You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
<td>Instantiate the <code>org.yaml.snakeyaml.Yaml</code> instance explicitly with an instance of <code>org.yaml.snakeyaml.constructor.SafeConstructor</code> as an argument.</td>
88
71
</tr>
89
72
<tr>
@@ -98,11 +81,28 @@ Fixes by framework
98
81
<tr>
99
82
<td>Kryo</td>
100
83
<td>com.esotericsoftware:kryo and com.esotericsoftware:kryo5</td>
101
-
<td>com.esotericsoftware:kryo versions including & after 5.0.0 Yes; com.esotericsoftware:kryo5 Yes</td>
84
+
<td>com.esotericsoftware:kryo >= 5.0.0 and com.esotericsoftware:kryo5 Yes</td>
102
85
<td>Don't call <code>com.esotericsoftware.kryo(5).Kryo#setRegistrationRequired</code> with the argument <code>false</code>.</td>
103
86
</tr>
104
87
</tbody>
105
88
</table>
89
+
</recommendation>
90
+
91
+
<example>
92
+
<p>
93
+
The following example calls <code>readObject</code> directly on an
94
+
<code>ObjectInputStream</code> that is constructed from untrusted data, and is
95
+
therefore inherently unsafe.
96
+
</p>
97
+
<samplesrc="UnsafeDeserializationBad.java" />
98
+
99
+
<p>
100
+
Rewriting the communication protocol to only rely on reading primitive types
0 commit comments