OpenResty 1.21.4.3

CPE Details

OpenResty 1.21.4.3
1.21.4.3
2023-12-19
15h56 +00:00
2023-12-19
15h56 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:openresty:openresty:1.21.4.3:*:*:*:*:*:*:*

Informations

Vendor

openresty

Product

openresty

Version

1.21.4.3

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2024-39702 2024-07-22 22h00 +00:00 In lj_str_hash.c in OpenResty 1.19.3.1 through 1.25.3.1, the string hashing function (used during string interning) allows HashDoS (Hash Denial of Service) attacks. An attacker could cause excessive resource usage during proxy operations via crafted requests, potentially leading to a denial of service with relatively few incoming requests. This vulnerability only exists in the OpenResty fork in the openresty/luajit2 GitHub repository. The LuaJIT/LuaJIT repository. is unaffected.
5.9
Medium