Логотип exploitDog
bind:"CVE-2023-39326" OR bind:"CVE-2023-45287" OR bind:"CVE-2024-21626"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2023-39326" OR bind:"CVE-2023-45287" OR bind:"CVE-2024-21626"

Количество 58

Количество 58

rocky логотип

RLSA-2024:0748

7 месяцев назад

Important: container-tools:4.0 security update

EPSS: Низкий
oracle-oval логотип

ELSA-2024-2272

больше 1 года назад

ELSA-2024-2272: containernetworking-plugins security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-2245

больше 1 года назад

ELSA-2024-2245: buildah security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-2193

больше 1 года назад

ELSA-2024-2193: podman security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-0748

почти 2 года назад

ELSA-2024-0748: container-tools:4.0 security update (IMPORTANT)

EPSS: Низкий
ubuntu логотип

CVE-2023-39326

около 2 лет назад

A malicious HTTP sender can use chunk extensions to cause a receiver reading from a request or response body to read many more bytes from the network than are in the body. A malicious HTTP client can further exploit this to cause a server to automatically read a large amount of data (up to about 1GiB) when a handler fails to read the entire body of a request. Chunk extensions are a little-used HTTP feature which permit including additional metadata in a request or response body sent using the chunked encoding. The net/http chunked encoding reader discards this metadata. A sender can exploit this by inserting a large metadata segment with each byte transferred. The chunk reader now produces an error if the ratio of real body to encoded bytes grows too small.

CVSS3: 5.3
EPSS: Низкий
redhat логотип

CVE-2023-39326

около 2 лет назад

A malicious HTTP sender can use chunk extensions to cause a receiver reading from a request or response body to read many more bytes from the network than are in the body. A malicious HTTP client can further exploit this to cause a server to automatically read a large amount of data (up to about 1GiB) when a handler fails to read the entire body of a request. Chunk extensions are a little-used HTTP feature which permit including additional metadata in a request or response body sent using the chunked encoding. The net/http chunked encoding reader discards this metadata. A sender can exploit this by inserting a large metadata segment with each byte transferred. The chunk reader now produces an error if the ratio of real body to encoded bytes grows too small.

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2023-39326

около 2 лет назад

A malicious HTTP sender can use chunk extensions to cause a receiver reading from a request or response body to read many more bytes from the network than are in the body. A malicious HTTP client can further exploit this to cause a server to automatically read a large amount of data (up to about 1GiB) when a handler fails to read the entire body of a request. Chunk extensions are a little-used HTTP feature which permit including additional metadata in a request or response body sent using the chunked encoding. The net/http chunked encoding reader discards this metadata. A sender can exploit this by inserting a large metadata segment with each byte transferred. The chunk reader now produces an error if the ratio of real body to encoded bytes grows too small.

CVSS3: 5.3
EPSS: Низкий
msrc логотип

CVE-2023-39326

3 месяца назад

Denial of service via chunk extensions in net/http

CVSS3: 5.3
EPSS: Низкий
debian логотип

CVE-2023-39326

около 2 лет назад

A malicious HTTP sender can use chunk extensions to cause a receiver r ...

CVSS3: 5.3
EPSS: Низкий
rocky логотип

RLSA-2024:2988

7 месяцев назад

Moderate: container-tools:rhel8 security update

EPSS: Низкий
oracle-oval логотип

ELSA-2024-2988

больше 1 года назад

ELSA-2024-2988: container-tools:ol8 security update (MODERATE)

EPSS: Низкий
github логотип

GHSA-9f76-wg39-x86h

около 2 лет назад

A malicious HTTP sender can use chunk extensions to cause a receiver reading from a request or response body to read many more bytes from the network than are in the body. A malicious HTTP client can further exploit this to cause a server to automatically read a large amount of data (up to about 1GiB) when a handler fails to read the entire body of a request. Chunk extensions are a little-used HTTP feature which permit including additional metadata in a request or response body sent using the chunked encoding. The net/http chunked encoding reader discards this metadata. A sender can exploit this by inserting a large metadata segment with each byte transferred. The chunk reader now produces an error if the ratio of real body to encoded bytes grows too small.

CVSS3: 5.3
EPSS: Низкий
oracle-oval логотип

ELSA-2024-12264

больше 1 года назад

ELSA-2024-12264: olcne security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-12263

больше 1 года назад

ELSA-2024-12263: olcne security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-12262

больше 1 года назад

ELSA-2024-12262: olcne security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-12261

больше 1 года назад

ELSA-2024-12261: olcne security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-12226

больше 1 года назад

ELSA-2024-12226: conmon security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-12225

больше 1 года назад

ELSA-2024-12225: conmon security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-12191

почти 2 года назад

ELSA-2024-12191: container-tools:4.0 security update (MODERATE)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
rocky логотип
RLSA-2024:0748

Important: container-tools:4.0 security update

7 месяцев назад
oracle-oval логотип
ELSA-2024-2272

ELSA-2024-2272: containernetworking-plugins security update (MODERATE)

