Description
nGrinder before 3.5.9 uses old version of SnakeYAML, which could allow remote attacker to execute arbitrary code via unsafe deserialization.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
| Link | Providers |
|---|---|
| https://cve.naver.com/detail/cve-2024-28212.html |
|
History
Wed, 07 May 2025 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Naver
Naver ngrinder |
|
| CPEs | cpe:2.3:a:naver:ngrinder:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Naver
Naver ngrinder |
Mon, 12 Aug 2024 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: naver
Published:
Updated: 2024-08-12T19:41:41.104Z
Reserved: 2024-03-07T02:38:58.221Z
Link: CVE-2024-28212
Updated: 2024-08-02T00:48:49.537Z
Status : Analyzed
Published: 2024-03-07T05:15:54.603
Modified: 2025-05-07T15:29:59.023
Link: CVE-2024-28212
No data.
OpenCVE Enrichment
No data.
Weaknesses