AI description
CVE-2025-55184 is a denial-of-service vulnerability affecting React Server Components (RSC) in versions 19.0.0, 19.0.1, 19.1.0, 19.1.1, 19.1.2, 19.2.0 and 19.2.1. It exists because the affected code unsafely deserializes payloads from HTTP requests to Server Function endpoints. This can lead to an infinite loop that hangs the server process, preventing it from serving future HTTP requests. The vulnerability can be triggered by sending a specially crafted HTTP request to any App Router endpoint. Exploitation does not require authentication and can be achieved with basic HTTP request crafting skills. An initial fix for this vulnerability was incomplete, and a complete fix has been issued under CVE-2025-67779.
- Description
- A pre-authentication denial of service vulnerability exists in React Server Components versions 19.0.0, 19.0.1 19.1.0, 19.1.1, 19.1.2, 19.2.0 and 19.2.1, including the following packages: react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The vulnerable code unsafely deserializes payloads from HTTP requests to Server Function endpoints, which can cause an infinite loop that hangs the server process and may prevent future HTTP requests from being served.
- Source
- cve-assign@fb.com
- NVD status
- Analyzed
- Products
- react, next.js
CVSS 3.1
- Type
- Secondary
- Base score
- 7.5
- Impact score
- 3.6
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
- Severity
- HIGH
- nvd@nist.gov
- CWE-502
Hype score is a measure of social media activity compared against trending CVEs from the past 12 months. Max score 100.
- Hype score
37
🚨 Urgent WAF update! 🚨 We've released emergency rules to protect against server-function exposure (CVE-2025-55183) & resource exhaustion (CVE-2025-55184). Enhanced security for your apps! 🛡️ https://t.co/ikyIQ9QaLX
@mveracf
13 Dec 2025
3 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Another one React Server Components Denial of Service - High Severity: CVE-2025-55184 and CVE-2025-67779 (CVSS 7.5) Source Code Exposure - Medium Severity: CVE-2025-55183 (CVSS 5.3) https://t.co/GbSdu7ZDYe #REACT #Exploit #Security https://t.co/30xwa9eCkz
@ZoltanSEC
13 Dec 2025
31 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Two new vulnerabilities disclosed: High-Severity DoS (CVE-2025-55184/67779) Medium-Severity Source Code Exposure (CVE-2025-55183) https://t.co/b1s5C96F3p
@AryaAmour08
13 Dec 2025
50 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
🚨 New Finding Alert 🚨 Excited to report a High Severity (8.2) vulnerability on @yeswehack! Found a DoS via Unsafe Deserialization in React Server Components. 🆔 CVE-2025-55184 Consistency is key in this game. 💻🔒 #BugBounty #AppSec #ReactJS #YesWeHack #Infosec #CVE h
@BgmiKaam41919
13 Dec 2025
4 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
React team warns of 3 new RSCs vulns: CVE-2025-55184 & CVE-2025-67779 cause infinite loops to crash servers. https://t.co/1vmVXWEOww https://t.co/kDBnmAd4ev
@MateusGalasso
13 Dec 2025
51 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
React2Shell Post-Mortem (CVE-2025-55184 / 67779 / 55183) Three High-severity vulns dropped → DoS + RCE + source code leaks possible in just hours. Our outcome? Zero production impact despite CVSS 7.5 How we survived: - Dependabot alerts - Patches deployed quickly and full htt
@GuatemalanJason
12 Dec 2025
149 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
waiting for the inevitable dup. tag on a high bug lol #CVE-2025-55184 https://t.co/BS9Iw23M5G
@artuc05
12 Dec 2025
141 Impressions
0 Retweets
2 Likes
1 Bookmark
1 Reply
0 Quotes
بعد أسبوع بس من طلبهم الأول بتحديث المكتبات الضعيفة، فريق React رجع يطلب نفس الشيء مرة ثانية. هالمرة الباحثين اكتشفوا ثغرتين ممكن يكونوا مزعجات. CVE-2025-55184 و CV
@altmemy199
12 Dec 2025
1297 Impressions
0 Retweets
14 Likes
3 Bookmarks
0 Replies
0 Quotes
CVE-2025-55184
@Zephyrdev_
12 Dec 2025
85 Impressions
0 Retweets
2 Likes
0 Bookmarks
1 Reply
0 Quotes
discussing vulnerabilities like CVE-2025-55184 type shi https://t.co/mfZ6jfehpp
@owenmilgram
12 Dec 2025
106 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
discussing vulnerabilities like CVE-2025-55184 type shi https://t.co/sv8A5h3aVF
@owenmilgram
12 Dec 2025
26 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-67779 It was found that the fix addressing CVE-2025-55184 in React Server Components was incomplete and does not prevent a denial of service attack in a specific case. Reac… https://t.co/vWb89mOv8Q
