nGrinder before 3.5.9 uses old version of SnakeYAML, which could allow remote attacker to execute arbitrary code via unsafe deserialization.
References
Link | Resource |
---|---|
https://cve.naver.com/detail/cve-2024-28212.html | Vendor Advisory |
https://cve.naver.com/detail/cve-2024-28212.html | Vendor Advisory |
Configurations
History
07 May 2025, 15:29
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:naver:ngrinder:*:*:*:*:*:*:*:* | |
References | () https://cve.naver.com/detail/cve-2024-28212.html - Vendor Advisory | |
First Time |
Naver
Naver ngrinder |
21 Nov 2024, 09:06
Type | Values Removed | Values Added |
---|---|---|
References | () https://cve.naver.com/detail/cve-2024-28212.html - |
12 Aug 2024, 20:35
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
07 Mar 2024, 13:52
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-03-07 05:15
Updated : 2025-05-07 15:29
NVD link : CVE-2024-28212
Mitre link : CVE-2024-28212
CVE.ORG link : CVE-2024-28212
JSON object : View
Products Affected
naver
- ngrinder
CWE
CWE-502
Deserialization of Untrusted Data