This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Scala-Lang First view 2017-11-15
Product Scala Last view 2022-09-23
Version Type
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:a:scala-lang:scala:*:*:*:*:*:*:*:* 2

Related : CVE

  Date Alert Description
9.8 2022-09-23 CVE-2022-36944

Scala 2.13.x before 2.13.9 has a Java deserialization chain in its JAR file. On its own, it cannot be exploited. There is only a risk in conjunction with Java object deserialization within an application. In such situations, it allows attackers to erase contents of arbitrary files, make network connections, or possibly run arbitrary code (specifically, Function0 functions) via a gadget chain.

7.8 2017-11-15 CVE-2017-15288

The compilation daemon in Scala before 2.10.7, 2.11.x before 2.11.12, and 2.12.x before 2.12.4 uses weak permissions for private files in /tmp/scala-devel/${USER:shared}/scalac-compile-server-port, which allows local users to write to arbitrary class files and consequently gain privileges.

CWE : Common Weakness Enumeration

%idName
50% (1) CWE-732 Incorrect Permission Assignment for Critical Resource
50% (1) CWE-502 Deserialization of Untrusted Data

Nessus® Vulnerability Scanner

id Description
2018-12-17 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-201812-08.nasl - Type: ACT_GATHER_INFO