CVE-2023-44487
- EPSS 94.44%
- Published 10.10.2023 14:15:10
- Last modified 11.06.2025 17:29:54
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
CVE-2021-24029
- EPSS 0.47%
- Published 15.03.2021 22:15:13
- Last modified 21.11.2024 05:52:14
A packet of death scenario is possible in mvfst via a specially crafted message during a QUIC session, which causes a crash via a failed assertion. Per QUIC specification, this particular message should be treated as a connection error. This issue af...
CVE-2020-1897
- EPSS 0.59%
- Published 18.05.2020 22:15:13
- Last modified 21.11.2024 05:11:34
A use-after-free is possible due to an error in lifetime management in the request adaptor when a malicious client invokes request error handling in a specific sequence. This issue affects versions of proxygen prior to v2020.05.18.00.
CVE-2019-11940
- EPSS 0.42%
- Published 04.12.2019 17:16:43
- Last modified 21.11.2024 04:22:01
In the course of decompressing HPACK inside the HTTP2 protocol, an unexpected sequence of header table resize operations can place the header table into a corrupted state, leading to a use-after-free condition and undefined behavior. This issue affec...
CVE-2019-11921
- EPSS 0.65%
- Published 25.07.2019 21:15:11
- Last modified 21.11.2024 04:21:59
An out of bounds write is possible via a specially crafted packet in certain configurations of Proxygen due to improper handling of Base64 when parsing malformed binary content in Structured HTTP Headers. This issue affects versions of proxygen prior...
CVE-2018-6343
- EPSS 0.27%
- Published 31.12.2018 22:29:00
- Last modified 06.05.2025 16:15:22
Proxygen fails to validate that a secondary auth manager is set before dereferencing it. That can cause a denial of service issue when parsing a Certificate/CertificateRequest HTTP2 Frame over a fizz (TLS 1.3) transport. This issue affects Proxygen r...