In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Allocation of Resources Without Limits or Throttling vulnerabilities in an interactive lesson.
Start learningUpgrade protobuf
to version 3.7.2 or higher.
Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling via the protobuf::coded_input_stream::CodedInputStream::skip_group
function due to improper handling of unknown fields when parsing user-supplied input. An attacker can cause a stack overflow by sending specially crafted messages that trigger uncontrolled recursion.