Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-pp9r-xg4c-8j4x | Salvo Affected by Denial of Service via Unbounded Memory Allocation in Form Data Parsing |
Wed, 25 Mar 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 24 Mar 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Salvo
Salvo salvo |
|
| CPEs | cpe:2.3:a:salvo:salvo:*:*:*:*:*:rust:*:* | |
| Vendors & Products |
Salvo
Salvo salvo |
|
| Metrics |
cvssV3_1
|
Tue, 24 Mar 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Salvo-rs
Salvo-rs salvo |
|
| Vendors & Products |
Salvo-rs
Salvo-rs salvo |
Tue, 24 Mar 2026 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Salvo is a Rust web framework. Prior to version 0.89.3, Salvo's form data parsing implementations (`form_data()` method and `Extractible` macro) do not enforce payload size limits before reading request bodies into memory. This allows attackers to cause Out-of-Memory (OOM) conditions by sending extremely large payloads, leading to service crashes and denial of service. Version 0.89.3 contains a patch. | |
| Title | Salvo Affected by Denial of Service via Unbounded Memory Allocation in Form Data Parsing | |
| Weaknesses | CWE-770 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-25T19:22:48.083Z
Reserved: 2026-03-18T02:42:27.508Z
Link: CVE-2026-33241
Updated: 2026-03-25T19:22:16.444Z
Status : Analyzed
Published: 2026-03-24T00:16:29.517
Modified: 2026-03-24T19:37:58.750
Link: CVE-2026-33241
No data.
OpenCVE Enrichment
Updated: 2026-03-25T21:27:53Z
Github GHSA