A high-performance REST toolkit written in C++

api-rest server
1 Open Issue Need Help Last updated: Sep 10, 2025

Open Issues Need Help

View All on GitHub

AI Summary: A security vulnerability exists in Pistache where a controlled input value, specifically a very large `size` at `http.cc#L496`, is used for dynamic memory allocation without proper validation. This can lead to an out-of-memory error, reproducible via the OSS Fuzz harness `fuzz_parsers` with a provided crashing input.

Complexity: 2/5
bug help wanted security

A high-performance REST toolkit written in C++

C++
#api-rest#server