Safety vulnerability ID: 42251
The information on this page was manually curated by our Cybersecurity Intelligence Team.
The Serialize.deserialize() method in CoAPthon 3.1, 4.0.0, 4.0.1, and 4.0.2 mishandles certain exceptions, leading to a denial of service in applications that use this library (e.g., the standard CoAP server, CoAP client, CoAP reverse proxy, example collect CoAP server and client) when they receive crafted CoAP messages.
Latest version: 4.0.2
CoAPthon is an implementation of the CoAP protocol.
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application