Vulnerability Details CVE-2023-24621
An issue was discovered in Esoteric YamlBeans through 1.15. It allows untrusted deserialisation to Java classes by default, where the data and class are controlled by the author of the YAML document being processed.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 8.1%
CVSS Severity
CVSS v3 Score 7.8
Products affected by CVE-2023-24621
-
cpe:2.3:a:esotericsoftware:yamlbeans:1.05
-
cpe:2.3:a:esotericsoftware:yamlbeans:1.06
-
cpe:2.3:a:esotericsoftware:yamlbeans:1.07
-
cpe:2.3:a:esotericsoftware:yamlbeans:1.08
-
cpe:2.3:a:esotericsoftware:yamlbeans:1.09
-
cpe:2.3:a:esotericsoftware:yamlbeans:1.10
-
cpe:2.3:a:esotericsoftware:yamlbeans:1.11
-
cpe:2.3:a:esotericsoftware:yamlbeans:1.12
-
cpe:2.3:a:esotericsoftware:yamlbeans:1.13
-
cpe:2.3:a:esotericsoftware:yamlbeans:1.14
-
cpe:2.3:a:esotericsoftware:yamlbeans:1.15