Логотип exploitDog
bind:CVE-2024-56518
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-56518

Количество 2

Количество 2

nvd логотип

CVE-2024-56518

10 месяцев назад

Hazelcast Management Center through 6.0 allows remote code execution via a JndiLoginModule user.provider.url in a hazelcast-client XML document (aka a client configuration file), which can be uploaded at the /cluster-connections URI.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-v8vm-8h6v-g2gc

10 месяцев назад

Hazelcast Management Center through 6.0 allows remote code execution via a JndiLoginModule user.provider.url in a hazelcast-client XML document (aka a client configuration file), which can be uploaded at the /cluster-connections URI.

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-56518

Hazelcast Management Center through 6.0 allows remote code execution via a JndiLoginModule user.provider.url in a hazelcast-client XML document (aka a client configuration file), which can be uploaded at the /cluster-connections URI.

CVSS3: 9.8
1%
Низкий
10 месяцев назад
github логотип
GHSA-v8vm-8h6v-g2gc

Hazelcast Management Center through 6.0 allows remote code execution via a JndiLoginModule user.provider.url in a hazelcast-client XML document (aka a client configuration file), which can be uploaded at the /cluster-connections URI.

CVSS3: 9.8
1%
Низкий
10 месяцев назад

Уязвимостей на страницу