Логотип exploitDog
bind:CVE-2023-24621
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-24621

Количество 2

Количество 2

nvd логотип

CVE-2023-24621

больше 2 лет назад

An issue was discovered in Esoteric YamlBeans through 1.15. It allows untrusted deserialisation to Java classes by default, where the data and class are controlled by the author of the YAML document being processed.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-jm7r-4pg6-gf26

больше 2 лет назад

Esoteric YamlBeans Unsafe Deserialization vulnerability

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-24621

An issue was discovered in Esoteric YamlBeans through 1.15. It allows untrusted deserialisation to Java classes by default, where the data and class are controlled by the author of the YAML document being processed.

CVSS3: 7.8
0%
Низкий
больше 2 лет назад
github логотип
GHSA-jm7r-4pg6-gf26

Esoteric YamlBeans Unsafe Deserialization vulnerability

CVSS3: 7.8
0%
Низкий
больше 2 лет назад

Уязвимостей на страницу