Grpc

Grpc

14 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.18%
  • Veröffentlicht 26.11.2024 17:15:22
  • Zuletzt bearbeitet 23.07.2025 20:13:08

There exists a denial of service through Data corruption in gRPC-C++ - gRPC-C++ servers with transmit zero copy enabled through the channel arg GRPC_ARG_TCP_TX_ZEROCOPY_ENABLED can experience data corruption issues. The data sent by the application m...

Exploit
  • EPSS 0.04%
  • Veröffentlicht 06.08.2024 11:16:07
  • Zuletzt bearbeitet 22.07.2025 19:29:58

It's possible for a gRPC client communicating with a HTTP/2 proxy to poison the HPACK table between the proxy and the backend such that other clients see failed requests. It's also possible to use this vulnerability to leak other clients HTTP header ...

  • EPSS 0.28%
  • Veröffentlicht 10.06.2024 22:15:12
  • Zuletzt bearbeitet 21.11.2024 09:23:20

@grpc/grps-js implements the core functionality of gRPC purely in JavaScript, without a C++ addon. Prior to versions 1.10.9, 1.9.15, and 1.8.22, there are two separate code paths in which memory can be allocated per message in excess of the `grpc.max...

Warnung Medienbericht Exploit
  • EPSS 94.44%
  • Veröffentlicht 10.10.2023 14:15:10
  • Zuletzt bearbeitet 11.06.2025 17:29:54

The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.

  • EPSS 0.02%
  • Veröffentlicht 13.09.2023 17:15:10
  • Zuletzt bearbeitet 21.11.2024 08:35:58

Lack of error handling in the TCP server in Google's gRPC starting version 1.23 on posix-compatible platforms (ex. Linux) allows an attacker to cause a denial of service by initiating a significant number of connections with the server. Note that gRP...

  • EPSS 0.12%
  • Veröffentlicht 09.08.2023 13:15:09
  • Zuletzt bearbeitet 21.11.2024 08:06:17

gRPC contains a vulnerability that allows hpack table accounting errors could lead to unwanted disconnects between clients and servers in exceptional cases/ Three vectors were found that allow the following DOS attacks: - Unbounded memory buffering ...

  • EPSS 0.02%
  • Veröffentlicht 09.06.2023 11:15:09
  • Zuletzt bearbeitet 21.11.2024 07:39:10

There exists an vulnerability causing an abort() to be called in gRPC.  The following headers cause gRPC's C++ implementation to abort() when called via http2: te: x (x != trailers) :scheme: x (x != http, https) grpclb_client_stats: x (x == anythi...

  • EPSS 0.07%
  • Veröffentlicht 09.06.2023 11:15:09
  • Zuletzt bearbeitet 21.11.2024 08:03:55

When gRPC HTTP2 stack raised a header size exceeded error, it skipped parsing the rest of the HPACK frame. This caused any HPACK table mutations to also be skipped, resulting in a desynchronization of HPACK tables between sender and receiver. If leve...

  • EPSS 0.02%
  • Veröffentlicht 09.06.2023 11:15:09
  • Zuletzt bearbeitet 13.02.2025 17:16:32

gRPC contains a vulnerability whereby a client can cause a termination of connection between a HTTP2 proxy and a gRPC server: a base64 encoding error for `-bin` suffixed headers will result in a disconnection by the gRPC server, but is typically allo...

  • EPSS 1.84%
  • Veröffentlicht 11.11.2020 11:15:10
  • Zuletzt bearbeitet 21.11.2024 05:37:45

The package grpc before 1.24.4; the package @grpc/grpc-js before 1.1.8 are vulnerable to Prototype Pollution via loadPackageDefinition.