Логотип exploitDog
bind:"CVE-2019-9512" OR bind:"CVE-2019-9514"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2019-9512" OR bind:"CVE-2019-9514"

Количество 35

Количество 35

ubuntu логотип

CVE-2019-9514

почти 6 лет назад

Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2019-9514

почти 6 лет назад

Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2019-9514

почти 6 лет назад

Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.

CVSS3: 7.5
EPSS: Низкий
msrc логотип

CVE-2019-9514

почти 6 лет назад

HTTP/2 Server Denial of Service Vulnerability

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2019-9514

почти 6 лет назад

Some HTTP/2 implementations are vulnerable to a reset flood, potential ...

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2019-9512

почти 6 лет назад

Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

CVSS3: 7.5
EPSS: Средний
redhat логотип

CVE-2019-9512

почти 6 лет назад

Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

CVSS3: 7.5
EPSS: Средний
nvd логотип

CVE-2019-9512

почти 6 лет назад

Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

CVSS3: 7.5
EPSS: Средний
msrc логотип

CVE-2019-9512

почти 6 лет назад

HTTP/2 Server Denial of Service Vulnerability

CVSS3: 7.5
EPSS: Средний
debian логотип

CVE-2019-9512

почти 6 лет назад

Some HTTP/2 implementations are vulnerable to ping floods, potentially ...

CVSS3: 7.5
EPSS: Средний
github логотип

GHSA-39qc-96h7-956f

около 3 лет назад

golang.org/x/net/http vulnerable to a reset flood

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-hgr8-6h9x-f7q9

около 3 лет назад

golang.org/x/net/http vulnerable to ping floods

CVSS3: 7.5
EPSS: Средний
fstec логотип

BDU:2020-03827

почти 6 лет назад

Уязвимость системы автоматизации бизнес-процессов Red Hat Process Automation Manager, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании у целевой системы

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:14246-1

больше 5 лет назад

Security update for Mozilla Firefox

EPSS: Низкий
oracle-oval логотип

ELSA-2019-4816

больше 5 лет назад

ELSA-2019-4816: kubernetes security update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2019-9514

Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.

CVSS3: 7.5
9%
Низкий
почти 6 лет назад
redhat логотип
CVE-2019-9514

Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.

CVSS3: 7.5
9%
Низкий
почти 6 лет назад
nvd логотип
CVE-2019-9514

Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.

CVSS3: 7.5
9%
Низкий
почти 6 лет назад
msrc логотип
CVE-2019-9514

HTTP/2 Server Denial of Service Vulnerability

CVSS3: 7.5
9%
Низкий
почти 6 лет назад
debian логотип
CVE-2019-9514

Some HTTP/2 implementations are vulnerable to a reset flood, potential ...

CVSS3: 7.5
9%
Низкий
почти 6 лет назад
ubuntu логотип
CVE-2019-9512

Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

CVSS3: 7.5
21%
Средний
почти 6 лет назад
redhat логотип
CVE-2019-9512

Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

CVSS3: 7.5
21%
Средний
почти 6 лет назад
nvd логотип
CVE-2019-9512

Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

CVSS3: 7.5
21%
Средний
почти 6 лет назад
msrc логотип
CVE-2019-9512

HTTP/2 Server Denial of Service Vulnerability

CVSS3: 7.5
21%
Средний
почти 6 лет назад
debian логотип
CVE-2019-9512

Some HTTP/2 implementations are vulnerable to ping floods, potentially ...

CVSS3: 7.5
21%
Средний
почти 6 лет назад
github логотип
GHSA-39qc-96h7-956f

golang.org/x/net/http vulnerable to a reset flood

CVSS3: 7.5
9%
Низкий
около 3 лет назад
github логотип
GHSA-hgr8-6h9x-f7q9

golang.org/x/net/http vulnerable to ping floods

CVSS3: 7.5
21%
Средний
около 3 лет назад
fstec логотип
BDU:2020-03827

Уязвимость системы автоматизации бизнес-процессов Red Hat Process Automation Manager, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании у целевой системы

CVSS3: 7.5
почти 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:14246-1

Security update for Mozilla Firefox

больше 5 лет назад
oracle-oval логотип
ELSA-2019-4816

ELSA-2019-4816: kubernetes security update (IMPORTANT)

больше 5 лет назад

Уязвимостей на страницу