next is vulnerable to Denial of Service
75
High Risk
Cache Component request flows can be forced into a body-handling deadlock that keeps connections open for too long. Repeated crafted requests can exhaust file descriptors and worker capacity. This enables availability degradation through connection exhaustion. The fix strips internal resume headers from untrusted input and prevents this deadlock path from external traffic.
You are affected if you are using a version that falls within the vulnerable range.
next is vulnerable to Denial of Service in versions 15.0.0 - 15.5.15 and 16.0.0 - 16.2.4.
Upgrade the next library to the patch version.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant