CVE-2025-7054
- EPSS 0.07%
- Veröffentlicht 07.08.2025 15:19:29
- Zuletzt bearbeitet 14.08.2025 19:58:57
Cloudflare quiche was discovered to be vulnerable to an infinite loop when sending packets containing RETIRE_CONNECTION_ID frames. QUIC connections possess a set of connection identifiers (IDs); see Section 5.1 of RFC 9000 https://datatracker.ietf....
CVE-2025-4821
- EPSS 0.15%
- Veröffentlicht 18.06.2025 15:47:52
- Zuletzt bearbeitet 06.08.2025 17:06:30
Impact Cloudflare quiche was discovered to be vulnerable to incorrect congestion window growth, which could cause it to send data at a rate faster than the path might actually support. An unauthenticated remote attacker can exploit the vulnerabilit...
CVE-2025-4820
- EPSS 0.15%
- Veröffentlicht 18.06.2025 15:45:49
- Zuletzt bearbeitet 06.08.2025 17:06:14
Impact Cloudflare quiche was discovered to be vulnerable to incorrect congestion window growth, which could cause it to send data at a rate faster than the path might actually support. An unauthenticated remote attacker can exploit the vulnerabilit...
CVE-2024-1410
- EPSS 0.41%
- Veröffentlicht 12.03.2024 18:15:07
- Zuletzt bearbeitet 06.08.2025 14:28:51
Cloudflare quiche was discovered to be vulnerable to unbounded storage of information related to connection ID retirement, which could lead to excessive resource consumption. Each QUIC connection possesses a set of connection Identifiers (IDs); see ...
CVE-2024-1765
- EPSS 4.72%
- Veröffentlicht 12.03.2024 18:15:07
- Zuletzt bearbeitet 06.08.2025 14:30:33
Cloudflare Quiche (through version 0.19.1/0.20.0) was affected by an unlimited resource allocation vulnerability causing rapid increase of memory usage of the system running quiche server or client. A remote attacker could take advantage of this vuln...
CVE-2023-6193
- EPSS 0.32%
- Veröffentlicht 12.12.2023 14:15:07
- Zuletzt bearbeitet 21.11.2024 08:43:19
quiche v. 0.15.0 through 0.19.0 was discovered to be vulnerable to unbounded queuing of path validation messages, which could lead to excessive resource consumption. QUIC path validation (RFC 9000 Section 8.2) requires that the recipient of a PATH_CH...