Логотип exploitDog
bind:CVE-2022-36944
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-36944

Количество 6

Количество 6

ubuntu логотип

CVE-2022-36944

больше 3 лет назад

Scala 2.13.x before 2.13.9 has a Java deserialization chain in its JAR file. On its own, it cannot be exploited. There is only a risk in conjunction with Java object deserialization within an application. In such situations, it allows attackers to erase contents of arbitrary files, make network connections, or possibly run arbitrary code (specifically, Function0 functions) via a gadget chain.

CVSS3: 9.8
EPSS: Высокий
redhat логотип

CVE-2022-36944

больше 3 лет назад

Scala 2.13.x before 2.13.9 has a Java deserialization chain in its JAR file. On its own, it cannot be exploited. There is only a risk in conjunction with Java object deserialization within an application. In such situations, it allows attackers to erase contents of arbitrary files, make network connections, or possibly run arbitrary code (specifically, Function0 functions) via a gadget chain.

CVSS3: 8.1
EPSS: Высокий
nvd логотип

CVE-2022-36944

больше 3 лет назад

Scala 2.13.x before 2.13.9 has a Java deserialization chain in its JAR file. On its own, it cannot be exploited. There is only a risk in conjunction with Java object deserialization within an application. In such situations, it allows attackers to erase contents of arbitrary files, make network connections, or possibly run arbitrary code (specifically, Function0 functions) via a gadget chain.

CVSS3: 9.8
EPSS: Высокий
debian логотип

CVE-2022-36944

больше 3 лет назад

Scala 2.13.x before 2.13.9 has a Java deserialization chain in its JAR ...

CVSS3: 9.8
EPSS: Высокий
github логотип

GHSA-8qv5-68g4-248j

больше 3 лет назад

Scala subject to file deletion, code execution due to Java deserialization chain with LazyList object deserialization

CVSS3: 9.8
EPSS: Высокий
fstec логотип

BDU:2023-00169

больше 3 лет назад

Уязвимость интерпретатора языка программирования Scala, связанная с ошибками при десериализации данных, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
EPSS: Высокий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2022-36944

Scala 2.13.x before 2.13.9 has a Java deserialization chain in its JAR file. On its own, it cannot be exploited. There is only a risk in conjunction with Java object deserialization within an application. In such situations, it allows attackers to erase contents of arbitrary files, make network connections, or possibly run arbitrary code (specifically, Function0 functions) via a gadget chain.

CVSS3: 9.8
70%
Высокий
больше 3 лет назад
redhat логотип
CVE-2022-36944

Scala 2.13.x before 2.13.9 has a Java deserialization chain in its JAR file. On its own, it cannot be exploited. There is only a risk in conjunction with Java object deserialization within an application. In such situations, it allows attackers to erase contents of arbitrary files, make network connections, or possibly run arbitrary code (specifically, Function0 functions) via a gadget chain.

CVSS3: 8.1
70%
Высокий
больше 3 лет назад
nvd логотип
CVE-2022-36944

Scala 2.13.x before 2.13.9 has a Java deserialization chain in its JAR file. On its own, it cannot be exploited. There is only a risk in conjunction with Java object deserialization within an application. In such situations, it allows attackers to erase contents of arbitrary files, make network connections, or possibly run arbitrary code (specifically, Function0 functions) via a gadget chain.

CVSS3: 9.8
70%
Высокий
больше 3 лет назад
debian логотип
CVE-2022-36944

Scala 2.13.x before 2.13.9 has a Java deserialization chain in its JAR ...

CVSS3: 9.8
70%
Высокий
больше 3 лет назад
github логотип
GHSA-8qv5-68g4-248j

Scala subject to file deletion, code execution due to Java deserialization chain with LazyList object deserialization

CVSS3: 9.8
70%
Высокий
больше 3 лет назад
fstec логотип
BDU:2023-00169

Уязвимость интерпретатора языка программирования Scala, связанная с ошибками при десериализации данных, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
70%
Высокий
больше 3 лет назад

Уязвимостей на страницу