Логотип exploitDog
bind:CVE-2026-1528
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2026-1528

Количество 5

Количество 5

ubuntu логотип

CVE-2026-1528

18 дней назад

ImpactA server can reply with a WebSocket frame using the 64-bit length form and an extremely large length. undici's ByteParser overflows internal math, ends up in an invalid state, and throws a fatal TypeError that terminates the process. Patches Patched in the undici version v7.24.0 and v6.24.0. Users should upgrade to this version or later.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2026-1528

18 дней назад

A flaw was found in undici. A remote attacker could exploit this vulnerability by sending a specially crafted WebSocket frame with an extremely large 64-bit length. This causes undici's ByteParser to overflow its internal calculations, leading to an invalid state and a fatal TypeError. The primary consequence is a Denial of Service (DoS), which terminates the process.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2026-1528

18 дней назад

ImpactA server can reply with a WebSocket frame using the 64-bit length form and an extremely large length. undici's ByteParser overflows internal math, ends up in an invalid state, and throws a fatal TypeError that terminates the process. Patches Patched in the undici version v7.24.0 and v6.24.0. Users should upgrade to this version or later.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2026-1528

18 дней назад

ImpactA server can reply with a WebSocket frame using the 64-bit lengt ...

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-f269-vfmq-vjvj

17 дней назад

Undici: Malicious WebSocket 64-bit length overflows parser and crashes the client

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2026-1528

ImpactA server can reply with a WebSocket frame using the 64-bit length form and an extremely large length. undici's ByteParser overflows internal math, ends up in an invalid state, and throws a fatal TypeError that terminates the process. Patches Patched in the undici version v7.24.0 and v6.24.0. Users should upgrade to this version or later.

CVSS3: 7.5
0%
Низкий
18 дней назад
redhat логотип
CVE-2026-1528

A flaw was found in undici. A remote attacker could exploit this vulnerability by sending a specially crafted WebSocket frame with an extremely large 64-bit length. This causes undici's ByteParser to overflow its internal calculations, leading to an invalid state and a fatal TypeError. The primary consequence is a Denial of Service (DoS), which terminates the process.

CVSS3: 7.5
0%
Низкий
18 дней назад
nvd логотип
CVE-2026-1528

ImpactA server can reply with a WebSocket frame using the 64-bit length form and an extremely large length. undici's ByteParser overflows internal math, ends up in an invalid state, and throws a fatal TypeError that terminates the process. Patches Patched in the undici version v7.24.0 and v6.24.0. Users should upgrade to this version or later.

CVSS3: 7.5
0%
Низкий
18 дней назад
debian логотип
CVE-2026-1528

ImpactA server can reply with a WebSocket frame using the 64-bit lengt ...

CVSS3: 7.5
0%
Низкий
18 дней назад
github логотип
GHSA-f269-vfmq-vjvj

Undici: Malicious WebSocket 64-bit length overflows parser and crashes the client

CVSS3: 7.5
0%
Низкий
17 дней назад

Уязвимостей на страницу