@CVEnew
12 Dec 2025
24 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-55184 nuclei template https://t.co/ressj9IrQN #cve #nuclei #REACT https://t.co/xlS95q48zy
@sirifu4k1
12 Dec 2025
1071 Impressions
5 Retweets
20 Likes
13 Bookmarks
0 Replies
0 Quotes
🚨 CVE-2025-55184 - high 🚨 React Server Components - Denial of Service > React Server Components 19.0.0 to 19.2.1 including react-server-dom-parcel, react-ser... 👾 https://t.co/Jxv11Wy1pN @pdnuclei #NucleiTemplates #cve
@pdnuclei_bot
12 Dec 2025
2697 Impressions
9 Retweets
41 Likes
21 Bookmarks
0 Replies
0 Quotes
‼️ Next.js Security Update: December 11, 2025 Two new React Server Components bugs affect Next.js App Router apps: a DoS infinite-loop hang (CVE-2025-55183, CVE-2025-55184) and Server Function source-code exposure (CVE-2025-55183) #code https://t.co/iOUVVrGSRL
@onix_react
12 Dec 2025
63 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
NEW React/Next.JS VULNERABILITIES JUST DROPPED 🔪 CVE-2025-55183 and CVE-2025-55184 React dropping new bangers every week 🗿 https://t.co/P4J0dW3zYc
@visharadup
12 Dec 2025
136 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
【続報・緊急】React Server Componentsに追加の脆弱性(CVE-2025-55184 / CVE-2025-55183)。前回パッチも不完全、再度アップデート必須【Next.js / Bun対応】 https://t.co/2wrFz1La0j #Qiitaアドカレ #Qiita @PythonHaruより
@yousukezan
12 Dec 2025
10376 Impressions
35 Retweets
124 Likes
68 Bookmarks
0 Replies
2 Quotes
🚨 Two new React Server Components (Next.js App Router) vulnerabilities disclosed: • CVE-2025-55184 (High) – DoS via malicious RSC payload → server hangs & CPU spike • CVE-2025-55183 (Medium) – Leak compiled Server Actions source code (business logic exposure)
@cletuskingdom
12 Dec 2025
179 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
🚨 URGENT: The React2Shell fix wasn't enough! New critical React Server Components vulnerabilities just dropped (CVE-2025-55184 DoS + CVE-2025-55183 source code leak) after researchers dug deeper into the original patches. These are separate from last week's RCE (still https:
@ronibhakta1
12 Dec 2025
3 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨React Server Component has discovered more CVEs : - CVE-2025-55184 (DoS) - CVE-2025-67779 (DoS) - CVE-2025-55183 (Source code disclosure) Versions affected : 19.0.0, 19.0.1, 19.0.2, 19.1.0, 19.1.1, 19.1.2, 19.1.2, 19.2.0, 19.2.1 and 19.2.2 of: - react-server-dom-webpack -
@ValkyriSecurity
12 Dec 2025
363 Impressions
1 Retweet
6 Likes
0 Bookmarks
0 Replies
0 Quotes
記事を投稿しました! 【続報・緊急】React Server Componentsに追加の脆弱性(CVE-2025-55184 / CVE-2025-... [Security] on #Qiita https://t.co/U62WCFnDO3
@PythonHaru
12 Dec 2025
37 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[New] React just found more bugs hiding in its last big patch. 🧩 CVE-2025-55184 & CVE-2025-67779 — can crash servers with one request. 🧩 CVE-2025-55183 — can leak source code from React Server Components. 👀 All discovered while testing the earlier CVE-2025-5518
@TheHackersNews
12 Dec 2025
10589 Impressions
31 Retweets
112 Likes
24 Bookmarks
2 Replies
2 Quotes
another day, another rsc vulnerability. → first, we’ve got cve-2025-55184 - a denial-of-service issue. ⋅ the core problem is simple: the rsc deserializer had no cycle detection. if someone sends a payload with circular refs or just absurdly deep nesting, the parser falls
@sanyampunia
12 Dec 2025
524 Impressions
0 Retweets
2 Likes
1 Bookmark
1 Reply
0 Quotes
CVE-2025-55184 PoC https://t.co/l9kioPMATF https://t.co/XZjseKOjIY
@penligent
12 Dec 2025
227 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
i keep getting email every day from talha tariq for "CVE-2025-55184 and CVE-2025-55183 in the React Server Components (RSC) implementation, affecting frameworks such as Next.js. Update application with latest patch." what vibe coding does to you
@archiexzzz
12 Dec 2025
22161 Impressions
8 Retweets
381 Likes
31 Bookmarks
18 Replies
4 Quotes
CVE-2025-55184 in React Server Components, reported by our security researcher RyotaK @ryotkak, has been disclosed. Even if you have applied the fix for React2Shell (CVE-2025-55182), you are still affected by this vulnerability, so please update again. While this does not lead
@flatt_sec_en
12 Dec 2025
664 Impressions
0 Retweets
5 Likes
1 Bookmark
0 Replies
0 Quotes
弊社セキュリティリサーチャーRyotaK @ryotkak がReact Server Componentsに報告した脆弱性(CVE-2025-55184)が公開されました。
@flatt_security
12 Dec 2025
8954 Impressions
24 Retweets
96 Likes
26 Bookmarks
0 Replies
0 Quotes
