Логотип exploitDog
bind:CVE-2023-46604
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-46604

Количество 7

Количество 7

ubuntu логотип

CVE-2023-46604

около 2 лет назад

The Java OpenWire protocol marshaller is vulnerable to Remote Code Execution. This vulnerability may allow a remote attacker with network access to either a Java-based OpenWire broker or client to run arbitrary shell commands by manipulating serialized class types in the OpenWire protocol to cause either the client or the broker (respectively) to instantiate any class on the classpath. Users are recommended to upgrade both brokers and clients to version 5.15.16, 5.16.7, 5.17.6, or 5.18.3 which fixes this issue.

CVSS3: 10
EPSS: Критический
redhat логотип

CVE-2023-46604

около 2 лет назад

The Java OpenWire protocol marshaller is vulnerable to Remote Code Execution. This vulnerability may allow a remote attacker with network access to either a Java-based OpenWire broker or client to run arbitrary shell commands by manipulating serialized class types in the OpenWire protocol to cause either the client or the broker (respectively) to instantiate any class on the classpath. Users are recommended to upgrade both brokers and clients to version 5.15.16, 5.16.7, 5.17.6, or 5.18.3 which fixes this issue.

CVSS3: 9.8
EPSS: Критический
nvd логотип

CVE-2023-46604

около 2 лет назад

The Java OpenWire protocol marshaller is vulnerable to Remote Code Execution. This vulnerability may allow a remote attacker with network access to either a Java-based OpenWire broker or client to run arbitrary shell commands by manipulating serialized class types in the OpenWire protocol to cause either the client or the broker (respectively) to instantiate any class on the classpath. Users are recommended to upgrade both brokers and clients to version 5.15.16, 5.16.7, 5.17.6, or 5.18.3 which fixes this issue.

CVSS3: 10
EPSS: Критический
debian логотип

CVE-2023-46604

около 2 лет назад

The Java OpenWire protocol marshaller is vulnerable to Remote Code Ex ...

CVSS3: 10
EPSS: Критический
github логотип

GHSA-crg9-44h2-xw35

около 2 лет назад

Apache ActiveMQ is vulnerable to Remote Code Execution

CVSS3: 10
EPSS: Критический
fstec логотип

BDU:2023-07372

около 2 лет назад

Уязвимость программной платформы Apache ActiveMQ, связанная с восстановлением в памяти недостоверных данных, позволяющая нарушителю выполнить произвольный код

CVSS3: 10
EPSS: Критический
redos логотип

ROS-20251031-03

около 1 месяца назад

Уязвимость apache-activemq

CVSS3: 10
EPSS: Критический

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2023-46604

The Java OpenWire protocol marshaller is vulnerable to Remote Code Execution. This vulnerability may allow a remote attacker with network access to either a Java-based OpenWire broker or client to run arbitrary shell commands by manipulating serialized class types in the OpenWire protocol to cause either the client or the broker (respectively) to instantiate any class on the classpath. Users are recommended to upgrade both brokers and clients to version 5.15.16, 5.16.7, 5.17.6, or 5.18.3 which fixes this issue.

CVSS3: 10
94%
Критический
около 2 лет назад
redhat логотип
CVE-2023-46604

The Java OpenWire protocol marshaller is vulnerable to Remote Code Execution. This vulnerability may allow a remote attacker with network access to either a Java-based OpenWire broker or client to run arbitrary shell commands by manipulating serialized class types in the OpenWire protocol to cause either the client or the broker (respectively) to instantiate any class on the classpath. Users are recommended to upgrade both brokers and clients to version 5.15.16, 5.16.7, 5.17.6, or 5.18.3 which fixes this issue.

CVSS3: 9.8
94%
Критический
около 2 лет назад
nvd логотип
CVE-2023-46604

The Java OpenWire protocol marshaller is vulnerable to Remote Code Execution. This vulnerability may allow a remote attacker with network access to either a Java-based OpenWire broker or client to run arbitrary shell commands by manipulating serialized class types in the OpenWire protocol to cause either the client or the broker (respectively) to instantiate any class on the classpath. Users are recommended to upgrade both brokers and clients to version 5.15.16, 5.16.7, 5.17.6, or 5.18.3 which fixes this issue.

CVSS3: 10
94%
Критический
около 2 лет назад
debian логотип
CVE-2023-46604

The Java OpenWire protocol marshaller is vulnerable to Remote Code Ex ...

CVSS3: 10
94%
Критический
около 2 лет назад
github логотип
GHSA-crg9-44h2-xw35

Apache ActiveMQ is vulnerable to Remote Code Execution

CVSS3: 10
94%
Критический
около 2 лет назад
fstec логотип
BDU:2023-07372

Уязвимость программной платформы Apache ActiveMQ, связанная с восстановлением в памяти недостоверных данных, позволяющая нарушителю выполнить произвольный код

CVSS3: 10
94%
Критический
около 2 лет назад
redos логотип
ROS-20251031-03

Уязвимость apache-activemq

CVSS3: 10
94%
Критический
около 1 месяца назад

Уязвимостей на страницу