Количество 4
Количество 4
CVE-2016-10750
In Hazelcast before 3.11, the cluster join procedure is vulnerable to remote code execution via Java deserialization. If an attacker can reach a listening Hazelcast instance with a crafted JoinRequest, and vulnerable classes exist in the classpath, the attacker can run arbitrary code.
CVE-2016-10750
In Hazelcast before 3.11, the cluster join procedure is vulnerable to remote code execution via Java deserialization. If an attacker can reach a listening Hazelcast instance with a crafted JoinRequest, and vulnerable classes exist in the classpath, the attacker can run arbitrary code.
CVE-2016-10750
In Hazelcast before 3.11, the cluster join procedure is vulnerable to ...
GHSA-jv65-pf7v-f7p8
Deserialization of Untrusted Data in Hazelcast
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2016-10750 In Hazelcast before 3.11, the cluster join procedure is vulnerable to remote code execution via Java deserialization. If an attacker can reach a listening Hazelcast instance with a crafted JoinRequest, and vulnerable classes exist in the classpath, the attacker can run arbitrary code. | CVSS3: 8.1 | 2% Низкий | почти 10 лет назад | |
CVE-2016-10750 In Hazelcast before 3.11, the cluster join procedure is vulnerable to remote code execution via Java deserialization. If an attacker can reach a listening Hazelcast instance with a crafted JoinRequest, and vulnerable classes exist in the classpath, the attacker can run arbitrary code. | CVSS3: 8.1 | 2% Низкий | больше 6 лет назад | |
CVE-2016-10750 In Hazelcast before 3.11, the cluster join procedure is vulnerable to ... | CVSS3: 8.1 | 2% Низкий | больше 6 лет назад | |
GHSA-jv65-pf7v-f7p8 Deserialization of Untrusted Data in Hazelcast | CVSS3: 8.1 | 2% Низкий | больше 3 лет назад |
Уязвимостей на страницу