You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Dozer improperly uses a reflection-based approach to type conversion, which might allow remote attackers to execute arbitrary code via a crafted serialized object.
CVE-2014-9515 - High Severity Vulnerability
Vulnerable Library - dozer-5.5.1.jar
Dozer is a powerful Java Bean to Java Bean mapper that recursively copies data from one object to another
Library home page: http://dozer.sourceforge.net/dozer
Path to dependency file: /tmp/ws-scm/Noche/pom.xml
Path to vulnerable library: epository/net/sf/dozer/dozer/5.5.1/dozer-5.5.1.jar
Dependency Hierarchy:
Found in HEAD commit: f3de48a78c88611de860a96414977232fe7ce7db
Vulnerability Details
Dozer improperly uses a reflection-based approach to type conversion, which might allow remote attackers to execute arbitrary code via a crafted serialized object.
Publish Date: 2017-12-29
URL: CVE-2014-9515
CVSS 3 Score Details (9.8)
Base Score Metrics:
The text was updated successfully, but these errors were encountered: