qs_dart is vulnerable to Denial of Service (DoS)
25
Low Risk
Affected versions of the package are vulnerable to denial-of-service conditions due to insufficient enforcement of array limits during query string decoding. Crafted inputs can cause arrays to grow beyond the configured listLimit, leading to excessive memory consumption. The updated decoding logic introduces explicit overflow tracking and converts oversized arrays into map-based representations when limits are exceeded, aligning behavior with Node.js qs semantics and preventing unbounded memory growth.
You are affected if you are using a version that falls within the vulnerable range.
qs_dart is vulnerable to Denial of Service (DoS) in versions 0.0.1 - 1.6.0.
Upgrade the qs_dart library to the patch version.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant