OpenResty 1.13.6.1

CPE Details

OpenResty 1.13.6.1
1.13.6.1
2019-07-23
13h25 +00:00
2019-07-23
13h25 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:openresty:openresty:1.13.6.1:*:*:*:*:*:*:*

Informations

Vendor

openresty

Product

openresty

Version

1.13.6.1

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2023-44487 2023-10-10 00h00 +00:00 The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
7.5
Haute
CVE-2021-23017 2021-06-01 10h28 +00:00 A security issue in nginx resolver was identified, which might allow an attacker who is able to forge UDP packets from the DNS server to cause 1-byte memory overwrite, resulting in worker process crash or potential other impact.
7.7
Haute
CVE-2020-11724 2020-04-12 18h55 +00:00 An issue was discovered in OpenResty before 1.15.8.4. ngx_http_lua_subrequest.c allows HTTP request smuggling, as demonstrated by the ngx.location.capture API.
7.5
Haute