Tag
protobuf.js Code Injection via Crafted Bytes Field Defaults (CVE-2026-44293)
2 rules 1 TTPprotobuf.js is vulnerable to code injection (CVE-2026-44293); by crafting a protobuf descriptor with a non-string default value for a `bytes` field, an attacker can inject arbitrary Javascript code into the generated `toObject` conversion function if default values are enabled, requiring the application to load an attacker-controlled schema and convert a message of the affected type with defaults enabled.
protobuf.js Denial-of-Service Vulnerability via Unbounded Recursion (CVE-2026-44289)
2 rules 1 TTPprotobuf.js is vulnerable to a denial-of-service (DoS) attack (CVE-2026-44289) due to unbounded recursion while decoding nested protobuf data, potentially leading to stack exhaustion and process crashes when processing crafted protobuf binary payloads.
protobuf.js CLI pbts Command Injection Vulnerability
2 rules 1 TTPThe protobuf.js CLI tool `pbts` is vulnerable to OS command injection via crafted filenames or paths with shell metacharacters, potentially leading to arbitrary command execution with the privileges of the `pbts` process when invoked on attacker-influenced file paths; CVE-2026-42290.