Логотип exploitDog
bind:CVE-2020-28923
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-28923

Количество 2

Количество 2

nvd логотип

CVE-2020-28923

около 5 лет назад

An issue was discovered in Play Framework 2.8.0 through 2.8.4. Carefully crafted JSON payloads sent as a form field lead to Data Amplification. This affects users migrating from a Play version prior to 2.8.0 that used the Play Java API to serialize classes with protected or private fields to JSON.

CVSS3: 2.7
EPSS: Низкий
github логотип

GHSA-v9mf-jgq3-c28h

почти 4 года назад

Data Amplification in Play Framework

CVSS3: 2.7
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-28923

An issue was discovered in Play Framework 2.8.0 through 2.8.4. Carefully crafted JSON payloads sent as a form field lead to Data Amplification. This affects users migrating from a Play version prior to 2.8.0 that used the Play Java API to serialize classes with protected or private fields to JSON.

CVSS3: 2.7
0%
Низкий
около 5 лет назад
github логотип
GHSA-v9mf-jgq3-c28h

Data Amplification in Play Framework

CVSS3: 2.7
0%
Низкий
почти 4 года назад

Уязвимостей на страницу