-
CVSS Score
-The vulnerability stems from the data_received function's handling of message parsing. Before the patch:
The commit diff shows critical validation added around header/body size checks and transport closure, confirming this was the vulnerable entry point. The test case in test_connections.py demonstrates how crafted packets exploit this function.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| asyncua | pip | < 0.9.96 | 0.9.96 |
A Semantic Attack on Google Gemini - Read the Latest Research