Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-qatb-my8j-b3hr
Summary
gRPC Reachable Assertion issue
There exists an vulnerability causing an abort() to be called in gRPC.
The following headers cause gRPC's C++ implementation to abort() when called via http2:

te: x (x != trailers)

:scheme: x (x != http, https)

grpclb_client_stats: x (x == anything)

On top of sending one of those headers, a later header must be sent that gets the total header size past 8KB. We recommend upgrading past git commit 2485fa94bd8a723e5c977d55a3ce10b301b437f8 or v1.53 and above.
Aliases
0
alias CVE-2023-1428
1
alias GHSA-6628-q6j9-w8vg
Fixed_packages
0
url pkg:deb/debian/grpc@0?distro=trixie
purl pkg:deb/debian/grpc@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grpc@0%3Fdistro=trixie
1
url pkg:deb/debian/grpc@1.30.2-3?distro=trixie
purl pkg:deb/debian/grpc@1.30.2-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grpc@1.30.2-3%3Fdistro=trixie
2
url pkg:deb/debian/grpc@1.51.1-3?distro=trixie
purl pkg:deb/debian/grpc@1.51.1-3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6g6x-9wx8-uqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grpc@1.51.1-3%3Fdistro=trixie
3
url pkg:deb/debian/grpc@1.51.1-6?distro=trixie
purl pkg:deb/debian/grpc@1.51.1-6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6g6x-9wx8-uqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grpc@1.51.1-6%3Fdistro=trixie
4
url pkg:deb/debian/grpc@1.51.1-7?distro=trixie
purl pkg:deb/debian/grpc@1.51.1-7?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6g6x-9wx8-uqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grpc@1.51.1-7%3Fdistro=trixie
5
url pkg:deb/debian/grpc@1.51.1-8?distro=trixie
purl pkg:deb/debian/grpc@1.51.1-8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6g6x-9wx8-uqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grpc@1.51.1-8%3Fdistro=trixie
6
url pkg:deb/debian/grpc@1.51.1-9?distro=trixie
purl pkg:deb/debian/grpc@1.51.1-9?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6g6x-9wx8-uqa5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/grpc@1.51.1-9%3Fdistro=trixie
7
url pkg:gem/grpc@1.53.0
purl pkg:gem/grpc@1.53.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-61xa-2pun-n3c9
1
vulnerability VCID-9rmn-3anf-fqcm
2
vulnerability VCID-sufp-vkzp-xygp
3
vulnerability VCID-v4qr-8be5-bbej
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/grpc@1.53.0
8
url pkg:maven/io.grpc/grpc-protobuf@1.53.0
purl pkg:maven/io.grpc/grpc-protobuf@1.53.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-61xa-2pun-n3c9
1
vulnerability VCID-v4qr-8be5-bbej
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/io.grpc/grpc-protobuf@1.53.0
9
url pkg:pypi/grpcio@1.53.0
purl pkg:pypi/grpcio@1.53.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-61xa-2pun-n3c9
1
vulnerability VCID-9rmn-3anf-fqcm
2
vulnerability VCID-sufp-vkzp-xygp
3
vulnerability VCID-v4qr-8be5-bbej
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/grpcio@1.53.0
Affected_packages
0
url pkg:gem/grpc@1.51.0
purl pkg:gem/grpc@1.51.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-9rmn-3anf-fqcm
1
vulnerability VCID-qatb-my8j-b3hr
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/grpc@1.51.0
1
url pkg:gem/grpc@1.52.0.pre2
purl pkg:gem/grpc@1.52.0.pre2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-9rmn-3anf-fqcm
1
vulnerability VCID-qatb-my8j-b3hr
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/grpc@1.52.0.pre2
2
url pkg:gem/grpc@1.52.0
purl pkg:gem/grpc@1.52.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-9rmn-3anf-fqcm
1
vulnerability VCID-qatb-my8j-b3hr
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/grpc@1.52.0
3
url pkg:gem/grpc@1.52.2
purl pkg:gem/grpc@1.52.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-9rmn-3anf-fqcm
1
vulnerability VCID-qatb-my8j-b3hr
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/grpc@1.52.2
4
url pkg:gem/grpc@1.53.0.pre2
purl pkg:gem/grpc@1.53.0.pre2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-9rmn-3anf-fqcm
1
vulnerability VCID-qatb-my8j-b3hr
resource_url http://public2.vulnerablecode.io/packages/pkg:gem/grpc@1.53.0.pre2
5
url pkg:maven/io.grpc/grpc-protobuf@1.51.0
purl pkg:maven/io.grpc/grpc-protobuf@1.51.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qatb-my8j-b3hr
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/io.grpc/grpc-protobuf@1.51.0
6
url pkg:maven/io.grpc/grpc-protobuf@1.51.1
purl pkg:maven/io.grpc/grpc-protobuf@1.51.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qatb-my8j-b3hr
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/io.grpc/grpc-protobuf@1.51.1
7
url pkg:maven/io.grpc/grpc-protobuf@1.51.3
purl pkg:maven/io.grpc/grpc-protobuf@1.51.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qatb-my8j-b3hr
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/io.grpc/grpc-protobuf@1.51.3
8
url pkg:maven/io.grpc/grpc-protobuf@1.52.0
purl pkg:maven/io.grpc/grpc-protobuf@1.52.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qatb-my8j-b3hr
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/io.grpc/grpc-protobuf@1.52.0
9
url pkg:maven/io.grpc/grpc-protobuf@1.52.1
