2 results (0.001 seconds)

CVSS: 10.0EPSS: 70%CPEs: 4EXPL: 2

23 Sep 2022 — Scala 2.13.x before 2.13.9 has a Java deserialization chain in its JAR file. On its own, it cannot be exploited. There is only a risk in conjunction with Java object deserialization within an application. In such situations, it allows attackers to erase contents of arbitrary files, make network connections, or possibly run arbitrary code (specifically, Function0 functions) via a gadget chain. Scala versiones 2.13.x anteriores a 2.13.9 tiene una cadena de deserialización de Java en su archivo JAR. • https://github.com/yarocher/lazylist-cve-poc • CWE-502: Deserialization of Untrusted Data •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

14 Nov 2017 — The compilation daemon in Scala before 2.10.7, 2.11.x before 2.11.12, and 2.12.x before 2.12.4 uses weak permissions for private files in /tmp/scala-devel/${USER:shared}/scalac-compile-server-port, which allows local users to write to arbitrary class files and consequently gain privileges. El demonio de compilación en Scala en versiones anteriores a la 2.10.7, las versiones 2.11.x anteriores a la 2.11.12 y las versiones 2.12.x anteriores a la 2.14.4 emplea permisos débiles para archivos privados en /tmp/sca... • http://scala-lang.org/news/security-update-nov17.html • CWE-732: Incorrect Permission Assignment for Critical Resource •