cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-7254,https://securityvulnerability.io/vulnerability/CVE-2024-7254,скеName Overflow Vulnerability in Protocol Buffers,"Any project that parses untrusted Protocol Buffers data containing an arbitrary number of nested groups / series of SGROUP tags can corrupted by exceeding the stack limit i.e. StackOverflow. Parsing nested groups as unknown fields with DiscardUnknownFieldsParser or Java Protobuf Lite parser, or against Protobuf map fields, creates unbounded recursions that can be abused by an attacker.",Google,"Protocol Buffers,Protobuf-java,Protobuf-javalite,Protobuf-kotlin,Protobuf-kotllin-lite,Google-protobuf [jruby Gem]",,,0.0004299999854993075,false,false,false,false,,false,false,2024-09-19T01:15:00.000Z,0 CVE-2022-1941,https://securityvulnerability.io/vulnerability/CVE-2022-1941,Out of Memory issue in ProtocolBuffers for cpp and python,"A parsing vulnerability for the MessageSet type in the ProtocolBuffers versions prior to and including 3.16.1, 3.17.3, 3.18.2, 3.19.4, 3.20.1 and 3.21.5 for protobuf-cpp, and versions prior to and including 3.16.1, 3.17.3, 3.18.2, 3.19.4, 3.20.1 and 4.21.5 for protobuf-python can lead to out of memory failures. A specially crafted message with multiple key-value per elements creates parsing issues, and can lead to a Denial of Service against services receiving unsanitized input. We recommend upgrading to versions 3.18.3, 3.19.5, 3.20.2, 3.21.6 for protobuf-cpp and 3.18.3, 3.19.5, 3.20.2, 4.21.6 for protobuf-python. Versions for 3.16 and 3.17 are no longer updated.",Google,"Protobuf-cpp,Protobuf-python",7.5,HIGH,0.003659999929368496,false,false,false,false,,false,false,2022-09-22T00:00:00.000Z,0 CVE-2021-22570,https://securityvulnerability.io/vulnerability/CVE-2021-22570,Nullptr Dereference in Protobuf,"Nullptr dereference when a null char is present in a proto symbol. The symbol is parsed incorrectly, leading to an unchecked call into the proto file's name during generation of the resulting error message. Since the symbol is incorrectly parsed, the file is nullptr. We recommend upgrading to version 3.15.0 or greater.",Google,Protobuf,6.5,MEDIUM,0.00044999999227002263,false,false,false,false,,false,false,2022-01-26T00:00:00.000Z,0 CVE-2021-22569,https://securityvulnerability.io/vulnerability/CVE-2021-22569,Denial of Service of protobuf-java parsing procedure,"An issue in protobuf-java allowed the interleaving of com.google.protobuf.UnknownFieldSet fields in such a way that would be processed out of order. A small malicious payload can occupy the parser for several minutes by creating large numbers of short-lived objects that cause frequent, repeated pauses. We recommend upgrading libraries beyond the vulnerable versions.",Google,"Protobuf-java,Protobuf-kotlin,Google-protobuf [jruby Gem]",7.5,HIGH,0.0010100000072270632,false,false,false,true,true,false,false,2022-01-10T14:10:00.000Z,0 CVE-2015-5237,https://securityvulnerability.io/vulnerability/CVE-2015-5237,,protobuf allows remote authenticated attackers to cause a heap-based buffer overflow.,Google,Protobuf,8.8,HIGH,0.015410000458359718,false,false,false,false,,false,false,2017-09-25T17:00:00.000Z,0