🚨 React Server Components [—] Dec 12, 2025 Comprehensive security advisory focusing on multiple recent critical vulnerabilities (including CVE-2025-55182, CVE-2025-55184, CVE-2025-55183, CVE-2025-67779) affecting React Server Components and related frameworks. Detailed... ht
@transilienceai
12 Dec 2025
15 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
实测React18系列版本也受到CVE-2025-55184影响了,怎么官方也没公布。。
@coderleilei
12 Dec 2025
81 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
⚠️ 【緊急安全警示】Next.js 發現高風險漏洞,請立即更新! 各位開發者朋友留意!Vercel 安全團隊剛剛發布了關於 Next.js App Router (RSC) 的兩個新安全漏洞通知。雖然目前暫無被攻擊的證據,但建議大家儘快採取
@Satoshi_wkkwu
12 Dec 2025
137 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Again? In less than a week we have TWO more vulnerabilities targeting React. CVE-2025-55183 - information leak vulnerability CVE-2025-55184 - A pre-authentication denial of service vulnerability Upgrade your apps again.... https://t.co/35GNIUuXN9
@itsdevdaniel
12 Dec 2025
482 Impressions
0 Retweets
2 Likes
0 Bookmarks
1 Reply
0 Quotes
Woke up to more React Server Component (RSC) security news! 🚨 It's a rough morning for developers. Two new vulnerabilities disclosed: High-Severity DoS (CVE-2025-55184/67779) Medium-Severity Source Code Exposure (CVE-2025-55183) PATCH IMMEDIATELY😮💨 https://t.co/MmBp
@AryaAmour08
12 Dec 2025
250 Impressions
0 Retweets
2 Likes
0 Bookmarks
0 Replies
0 Quotes
New React RSC vulnerabilities just dropped! CVE-2025-55184 and CVE-2025-55183, detailed in the latest Next.js & React security bulletins. Initial patches in React 19.0.1/19.1.2/19.2.1 turned out incomplete, leading to a new DoS vuln CVE-2025-67779 https://t.co/xD9Th3fRHk
@sunggatalimbet
12 Dec 2025
370 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
¡OJO, React Devs! ⚠️ Hay otra vulnerabilidad **crítica** (CVE-2025-55184) en React. Hackers ya la están explotando para RCE y DoS. Si usas React o Next.js, ¡ACTUALIZA AHORA! Cloudflare tuvo un outage por su parche de emergencia. ¡Tu app está en riesgo! #React #Ciberseg
@GagoDevM
11 Dec 2025
130 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
🚨 React has disclosed two new, additional vulnerabilities to the critical RCE vuln of last week - CVE-2025-55183 and CVE-2025-55184. Patches are available and urged to be applied immediately. Track live attacks against React honeypots 👉https://t.co/GXFaqggV8a https://t.co
@DefusedCyber
11 Dec 2025
5241 Impressions
19 Retweets
77 Likes
20 Bookmarks
0 Replies
1 Quote
Two new React Server Component vulnerabilities were just disclosed: 🔹 CVE-2025-55183: Info disclosure via coerced server function args 🔹 CVE-2025-55184: DoS via infinite promise recursion We've deployed Adaptive Security Engine Rapid Rules. Learn more: https://t.co/FhZApc5
@akamai_research
11 Dec 2025
5628 Impressions
2 Retweets
8 Likes
0 Bookmarks
0 Replies
2 Quotes
Cloudflare has released new emergency WAF rules addressing the following CVE to enhance customer protection. * React - Leaking Server Functions (CVE-2025-55183) * React - DoS (CVE-2025-55184) https://t.co/SdCU2jeMiQ
@Cloudforce_One
11 Dec 2025
1594 Impressions
5 Retweets
21 Likes
3 Bookmarks
2 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:facebook:react:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "4B63E074-FEA2-495B-98C6-9D74E343A1C0",
"versionEndExcluding": "19.0.2",
"versionStartIncluding": "19.0.0"
},
{
"criteria": "cpe:2.3:a:facebook:react:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "4C133EED-6729-453F-B832-3E5A7EC22E92",
"versionEndExcluding": "19.1.3",
"versionStartIncluding": "19.1.0"
},
{
"criteria": "cpe:2.3:a:facebook:react:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "DE6F153C-825C-41B6-BE6F-2552A26307E0",
"versionEndExcluding": "19.2.2",
"versionStartIncluding": "19.2.0"
}
],
"operator": "OR"
}
]
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:vercel:next.js:*:*:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "6E0DE913-817F-40D2-BC98-0D610CCDE02A",
"versionEndExcluding": "14.2.35",
"versionStartIncluding": "13.3.0"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:*:*:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "7F89ACED-432F-4789-A368-96D4E28DEE34",
"versionEndExcluding": "15.0.7",
"versionStartIncluding": "15.0.0"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:*:*:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "99287D38-84D1-470A-96EF-B1D851552139",
"versionEndExcluding": "15.1.11",
