Show filters
8 Total Results
Displaying 1-8 of 8
Sort by:
Attacker Value
Unknown

CVE-2024-24786

Disclosure Date: March 05, 2024 (last updated March 06, 2024)
The protojson.Unmarshal function can enter an infinite loop when unmarshaling certain forms of invalid JSON. This condition can occur when unmarshaling into a message which contains a google.protobuf.Any value, or when the UnmarshalOptions.DiscardUnknown option is set.
0
Attacker Value
Unknown

CVE-2023-36665

Disclosure Date: July 05, 2023 (last updated October 08, 2023)
"protobuf.js (aka protobufjs) 6.10.0 through 7.x before 7.2.5 allows Prototype Pollution, a different vulnerability than CVE-2022-25878. A user-controlled protobuf message can be used by an attacker to pollute the prototype of Object.prototype by adding and overwriting its data and functions. Exploitation can involve: (1) using the function parse to parse protobuf messages on the fly, (2) loading .proto files by using load/loadSync functions, or (3) providing untrusted input to the functions ReflectionObject.setParsedOption and util.setProperty.
Attacker Value
Unknown

CVE-2023-24535

Disclosure Date: June 08, 2023 (last updated October 08, 2023)
Parsing invalid messages can panic. Parsing a text-format message which contains a potential number consisting of a minus sign, one or more characters of whitespace, and no further input will cause a panic.
Attacker Value
Unknown

CVE-2022-48468

Disclosure Date: April 13, 2023 (last updated October 08, 2023)
protobuf-c before 1.4.1 has an unsigned integer overflow in parse_required_member.
Attacker Value
Unknown

CVE-2022-33070

Disclosure Date: June 23, 2022 (last updated November 08, 2023)
Protobuf-c v1.4.0 was discovered to contain an invalid arithmetic shift via the function parse_tag_and_wiretype in protobuf-c/protobuf-c.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via unspecified vectors.
Attacker Value
Unknown

CVE-2022-25878

Disclosure Date: May 27, 2022 (last updated October 07, 2023)
The package protobufjs before 6.11.3 are vulnerable to Prototype Pollution which can allow an attacker to add/modify properties of the Object.prototype. This vulnerability can occur in multiple ways: 1. by providing untrusted user input to util.setProperty or to ReflectionObject.setParsedOption functions 2. by parsing/loading .proto files
Attacker Value
Unknown

CVE-2019-15544

Disclosure Date: August 26, 2019 (last updated November 08, 2023)
An issue was discovered in the protobuf crate before 2.6.0 for Rust. Attackers can exhaust all memory via Vec::reserve calls.
Attacker Value
Unknown

CVE-2018-3738

Disclosure Date: June 07, 2018 (last updated November 26, 2024)
protobufjs is vulnerable to ReDoS when parsing crafted invalid .proto files.