qs-codec is vulnerable to Denial of Service (DoS)
25
Low Risk
Affected versions of the package are vulnerable to denial-of-service conditions due to unbounded list growth during query string decoding. When decoding crafted inputs with excessive parameters, lists can grow without limit, leading to excessive memory consumption. The fix introduces controlled overflow handling by converting oversized lists into a bounded overflow structure, ensuring memory safety and preventing resource exhaustion during parsing.
You are affected if you are using a version that falls within the vulnerable range.
qs-codec is vulnerable to Denial of Service (DoS) in versions 0.0.1 - 1.3.2.
Upgrade the qs-codec library to the patch version.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant