Metrics
Affected Vendors & Products
Tue, 15 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Mon, 14 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Mon, 14 Jul 2025 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Apache
Apache eventmesh |
|
CPEs | cpe:2.3:a:apache:eventmesh:*:*:*:*:*:*:*:* | |
Vendors & Products |
Apache
Apache eventmesh |
Sun, 13 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Tue, 18 Feb 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
Fri, 14 Feb 2025 17:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Fri, 14 Feb 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | CWE-502 Deserialization of Untrusted Data at the eventmesh-meta-raft plugin module in Apache EventMesh master branch without release version on windows\linux\mac os e.g. platforms allows attackers to send controlled message and remote code execute via hessian deserialization rpc protocol. Users can use the code under the master branch in project repo or version 1.11.0 to fix this issue. | |
Title | Apache EventMesh: raft Hessian Deserialization Vulnerability allowing remote code execution | |
Weaknesses | CWE-502 | |
References |
|

Status: PUBLISHED
Assigner: apache
Published: 2025-02-14T13:34:26.600Z
Updated: 2025-02-18T15:10:16.650Z
Reserved: 2024-12-18T07:46:43.781Z
Link: CVE-2024-56180

Updated: 2025-02-14T17:02:37.296Z

Status : Analyzed
Published: 2025-02-14T14:15:32.267
Modified: 2025-07-14T13:07:40.770
Link: CVE-2024-56180

No data.