Safety vulnerability ID: 76297
The information on this page was manually curated by our Cybersecurity Intelligence Team.
A vulnerability in the /3/Parse endpoint of h2oai/h2o-3 version 3.46.0.1 allows for a denial of service (DoS) attack. The endpoint uses a user-specified string to construct a regular expression, which is then applied to another user-specified string. By sending multiple simultaneous requests, an attacker can exhaust all available threads, leading to a complete denial of service.
Latest version: 3.46.0.7
H2O, Fast Scalable Machine Learning, for python
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application