-
CVSS Score
-The vulnerable function is identified by analyzing the patch in AbstractDocument.java, which modifies the readObject method to add a class type check before instantiation. This change directly addresses the deserialization vulnerability.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.apache.xmlgraphics:batik | maven | >= 1.0, <= 1.9.1 | 1.10 |
A Semantic Attack on Google Gemini - Read the Latest Research