handleIncomingPacket in conn.go in Pion DTLS before 1.5.2 lacks a check for application data with epoch 0, which allows remote attackers to inject arbitrary unencrypted data after handshake completion.
{ "versions": [ { "introduced": "0" }, { "fixed": "1.5.2" } ] }
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-20786.json"