CVE-2019-9518
- EPSS 3.67%
- Published 13.08.2019 21:15:13
- Last modified 14.01.2025 19:29:55
Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONT...
CVE-2019-9511
- EPSS 13.95%
- Published 13.08.2019 21:15:12
- Last modified 14.01.2025 19:29:55
Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. T...
CVE-2019-9512
- EPSS 51.23%
- Published 13.08.2019 21:15:12
- Last modified 21.11.2024 04:51:46
Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this d...
CVE-2019-9513
- EPSS 4.36%
- Published 13.08.2019 21:15:12
- Last modified 14.01.2025 19:29:55
Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the...
CVE-2019-9514
- EPSS 9.48%
- Published 13.08.2019 21:15:12
- Last modified 14.01.2025 19:29:55
Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the p...
CVE-2019-9515
- EPSS 10.39%
- Published 13.08.2019 21:15:12
- Last modified 14.01.2025 19:29:55
Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service. The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS f...
CVE-2019-9516
- EPSS 2.29%
- Published 13.08.2019 21:15:12
- Last modified 14.01.2025 19:29:55
Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater h...
CVE-2019-9517
- EPSS 4.56%
- Published 13.08.2019 21:15:12
- Last modified 14.01.2025 19:29:55
Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially leading to a denial of service. The attacker opens the HTTP/2 window so the peer can send without constraint; however, they leave the TCP window closed so...
CVE-2019-14809
- EPSS 2.58%
- Published 13.08.2019 21:15:11
- Last modified 21.11.2024 04:27:24
net/url in Go before 1.11.13 and 1.12.x before 1.12.8 mishandles malformed hosts in URLs, leading to an authorization bypass in some applications. This is related to a Host field with a suffix appearing in neither Hostname() nor Port(), and is relate...
CVE-2017-18509
- EPSS 0.14%
- Published 13.08.2019 14:15:11
- Last modified 21.11.2024 03:20:16
An issue was discovered in net/ipv6/ip6mr.c in the Linux kernel before 4.11. By setting a specific socket option, an attacker can control a pointer in kernel land and cause an inet_csk_listen_stop general protection fault, or potentially execute arbi...