next is vulnerable to Denial of Service
75
High Risk
Server Components request handling can consume excessive CPU when deserializing crafted input to server function endpoints. An attacker can repeatedly trigger heavy processing and exhaust request handling capacity. This degrades application availability without requiring prior access. The fix hardens deserialization behavior to prevent unbounded compute usage from malformed payloads.
You are affected if you are using a version that falls within the vulnerable range.
next is vulnerable to Denial of Service in versions 13.0.0 - 15.5.15 and 16.0.0 - 16.2.4.
Upgrade the next library to the patch version.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant