Логотип exploitDog
bind:CVE-2017-8046
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2017-8046

Количество 3

Количество 3

redhat логотип

CVE-2017-8046

почти 8 лет назад

Malicious PATCH requests submitted to servers using Spring Data REST versions prior to 2.6.9 (Ingalls SR9), versions prior to 3.0.1 (Kay SR1) and Spring Boot versions prior to 1.5.9, 2.0 M6 can use specially crafted JSON data to run arbitrary Java code.

CVSS3: 10
EPSS: Критический
nvd логотип

CVE-2017-8046

около 8 лет назад

Malicious PATCH requests submitted to servers using Spring Data REST versions prior to 2.6.9 (Ingalls SR9), versions prior to 3.0.1 (Kay SR1) and Spring Boot versions prior to 1.5.9, 2.0 M6 can use specially crafted JSON data to run arbitrary Java code.

CVSS3: 9.8
EPSS: Критический
github логотип

GHSA-9qf9-28h9-hqcj

больше 3 лет назад

Remote code execution in PATCH requests in Spring Data REST

CVSS3: 9.8
EPSS: Критический

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2017-8046

Malicious PATCH requests submitted to servers using Spring Data REST versions prior to 2.6.9 (Ingalls SR9), versions prior to 3.0.1 (Kay SR1) and Spring Boot versions prior to 1.5.9, 2.0 M6 can use specially crafted JSON data to run arbitrary Java code.

CVSS3: 10
94%
Критический
почти 8 лет назад
nvd логотип
CVE-2017-8046

Malicious PATCH requests submitted to servers using Spring Data REST versions prior to 2.6.9 (Ingalls SR9), versions prior to 3.0.1 (Kay SR1) and Spring Boot versions prior to 1.5.9, 2.0 M6 can use specially crafted JSON data to run arbitrary Java code.

CVSS3: 9.8
94%
Критический
около 8 лет назад
github логотип
GHSA-9qf9-28h9-hqcj

Remote code execution in PATCH requests in Spring Data REST

CVSS3: 9.8
94%
Критический
больше 3 лет назад

Уязвимостей на страницу