Show filters
18 Total Results
Displaying 11-18 of 18
Sort by:
Attacker Value
Unknown

CVE-2022-33070

Disclosure Date: June 23, 2022 (last updated November 08, 2023)
Protobuf-c v1.4.0 was discovered to contain an invalid arithmetic shift via the function parse_tag_and_wiretype in protobuf-c/protobuf-c.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via unspecified vectors.
Attacker Value
Unknown

CVE-2022-25878

Disclosure Date: May 27, 2022 (last updated February 23, 2025)
The package protobufjs before 6.11.3 are vulnerable to Prototype Pollution which can allow an attacker to add/modify properties of the Object.prototype. This vulnerability can occur in multiple ways: 1. by providing untrusted user input to util.setProperty or to ReflectionObject.setParsedOption functions 2. by parsing/loading .proto files
Attacker Value
Unknown

CVE-2021-22570

Disclosure Date: January 26, 2022 (last updated February 23, 2025)
Nullptr dereference when a null char is present in a proto symbol. The symbol is parsed incorrectly, leading to an unchecked call into the proto file's name during generation of the resulting error message. Since the symbol is incorrectly parsed, the file is nullptr. We recommend upgrading to version 3.15.0 or greater.
Attacker Value
Unknown

CVE-2021-22569

Disclosure Date: January 10, 2022 (last updated February 23, 2025)
An issue in protobuf-java allowed the interleaving of com.google.protobuf.UnknownFieldSet fields in such a way that would be processed out of order. A small malicious payload can occupy the parser for several minutes by creating large numbers of short-lived objects that cause frequent, repeated pauses. We recommend upgrading libraries beyond the vulnerable versions.
Attacker Value
Unknown

CVE-2021-3121

Disclosure Date: January 11, 2021 (last updated February 22, 2025)
An issue was discovered in GoGo Protobuf before 1.3.2. plugin/unmarshal/unmarshal.go lacks certain index validation, aka the "skippy peanut butter" issue.
Attacker Value
Unknown

CVE-2019-15544

Disclosure Date: August 26, 2019 (last updated November 08, 2023)
An issue was discovered in the protobuf crate before 2.6.0 for Rust. Attackers can exhaust all memory via Vec::reserve calls.
Attacker Value
Unknown

CVE-2018-3738

Disclosure Date: June 07, 2018 (last updated November 26, 2024)
protobufjs is vulnerable to ReDoS when parsing crafted invalid .proto files.
Attacker Value
Unknown

CVE-2015-5237

Disclosure Date: September 25, 2017 (last updated November 26, 2024)
protobuf allows remote authenticated attackers to cause a heap-based buffer overflow.