
We found results for “”
CVE-2020-36049
Good to know:


Date: January 7, 2021
socket.io-parser before 3.4.1 allows attackers to cause a denial of service (memory consumption) via a large packet because a concatenation approach is used.
Language: Java
Severity Score
Related Resources (9)
Severity Score
Weakness Type (CWE)
Top Fix

Upgrade Version
Upgrade to version sombrerodepaja/franky-skeleton-application - dev-dev;sombrerodepaja/franky-skeleton-application - no_fix;chrisbraybrooke/laravel-ecommerce - 0.0.56;chrisbraybrooke/laravel-ecommerce - 0.0.2;chrisbraybrooke/laravel-ecommerce - 0.0.17;chrisbraybrooke/laravel-ecommerce - dev-form-field-key;touskar/php-socket-io-event-emitter - no_fix;flexxia/flexprimeng - dev-dependabot/npm_and_yarn/css/postcss/browserslist-4.17.0;flexxia/flexprimeng - dev-dependabot/npm_and_yarn/css/postcss/ini-1.3.8;flexxia/flexprimeng - dev-dependabot/npm_and_yarn/css/postcss/y18n-3.2.2;flexxia/flexprimeng - dev-dependabot/npm_and_yarn/css/postcss/path-parse-1.0.7;Sheeler.AngularTemplate - no_fix;mpcmf/mpcmf-web-app - 1.0.0.x-dev;mpcmf/mpcmf-web-app - no_fix;rotary/rotary_bs4 - no_fix;dotnetng.template - 1.0.0.4;mmi/mmi-cms - 2.3.1;pwptemplatepusintek - no_fix;PWPTemplateCMS - no_fix;efecanaltay/hello-world - no_fix;nextqs/php-socket-io-event-emitter - no_fix;ristorantino/aditions - dev-master-ko-js-update;sroehrl/neoan-php - v2.0.1-beta;sroehrl/neoan-php - no_fix;grandchef/php-socket-io-event-emitter - no_fix;scancode/portal-module - dev-dependabot/npm_and_yarn/Resources/assets/coreui/decode-uri-component-0.2.2;scancode/portal-module - dev-dependabot/npm_and_yarn/Resources/assets/coreui/path-parse-1.0.7;scancode/portal-module - v1.0.12;anupsathya/umd_bootstrap_sass - no_fix;socket.io-parser - 3.3.2;socket.io-parser - 3.4.1;mriso_dev/nodejschat - no_fix;Sheelersoft.AngularTemplate - no_fix;MIDIator.WebClient - 1.0.105;simplefile123 - no_fix;frankyframework/franky2 - no_fix;narirock/marrs-catalog - no_fix;johnrazeur/php-socket-io-event-emitter - v1.0.0;NorDroN.AngularTemplate - 0.1.6;KarmaNodeModules - no_fix;org.webjars:browser-sync:no_fix;org.webjars.npm:socket.io-parser:3.3.2
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | NONE |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | NONE |
Integrity (I): | NONE |
Availability (A): | HIGH |
CVSS v2
Base Score: |
|
---|---|
Access Vector (AV): | NETWORK |
Access Complexity (AC): | LOW |
Authentication (AU): | NONE |
Confidentiality (C): | NONE |
Integrity (I): | NONE |
Availability (A): | PARTIAL |
Additional information: |