![]() it tried to block all currently known critical classes of the It used to have a blacklistīy default, i.e. it blocks all classesĮxcept those types it has explicit converters for. XStream itself sets up a whitelist by default now, i.e. These vulnerabilities may allow a remote attacker to load and execute arbitraryĬode from a remote host only by manipulating the processed input stream. Library to serialize objects to XML and back again. ![]() ![]() ![]() Multiple security vulnerabilities have been discovered in XStream, a Java ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |