cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2021-22095,https://securityvulnerability.io/vulnerability/CVE-2021-22095,,"In Spring AMQP versions 2.2.0 - 2.2.19 and 2.3.0 - 2.3.11, the Spring AMQP Message object, in its toString() method, will create a new String object from the message body, regardless of its size. This can cause an OOM Error with a large message",Vmware,Spring AMQp,6.5,MEDIUM,0.0008099999977275729,false,false,false,false,,false,false,2021-11-30T18:41:35.000Z,0 CVE-2021-22097,https://securityvulnerability.io/vulnerability/CVE-2021-22097,,"In Spring AMQP versions 2.2.0 - 2.2.18 and 2.3.0 - 2.3.10, the Spring AMQP Message object, in its toString() method, will deserialize a body for a message with content type application/x-java-serialized-object. It is possible to construct a malicious java.util.Dictionary object that can cause 100% CPU usage in the application if the toString() method is called.",Vmware,Spring AMQp,6.5,MEDIUM,0.0008099999977275729,false,false,false,false,,false,false,2021-10-28T15:24:19.000Z,0