Количество 93
Количество 93
RLSA-2024:2724
Important: git-lfs security update
ELSA-2024-8038
ELSA-2024-8038: container-tools:ol8 security update (IMPORTANT)
ELSA-2024-3346
ELSA-2024-3346: git-lfs security update (IMPORTANT)
ELSA-2024-2724
ELSA-2024-2724: git-lfs security update (IMPORTANT)
ELSA-2024-9115
ELSA-2024-9115: grafana security update (MODERATE)
RLSA-2025:7256
Moderate: git-lfs security update
ELSA-2025-7256
ELSA-2025-7256: git-lfs security update (MODERATE)
GHSA-j6m3-gc37-6r6q
If errors returned from MarshalJSON methods contain user controlled data, they may be used to break the contextual auto-escaping behavior of the html/template package, allowing for subsequent actions to inject unexpected content into templates.
BDU:2024-03248
Уязвимость пакета html/template языка программирования Go, связанная с отсутствием проверки входных значений, позволяющая нарушителю вводить произвольный контент в шаблоны
RLSA-2024:5258
Important: container-tools:rhel8 security update
ELSA-2024-5258
ELSA-2024-5258: container-tools:ol8 security update (IMPORTANT)
CVE-2024-24788
A malformed DNS message in response to a query can cause the Lookup functions to get stuck in an infinite loop.
CVE-2024-24788
A malformed DNS message in response to a query can cause the Lookup functions to get stuck in an infinite loop.
CVE-2024-24788
A malformed DNS message in response to a query can cause the Lookup functions to get stuck in an infinite loop.
CVE-2024-24788
Malformed DNS message can cause infinite loop in net
CVE-2024-24788
A malformed DNS message in response to a query can cause the Lookup fu ...
CVE-2024-24791
The net/http HTTP/1.1 client mishandled the case where a server responds to a request with an "Expect: 100-continue" header with a non-informational (200 or higher) status. This mishandling could leave a client connection in an invalid state, where the next request sent on the connection will fail. An attacker sending a request to a net/http/httputil.ReverseProxy proxy can exploit this mishandling to cause a denial of service by sending "Expect: 100-continue" requests which elicit a non-informational response from the backend. Each such request leaves the proxy with an invalid connection, and causes one subsequent request using that connection to fail.
CVE-2024-24791
The net/http HTTP/1.1 client mishandled the case where a server responds to a request with an "Expect: 100-continue" header with a non-informational (200 or higher) status. This mishandling could leave a client connection in an invalid state, where the next request sent on the connection will fail. An attacker sending a request to a net/http/httputil.ReverseProxy proxy can exploit this mishandling to cause a denial of service by sending "Expect: 100-continue" requests which elicit a non-informational response from the backend. Each such request leaves the proxy with an invalid connection, and causes one subsequent request using that connection to fail.
CVE-2024-24791
The net/http HTTP/1.1 client mishandled the case where a server responds to a request with an "Expect: 100-continue" header with a non-informational (200 or higher) status. This mishandling could leave a client connection in an invalid state, where the next request sent on the connection will fail. An attacker sending a request to a net/http/httputil.ReverseProxy proxy can exploit this mishandling to cause a denial of service by sending "Expect: 100-continue" requests which elicit a non-informational response from the backend. Each such request leaves the proxy with an invalid connection, and causes one subsequent request using that connection to fail.
