Количество 16
Количество 16
GHSA-93p3-5r25-4p75
Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU.

CVE-2019-9518
Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU.

CVE-2019-9518
Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU.

CVE-2019-9518
Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU.

CVE-2019-9518
HTTP/2 Server Denial of Service Vulnerability
CVE-2019-9518
Some HTTP/2 implementations are vulnerable to a flood of empty frames, ...

BDU:2019-02957
Уязвимость реализации сетевого протокола HTTP/2 операционных систем Windows, сервера nginx, сетевых программных средств netty, Envoy, SwiftNIO, программной платформы Node.js, позволяющая нарушителю вызвать отказ в обслуживании

openSUSE-SU-2019:2115-1
Security update for nodejs8

openSUSE-SU-2019:2114-1
Security update for nodejs10

SUSE-SU-2019:2260-1
Security update for nodejs8

SUSE-SU-2019:2259-1
Security update for nodejs10

SUSE-SU-2019:2254-1
Security update for nodejs10
ELSA-2019-2925
ELSA-2019-2925: nodejs:10 security update (IMPORTANT)

SUSE-SU-2020:0059-1
Security update for nodejs12

RLSA-2019:2925
Important: nodejs:10 security update

SUSE-SU-2019:14246-1
Security update for Mozilla Firefox
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
GHSA-93p3-5r25-4p75 Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU. | CVSS3: 7.5 | 4% Низкий | около 3 лет назад | |
![]() | CVE-2019-9518 Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU. | CVSS3: 7.5 | 4% Низкий | почти 6 лет назад |
![]() | CVE-2019-9518 Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU. | CVSS3: 7.5 | 4% Низкий | почти 6 лет назад |
![]() | CVE-2019-9518 Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU. | CVSS3: 7.5 | 4% Низкий | почти 6 лет назад |
![]() | CVE-2019-9518 HTTP/2 Server Denial of Service Vulnerability | CVSS3: 7.5 | 4% Низкий | почти 6 лет назад |
CVE-2019-9518 Some HTTP/2 implementations are vulnerable to a flood of empty frames, ... | CVSS3: 7.5 | 4% Низкий | почти 6 лет назад | |
![]() | BDU:2019-02957 Уязвимость реализации сетевого протокола HTTP/2 операционных систем Windows, сервера nginx, сетевых программных средств netty, Envoy, SwiftNIO, программной платформы Node.js, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 7.5 | 4% Низкий | почти 6 лет назад |
![]() | openSUSE-SU-2019:2115-1 Security update for nodejs8 | почти 6 лет назад | ||
![]() | openSUSE-SU-2019:2114-1 Security update for nodejs10 | почти 6 лет назад | ||
![]() | SUSE-SU-2019:2260-1 Security update for nodejs8 | почти 6 лет назад | ||
![]() | SUSE-SU-2019:2259-1 Security update for nodejs10 | почти 6 лет назад | ||
![]() | SUSE-SU-2019:2254-1 Security update for nodejs10 | почти 6 лет назад | ||
ELSA-2019-2925 ELSA-2019-2925: nodejs:10 security update (IMPORTANT) | больше 5 лет назад | |||
![]() | SUSE-SU-2020:0059-1 Security update for nodejs12 | больше 5 лет назад | ||
![]() | RLSA-2019:2925 Important: nodejs:10 security update | больше 5 лет назад | ||
![]() | SUSE-SU-2019:14246-1 Security update for Mozilla Firefox | больше 5 лет назад |
Уязвимостей на страницу