Логотип exploitDog
bind:CVE-2023-46674
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-46674

Количество 3

Количество 3

redhat логотип

CVE-2023-46674

около 2 лет назад

An issue was identified that allowed the unsafe deserialization of java objects from hadoop or spark configuration properties that could have been modified by authenticated users. Elastic would like to thank Yakov Shafranovich, with Amazon Web Services for reporting this issue.

CVSS3: 6
EPSS: Низкий
nvd логотип

CVE-2023-46674

около 2 лет назад

An issue was identified that allowed the unsafe deserialization of java objects from hadoop or spark configuration properties that could have been modified by authenticated users. Elastic would like to thank Yakov Shafranovich, with Amazon Web Services for reporting this issue.

CVSS3: 6
EPSS: Низкий
github логотип

GHSA-rv74-m283-5j95

около 2 лет назад

Elasticsearch-hadoop Unsafe Deserialization

CVSS3: 6
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2023-46674

An issue was identified that allowed the unsafe deserialization of java objects from hadoop or spark configuration properties that could have been modified by authenticated users. Elastic would like to thank Yakov Shafranovich, with Amazon Web Services for reporting this issue.

CVSS3: 6
0%
Низкий
около 2 лет назад
nvd логотип
CVE-2023-46674

An issue was identified that allowed the unsafe deserialization of java objects from hadoop or spark configuration properties that could have been modified by authenticated users. Elastic would like to thank Yakov Shafranovich, with Amazon Web Services for reporting this issue.

CVSS3: 6
0%
Низкий
около 2 лет назад
github логотип
GHSA-rv74-m283-5j95

Elasticsearch-hadoop Unsafe Deserialization

CVSS3: 6
0%
Низкий
около 2 лет назад

Уязвимостей на страницу