CVE-2026-42778
- EPSS 0.19%
- Veröffentlicht 01.05.2026 10:01:10
- Zuletzt bearbeitet 01.05.2026 17:55:49
The fix for CVE-2026-41409 was not applied to the 2.1.X and 2.2.X branches. Here was the original issue description: The fix for CVE-2024-52046 in Apache MINA AbstractIoBuffer.getObject() was incomplete. The classname allowlist of classes allowed...
CVE-2026-42779
- EPSS 0.19%
- Veröffentlicht 01.05.2026 10:00:43
- Zuletzt bearbeitet 01.05.2026 17:55:28
The fix for CVE-2026-41635 was not applied to the 2.1.X and 2.2.X branches. Here was the original issue description: Apache MINA's AbstractIoBuffer.resolveClass() contains two branches, one of them (for static classes or primitive types) d...
CVE-2026-41409
- EPSS 0.18%
- Veröffentlicht 27.04.2026 09:20:12
- Zuletzt bearbeitet 29.04.2026 19:08:07
The fix for CVE-2024-52046 in Apache MINA AbstractIoBuffer.getObject() was incomplete. The classname allowlist of classes allowed to be deserialized was applied too late after a static initializer in a class to be read might already have been execute...
CVE-2026-41635
- EPSS 0.14%
- Veröffentlicht 27.04.2026 08:59:50
- Zuletzt bearbeitet 29.04.2026 19:08:21
Apache MINA's AbstractIoBuffer.resolveClass() contains two branches, one of them (for static classes or primitive types) does not check the class at all, bypassing the classname allowlist and allowing arbitrary code to be executed. The fix checks...
CVE-2024-52046
- EPSS 79.97%
- Veröffentlicht 25.12.2024 10:15:05
- Zuletzt bearbeitet 12.02.2025 10:15:13
The ObjectSerializationDecoder in Apache MINA uses Java’s native deserialization protocol to process incoming serialized data but lacks the necessary security checks and defenses. This vulnerability allows attackers to exploit the deserialization pro...
CVE-2021-41973
- EPSS 1.81%
- Veröffentlicht 01.11.2021 09:15:09
- Zuletzt bearbeitet 21.11.2024 06:27:00
In Apache MINA, a specifically crafted, malformed HTTP request may cause the HTTP Header decoder to loop indefinitely. The decoder assumed that the HTTP Header begins at the beginning of the buffer and loops if there is more data than expected. Pleas...
CVE-2019-0231
- EPSS 0.71%
- Veröffentlicht 01.10.2019 20:15:11
- Zuletzt bearbeitet 21.11.2024 04:16:33
Handling of the close_notify SSL/TLS message does not lead to a connection closure, leading the server to retain the socket opened and to have the client potentially receive clear text messages afterward. Mitigation: 2.0.20 users should migrate to 2....