![]() ![]() This vulnerability could be exploited to causeĪ denial of service. ![]() ![]() There is a vulnerability in GO managing HTTP/2 requests, which CVE-2023-43641 traefik - Resource exhaustion by malicious HTTP/2 client traefik 2.10.5 There is a vulnerability to out-of-bounds array access. Race condition that can be used by another process toīypass desired Unix socket permissions on startup.ĬVE-2023-45145 libcue - out-of-bounds array access libcue 2.3.0 The wrong order of listen(2) and chmod(2) calls creates a HTTP/2 denial of service vulnerability in bundled Jetty CVE-2023-36478 CVE-2023-44487 Roundcube - XSS vulnerability in SVG roundcube 1.6.4,1Ĭross-site scripting (XSS) vulnerability in handling of SVG in HTML messages redis - Possible bypassing Unix socket permissions redis 7.2.2 redis-devel 7.1018 redis70 7.0.14 redis62 6.2.14 ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |