[MAVEN:GHSA-4QHR-Q7WF-94XP] Deserialization of Untrusted Data in JYaml

Severity Critical
Affected Packages 1
CVEs 1

JYaml through 1.3 allows remote code execution during deserialization of a malicious payload through the load() function. NOTE: this is a discontinued product.

Package Affected Version
pkg:maven/org.jyaml/jyaml <= 1.3
ID
MAVEN:GHSA-4QHR-Q7WF-94XP
Severity
critical
URL
https://github.com/advisories/GHSA-4qhr-q7wf-94xp
Published
2022-05-24T17:09:22
(2 years ago)
Modified
2023-01-27T05:02:27
(20 months ago)
Rights
Maven Security Team
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:maven/org.jyaml/jyaml org.jyaml jyaml <= 1.3
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...