Search CVE reports


Toggle filters

11 – 20 of 60 results


CVE-2023-44487

High priority

Some fixes available 29 of 42

The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.

13 affected packages

haproxy, tomcat10, tomcat9, trafficserver, h2o...

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
haproxy Not affected Not affected Not affected Fixed
tomcat10 Not affected Not in release Not in release Ignored
tomcat9 Not affected Fixed Fixed Fixed
trafficserver Not affected Fixed Fixed Not affected
h2o Not affected Not affected Not affected Fixed
tomcat8 Not in release Not in release Not in release Fixed
dotnet6 Not in release Fixed Not in release Not in release
dotnet7 Not in release Fixed Not in release Not in release
dotnet8 Fixed Not affected Not in release Not in release
nginx Not affected Not affected Not affected Not affected
nghttp2 Not affected Fixed Fixed Fixed
nodejs Not affected Fixed Fixed Fixed
netty Not affected Fixed Fixed Not affected
Show all 13 packages Show less packages

CVE-2022-41742

Medium priority
Fixed

NGINX Open Source before versions 1.23.2 and 1.22.1, NGINX Open Source Subscription before versions R2 P1 and R1 P1, and NGINX Plus before versions R27 P1 and R26 P1 have a vulnerability in the module ngx_http_mp4_module that...

1 affected package

nginx

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
nginx Fixed Fixed Fixed
Show less packages

CVE-2022-41741

Medium priority
Fixed

NGINX Open Source before versions 1.23.2 and 1.22.1, NGINX Open Source Subscription before versions R2 P1 and R1 P1, and NGINX Plus before versions R27 P1 and R26 P1 have a vulnerability in the module ngx_http_mp4_module that...

1 affected package

nginx

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
nginx Fixed Fixed Fixed
Show less packages

CVE-2022-3638

Medium priority
Not affected

Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

1 affected package

nginx

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
nginx Not affected Not affected Not affected
Show less packages

CVE-2021-3618

Low priority

Some fixes available 6 of 22

ALPACA is an application layer protocol content confusion attack, exploiting TLS servers implementing different protocols but using compatible certificates, such as multi-domain or wildcard certificates. A MiTM attacker having...

3 affected packages

nginx, sendmail, vsftpd

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
nginx Not affected Fixed Fixed Fixed
sendmail Not affected Vulnerable Vulnerable Vulnerable
vsftpd Not affected Not affected Fixed Vulnerable
Show less packages

CVE-2021-32762

Negligible priority
Needs evaluation

Redis is an open source, in-memory database that persists on disk. The redis-cli command line tool and redis-sentinel service may be vulnerable to integer overflow when parsing specially crafted large multi-bulk network replies....

7 affected packages

discque, hiredis, nginx, python-hiredis, redis...

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
discque Not in release Not in release Not in release Not in release
hiredis Not affected Not affected Not affected Not affected
nginx Not affected Not affected Not affected Not affected
python-hiredis Not affected Not affected Not affected Not affected
redis Not affected Not affected Not affected Not affected
rspamd Not affected Not affected Not affected Not in release
webdis Not affected Not affected Not affected Not in release
Show all 7 packages Show less packages

CVE-2021-23017

Medium priority
Fixed

A security issue in nginx resolver was identified, which might allow an attacker who is able to forge UDP packets from the DNS server to cause 1-byte memory overwrite, resulting in worker process crash or potential other impact.

1 affected package

nginx

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
nginx Fixed Fixed Fixed
Show less packages

CVE-2020-36309

Low priority

Some fixes available 3 of 5

ngx_http_lua_module (aka lua-nginx-module) before 0.10.16 in OpenResty allows unsafe characters in an argument when using the API to mutate a URI, or a request or response header.

1 affected package

nginx

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
nginx Not affected Not affected Fixed Fixed
Show less packages

CVE-2020-21699

Medium priority
Not affected

The web server Tengine 2.2.2 developed in the Nginx version from 0.5.6 thru 1.13.2 is vulnerable to an integer overflow vulnerability in the nginx range filter module, resulting in the leakage of potentially sensitive information...

1 affected package

nginx

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
nginx Not affected Not affected Not affected
Show less packages

CVE-2020-12440

Medium priority
Not affected

Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none

1 affected package

nginx

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
nginx Not affected Not affected
Show less packages