Количество 16
Количество 16
CVE-2019-9518
Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU.
CVE-2019-9518
Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU.
CVE-2019-9518
Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU.
CVE-2019-9518
HTTP/2 Server Denial of Service Vulnerability
CVE-2019-9518
Some HTTP/2 implementations are vulnerable to a flood of empty frames, ...
GHSA-93p3-5r25-4p75
Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU.
BDU:2019-02957
Уязвимость реализации сетевого протокола HTTP/2 операционных систем Windows, сервера nginx, сетевых программных средств netty, Envoy, SwiftNIO, программной платформы Node.js, позволяющая нарушителю вызвать отказ в обслуживании
openSUSE-SU-2019:2115-1
Security update for nodejs8
openSUSE-SU-2019:2114-1
Security update for nodejs10
SUSE-SU-2019:2260-1
Security update for nodejs8
SUSE-SU-2019:2259-1
Security update for nodejs10
SUSE-SU-2019:2254-1
Security update for nodejs10
ELSA-2019-2925
ELSA-2019-2925: nodejs:10 security update (IMPORTANT)
SUSE-SU-2020:0059-1
Security update for nodejs12
RLSA-2019:2925
Important: nodejs:10 security update
SUSE-SU-2019:14246-1
Security update for Mozilla Firefox
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2019-9518 Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU. | CVSS3: 7.5 | 4% Низкий | около 6 лет назад | |
CVE-2019-9518 Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU. | CVSS3: 7.5 | 4% Низкий | около 6 лет назад | |
CVE-2019-9518 Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU. | CVSS3: 7.5 | 4% Низкий | около 6 лет назад | |
CVE-2019-9518 HTTP/2 Server Denial of Service Vulnerability | CVSS3: 7.5 | 4% Низкий | около 6 лет назад | |
CVE-2019-9518 Some HTTP/2 implementations are vulnerable to a flood of empty frames, ... | CVSS3: 7.5 | 4% Низкий | около 6 лет назад | |
GHSA-93p3-5r25-4p75 Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU. | CVSS3: 7.5 | 4% Низкий | больше 3 лет назад | |
BDU:2019-02957 Уязвимость реализации сетевого протокола HTTP/2 операционных систем Windows, сервера nginx, сетевых программных средств netty, Envoy, SwiftNIO, программной платформы Node.js, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 7.5 | 4% Низкий | около 6 лет назад | |
openSUSE-SU-2019:2115-1 Security update for nodejs8 | около 6 лет назад | |||
openSUSE-SU-2019:2114-1 Security update for nodejs10 | около 6 лет назад | |||
SUSE-SU-2019:2260-1 Security update for nodejs8 | около 6 лет назад | |||
SUSE-SU-2019:2259-1 Security update for nodejs10 | около 6 лет назад | |||
SUSE-SU-2019:2254-1 Security update for nodejs10 | около 6 лет назад | |||
ELSA-2019-2925 ELSA-2019-2925: nodejs:10 security update (IMPORTANT) | около 6 лет назад | |||
SUSE-SU-2020:0059-1 Security update for nodejs12 | почти 6 лет назад | |||
RLSA-2019:2925 Important: nodejs:10 security update | около 6 лет назад | |||
SUSE-SU-2019:14246-1 Security update for Mozilla Firefox | почти 6 лет назад |
Уязвимостей на страницу