296,733
Total vulnerabilities in the database
Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.
| Software | From | Fixed in |
|---|---|---|
| apple / swiftnio | 1.0.0 | 1.4.0.x |
| apache / traffic_server | 8.0.0 | 8.0.3.x |
| apache / traffic_server | 7.0.0 | 7.1.6.x |
| apache / traffic_server | 6.0.0 | 6.2.3.x |
| debian / debian_linux | 10.0 | 10.0.x |
| nodejs / node.js | 8.0.0 | 8.8.1.x |
| nodejs / node.js | 10.0.0 | 10.12.0.x |
| nodejs / node.js | 12.0.0 | 12.8.1 |
| nodejs / node.js | 10.13.0 | 10.16.3 |
| nodejs / node.js | 8.9.0 | 8.16.1 |
golang.org/x/net/http
|
- | 0.0.0-20190813141303-74dc4d7220e7 |
golang.org/x/net
|
- | 0.0.0-20190813141303-74dc4d7220e7 |