go-bitfield package in go language allows attackers to trigger panics by feeding untrusted user input into the size parameter
Reporter | Title | Published | Views | Family All 9 |
---|---|---|---|---|
![]() | CVE-2023-23626 Denial of service when feeding malformed size arguments in go-bitfield | 9 Feb 202320:54 | – | cvelist |
![]() | Denial of service via malformed size parameters in github.com/ipfs/go-bitfield | 14 Feb 202319:41 | – | osv |
![]() | CVE-2023-23626 | 9 Feb 202321:15 | – | osv |
![]() | IPFS go-bitfield vulnerable to DoS via malformed size arguments | 10 Feb 202319:52 | – | osv |
![]() | CVE-2023-23626 Denial of service when feeding malformed size arguments in go-bitfield | 9 Feb 202320:54 | – | vulnrichment |
![]() | Denial Of Service (DoS) | 15 Feb 202308:50 | – | veracode |
![]() | Code injection | 9 Feb 202321:15 | – | prion |
![]() | CVE-2023-23626 | 9 Feb 202321:15 | – | nvd |
![]() | IPFS go-bitfield vulnerable to DoS via malformed size arguments | 10 Feb 202319:52 | – | github |
[
{
"vendor": "ipfs",
"product": "go-bitfield",
"versions": [
{
"version": "< 1.1.0",
"status": "affected"
}
]
}
]
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo