Page 2 of 12 results (0.005 seconds)

CVSS: 5.3EPSS: 0%CPEs: 3EXPL: 0

gRPC contains a vulnerability whereby a client can cause a termination of connection between a HTTP2 proxy and a gRPC server: a base64 encoding error for `-bin` suffixed headers will result in a disconnection by the gRPC server, but is typically allowed by HTTP2 proxies. We recommend upgrading beyond the commit in  https://github.com/grpc/grpc/pull/32309 https://www.google.com/url gRPC contiene una vulnerabilidad por la que un cliente puede provocar la finalización de la conexión entre un proxy HTTP2 y un servidor gRPC. Un error de codificación en base64 para cabeceras con sufijo "-bin" provocará la desconexión por parte del servidor gRPC, pero suele estar permitido por los proxies HTTP2. Se recomienda actualizar más allá del commit "https://github.com/grpc/grpc/pull/32309". • https://github.com/grpc/grpc/pull/32309 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/37IDNVY5AWVH7JDMM2SDTL24ZPPZJNSY https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VWE44J5FG7THHL7XVEVTNIGEYBNKJBLL • CWE-440: Expected Behavior Violation •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

There exists an vulnerability causing an abort() to be called in gRPC.  The following headers cause gRPC's C++ implementation to abort() when called via http2: te: x (x != trailers) :scheme: x (x != http, https) grpclb_client_stats: x (x == anything) On top of sending one of those headers, a later header must be sent that gets the total header size past 8KB. We recommend upgrading past git commit 2485fa94bd8a723e5c977d55a3ce10b301b437f8 or v1.53 and above. • https://github.com/grpc/grpc/commit/2485fa94bd8a723e5c977d55a3ce10b301b437f8 • CWE-617: Reachable Assertion •

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 0

The package grpc before 1.24.4; the package @grpc/grpc-js before 1.1.8 are vulnerable to Prototype Pollution via loadPackageDefinition. El paquete grpc versiones anteriores a 1.24.4; el paquete @grpc/grpc-js versiones anteriores a 1.1.8, son vulnerables a una contaminación de prototipo por medio de loadPackageDefinition • https://github.com/grpc/grpc-node/pull/1605 https://github.com/grpc/grpc-node/pull/1606 https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1038819 https://snyk.io/vuln/SNYK-JS-GRPC-598671 https://snyk.io/vuln/SNYK-JS-GRPCGRPCJS-1038818 • CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

Google gRPC before 2017-04-05 has an out-of-bounds write caused by a heap-based buffer overflow related to core/lib/iomgr/error.c. Google gRPC antes del 05-04-2017, presenta una escritura fuera de límites causada por un desbordamiento de búfer en la región heap de la memoria relacionado con el archivo core/lib/iomgr/error.c. • https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1018 https://github.com/grpc/grpc/pull/10492 • CWE-787: Out-of-bounds Write •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

Google gRPC before 2017-03-29 has an out-of-bounds write caused by a heap-based use-after-free related to the grpc_call_destroy function in core/lib/surface/call.c. Google gRPC anterior a 2017-03-29 tiene una escritura fuera de límites causada por un uso después de liberación en el heap y relacionado con la función grpc_call_destroy en core/lib/surface/call.c. • http://www.securityfocus.com/bid/98280 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=726 https://github.com/grpc/grpc/pull/10353 • CWE-787: Out-of-bounds Write •