-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability description explicitly states exploitation occurs through the load() function. Multiple sources (CVE, GitHub Advisory, and exploit documentation) confirm JYaml's load() method is the attack vector. The marshalsec framework specifically targets this function for payload generation, and the CWE-502 classification directly aligns with deserialization vulnerabilities in load methods. No other functions are mentioned in available documentation as contributing to this vulnerability.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.jyaml:jyaml | maven | <= 1.3 |
KEV Misses 88% of Exploited CVEs- Get the report