Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-1899 | ws is an open source WebSocket client and server for Node.js. A request with a number of headers exceeding theserver.maxHeadersCount threshold could be used to crash a ws server. The vulnerability was fixed in ws@8.17.1 (e55e510) and backported to ws@7.5.10 (22c2876), ws@6.2.3 (eeb76d3), and ws@5.2.4 (4abd8f6). In vulnerable versions of ws, the issue can be mitigated in the following ways: 1. Reduce the maximum allowed length of the request headers using the --max-http-header-size=size and/or the maxHeaderSize options so that no more headers than the server.maxHeadersCount limit can be sent. 2. Set server.maxHeadersCount to 0 so that no limit is applied. |
Github GHSA |
GHSA-3h5v-q93c-6h6q | ws affected by a DoS when handling a request with many HTTP headers |
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Fri, 06 Jun 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:openshift_data_foundation:4.14::el9 cpe:/a:redhat:openshift_data_foundation:4.15::el9 |
Thu, 20 Mar 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat rhdh
|
|
| CPEs | cpe:/a:redhat:rhdh:1.3::el9 | |
| Vendors & Products |
Redhat rhdh
|
Fri, 16 Aug 2024 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
threat_severity
|
threat_severity
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-02T03:57:40.022Z
Reserved: 2024-06-10T19:54:41.360Z
Link: CVE-2024-37890
Updated: 2024-06-18T13:31:19.779Z
Status : Deferred
Published: 2024-06-17T20:15:13.203
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-37890
OpenCVE Enrichment
No data.
EUVD
Github GHSA