"versionStartIncluding": "15.1.0"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:*:*:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "4E4E7989-19E3-44C5-B292-54C73FF3F356",
"versionEndExcluding": "15.2.8",
"versionStartIncluding": "15.2.0"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:*:*:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "78D397D2-B678-4463-85AB-8887554166C9",
"versionEndExcluding": "15.3.8",
"versionStartIncluding": "15.3.0"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:*:*:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "137455D1-FCE0-4A58-A479-E7CA39EA969D",
"versionEndExcluding": "15.4.10",
"versionStartIncluding": "15.4.0"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:*:*:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "7EFB67E0-24A1-4013-A654-C3EEAA2702DD",
"versionEndExcluding": "15.5.9",
"versionStartIncluding": "15.5.0"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:*:*:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "009539CB-1F6D-446A-B581-1ABC70B10154",
"versionEndExcluding": "16.0.10",
"versionStartIncluding": "16.0.0"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:-:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "3ED7F693-8012-4F88-BC71-CF108E20664A"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary0:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "40EE98AC-754A-4FD9-B51A-9E2674584FD9"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary1:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "13B41C54-AF21-4637-A852-F997635B4E83"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary10:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "91B41697-2D70-488D-A5C3-CB9D435560CA"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary11:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "7D43DB84-7BCF-429B-849A-7189EC1922D0"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary12:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "CEC2346B-8DBD-4D53-9866-CFBDD3AACEF2"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary13:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "2BC95097-8CA6-42FE-98D7-F968E37C11B7"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary14:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "4F8FA85C-1200-4FD2-B5D7-906300748BD4"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary15:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "5D0B177B-2A31-48E9-81C7-1024E2452486"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary16:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "7CCA01F3-3A14-4450-8A68-B1DA22C685B7"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary17:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "1AB351AE-8C29-4E67-8699-0AAC6B3383E2"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary18:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "14A34D9D-5FA2-434B-836E-3CE63D716CCB"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary19:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "E8440F05-F32B-4D40-90B7-04BF22107D86"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary2:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "FB6C6F6D-1EC0-4BD9-97A4-CFDE70DF0C43"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary20:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "6189BD4C-A3E2-451B-96B2-FF01250E946D"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary21:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "389EE453-8B07-45DD-BE9C-277C9C5CB156"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary22:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "BA4D4638-4734-4B16-87AA-EF4B5D2DDD7A"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary23:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "D54A2E63-6E0C-4E17-86A8-459B0A7EE00B"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary24:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "E6136F0A-3010-4BAD-811B-D047CF5E6F64"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary25:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "525EFA40-B14B-47E9-8FBD-45721A802DB6"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary26:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "69142944-1EC0-4F94-862E-FA7F2E101101"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary27:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "30016C06-372D-4F98-84A8-0732CA054970"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary28:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "E1536E2B-84EC-46A3-9B6F-026364A9D927"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary29:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "5E6F1F60-30E2-407C-8152-EEEB7EFE24CB"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary3:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "3C907301-2C8F-465B-8134-94130E29F5DB"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary30:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "E81C89FD-40CB-471E-9967-90ACDCF79373"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary31:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "55E8AEEC-A686-49D6-B298-AEE4E838E769"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary32:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "CB0618EC-6A0B-4AC3-BF6D-E51AC84C4E15"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary33:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "7B27F133-8EB4-4761-A706-DF42D4EB55F6"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary34:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "BF975472-B7E7-4AC8-B834-DA19897A4894"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary35:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "48A82613-F3FD-4E89-8E4A-F3F05A616171"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary36:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "0D42CA1F-7C21-47C1-8A9C-1015286FCBE2"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary37:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "7C83A4EF-B96F-40EC-BA1F-FE1370AF78AC"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary38:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "C151FDAB-DE34-4A7E-9762-6E99386798BF"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary39:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "53025212-05F0-41FE-81F8-023B1784BB8C"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary4:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "68EAC2B9-32A5-4721-BB35-16D519CD1BBC"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary40:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "7411EF71-CBEB-4127-935F-3C732A1E22AC"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary41:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "0C4B8930-1B65-4894-AFA8-C323AA7A8292"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary42:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "B4977345-BD8C-41C7-9DD7-1E41D6CC6438"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary43:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "EFE030A4-5B14-4C2D-B953-E80C98FB26EE"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary44:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "9F616FD4-83BF-4A9A-AFFD-0D3E2544DC7E"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary45:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "00512630-8B88-43B0-9ED3-2B33C64CC9A9"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary46:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "A88EEF11-C7DA-4E2D-A030-FC177E696557"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary47:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "BE8453D9-7275-4A5F-8732-F05662FFF2E8"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary48:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "E306B896-9BBB-424B-8D99-7A1A79AEFE9D"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary49:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "ACA87B86-33D5-4BEA-A13D-EEB4922D511E"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary5:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "77AA0D23-B101-445C-A260-ED3152A93D17"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary50:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "7D7DCCF7-FC83-4767-A0C2-C84A8B14F93B"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary51:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "FD397568-7F1F-4153-AF08-B22D4D3B45F9"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary52:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "984416EF-B121-40CE-B3AD-E22A06BB5844"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary53:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "C4B58652-EE24-43CF-8ABE-4A01B2C9938C"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary54:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "8090CF73-AEA7-43FC-A960-321BED3B1682"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary55:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "823164E5-609D-4F24-86A5-E25618FE86A7"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary56:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "E13CD688-63C3-4FFA-9D13-696005F0C155"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary57:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "B397B18C-8A7A-4766-9A68-98B26E190A4A"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary58:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "15454C74-5F28-475D-830A-2AE603292301"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary59:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "A638BD4D-8CE5-421E-97C3-A56A4F057A50"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary6:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "2DB345E3-BAD0-497E-93AE-5E4DC669C192"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary7:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "840FEB19-2C66-4004-A488-B90219F8AC05"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary8:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "C260F966-73D7-43F3-A329-8C558A695821"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:15.6.0:canary9:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "28130A79-39B5-43E8-A690-C8E9C62483F8"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:16.1.0:-:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "09089CEC-B446-496E-940D-AD4FE4E440ED"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:16.1.0:canary0:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "22B740D5-0CF9-45D6-A12A-FE0567276481"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:16.1.0:canary1:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "256B837F-159D-449B-A748-5E4136E17D21"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:16.1.0:canary10:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "7091E48E-8CD5-41DB-835F-6A3DC82CC10E"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:16.1.0:canary11:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "F074BCE2-16CA-4628-9325-4C1865F71B05"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:16.1.0:canary12:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "EC66102A-F2C4-4069-A7D0-CA1E1961B048"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:16.1.0:canary13:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "D9AFF756-AD32-4B69-A3C2-CD77BEEDC30D"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:16.1.0:canary14:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "550CC768-2BFF-41D2-B2A9-6332782FAE8B"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:16.1.0:canary15:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "65B15DCD-A2F3-445A-85FC-1B35F176FAA1"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:16.1.0:canary16:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "6923D356-EF15-4747-877B-74F6B5CFC297"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:16.1.0:canary17:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "2B1A9FB9-9501-4F29-9535-D21387A668DE"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:16.1.0:canary18:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "DA2A5F90-BEC1-4588-BFD6-4D095EAB40A2"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:16.1.0:canary2:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "061F871B-F0F9-4166-8D97-3A9F6D234AD0"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:16.1.0:canary3:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "2F375E07-2ACB-4FF1-86C7-D499EEA9BD20"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:16.1.0:canary4:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "4540A878-F057-4371-97C8-B286921E7F5D"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:16.1.0:canary5:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "F7A5ED68-0BB9-4699-B0F5-C425DC92F8A9"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:16.1.0:canary6:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "76CD81F2-69D3-47F0-988E-235A16870511"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:16.1.0:canary7:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "74EE714B-8E4F-47A0-9C9C-C3A93810ABB3"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:16.1.0:canary8:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "1C2E002A-D038-492A-8B83-F5EF658B56ED"
},
{
"criteria": "cpe:2.3:a:vercel:next.js:16.1.0:canary9:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "F369DF32-1EF0-4342-BFEF-CFC0F485D8B6"
}
],
"operator": "OR"
}
]
}
]