Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-e3m7-psun-vfby
Summaryh2o is an HTTP server with support for HTTP/1.x, HTTP/2 and HTTP/3. The QUIC stack (quicly), as used by H2O up to commit 43f86e5 (in version 2.3.0-beta and prior), is susceptible to a state exhaustion attack. When H2O is serving HTTP/3, a remote attacker can exploit this vulnerability to progressively increase the memory retained by the QUIC stack. This can eventually cause H2O to abort due to memory exhaustion. The vulnerability has been resolved in commit d67e81d03be12a9d53dc8271af6530f40164cd35. HTTP/1 and HTTP/2 are not affected by this vulnerability as they do not use QUIC. Administrators looking to mitigate this issue without upgrading can disable HTTP/3 support.
Aliases
0
alias CVE-2023-50247
Fixed_packages
0
url pkg:deb/debian/h2o@0?distro=bullseye
purl pkg:deb/debian/h2o@0?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/h2o@0%3Fdistro=bullseye
1
url pkg:deb/debian/h2o@2.2.5%2Bdfsg2-6?distro=bullseye
purl pkg:deb/debian/h2o@2.2.5%2Bdfsg2-6?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/h2o@2.2.5%252Bdfsg2-6%3Fdistro=bullseye
2
url pkg:deb/debian/h2o@2.2.5%2Bdfsg2-7?distro=bullseye
purl pkg:deb/debian/h2o@2.2.5%2Bdfsg2-7?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/h2o@2.2.5%252Bdfsg2-7%3Fdistro=bullseye
Affected_packages
References
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-50247
reference_id
reference_type
scores
0
value 0.00562
scoring_system epss
scoring_elements 0.68283
published_at 2026-04-02T12:55:00Z
1
value 0.00562
scoring_system epss
scoring_elements 0.68303
published_at 2026-04-04T12:55:00Z
2
value 0.00562
scoring_system epss
scoring_elements 0.6828
published_at 2026-04-07T12:55:00Z
3
value 0.00562
scoring_system epss
scoring_elements 0.68331
published_at 2026-04-08T12:55:00Z
4
value 0.00562
scoring_system epss
scoring_elements 0.68347
published_at 2026-04-09T12:55:00Z
5
value 0.00562
scoring_system epss
scoring_elements 0.68373
published_at 2026-04-11T12:55:00Z
6
value 0.00562
scoring_system epss
scoring_elements 0.6836
published_at 2026-04-12T12:55:00Z
7
value 0.00562
scoring_system epss
scoring_elements 0.68328
published_at 2026-04-13T12:55:00Z
8
value 0.00562
scoring_system epss
scoring_elements 0.68367
published_at 2026-04-16T12:55:00Z
9
value 0.00562
scoring_system epss
scoring_elements 0.6838
published_at 2026-04-18T12:55:00Z
10
value 0.00562
scoring_system epss
scoring_elements 0.68359
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-50247
Weaknesses
Exploits
Severity_range_scorenull
Exploitabilitynull
Weighted_severitynull
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-e3m7-psun-vfby