Количество 30
Количество 30
BDU:2019-02994
Уязвимость реализации сетевого протокола HTTP/2 операционных систем Windows, сервера nginx, программной платформы Node.js, позволяющая нарушителю вызвать отказ в обслуживании
CVE-2019-9511
Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.
CVE-2019-9511
Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.
CVE-2019-9511
Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.
CVE-2019-9511
HTTP/2 Server Denial of Service Vulnerability
CVE-2019-9511
Some HTTP/2 implementations are vulnerable to window size manipulation ...
GHSA-89fc-749h-w2fj
Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.
BDU:2019-03782
Уязвимость реализации сетевого протокола HTTP/2 веб-сервера Apache HTTP Server, связанная с неконтролируемым расходом ресурса, позволяющая нарушителю вызвать отказ в обслуживании
openSUSE-SU-2019:2234-1
Security update for nghttp2
openSUSE-SU-2019:2232-1
Security update for nghttp2
SUSE-SU-2019:2473-1
Security update for nghttp2
ELSA-2019-2692
ELSA-2019-2692: nghttp2 security update (IMPORTANT)
openSUSE-SU-2019:2264-1
Security update for nginx
SUSE-SU-2019:2559-1
Security update for nginx
RLSA-2019:2799
Important: nginx:1.14 security update
ELSA-2020-5862
ELSA-2020-5862: olcne nginx security update (IMPORTANT)
ELSA-2020-5859
ELSA-2020-5859: olcne nginx security update (IMPORTANT)
ELSA-2019-2799
ELSA-2019-2799: nginx:1.14 security update (IMPORTANT)
SUSE-SU-2021:0932-1
Security update for nghttp2
openSUSE-SU-2019:2120-1
Security update for nginx
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
BDU:2019-02994 Уязвимость реализации сетевого протокола HTTP/2 операционных систем Windows, сервера nginx, программной платформы Node.js, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 7.5 | 18% Средний | около 6 лет назад | |
CVE-2019-9511 Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both. | CVSS3: 7.5 | 18% Средний | около 6 лет назад | |
CVE-2019-9511 Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both. | CVSS3: 6.5 | 18% Средний | около 6 лет назад | |
CVE-2019-9511 Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both. | CVSS3: 7.5 | 18% Средний | около 6 лет назад | |
CVE-2019-9511 HTTP/2 Server Denial of Service Vulnerability | CVSS3: 7.5 | 18% Средний | около 6 лет назад | |
CVE-2019-9511 Some HTTP/2 implementations are vulnerable to window size manipulation ... | CVSS3: 7.5 | 18% Средний | около 6 лет назад | |
GHSA-89fc-749h-w2fj Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both. | CVSS3: 7.5 | 18% Средний | больше 3 лет назад | |
BDU:2019-03782 Уязвимость реализации сетевого протокола HTTP/2 веб-сервера Apache HTTP Server, связанная с неконтролируемым расходом ресурса, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 7.5 | 18% Средний | больше 6 лет назад | |
openSUSE-SU-2019:2234-1 Security update for nghttp2 | около 6 лет назад | |||
openSUSE-SU-2019:2232-1 Security update for nghttp2 | около 6 лет назад | |||
SUSE-SU-2019:2473-1 Security update for nghttp2 | около 6 лет назад | |||
ELSA-2019-2692 ELSA-2019-2692: nghttp2 security update (IMPORTANT) | около 6 лет назад | |||
openSUSE-SU-2019:2264-1 Security update for nginx | около 6 лет назад | |||
SUSE-SU-2019:2559-1 Security update for nginx | около 6 лет назад | |||
RLSA-2019:2799 Important: nginx:1.14 security update | около 6 лет назад | |||
ELSA-2020-5862 ELSA-2020-5862: olcne nginx security update (IMPORTANT) | около 5 лет назад | |||
ELSA-2020-5859 ELSA-2020-5859: olcne nginx security update (IMPORTANT) | около 5 лет назад | |||
ELSA-2019-2799 ELSA-2019-2799: nginx:1.14 security update (IMPORTANT) | около 6 лет назад | |||
SUSE-SU-2021:0932-1 Security update for nghttp2 | больше 4 лет назад | |||
openSUSE-SU-2019:2120-1 Security update for nginx | около 6 лет назад |
Уязвимостей на страницу