purl pkg:maven/io.grpc/grpc-protobuf@1.52.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qatb-my8j-b3hr
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/io.grpc/grpc-protobuf@1.52.1
10
url pkg:pypi/grpcio@1.51.0
purl pkg:pypi/grpcio@1.51.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-9rmn-3anf-fqcm
1
vulnerability VCID-qatb-my8j-b3hr
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/grpcio@1.51.0
11
url pkg:pypi/grpcio@1.51.1
purl pkg:pypi/grpcio@1.51.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-9rmn-3anf-fqcm
1
vulnerability VCID-qatb-my8j-b3hr
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/grpcio@1.51.1
12
url pkg:pypi/grpcio@1.51.3
purl pkg:pypi/grpcio@1.51.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-9rmn-3anf-fqcm
1
vulnerability VCID-qatb-my8j-b3hr
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/grpcio@1.51.3
13
url pkg:pypi/grpcio@1.52.0rc1
purl pkg:pypi/grpcio@1.52.0rc1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-9rmn-3anf-fqcm
1
vulnerability VCID-qatb-my8j-b3hr
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/grpcio@1.52.0rc1
14
url pkg:pypi/grpcio@1.52.0
purl pkg:pypi/grpcio@1.52.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-9rmn-3anf-fqcm
1
vulnerability VCID-qatb-my8j-b3hr
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/grpcio@1.52.0
15
url pkg:pypi/grpcio@1.53.0rc2
purl pkg:pypi/grpcio@1.53.0rc2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-9rmn-3anf-fqcm
1
vulnerability VCID-qatb-my8j-b3hr
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/grpcio@1.53.0rc2
16
url pkg:rpm/redhat/rhc-worker-playbook@0.1.10-1?arch=el9_5
purl pkg:rpm/redhat/rhc-worker-playbook@0.1.10-1?arch=el9_5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-12sa-qzjz-2ya9
1
vulnerability VCID-61xa-2pun-n3c9
2
vulnerability VCID-9rmn-3anf-fqcm
3
vulnerability VCID-qatb-my8j-b3hr
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rhc-worker-playbook@0.1.10-1%3Farch=el9_5
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1428.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1428.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-1428
reference_id
reference_type
scores
0
value 0.00073
scoring_system epss
scoring_elements 0.2234
published_at 2026-04-04T12:55:00Z
1
value 0.00073
scoring_system epss
scoring_elements 0.22296
published_at 2026-04-02T12:55:00Z
2
value 0.00078
scoring_system epss
scoring_elements 0.23029
published_at 2026-04-24T12:55:00Z
3
value 0.00078
scoring_system epss
scoring_elements 0.23183
published_at 2026-04-07T12:55:00Z
4
value 0.00078
scoring_system epss
scoring_elements 0.23257
published_at 2026-04-08T12:55:00Z
5
value 0.00078
scoring_system epss
scoring_elements 0.23307
published_at 2026-04-09T12:55:00Z
6
value 0.00078
scoring_system epss
scoring_elements 0.23328
published_at 2026-04-11T12:55:00Z
7
value 0.00078
scoring_system epss
scoring_elements 0.2329
published_at 2026-04-12T12:55:00Z
8
value 0.00078
scoring_system epss
scoring_elements 0.23233
published_at 2026-04-13T12:55:00Z
9
value 0.00078
scoring_system epss
scoring_elements 0.23249
published_at 2026-04-16T12:55:00Z
10
value 0.00078
scoring_system epss
scoring_elements 0.23241
published_at 2026-04-18T12:55:00Z
11
value 0.00078
scoring_system epss
scoring_elements 0.23221
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-1428
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://github.com/grpc/grpc/commit/2485fa94bd8a723e5c977d55a3ce10b301b437f8
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T18:57:29Z/
url https://github.com/grpc/grpc/commit/2485fa94bd8a723e5c977d55a3ce10b301b437f8
4
reference_url https://github.com/grpc/grpc/issues/33463
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/grpc/grpc/issues/33463
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2214473
reference_id 2214473
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2214473
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-1428
reference_id CVE-2023-1428
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-1428
7
reference_url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/grpc/CVE-2023-1428.yml
reference_id CVE-2023-1428.YML
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/grpc/CVE-2023-1428.yml
8
reference_url https://github.com/advisories/GHSA-6628-q6j9-w8vg
reference_id GHSA-6628-q6j9-w8vg
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-6628-q6j9-w8vg
9
reference_url https://access.redhat.com/errata/RHSA-2024:10761
reference_id RHSA-2024:10761
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10761
Weaknesses
0
cwe_id 617
name Reachable Assertion
description The product contains an assert() or similar statement that can be triggered by an attacker, which leads to an application exit or other behavior that is more severe than necessary.
1
cwe_id 937
name OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013.
2
cwe_id 1035
name OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017.
Exploits
Severity_range_score7.0 - 8.9
Exploitability0.5
Weighted_severity8.0
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-qatb-my8j-b3hr