to a request with an "Expect: 100-continue" header with a non-informational (200 or higher) status. This mishandling could leave a client connection in an invalid state, where the next request sent on the connection will fail. An attacker sending a request to a net/http/httputil.ReverseProxy proxy can exploit this mishandling to cause a denial of service by sending "Expect: 100-continue" requests which elicit a non-informational response from the backend. Each such request leaves the proxy with an invalid connection, and causes one subsequent request using that connection to fail.

CVE-2024-24791
The net/http HTTP/1.1 client mishandled the case where a server responds to a request with an "Expect: 100-continue" header with a non-informational (200 or higher) status. This mishandling could leave a client connection in an invalid state, where the next request sent on the connection will fail. An attacker sending a request to a net/http/httputil.ReverseProxy proxy can exploit this mishandling to cause a denial of service by sending "Expect: 100-continue" requests which elicit a non-informational response from the backend. Each such request leaves the proxy with an invalid connection, and causes one subsequent request using that connection to fail.

CVE-2024-24791
Denial of service due to improper 100-continue handling in net/http
CVE-2024-24791
The net/http HTTP/1.1 client mishandled the case where a server respon ...

ROS-20240918-05
Уязвимость consul

RLSA-2024:9277
Moderate: oci-seccomp-bpf-hook security update

RLSA-2024:9200
Moderate: runc security update
GHSA-2jwv-jmq4-4j3r
A malformed DNS message in response to a query can cause the Lookup functions to get stuck in an infinite loop.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
ELSA-2024-2724 ELSA-2024-2724: git-lfs security update (IMPORTANT) | больше 1 года назад | |||
ELSA-2024-9115 ELSA-2024-9115: grafana security update (MODERATE) | 11 месяцев назад | |||
ELSA-2025-7256 ELSA-2025-7256: git-lfs security update (MODERATE) | 5 месяцев назад | |||
GHSA-j6m3-gc37-6r6q If errors returned from MarshalJSON methods contain user controlled data, they may be used to break the contextual auto-escaping behavior of the html/template package, allowing for subsequent actions to inject unexpected content into templates. | CVSS3: 5.4 | 0% Низкий | больше 1 года назад | |
![]() | BDU:2024-03248 Уязвимость пакета html/template языка программирования Go, связанная с отсутствием проверки входных значений, позволяющая нарушителю вводить произвольный контент в шаблоны | CVSS3: 7.5 | 0% Низкий | больше 1 года назад |
ELSA-2024-5258 ELSA-2024-5258: container-tools:ol8 security update (IMPORTANT) | около 1 года назад | |||
![]() | CVE-2024-24788 A malformed DNS message in response to a query can cause the Lookup functions to get stuck in an infinite loop. | CVSS3: 5.9 | 0% Низкий | больше 1 года назад |
![]() | CVE-2024-24788 A malformed DNS message in response to a query can cause the Lookup functions to get stuck in an infinite loop. | CVSS3: 7.5 | 0% Низкий | больше 1 года назад |
![]() | CVE-2024-24788 A malformed DNS message in response to a query can cause the Lookup functions to get stuck in an infinite loop. | CVSS3: 5.9 | 0% Низкий | больше 1 года назад |
![]() | CVE-2024-24788 Malformed DNS message can cause infinite loop in net | CVSS3: 5.9 | 0% Низкий | около 2 месяцев назад |
CVE-2024-24788 A malformed DNS message in response to a query can cause the Lookup fu ... | CVSS3: 5.9 | 0% Низкий | больше 1 года назад | |
![]() | CVE-2024-24791 The net/http HTTP/1.1 client mishandled the case where a server responds to a request with an "Expect: 100-continue" header with a non-informational (200 or higher) status. This mishandling could leave a client connection in an invalid state, where the next request sent on the connection will fail. An attacker sending a request to a net/http/httputil.ReverseProxy proxy can exploit this mishandling to cause a denial of service by sending "Expect: 100-continue" requests which elicit a non-informational response from the backend. Each such request leaves the proxy with an invalid connection, and causes one subsequent request using that connection to fail. | CVSS3: 7.5 | 1% Низкий | больше 1 года назад |
![]() | CVE-2024-24791 The net/http HTTP/1.1 client mishandled the case where a server responds to a request with an "Expect: 100-continue" header with a non-informational (200 or higher) status. This mishandling could leave a client connection in an invalid state, where the next request sent on the connection will fail. An attacker sending a request to a net/http/httputil.ReverseProxy proxy can exploit this mishandling to cause a denial of service by sending "Expect: 100-continue" requests which elicit a non-informational response from the backend. Each such request leaves the proxy with an invalid connection, and causes one subsequent request using that connection to fail. | CVSS3: 5.9 | 1% Низкий | больше 1 года назад |
![]() | CVE-2024-24791 The net/http HTTP/1.1 client mishandled the case where a server responds to a request with an "Expect: 100-continue" header with a non-informational (200 or higher) status. This mishandling could leave a client connection in an invalid state, where the next request sent on the connection will fail. An attacker sending a request to a net/http/httputil.ReverseProxy proxy can exploit this mishandling to cause a denial of service by sending "Expect: 100-continue" requests which elicit a non-informational response from the backend. Each such request leaves the proxy with an invalid connection, and causes one subsequent request using that connection to fail. | CVSS3: 7.5 | 1% Низкий | больше 1 года назад |
![]() | CVE-2024-24791 Denial of service due to improper 100-continue handling in net/http | CVSS3: 7.5 | 1% Низкий | около 2 месяцев назад |
CVE-2024-24791 The net/http HTTP/1.1 client mishandled the case where a server respon ... | CVSS3: 7.5 | 1% Низкий | больше 1 года назад | |
![]() | ROS-20240918-05 Уязвимость consul | CVSS3: 6.5 | 0% Низкий | около 1 года назад |
![]() | RLSA-2024:9277 Moderate: oci-seccomp-bpf-hook security update | 0% Низкий | 7 месяцев назад | |
![]() | RLSA-2024:9200 Moderate: runc security update | 0% Низкий | 7 месяцев назад | |
GHSA-2jwv-jmq4-4j3r A malformed DNS message in response to a query can cause the Lookup functions to get stuck in an infinite loop. | 0% Низкий | больше 1 года назад |
Уязвимостей на страницу