Количество 2
Количество 2
CVE-2022-3212
<bytes::Bytes as axum_core::extract::FromRequest>::from_request would not, by default, set a limit for the size of the request body. That meant if a malicious peer would send a very large (or infinite) body your server might run out of memory and crash. This also applies to these extractors which used Bytes::from_request internally: axum::extract::Form axum::extract::Json String
GHSA-m77f-652q-wwp4
axum-core has no default limit put on request bodies
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2022-3212 <bytes::Bytes as axum_core::extract::FromRequest>::from_request would not, by default, set a limit for the size of the request body. That meant if a malicious peer would send a very large (or infinite) body your server might run out of memory and crash. This also applies to these extractors which used Bytes::from_request internally: axum::extract::Form axum::extract::Json String | CVSS3: 7.5 | 0% Низкий | больше 3 лет назад | |
GHSA-m77f-652q-wwp4 axum-core has no default limit put on request bodies | CVSS3: 7.5 | 0% Низкий | больше 3 лет назад |
Уязвимостей на страницу