{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T23:34:47.937","vulnerabilities":[{"cve":{"id":"CVE-2018-1000518","sourceIdentifier":"cve@mitre.org","published":"2018-06-26T16:29:01.243","lastModified":"2024-11-21T03:40:06.297","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"aaugustin websockets version 4 contains a CWE-409: Improper Handling of Highly Compressed Data (Data Amplification) vulnerability in Servers and clients, unless configured with compression=None that can result in Denial of Service by memory exhaustion. This attack appear to be exploitable via Sending a specially crafted frame on an established connection. This vulnerability appears to have been fixed in 5."},{"lang":"es","value":"aaugustin websockets 4 contiene una vulnerabilidad CWE-409: gestión incorrecta de datos altamente comprimidos (amplificación de datos) en los servidores y los clientes, a no ser que se configure con compression=None, lo que puede resultar en una denegación de servicio (DoS) por agotamiento de memoria. Este ataque parece ser explotable mediante el envío de una trama especialmente manipulada en una conexión establecida. La vulnerabilidad parece haber sido solucionada en la versión 5."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-400"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:websockets_project:websockets:4.0:*:*:*:*:python:*:*","matchCriteriaId":"62B9B0E7-5768-4331-8C88-3C730255219B"}]}]}],"references":[{"url":"https://github.com/aaugustin/websockets/pull/407","source":"cve@mitre.org","tags":["Exploit","Patch","Third Party Advisory"]},{"url":"https://github.com/aaugustin/websockets/pull/407","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Third Party Advisory"]}]}}]}