Логотип exploitDog
bind:CVE-2022-24082
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-24082

Количество 2

Количество 2

nvd логотип

CVE-2022-24082

больше 3 лет назад

If an on-premise installation of the Pega Platform is configured with the port for the JMX interface exposed to the Internet and port filtering is not properly configured, then it may be possible to upload serialized payloads to attack the underlying system. This does not affect systems running on PegaCloud due to its design and architecture.

CVSS3: 9.8
EPSS: Средний
github логотип

GHSA-3crj-j3hg-7v57

больше 3 лет назад

If an on-premise installation of the Pega Platform is configured with the port for the JMX interface exposed to the Internet and port filtering is not properly configured, then it may be possible to upload serialized payloads to attack the underlying system. This does not affect systems running on PegaCloud due to its design and architecture.

CVSS3: 9.8
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2022-24082

If an on-premise installation of the Pega Platform is configured with the port for the JMX interface exposed to the Internet and port filtering is not properly configured, then it may be possible to upload serialized payloads to attack the underlying system. This does not affect systems running on PegaCloud due to its design and architecture.

CVSS3: 9.8
31%
Средний
больше 3 лет назад
github логотип
GHSA-3crj-j3hg-7v57

If an on-premise installation of the Pega Platform is configured with the port for the JMX interface exposed to the Internet and port filtering is not properly configured, then it may be possible to upload serialized payloads to attack the underlying system. This does not affect systems running on PegaCloud due to its design and architecture.

CVSS3: 9.8
31%
Средний
больше 3 лет назад

Уязвимостей на страницу