Логотип exploitDog
bind:"CVE-2019-9511" OR bind:"CVE-2019-9513" OR bind:"CVE-2019-9516"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2019-9511" OR bind:"CVE-2019-9513" OR bind:"CVE-2019-9516"

Количество 44

Количество 44

redhat логотип

CVE-2019-9511

почти 6 лет назад

Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

CVSS3: 6.5
EPSS: Средний
nvd логотип

CVE-2019-9511

почти 6 лет назад

Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

CVSS3: 7.5
EPSS: Средний
msrc логотип

CVE-2019-9511

почти 6 лет назад

HTTP/2 Server Denial of Service Vulnerability

CVSS3: 7.5
EPSS: Средний
debian логотип

CVE-2019-9511

почти 6 лет назад

Some HTTP/2 implementations are vulnerable to window size manipulation ...

CVSS3: 7.5
EPSS: Средний
github логотип

GHSA-89fc-749h-w2fj

около 3 лет назад

Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

CVSS3: 7.5
EPSS: Средний
fstec логотип

BDU:2019-03782

около 6 лет назад

Уязвимость реализации сетевого протокола HTTP/2 веб-сервера Apache HTTP Server, связанная с неконтролируемым расходом ресурса, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
EPSS: Средний
fstec логотип

BDU:2019-02994

почти 6 лет назад

Уязвимость реализации сетевого протокола HTTP/2 операционных систем Windows, сервера nginx, программной платформы Node.js, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
EPSS: Средний
suse-cvrf логотип

SUSE-SU-2019:14246-1

больше 5 лет назад

Security update for Mozilla Firefox

EPSS: Низкий
ubuntu логотип

CVE-2019-9516

почти 6 лет назад

Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory.

CVSS3: 6.5
EPSS: Низкий
redhat логотип

CVE-2019-9516

почти 6 лет назад

Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory.

CVSS3: 6.5
EPSS: Низкий
nvd логотип

CVE-2019-9516

почти 6 лет назад

Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory.

CVSS3: 6.5
EPSS: Низкий
msrc логотип

CVE-2019-9516

больше 4 лет назад

CVSS3: 6.5
EPSS: Низкий
debian логотип

CVE-2019-9516

почти 6 лет назад

Some HTTP/2 implementations are vulnerable to a header leak, potential ...

CVSS3: 6.5
EPSS: Низкий
ubuntu логотип

CVE-2019-9513

почти 6 лет назад

Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2019-9513

почти 6 лет назад

Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2019-9513

почти 6 лет назад

Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.

CVSS3: 7.5
EPSS: Низкий
msrc логотип

CVE-2019-9513

почти 6 лет назад

HTTP/2 Server Denial of Service Vulnerability

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2019-9513

почти 6 лет назад

Some HTTP/2 implementations are vulnerable to resource loops, potentia ...

CVSS3: 7.5
EPSS: Низкий
oracle-oval логотип

ELSA-2020-5862

больше 4 лет назад

ELSA-2020-5862: olcne nginx security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2020-5859

больше 4 лет назад

ELSA-2020-5859: olcne nginx security update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2019-9511

Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

CVSS3: 6.5
14%
Средний
почти 6 лет назад
nvd логотип
CVE-2019-9511

Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

CVSS3: 7.5
14%
Средний
почти 6 лет назад
msrc логотип
CVE-2019-9511

HTTP/2 Server Denial of Service Vulnerability

CVSS3: 7.5
14%
Средний
почти 6 лет назад
debian логотип
CVE-2019-9511

Some HTTP/2 implementations are vulnerable to window size manipulation ...

CVSS3: 7.5
14%
Средний
почти 6 лет назад
github логотип
GHSA-89fc-749h-w2fj

Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

CVSS3: 7.5
14%
Средний
около 3 лет назад
fstec логотип
BDU:2019-03782

Уязвимость реализации сетевого протокола HTTP/2 веб-сервера Apache HTTP Server, связанная с неконтролируемым расходом ресурса, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
14%
Средний
около 6 лет назад
fstec логотип
BDU:2019-02994

Уязвимость реализации сетевого протокола HTTP/2 операционных систем Windows, сервера nginx, программной платформы Node.js, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
14%
Средний
почти 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:14246-1

Security update for Mozilla Firefox

больше 5 лет назад
ubuntu логотип
CVE-2019-9516

Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory.

CVSS3: 6.5
2%
Низкий
почти 6 лет назад
redhat логотип
CVE-2019-9516

Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory.

CVSS3: 6.5
2%
Низкий
почти 6 лет назад
nvd логотип
CVE-2019-9516

Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory.

CVSS3: 6.5
2%
Низкий
почти 6 лет назад
msrc логотип
CVSS3: 6.5
2%
Низкий
больше 4 лет назад
debian логотип
CVE-2019-9516

Some HTTP/2 implementations are vulnerable to a header leak, potential ...

CVSS3: 6.5
2%
Низкий
почти 6 лет назад
ubuntu логотип
CVE-2019-9513

Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.

CVSS3: 7.5
4%
Низкий
почти 6 лет назад
redhat логотип
CVE-2019-9513

Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.

CVSS3: 7.5
4%
Низкий
почти 6 лет назад
nvd логотип
CVE-2019-9513

Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.

CVSS3: 7.5
4%
Низкий
почти 6 лет назад
msrc логотип
CVE-2019-9513

HTTP/2 Server Denial of Service Vulnerability

CVSS3: 7.5
4%
Низкий
почти 6 лет назад
debian логотип
CVE-2019-9513

Some HTTP/2 implementations are vulnerable to resource loops, potentia ...

CVSS3: 7.5
4%
Низкий
почти 6 лет назад
oracle-oval логотип
ELSA-2020-5862

ELSA-2020-5862: olcne nginx security update (IMPORTANT)

больше 4 лет назад
oracle-oval логотип
ELSA-2020-5859

ELSA-2020-5859: olcne nginx security update (IMPORTANT)

больше 4 лет назад

Уязвимостей на страницу