{"uuid": "783f0414-9a03-4967-9fbd-da39a85d62c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-7254", "type": "seen", "source": "https://t.me/cvedetector/6037", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-7254 - Apache Protocol Buffers Stack Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-7254 \nPublished : Sept. 19, 2024, 1:15 a.m. | 20\u00a0minutes ago \nDescription : Any project that parses untrusted Protocol Buffers data\u00a0containing an arbitrary number of nested groups / series of SGROUP\u00a0tags can corrupted by exceeding the stack limit i.e. StackOverflow. Parsing nested groups as unknown fields with DiscardUnknownFieldsParser or Java Protobuf Lite parser, or against Protobuf map fields, creates unbounded recursions that can be abused by an attacker. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-19T03:37:29.000000Z"}