Логотип exploitDog
bind:"CVE-2019-9512" OR bind:"CVE-2019-9514" OR bind:"CVE-2019-16884"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2019-9512" OR bind:"CVE-2019-9514" OR bind:"CVE-2019-16884"

Количество 51

Количество 51

nvd логотип

CVE-2019-9512

почти 6 лет назад

Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

CVSS3: 7.5
EPSS: Средний
msrc логотип

CVE-2019-9512

почти 6 лет назад

HTTP/2 Server Denial of Service Vulnerability

CVSS3: 7.5
EPSS: Средний
debian логотип

CVE-2019-9512

почти 6 лет назад

Some HTTP/2 implementations are vulnerable to ping floods, potentially ...

CVSS3: 7.5
EPSS: Средний
suse-cvrf логотип

SUSE-SU-2020:0059-1

больше 5 лет назад

Security update for nodejs12

EPSS: Низкий
rocky логотип

RLSA-2019:2925

больше 5 лет назад

Important: nodejs:10 security update

EPSS: Низкий
github логотип

GHSA-hgr8-6h9x-f7q9

около 3 лет назад

golang.org/x/net/http vulnerable to ping floods

CVSS3: 7.5
EPSS: Средний
fstec логотип

BDU:2020-03827

почти 6 лет назад

Уязвимость системы автоматизации бизнес-процессов Red Hat Process Automation Manager, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании у целевой системы

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2019-16884

больше 5 лет назад

runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2019-16884

больше 5 лет назад

runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory.

CVSS3: 6.5
EPSS: Низкий
nvd логотип

CVE-2019-16884

больше 5 лет назад

runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory.

CVSS3: 7.5
EPSS: Низкий
msrc логотип

CVE-2019-16884

почти 4 года назад

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2019-16884

больше 5 лет назад

runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other ...

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2019-9514

почти 6 лет назад

Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2019-9514

почти 6 лет назад

Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2019-9514

почти 6 лет назад

Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.

CVSS3: 7.5
EPSS: Низкий
msrc логотип

CVE-2019-9514

почти 6 лет назад

HTTP/2 Server Denial of Service Vulnerability

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2019-9514

почти 6 лет назад

Some HTTP/2 implementations are vulnerable to a reset flood, potential ...

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:0045-1

больше 5 лет назад

Security update for containerd, docker, docker-runc, golang-github-docker-libnetwork

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2019:2434-1

больше 5 лет назад

Security update for docker-runc

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2019:2418-1

больше 5 лет назад

Security update for docker-runc

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2019-9512

Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

CVSS3: 7.5
21%
Средний
почти 6 лет назад
msrc логотип
CVE-2019-9512

HTTP/2 Server Denial of Service Vulnerability

CVSS3: 7.5
21%
Средний
почти 6 лет назад
debian логотип
CVE-2019-9512

Some HTTP/2 implementations are vulnerable to ping floods, potentially ...

CVSS3: 7.5
21%
Средний
почти 6 лет назад
suse-cvrf логотип
SUSE-SU-2020:0059-1

Security update for nodejs12

больше 5 лет назад
rocky логотип
RLSA-2019:2925

Important: nodejs:10 security update

больше 5 лет назад
github логотип
GHSA-hgr8-6h9x-f7q9

golang.org/x/net/http vulnerable to ping floods

CVSS3: 7.5
21%
Средний
около 3 лет назад
fstec логотип
BDU:2020-03827

Уязвимость системы автоматизации бизнес-процессов Red Hat Process Automation Manager, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании у целевой системы

CVSS3: 7.5
почти 6 лет назад
ubuntu логотип
CVE-2019-16884

runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory.

CVSS3: 7.5
0%
Низкий
больше 5 лет назад
redhat логотип
CVE-2019-16884

runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory.

CVSS3: 6.5
0%
Низкий
больше 5 лет назад
nvd логотип
CVE-2019-16884

runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory.

CVSS3: 7.5
0%
Низкий
больше 5 лет назад
msrc логотип
CVSS3: 7.5
0%
Низкий
почти 4 года назад
debian логотип
CVE-2019-16884

runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other ...

CVSS3: 7.5
0%
Низкий
больше 5 лет назад
ubuntu логотип
CVE-2019-9514

Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.

CVSS3: 7.5
9%
Низкий
почти 6 лет назад
redhat логотип
CVE-2019-9514

Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.

CVSS3: 7.5
9%
Низкий
почти 6 лет назад
nvd логотип
CVE-2019-9514

Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.

CVSS3: 7.5
9%
Низкий
почти 6 лет назад
msrc логотип
CVE-2019-9514

HTTP/2 Server Denial of Service Vulnerability

CVSS3: 7.5
9%
Низкий
почти 6 лет назад
debian логотип
CVE-2019-9514

Some HTTP/2 implementations are vulnerable to a reset flood, potential ...

CVSS3: 7.5
9%
Низкий
почти 6 лет назад
suse-cvrf логотип
openSUSE-SU-2020:0045-1

Security update for containerd, docker, docker-runc, golang-github-docker-libnetwork

0%
Низкий
больше 5 лет назад
suse-cvrf логотип
openSUSE-SU-2019:2434-1

Security update for docker-runc

0%
Низкий
больше 5 лет назад
suse-cvrf логотип
openSUSE-SU-2019:2418-1

Security update for docker-runc

0%
Низкий
больше 5 лет назад

Уязвимостей на страницу