cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-7254,https://securityvulnerability.io/vulnerability/CVE-2024-7254,скеName Overflow Vulnerability in Protocol Buffers,"Any project that parses untrusted Protocol Buffers data containing an arbitrary number of nested groups / series of SGROUP tags can corrupted by exceeding the stack limit i.e. StackOverflow. Parsing nested groups as unknown fields with DiscardUnknownFieldsParser or Java Protobuf Lite parser, or against Protobuf map fields, creates unbounded recursions that can be abused by an attacker.",Google,"Protocol Buffers,Protobuf-java,Protobuf-javalite,Protobuf-kotlin,Protobuf-kotllin-lite,Google-protobuf [jruby Gem]",,,0.0004299999854993075,false,false,false,false,,false,false,2024-09-19T01:15:00.000Z,0 CVE-2021-22569,https://securityvulnerability.io/vulnerability/CVE-2021-22569,Denial of Service of protobuf-java parsing procedure,"An issue in protobuf-java allowed the interleaving of com.google.protobuf.UnknownFieldSet fields in such a way that would be processed out of order. A small malicious payload can occupy the parser for several minutes by creating large numbers of short-lived objects that cause frequent, repeated pauses. We recommend upgrading libraries beyond the vulnerable versions.",Google,"Protobuf-java,Protobuf-kotlin,Google-protobuf [jruby Gem]",7.5,HIGH,0.0010100000072270632,false,false,false,true,true,false,false,2022-01-10T14:10:00.000Z,0