{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-16T05:23:50.743","vulnerabilities":[{"cve":{"id":"CVE-2025-23020","sourceIdentifier":"cve@mitre.org","published":"2025-02-20T03:15:12.630","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"An issue was discovered in Kwik before 0.10.1. A hash collision vulnerability (in the hash table used to manage connections) allows remote attackers to cause a considerable CPU load on the server (a Hash DoS attack) by initiating connections with colliding Source Connection IDs (SCIDs)."},{"lang":"es","value":"Se descubrió un problema en Kwik antes de 0.10.1. Una vulnerabilidad de colisión hash (en la tabla hash utilizada para administrar conexiones) permite a los atacantes remotos causar una carga de CPU considerable en el servidor (un ataque de hash DOS) al iniciar conexiones con ID de conexión de origen colisionales (SCID)."}],"metrics":{"cvssMetricV31":[{"source":"cve@mitre.org","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW"},"exploitabilityScore":3.9,"impactScore":1.4}]},"weaknesses":[{"source":"cve@mitre.org","type":"Secondary","description":[{"lang":"en","value":"CWE-407"}]}],"references":[{"url":"https://github.com/ncc-pbottine/QUIC-Hash-Dos-Advisory","source":"cve@mitre.org"},{"url":"https://github.com/ptrd/kwik/releases/tag/v0.10.1","source":"cve@mitre.org"}]}}]}