Логотип exploitDog
bind:CVE-2025-66631
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-66631

Количество 2

Количество 2

nvd логотип

CVE-2025-66631

2 месяца назад

CSLA .NET is a framework designed for the development of reusable, object-oriented business layers for applications. Versions 5.5.4 and below allow the use of WcfProxy. WcfProxy uses the now-obsolete NetDataContractSerializer (NDCS) and is vulnerable to remote code execution during deserialization. This vulnerability is fixed in version 6.0.0. To workaround this issue, remove the WcfProxy in data portal configurations.

EPSS: Низкий
github логотип

GHSA-wq34-7f4g-953v

2 месяца назад

Csla affected by Remote Code Execution via WcfProxy (NetDataContractSerializer)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-66631

CSLA .NET is a framework designed for the development of reusable, object-oriented business layers for applications. Versions 5.5.4 and below allow the use of WcfProxy. WcfProxy uses the now-obsolete NetDataContractSerializer (NDCS) and is vulnerable to remote code execution during deserialization. This vulnerability is fixed in version 6.0.0. To workaround this issue, remove the WcfProxy in data portal configurations.

0%
Низкий
2 месяца назад
github логотип
GHSA-wq34-7f4g-953v

Csla affected by Remote Code Execution via WcfProxy (NetDataContractSerializer)

0%
Низкий
2 месяца назад

Уязвимостей на страницу