Логотип exploitDog
bind:CVE-2026-27727
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2026-27727

Количество 5

Количество 5

redhat логотип

CVE-2026-27727

около 1 месяца назад

mchange-commons-java, a library that provides Java utilities, includes code that mirrors early implementations of JNDI functionality, including support for remote `factoryClassLocation` values, by which code can be downloaded and invoked within a running application. If an attacker can provoke an application to read a maliciously crafted `jaxax.naming.Reference` or serialized object, they can provoke the download and execution of malicious code. Implementations of this functionality within the JDK were disabled by default behind a System property that defaults to `false`, `com.sun.jndi.ldap.object.trustURLCodebase`. However, since mchange-commons-java includes an independent implementation of JNDI derefencing, libraries (such as c3p0) that resolve references via that implementation could be provoked to download and execute malicious code even after the JDK was hardened. Mirroring the JDK patch, mchange-commons-java's JNDI functionality is gated by configuration parameters that defau...

CVSS3: 8.3
EPSS: Низкий
nvd логотип

CVE-2026-27727

около 1 месяца назад

mchange-commons-java, a library that provides Java utilities, includes code that mirrors early implementations of JNDI functionality, including support for remote `factoryClassLocation` values, by which code can be downloaded and invoked within a running application. If an attacker can provoke an application to read a maliciously crafted `jaxax.naming.Reference` or serialized object, they can provoke the download and execution of malicious code. Implementations of this functionality within the JDK were disabled by default behind a System property that defaults to `false`, `com.sun.jndi.ldap.object.trustURLCodebase`. However, since mchange-commons-java includes an independent implementation of JNDI derefencing, libraries (such as c3p0) that resolve references via that implementation could be provoked to download and execute malicious code even after the JDK was hardened. Mirroring the JDK patch, mchange-commons-java's JNDI functionality is gated by configuration parameters that default

CVSS3: 9.8
EPSS: Низкий
debian логотип

CVE-2026-27727

около 1 месяца назад

mchange-commons-java, a library that provides Java utilities, includes ...

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-m2cm-222f-qw44

около 1 месяца назад

mchange-commons-java: Remote Code Execution via JNDI Reference Resolution

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0855-1

18 дней назад

Security update for c3p0 and mchange-commons

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2026-27727

mchange-commons-java, a library that provides Java utilities, includes code that mirrors early implementations of JNDI functionality, including support for remote `factoryClassLocation` values, by which code can be downloaded and invoked within a running application. If an attacker can provoke an application to read a maliciously crafted `jaxax.naming.Reference` or serialized object, they can provoke the download and execution of malicious code. Implementations of this functionality within the JDK were disabled by default behind a System property that defaults to `false`, `com.sun.jndi.ldap.object.trustURLCodebase`. However, since mchange-commons-java includes an independent implementation of JNDI derefencing, libraries (such as c3p0) that resolve references via that implementation could be provoked to download and execute malicious code even after the JDK was hardened. Mirroring the JDK patch, mchange-commons-java's JNDI functionality is gated by configuration parameters that defau...

CVSS3: 8.3
0%
Низкий
около 1 месяца назад
nvd логотип
CVE-2026-27727

mchange-commons-java, a library that provides Java utilities, includes code that mirrors early implementations of JNDI functionality, including support for remote `factoryClassLocation` values, by which code can be downloaded and invoked within a running application. If an attacker can provoke an application to read a maliciously crafted `jaxax.naming.Reference` or serialized object, they can provoke the download and execution of malicious code. Implementations of this functionality within the JDK were disabled by default behind a System property that defaults to `false`, `com.sun.jndi.ldap.object.trustURLCodebase`. However, since mchange-commons-java includes an independent implementation of JNDI derefencing, libraries (such as c3p0) that resolve references via that implementation could be provoked to download and execute malicious code even after the JDK was hardened. Mirroring the JDK patch, mchange-commons-java's JNDI functionality is gated by configuration parameters that default

CVSS3: 9.8
0%
Низкий
около 1 месяца назад
debian логотип
CVE-2026-27727

mchange-commons-java, a library that provides Java utilities, includes ...

CVSS3: 9.8
0%
Низкий
около 1 месяца назад
github логотип
GHSA-m2cm-222f-qw44

mchange-commons-java: Remote Code Execution via JNDI Reference Resolution

0%
Низкий
около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2026:0855-1

Security update for c3p0 and mchange-commons

18 дней назад

Уязвимостей на страницу