| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2026-33186 | gRPC-Go has an authorization bypass via missing leading slash in :path | grpc | grpc-go | Critical | 9.1 | 2026-03-20 22:23:32 | Deep Dive |
| CVE-2024-11407 | Denial of Service through Data corruption in gRPC-C++ | grpc | gRPC-C++ | - | - | 2024-11-26 16:59:50 | Deep Dive |
| CVE-2024-7246 | HPACK table poisoning in gRPC C++, Python & Ruby | gRPC | 中危 | - | 2024-08-06 10:14:28 | Deep Dive | |
| CVE-2024-37168 | @grpc/grpc-js can allocate memory for incoming messages well above configured limits | grpc | grpc-node | Medium | 5.3 | 2024-06-10 21:32:06 | Deep Dive |
| CVE-2023-4785 | Denial of Service in gRPC Core | gRPC | High | 7.5 | 2023-09-13 16:31:56 | Deep Dive | |
| CVE-2023-33953 | Denial-of-Service in gRPC | gRPC | High | 7.5 | 2023-08-09 12:54:47 | Deep Dive | |
| CVE-2023-32731 | Information leak in gRPC | gRPC | High | 7.4 | 2023-06-09 10:54:08 | Deep Dive | |
| CVE-2023-32732 | Denial-of-Service in gRPC | gRPC | Medium | 5.3 | 2023-06-09 10:48:15 | Deep Dive | |
| CVE-2023-1428 | Denial-of-Service in gRPC | gRPC | High | 7.5 | 2023-06-09 10:46:54 | Deep Dive | |
| CVE-2022-24777 | Denial of Service via reachable assertion in grpc-swift | grpc | grpc-swift | High | 7.5 | 2022-03-25 16:35:09 | Deep Dive |
| CVE-2020-7768 | Prototype Pollution | - | grpc | High | 7.5 | 2020-11-11 10:20:17 | Deep Dive |