The package io.socket:socket.io-client before 2.0.1 are vulnerable to NULL Pointer Dereference when parsing a packet with with invalid payload format.
References
Configurations
History
21 Nov 2024, 06:53
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/socketio/socket.io-client-java/commit/8664499b6f31154f49783531f778dac5387b766b - Patch, Third Party Advisory | |
References | () https://github.com/socketio/socket.io-client-java/commit/e8ffe9d1383736f6a21090ab959a2f4fa5a41284 - Patch, Third Party Advisory | |
References | () https://github.com/socketio/socket.io-client-java/issues/508%23issuecomment-1179817361 - Third Party Advisory | |
References | () https://github.com/socketio/socket.io-client-java/releases/tag/socket.io-client-2.0.1 - Release Notes, Third Party Advisory | |
References | () https://security.snyk.io/vuln/SNYK-JAVA-IOSOCKET-2949738 - Exploit, Issue Tracking, Patch, Release Notes, Third Party Advisory |
Information
Published : 2022-08-02 14:15
Updated : 2024-11-21 06:53
NVD link : CVE-2022-25867
Mitre link : CVE-2022-25867
CVE.ORG link : CVE-2022-25867
JSON object : View
Products Affected
socket
- socket.io-client_java
CWE
CWE-476
NULL Pointer Dereference