Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 27 Feb 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
H2o
H2o quicly |
|
| Weaknesses | CWE-617 | |
| CPEs | cpe:2.3:a:h2o:quicly:*:*:*:*:*:*:*:* | |
| Vendors & Products |
H2o
H2o quicly |
Tue, 20 Jan 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 20 Jan 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
H20
H20 quickly |
|
| Vendors & Products |
H20
H20 quickly |
Mon, 19 Jan 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Quicly, an IETF QUIC protocol implementation, is susceptible to a denial-of-service attack prior to commit d9d3df6a8530a102b57d840e39b0311ce5c9e14e. A remote attacker can exploit these bugs to trigger an assertion failure that crashes process using Quicly. Commit d9d3df6a8530a102b57d840e39b0311ce5c9e14e fixes the issue. | |
| Title | Quicly has assertion failures | |
| Weaknesses | CWE-20 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-20T15:49:59.004Z
Reserved: 2025-09-29T20:25:16.182Z
Link: CVE-2025-61684
Updated: 2026-01-20T15:49:45.335Z
Status : Analyzed
Published: 2026-01-19T16:15:53.423
Modified: 2026-02-27T19:41:05.257
Link: CVE-2025-61684
No data.
OpenCVE Enrichment
Updated: 2026-01-20T08:43:28Z