больше 1 года назад
oracle-oval логотип
ELSA-2024-2245

ELSA-2024-2245: buildah security update (MODERATE)

больше 1 года назад
oracle-oval логотип
ELSA-2024-2193

ELSA-2024-2193: podman security update (MODERATE)

больше 1 года назад
oracle-oval логотип
ELSA-2024-0748

ELSA-2024-0748: container-tools:4.0 security update (IMPORTANT)

почти 2 года назад
ubuntu логотип
CVE-2023-39326

A malicious HTTP sender can use chunk extensions to cause a receiver reading from a request or response body to read many more bytes from the network than are in the body. A malicious HTTP client can further exploit this to cause a server to automatically read a large amount of data (up to about 1GiB) when a handler fails to read the entire body of a request. Chunk extensions are a little-used HTTP feature which permit including additional metadata in a request or response body sent using the chunked encoding. The net/http chunked encoding reader discards this metadata. A sender can exploit this by inserting a large metadata segment with each byte transferred. The chunk reader now produces an error if the ratio of real body to encoded bytes grows too small.

CVSS3: 5.3
0%
Низкий
около 2 лет назад
redhat логотип
CVE-2023-39326

A malicious HTTP sender can use chunk extensions to cause a receiver reading from a request or response body to read many more bytes from the network than are in the body. A malicious HTTP client can further exploit this to cause a server to automatically read a large amount of data (up to about 1GiB) when a handler fails to read the entire body of a request. Chunk extensions are a little-used HTTP feature which permit including additional metadata in a request or response body sent using the chunked encoding. The net/http chunked encoding reader discards this metadata. A sender can exploit this by inserting a large metadata segment with each byte transferred. The chunk reader now produces an error if the ratio of real body to encoded bytes grows too small.

CVSS3: 5.3
0%
Низкий
около 2 лет назад
nvd логотип
CVE-2023-39326

A malicious HTTP sender can use chunk extensions to cause a receiver reading from a request or response body to read many more bytes from the network than are in the body. A malicious HTTP client can further exploit this to cause a server to automatically read a large amount of data (up to about 1GiB) when a handler fails to read the entire body of a request. Chunk extensions are a little-used HTTP feature which permit including additional metadata in a request or response body sent using the chunked encoding. The net/http chunked encoding reader discards this metadata. A sender can exploit this by inserting a large metadata segment with each byte transferred. The chunk reader now produces an error if the ratio of real body to encoded bytes grows too small.

CVSS3: 5.3
0%
Низкий
около 2 лет назад
msrc логотип
CVE-2023-39326

Denial of service via chunk extensions in net/http

CVSS3: 5.3
0%
Низкий
3 месяца назад
debian логотип
CVE-2023-39326

A malicious HTTP sender can use chunk extensions to cause a receiver r ...

CVSS3: 5.3
0%
Низкий
около 2 лет назад
rocky логотип
RLSA-2024:2988

Moderate: container-tools:rhel8 security update

7 месяцев назад
oracle-oval логотип
ELSA-2024-2988

ELSA-2024-2988: container-tools:ol8 security update (MODERATE)

больше 1 года назад
github логотип
GHSA-9f76-wg39-x86h

A malicious HTTP sender can use chunk extensions to cause a receiver reading from a request or response body to read many more bytes from the network than are in the body. A malicious HTTP client can further exploit this to cause a server to automatically read a large amount of data (up to about 1GiB) when a handler fails to read the entire body of a request. Chunk extensions are a little-used HTTP feature which permit including additional metadata in a request or response body sent using the chunked encoding. The net/http chunked encoding reader discards this metadata. A sender can exploit this by inserting a large metadata segment with each byte transferred. The chunk reader now produces an error if the ratio of real body to encoded bytes grows too small.

CVSS3: 5.3
0%
Низкий
около 2 лет назад
oracle-oval логотип
ELSA-2024-12264

ELSA-2024-12264: olcne security update (IMPORTANT)

больше 1 года назад
oracle-oval логотип
ELSA-2024-12263

ELSA-2024-12263: olcne security update (IMPORTANT)

больше 1 года назад
oracle-oval логотип
ELSA-2024-12262

ELSA-2024-12262: olcne security update (IMPORTANT)

больше 1 года назад
oracle-oval логотип
ELSA-2024-12261

ELSA-2024-12261: olcne security update (IMPORTANT)

больше 1 года назад
oracle-oval логотип
ELSA-2024-12226

ELSA-2024-12226: conmon security update (IMPORTANT)

больше 1 года назад
oracle-oval логотип
ELSA-2024-12225

ELSA-2024-12225: conmon security update (IMPORTANT)

больше 1 года назад
oracle-oval логотип
ELSA-2024-12191

ELSA-2024-12191: container-tools:4.0 security update (MODERATE)

почти 2 года назад

Уязвимостей на страницу