Vulnerabilities > Dena

DATE CVE VULNERABILITY TITLE RISK
2024-10-11 CVE-2024-25622 Always-Incorrect Control Flow Implementation vulnerability in Dena H2O
h2o is an HTTP server with support for HTTP/1.x, HTTP/2 and HTTP/3.
network
low complexity
dena CWE-670
4.3
2024-10-11 CVE-2024-45396 Reachable Assertion vulnerability in Dena Quicly
Quicly is an IETF QUIC protocol implementation.
network
low complexity
dena CWE-617
7.5
2024-10-11 CVE-2024-45397 Authentication Bypass by Spoofing vulnerability in Dena H2O
h2o is an HTTP server with support for HTTP/1.x, HTTP/2 and HTTP/3.
network
low complexity
dena CWE-290
7.5
2024-10-11 CVE-2024-45402 Double Free vulnerability in Dena Picotls
Picotls is a TLS protocol library that allows users select different crypto backends based on their use case.
network
low complexity
dena CWE-415
critical
9.8
2024-10-11 CVE-2024-45403 Reachable Assertion vulnerability in Dena H2O
h2o is an HTTP server with support for HTTP/1.x, HTTP/2 and HTTP/3.
network
low complexity
dena CWE-617
7.5
2023-12-12 CVE-2023-41337 Improper Verification of Cryptographic Signature vulnerability in Dena H2O
h2o is an HTTP server with support for HTTP/1.x, HTTP/2 and HTTP/3.
low complexity
dena CWE-347
6.7
2023-12-12 CVE-2023-50247 Allocation of Resources Without Limits or Throttling vulnerability in Dena H2O
h2o is an HTTP server with support for HTTP/1.x, HTTP/2 and HTTP/3.
network
low complexity
dena CWE-770
7.5
2023-10-10 CVE-2023-44487 The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023. 7.5
2023-04-27 CVE-2023-30847 Access of Uninitialized Pointer vulnerability in Dena H2O
H2O is an HTTP server.
network
low complexity
dena CWE-824
8.2
2022-06-14 CVE-2022-29482 Improper Certificate Validation vulnerability in Dena Mobaoku-Auction & Flea Market
'Mobaoku-Auction&Flea Market' App for iOS versions prior to 5.5.16 improperly verifies server certificates, which may allow an attacker to eavesdrop on an encrypted communication via a man-in-the-middle attack.
network
high complexity
dena CWE-295
3.7