{"id":"CVE-2020-36049","details":"socket.io-parser before 3.4.1 allows attackers to cause a denial of service (memory consumption) via a large packet because a concatenation approach is used.","aliases":["GHSA-xfhh-g9f5-x4m4"],"modified":"2026-03-14T10:26:28.526662Z","published":"2021-01-08T00:15:11.187Z","references":[{"type":"ADVISORY","url":"https://github.com/bcaller/kill-engine-io"},{"type":"FIX","url":"https://github.com/socketio/socket.io-parser/commit/dcb942d24db97162ad16a67c2a0cf30875342d55"},{"type":"EVIDENCE","url":"https://blog.caller.xyz/socketio-engineio-dos/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/socketio/socket.io-parser","events":[{"introduced":"0"},{"fixed":"a8130ce3a9682498bf986a0c3e4a53f9cf2ef965"},{"fixed":"dcb942d24db97162ad16a67c2a0cf30875342d55"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"3.4.1"}]}}],"versions":["2.0.0","2.1.0","2.1.1","2.1.2","2.1.3","2.1.4","2.1.5","2.2.0","2.2.1","2.2.2","2.2.3","2.2.4","2.2.5","2.2.6","2.3.0","2.3.1","2.3.2","3.0.0","3.1.0","3.1.1","3.1.2","3.1.3","3.2.0","3.3.0","3.4.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-36049.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}