Описание
Those using Xstream to seralize XML data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack.
Ссылки
- ExploitPermissions RequiredThird Party Advisory
- Issue TrackingThird Party Advisory
- ExploitPermissions RequiredThird Party Advisory
- Issue TrackingThird Party Advisory
Уязвимые конфигурации
EPSS
6.5 Medium
CVSS3
7.5 High
CVSS3
Дефекты
Связанные уязвимости
Those using Xstream to seralize XML data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack.
Those using Xstream to seralize XML data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack.
Those using Xstream to seralize XML data may be vulnerable to Denial o ...
XStream can cause a Denial of Service by injecting deeply nested objects raising a stack overflow
Уязвимость Java-библиотеки для преобразования объектов в XML или JSON формат XStream, связанная с переполнением буфера на стеке, позволяющая нарушителю вызвать отказ в обслуживании
EPSS
6.5 Medium
CVSS3
7.5 High
CVSS3