Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-10750

Опубликовано: 22 мая 2019
Источник: debian
EPSS Низкий

Описание

In Hazelcast before 3.11, the cluster join procedure is vulnerable to remote code execution via Java deserialization. If an attacker can reach a listening Hazelcast instance with a crafted JoinRequest, and vulnerable classes exist in the classpath, the attacker can run arbitrary code.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
hazelcastitppackage

EPSS

Процентиль: 85%
0.02445
Низкий

Связанные уязвимости

CVSS3: 8.1
redhat
почти 10 лет назад

In Hazelcast before 3.11, the cluster join procedure is vulnerable to remote code execution via Java deserialization. If an attacker can reach a listening Hazelcast instance with a crafted JoinRequest, and vulnerable classes exist in the classpath, the attacker can run arbitrary code.

CVSS3: 8.1
nvd
больше 6 лет назад

In Hazelcast before 3.11, the cluster join procedure is vulnerable to remote code execution via Java deserialization. If an attacker can reach a listening Hazelcast instance with a crafted JoinRequest, and vulnerable classes exist in the classpath, the attacker can run arbitrary code.

CVSS3: 8.1
github
больше 3 лет назад

Deserialization of Untrusted Data in Hazelcast

EPSS

Процентиль: 85%
0.02445
Низкий