CVE-2022-25647

CVSS v3.1 7.5 (High)
75% Progress
CVSS v2.0 5 (Medium)
50% Progress
EPSS 0.50 % (77th)
0.50% Progress
Affected Products 6
Advisories 6

The package com.google.code.gson:gson before 2.8.9 are vulnerable to Deserialization of Untrusted Data via the writeReplace() method in internal classes, which may lead to DoS attacks.

Weaknesses
CWE-502
Deserialization of Untrusted Data
CVE Status
PUBLISHED
CNA
Snyk
Published Date
2022-05-01 16:15:08
(2 years ago)
Updated Date
2022-11-28 17:33:38
(22 months ago)

Affected Products

Loading...
Loading...
Loading...

Configuration #1

    CPE23 From Up To
  Google Gson from 2.2.3 version and prior 2.8.9 version cpe:2.3:a:google:gson >= 2.2.3 < 2.8.9

Configuration #2

    CPE23 From Up To
  Debian Linux 9.0 cpe:2.3:o:debian:debian_linux:9.0
  Debian Linux 10.0 cpe:2.3:o:debian:debian_linux:10.0
  Debian Linux 11.0 cpe:2.3:o:debian:debian_linux:11.0

Configuration #3

    CPE23 From Up To
  Netapp Active Iq Unified Manager for Linux cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:linux
  Netapp Active Iq Unified Manager for Vmware Vsphere cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere
  Netapp Active Iq Unified Manager for Windows cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows

Configuration #4

    CPE23 From Up To
  Oracle Financial Services Crime And Compliance Management Studio 8.0.8.2.0 cpe:2.3:a:oracle:financial_services_crime_and_compliance_management_studio:8.0.8.2.0
  Oracle Financial Services Crime And Compliance Management Studio 8.0.8.3.0 cpe:2.3:a:oracle:financial_services_crime_and_compliance_management_studio:8.0.8.3.0
  Oracle Graalvm 20.3.6 cpe:2.3:a:oracle:graalvm:20.3.6:*:*:*:enterprise
  Oracle Graalvm 21.3.2 cpe:2.3:a:oracle:graalvm:21.3.2:*:*:*:enterprise
  Oracle Graalvm 22.1.0 cpe:2.3:a:oracle:graalvm:22.1.0:*:*:*:enterprise
  Oracle Retail Order Broker 18.0 cpe:2.3:a:oracle:retail_order_broker:18.0
  Oracle Retail Order Broker 19.1 cpe:2.3:a:oracle:retail_order_broker:19.1
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...