Количество 22
Количество 22

CVE-2019-9516
Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory.

CVE-2019-9516
Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory.

CVE-2019-9516
Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory.

CVE-2019-9516
CVE-2019-9516
Some HTTP/2 implementations are vulnerable to a header leak, potential ...
GHSA-6gw7-c226-vg73
Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory.

BDU:2019-03638
Уязвимость реализации сетевого протокола HTTP/2 сервера nginx, программной платформы Node.js, сетевого программного средства SwiftNIO, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании

openSUSE-SU-2019:2264-1
Security update for nginx

SUSE-SU-2019:2559-1
Security update for nginx

RLSA-2019:2799
Important: nginx:1.14 security update
ELSA-2019-2799
ELSA-2019-2799: nginx:1.14 security update (IMPORTANT)

openSUSE-SU-2019:2120-1
Security update for nginx

SUSE-SU-2019:2309-1
Security update for nginx

openSUSE-SU-2019:2115-1
Security update for nodejs8

openSUSE-SU-2019:2114-1
Security update for nodejs10

SUSE-SU-2019:2260-1
Security update for nodejs8

SUSE-SU-2019:2259-1
Security update for nodejs10

SUSE-SU-2019:2254-1
Security update for nodejs10
ELSA-2019-2925
ELSA-2019-2925: nodejs:10 security update (IMPORTANT)

SUSE-SU-2020:0059-1
Security update for nodejs12
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2019-9516 Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory. | CVSS3: 6.5 | 2% Низкий | почти 6 лет назад |
![]() | CVE-2019-9516 Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory. | CVSS3: 6.5 | 2% Низкий | почти 6 лет назад |
![]() | CVE-2019-9516 Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory. | CVSS3: 6.5 | 2% Низкий | почти 6 лет назад |
![]() | CVSS3: 6.5 | 2% Низкий | больше 4 лет назад | |
CVE-2019-9516 Some HTTP/2 implementations are vulnerable to a header leak, potential ... | CVSS3: 6.5 | 2% Низкий | почти 6 лет назад | |
GHSA-6gw7-c226-vg73 Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory. | CVSS3: 6.5 | 2% Низкий | около 3 лет назад | |
![]() | BDU:2019-03638 Уязвимость реализации сетевого протокола HTTP/2 сервера nginx, программной платформы Node.js, сетевого программного средства SwiftNIO, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 7.5 | 2% Низкий | почти 6 лет назад |
![]() | openSUSE-SU-2019:2264-1 Security update for nginx | больше 5 лет назад | ||
![]() | SUSE-SU-2019:2559-1 Security update for nginx | больше 5 лет назад | ||
![]() | RLSA-2019:2799 Important: nginx:1.14 security update | почти 6 лет назад | ||
ELSA-2019-2799 ELSA-2019-2799: nginx:1.14 security update (IMPORTANT) | почти 6 лет назад | |||
![]() | openSUSE-SU-2019:2120-1 Security update for nginx | почти 6 лет назад | ||
![]() | SUSE-SU-2019:2309-1 Security update for nginx | почти 6 лет назад | ||
![]() | openSUSE-SU-2019:2115-1 Security update for nodejs8 | почти 6 лет назад | ||
![]() | openSUSE-SU-2019:2114-1 Security update for nodejs10 | почти 6 лет назад | ||
![]() | SUSE-SU-2019:2260-1 Security update for nodejs8 | почти 6 лет назад | ||
![]() | SUSE-SU-2019:2259-1 Security update for nodejs10 | почти 6 лет назад | ||
![]() | SUSE-SU-2019:2254-1 Security update for nodejs10 | почти 6 лет назад | ||
ELSA-2019-2925 ELSA-2019-2925: nodejs:10 security update (IMPORTANT) | больше 5 лет назад | |||
![]() | SUSE-SU-2020:0059-1 Security update for nodejs12 | больше 5 лет назад |
Уязвимостей на страницу