CVE-2024-24791
Denial of service due to improper 100-continue handling in net/http
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
RLSA-2024:2724 Important: git-lfs security update | больше 1 года назад | |||
ELSA-2024-8038 ELSA-2024-8038: container-tools:ol8 security update (IMPORTANT) | больше 1 года назад | |||
ELSA-2024-3346 ELSA-2024-3346: git-lfs security update (IMPORTANT) | больше 1 года назад | |||
ELSA-2024-2724 ELSA-2024-2724: git-lfs security update (IMPORTANT) | больше 1 года назад | |||
ELSA-2024-9115 ELSA-2024-9115: grafana security update (MODERATE) | около 1 года назад | |||
RLSA-2025:7256 Moderate: git-lfs security update | 4 месяца назад | |||
ELSA-2025-7256 ELSA-2025-7256: git-lfs security update (MODERATE) | 9 месяцев назад | |||
GHSA-j6m3-gc37-6r6q If errors returned from MarshalJSON methods contain user controlled data, they may be used to break the contextual auto-escaping behavior of the html/template package, allowing for subsequent actions to inject unexpected content into templates. | CVSS3: 5.4 | 0% Низкий | почти 2 года назад | |
BDU:2024-03248 Уязвимость пакета html/template языка программирования Go, связанная с отсутствием проверки входных значений, позволяющая нарушителю вводить произвольный контент в шаблоны | CVSS3: 7.5 | 0% Низкий | почти 2 года назад | |
RLSA-2024:5258 Important: container-tools:rhel8 security update | больше 1 года назад | |||
ELSA-2024-5258 ELSA-2024-5258: container-tools:ol8 security update (IMPORTANT) | больше 1 года назад | |||
CVE-2024-24788 A malformed DNS message in response to a query can cause the Lookup functions to get stuck in an infinite loop. | CVSS3: 5.9 | 0% Низкий | больше 1 года назад | |
CVE-2024-24788 A malformed DNS message in response to a query can cause the Lookup functions to get stuck in an infinite loop. | CVSS3: 7.5 | 0% Низкий | больше 1 года назад | |
CVE-2024-24788 A malformed DNS message in response to a query can cause the Lookup functions to get stuck in an infinite loop. | CVSS3: 5.9 | 0% Низкий | больше 1 года назад | |
CVE-2024-24788 Malformed DNS message can cause infinite loop in net | CVSS3: 5.9 | 0% Низкий | 5 месяцев назад | |
CVE-2024-24788 A malformed DNS message in response to a query can cause the Lookup fu ... | CVSS3: 5.9 | 0% Низкий | больше 1 года назад | |
CVE-2024-24791 The net/http HTTP/1.1 client mishandled the case where a server responds to a request with an "Expect: 100-continue" header with a non-informational (200 or higher) status. This mishandling could leave a client connection in an invalid state, where the next request sent on the connection will fail. An attacker sending a request to a net/http/httputil.ReverseProxy proxy can exploit this mishandling to cause a denial of service by sending "Expect: 100-continue" requests which elicit a non-informational response from the backend. Each such request leaves the proxy with an invalid connection, and causes one subsequent request using that connection to fail. | CVSS3: 7.5 | 1% Низкий | больше 1 года назад | |
CVE-2024-24791 The net/http HTTP/1.1 client mishandled the case where a server responds to a request with an "Expect: 100-continue" header with a non-informational (200 or higher) status. This mishandling could leave a client connection in an invalid state, where the next request sent on the connection will fail. An attacker sending a request to a net/http/httputil.ReverseProxy proxy can exploit this mishandling to cause a denial of service by sending "Expect: 100-continue" requests which elicit a non-informational response from the backend. Each such request leaves the proxy with an invalid connection, and causes one subsequent request using that connection to fail. | CVSS3: 5.9 | 1% Низкий | больше 1 года назад | |
CVE-2024-24791 The net/http HTTP/1.1 client mishandled the case where a server responds to a request with an "Expect: 100-continue" header with a non-informational (200 or higher) status. This mishandling could leave a client connection in an invalid state, where the next request sent on the connection will fail. An attacker sending a request to a net/http/httputil.ReverseProxy proxy can exploit this mishandling to cause a denial of service by sending "Expect: 100-continue" requests which elicit a non-informational response from the backend. Each such request leaves the proxy with an invalid connection, and causes one subsequent request using that connection to fail. | CVSS3: 7.5 | 1% Низкий | больше 1 года назад | |
CVE-2024-24791 Denial of service due to improper 100-continue handling in net/http | CVSS3: 7.5 | 1% Низкий | 5 месяцев назад |
Уязвимостей на страницу