{
  "affected": [
    {
      "ranges": [
        {
          "database_specific": {
            "versions": [
              {
                "introduced": "0"
              },
              {
                "last_affected": "3.46.0.1"
              }
            ]
          },
          "events": [
            {
              "introduced": "0"
            },
            {
              "last_affected": "a35cd8a449055c283049e880e77b52bbd7e976e5"
            }
          ],
          "repo": "https://github.com/h2oai/h2o-3",
          "type": "GIT"
        }
      ]
    }
  ],
  "details": "A vulnerability in the `/3/ParseSetup` endpoint of h2oai/h2o-3 version 3.46.0.1 allows for a denial of service (DoS) attack. The endpoint applies a user-specified regular expression to a user-controllable string. This can be exploited by an attacker to cause inefficient regular expression complexity, leading to the exhaustion of server resources and making the server unresponsive.",
  "id": "CVE-2024-10550",
  "modified": "2026-03-10T21:53:24.991682536Z",
  "published": "2025-03-20T10:15:17.390Z",
  "references": [
    {
      "type": "EVIDENCE",
      "url": "https://huntr.com/bounties/ef3f4d89-3b8b-4618-b134-cb93c1664ec6"
    }
  ],
  "severity": [
    {
      "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "type": "CVSS_V3"
    }
  ]
}