nGrinder before 3.5.9 uses old version of SnakeYAML, which could allow remote attacker to execute arbitrary code via unsafe deserialization.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://cve.naver.com/detail/cve-2024-28212.html |
|
History
Wed, 07 May 2025 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Naver
Naver ngrinder |
|
| CPEs | cpe:2.3:a:naver:ngrinder:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Naver
Naver ngrinder |
Mon, 12 Aug 2024 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: naver
Published:
Updated: 2024-08-12T19:41:41.104Z
Reserved: 2024-03-07T02:38:58.221Z
Link: CVE-2024-28212
Updated: 2024-08-02T00:48:49.537Z
Status : Analyzed
Published: 2024-03-07T05:15:54.603
Modified: 2025-05-07T15:29:59.023
Link: CVE-2024-28212
No data.
OpenCVE Enrichment
No data.
Weaknesses