Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-8m45-2rjm-j347: @solana/web3.js vulnerable to Denial of Service attack via Message/Transaction object deserialization

Using particular inputs with @solana/web3.js will result in memory exhaustion (OOM).

If you have a server, client, mobile, or desktop product that accepts untrusted input for use with @solana/web3.js, your application/service may crash, resulting in a loss of availability.

ghsa
#web#dos#js#git

@solana/web3.js vulnerable to Denial of Service attack via Message/Transaction object deserialization

High severity GitHub Reviewed Published Apr 17, 2024 in solana-labs/solana-web3.js • Updated Apr 17, 2024

ghsa: Latest News

GHSA-8q6v-474h-whgg: The Thinbus Javascript Secure Remote Password (SRP) Client Generates Fewer Bits of Entropy Than Intended