Description
ws is a "simple to use, blazing fast and thoroughly tested websocket client, server and console for node.js, up-to-date against RFC-6455". By sending an overly long websocket payload to a `ws` server, it is possible to crash the node process. This affects ws 1.1.0 and earlier.
Remediation
References
https://github.com/nodejs/node/issues/7388
https://nodesecurity.io/advisories/120
Related Vulnerabilities
CVE-2022-31367 Vulnerability in npm package strapi-plugin-content-type-builder
CVE-2022-33140 Vulnerability in maven package org.apache.nifi.registry:nifi-registry-framework
CVE-2018-1000620 Vulnerability in maven package org.webjars.npm:cryptiles
CVE-2020-14061 Vulnerability in maven package com.fasterxml.jackson.core:jackson-databind
CVE-2020-11988 Vulnerability in maven package org.apache.xmlgraphics:xmlgraphics-commons