An issue in OpenResty lua-nginx-module v.0.10.26 and before allows a remote attacker to conduct HTTP request smuggling via a crafted HEAD request.
{ "binaries": [ { "binary_version": "0.10-1", "binary_name": "lua-nginx-memcached" } ] }
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-33452.json"
{ "binaries": [ { "binary_version": "0.20-1", "binary_name": "lua-nginx-redis" } ] }
{ "binaries": [ { "binary_version": "0.05-1", "binary_name": "lua-nginx-websocket" } ] }
{ "binaries": [ { "binary_version": "0.26-1", "binary_name": "lua-nginx-redis" } ] }
{ "binaries": [ { "binary_version": "0.06-1", "binary_name": "lua-nginx-websocket" } ] }
{ "binaries": [ { "binary_version": "0.14-1", "binary_name": "lua-nginx-memcached" } ] }
{ "binaries": [ { "binary_version": "0.27-1", "binary_name": "lua-nginx-redis" } ] }
{ "binaries": [ { "binary_version": "0.14-1.1", "binary_name": "lua-nginx-memcached" } ] }
{ "binaries": [ { "binary_version": "0.27-1.1", "binary_name": "lua-nginx-redis" } ] }
{ "binaries": [ { "binary_version": "0.08-1", "binary_name": "lua-nginx-websocket" } ] }
{ "binaries": [ { "binary_version": "0.14-1.1build1", "binary_name": "lua-nginx-memcached" } ] }
{ "binaries": [ { "binary_version": "0.27-1.1build1", "binary_name": "lua-nginx-redis" } ] }
{ "binaries": [ { "binary_version": "0.08-1build1", "binary_name": "lua-nginx-websocket" } ] }
{ "binaries": [ { "binary_version": "0.13-1", "binary_name": "lua-nginx-websocket" } ] }