Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-8m45-2rjm-j347: @solana/web3.js vulnerable to Denial of Service attack via Message/Transaction object deserialization

Using particular inputs with @solana/web3.js will result in memory exhaustion (OOM).

If you have a server, client, mobile, or desktop product that accepts untrusted input for use with @solana/web3.js, your application/service may crash, resulting in a loss of availability.

ghsa
#web#dos#js#git

@solana/web3.js vulnerable to Denial of Service attack via Message/Transaction object deserialization

High severity GitHub Reviewed Published Apr 17, 2024 in solana-labs/solana-web3.js • Updated Apr 17, 2024

ghsa: Latest News

GHSA-625h-95r8-8xpm: Rack has an unsafe default in Rack::QueryParser allows params_limit bypass via semicolon-separated parameters