Metrics
Affected Vendors & Products
Tue, 18 Feb 2025 02:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
threat_severity
|
threat_severity
|
Mon, 17 Feb 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Fri, 14 Feb 2025 17:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Fri, 14 Feb 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 14 Feb 2025 10:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In Apache Ignite versions from 2.6.0 and before 2.17.0, configured Class Serialization Filters are ignored for some Ignite endpoints. The vulnerability could be exploited if an attacker manually crafts an Ignite message containing a vulnerable object whose class is present in the Ignite server classpath and sends it to Ignite server endpoints. Deserialization of such a message by the Ignite server may result in the execution of arbitrary code on the Apache Ignite server side. | |
Title | Apache Ignite: Possible RCE when deserializing incoming messages by the server node | |
Weaknesses | CWE-502 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: apache
Published: 2025-02-14T09:55:40.520Z
Updated: 2025-02-14T17:02:36.182Z
Reserved: 2024-11-14T14:12:31.171Z
Link: CVE-2024-52577

Updated: 2025-02-14T17:02:36.182Z

Status : Received
Published: 2025-02-14T10:15:09.557
Modified: 2025-02-14T17:15:16.200
Link: CVE-2024-52577
