Количество 4
Количество 4
CVE-2016-10542
ws is a "simple to use, blazing fast and thoroughly tested websocket client, server and console for node.js, up-to-date against RFC-6455". By sending an overly long websocket payload to a `ws` server, it is possible to crash the node process. This affects ws 1.1.0 and earlier.
CVE-2016-10542
ws is a "simple to use, blazing fast and thoroughly tested websocket client, server and console for node.js, up-to-date against RFC-6455". By sending an overly long websocket payload to a `ws` server, it is possible to crash the node process. This affects ws 1.1.0 and earlier.
CVE-2016-10542
ws is a "simple to use, blazing fast and thoroughly tested websocket c ...
GHSA-6663-c963-2gqg
DoS due to excessively large websocket message in ws
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2016-10542 ws is a "simple to use, blazing fast and thoroughly tested websocket client, server and console for node.js, up-to-date against RFC-6455". By sending an overly long websocket payload to a `ws` server, it is possible to crash the node process. This affects ws 1.1.0 and earlier. | CVSS3: 7.5 | 66% Средний | больше 7 лет назад | |
CVE-2016-10542 ws is a "simple to use, blazing fast and thoroughly tested websocket client, server and console for node.js, up-to-date against RFC-6455". By sending an overly long websocket payload to a `ws` server, it is possible to crash the node process. This affects ws 1.1.0 and earlier. | CVSS3: 7.5 | 66% Средний | больше 7 лет назад | |
CVE-2016-10542 ws is a "simple to use, blazing fast and thoroughly tested websocket c ... | CVSS3: 7.5 | 66% Средний | больше 7 лет назад | |
GHSA-6663-c963-2gqg DoS due to excessively large websocket message in ws | 66% Средний | почти 7 лет назад |
Уязвимостей на страницу