Логотип exploitDog
bind:"BDU:2019-03646" OR bind:"CVE-2019-9515"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2019-03646" OR bind:"CVE-2019-9515"

Количество 15

Количество 15

fstec логотип

BDU:2019-03646

почти 6 лет назад

Уязвимость компонента connection.c сетевого протокола HTTP/2 веб-сервера Apache Traffic Server, веб-сервера H2O, программной платформы Node.js, сетевого программного средства SwiftNIO, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2019-9515

почти 6 лет назад

Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service. The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost equivalent in behavior to a ping. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2019-9515

почти 6 лет назад

Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service. The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost equivalent in behavior to a ping. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2019-9515

почти 6 лет назад

Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service. The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost equivalent in behavior to a ping. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2019-9515

почти 6 лет назад

Some HTTP/2 implementations are vulnerable to a settings flood, potent ...

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-9259-5376-vjcj

около 3 лет назад

Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service. The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost equivalent in behavior to a ping. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2019:2115-1

почти 6 лет назад

Security update for nodejs8

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2019:2114-1

почти 6 лет назад

Security update for nodejs10

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:2260-1

почти 6 лет назад

Security update for nodejs8

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:2259-1

почти 6 лет назад

Security update for nodejs10

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:2254-1

почти 6 лет назад

Security update for nodejs10

EPSS: Низкий
oracle-oval логотип

ELSA-2019-2925

больше 5 лет назад

ELSA-2019-2925: nodejs:10 security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:0059-1

больше 5 лет назад

Security update for nodejs12

EPSS: Низкий
rocky логотип

RLSA-2019:2925

больше 5 лет назад

Important: nodejs:10 security update

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:14246-1

больше 5 лет назад

Security update for Mozilla Firefox

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2019-03646

Уязвимость компонента connection.c сетевого протокола HTTP/2 веб-сервера Apache Traffic Server, веб-сервера H2O, программной платформы Node.js, сетевого программного средства SwiftNIO, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
5%
Низкий
почти 6 лет назад
ubuntu логотип
CVE-2019-9515

Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service. The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost equivalent in behavior to a ping. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

CVSS3: 7.5
5%
Низкий
почти 6 лет назад
redhat логотип
CVE-2019-9515

Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service. The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost equivalent in behavior to a ping. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

CVSS3: 7.5
5%
Низкий
почти 6 лет назад
nvd логотип
CVE-2019-9515

Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service. The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost equivalent in behavior to a ping. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

CVSS3: 7.5
5%
Низкий
почти 6 лет назад
debian логотип
CVE-2019-9515

Some HTTP/2 implementations are vulnerable to a settings flood, potent ...

CVSS3: 7.5
5%
Низкий
почти 6 лет назад
github логотип
GHSA-9259-5376-vjcj

Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service. The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost equivalent in behavior to a ping. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.

CVSS3: 7.5
5%
Низкий
около 3 лет назад
suse-cvrf логотип
openSUSE-SU-2019:2115-1

Security update for nodejs8

почти 6 лет назад
suse-cvrf логотип
openSUSE-SU-2019:2114-1

Security update for nodejs10

почти 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:2260-1

Security update for nodejs8

почти 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:2259-1

Security update for nodejs10

почти 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:2254-1

Security update for nodejs10

почти 6 лет назад
oracle-oval логотип
ELSA-2019-2925

ELSA-2019-2925: nodejs:10 security update (IMPORTANT)

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:0059-1

Security update for nodejs12

больше 5 лет назад
rocky логотип
RLSA-2019:2925

Important: nodejs:10 security update

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2019:14246-1

Security update for Mozilla Firefox

больше 5 лет назад

Уязвимостей на страницу