7.5
CVSSv3

CVE-2018-21036

Published: 21/07/2020 Updated: 23/07/2020
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

Sails.js before v1.0.0-46 allows malicious users to cause a denial of service with a single request because there is no error handler in sails-hook-sockets to handle an empty pathname in a WebSocket request.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

sailsjs sails

Mailing Lists

Hello, Sailsjs (sailsjscom/) <sailsjscom/> before v100-46 allows attackers to cause a denial of service with a single request because there is no error handler in sails-hook-sockets to handle an empty pathname in a WebSocket request [Affected Product Code Base] Sailsjs - < v100-46 sails-hook-sockets - < 155 ...