Описание
JYaml through 1.3 allows remote code execution during deserialization of a malicious payload through the load() function. NOTE: this is a discontinued product.
Ссылки
- ExploitThird Party Advisory
- Third Party Advisory
- Technical DescriptionThird Party Advisory
- Third Party Advisory
- ExploitThird Party Advisory
- Third Party Advisory
- Technical DescriptionThird Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 1.3 (включая)
cpe:2.3:a:jyaml_project:jyaml:*:*:*:*:*:*:*:*
EPSS
Процентиль: 92%
0.0758
Низкий
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-502
Связанные уязвимости
EPSS
Процентиль: 92%
0.0758
Низкий
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-502