Serialized-object interfaces in IBM products allow remote attackers to execute arbitrary commands via crafted serialized Java object
Source | Link |
---|---|
securitytracker | www.securitytracker.com/id/1035125 |
www-01 | www.www-01.ibm.com/support/docview.wss |
www-01 | www.www-01.ibm.com/support/docview.wss |
exploit-db | www.exploit-db.com/exploits/41613/ |
www-01 | www.www-01.ibm.com/support/docview.wss |
www-01 | www.www-01.ibm.com/support/docview.wss |
securityfocus | www.securityfocus.com/bid/77653 |
www-01 | www.www-01.ibm.com/support/docview.wss |
www-01 | www.www-01.ibm.com/support/docview.wss |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo