Browse all 4 CVE security advisories affecting hyperium. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Hyperium is an HTTP library primarily used for building robust web clients and servers in Rust. Historically, it has been susceptible to remote code execution, cross-site scripting, and privilege escalation vulnerabilities, often stemming from improper input validation and insecure default configurations. While no major public security incidents have been documented, the four recorded CVEs highlight potential risks in request handling and memory management. Its Rust foundation provides memory safety advantages, but developers must remain vigilant about dependency updates and secure implementation practices to mitigate potential attack vectors in web service integrations.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2024-47609 | Remotely exploitable DoS in Tonic `<=v0.12.2` — tonicCWE-755 | 7.5 | - | 2024-10-01 |
| CVE-2021-32715 | Lenient Parsing of Content-Length Header When Prefixed with Plus Sign — hyperCWE-444 | 3.1 | Low | 2021-07-07 |
| CVE-2021-32714 | Integer Overflow in Chunked Transfer-Encoding — hyperCWE-190 | 5.9 | Medium | 2021-07-07 |
| CVE-2021-21299 | Multiple Transfer-Encoding headers misinterprets request payload — hyperCWE-444 | 4.8 | Medium | 2021-02-11 |
This page lists every published CVE security advisory associated with hyperium. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.