DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none
Project Subscriptions
No data.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-6166 | Laravel 9.1.8, when processing attacker-controlled data for deserialization, allows Remote Code Execution (RCE) via an unserialized pop chain in __destruct in Illuminate\Broadcasting\PendingBroadcast.php and __call in Faker\Generator.php. |
Github GHSA |
GHSA-vv7q-mfpc-qgm5 | Unserialized Pop Chain in Laravel |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
No reference.
History
No history.
Projects
Sign in to view the affected projects.
Status: REJECTED
Assigner: mitre
Published:
Updated: 2022-08-12T15:15:40
Reserved: 2022-05-23T00:00:00
Link: CVE-2022-31279
No data.
Status : Rejected
Published: 2022-06-07T16:15:07.837
Modified: 2023-11-07T03:47:36.727
Link: CVE-2022-31279
No data.
OpenCVE Enrichment
No data.
Weaknesses
No weakness.
EUVD
Github GHSA