vulnerability
Oracle Linux: CVE-2016-5003: ELSA-2018-1779: xmlrpc3 security update (IMPORTANT) (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:N/AC:L/Au:N/C:P/I:P/A:P) | May 24, 2016 | Jun 1, 2018 | Dec 3, 2025 |
Severity
7
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
May 24, 2016
Added
Jun 1, 2018
Modified
Dec 3, 2025
Description
The Apache XML-RPC (aka ws-xmlrpc) library 3.1.3, as used in Apache Archiva, allows remote attackers to execute arbitrary code via a crafted serialized Java object in an <ex:serializable> element.
A flaw was discovered in the Apache XML-RPC (ws-xmlrpc) library that deserializes untrusted data when enabledForExtensions setting is enabled. A remote attacker could use this vulnerability to execute arbitrary code via a crafted serialized Java object in a <ex:serializable> element.
A flaw was discovered in the Apache XML-RPC (ws-xmlrpc) library that deserializes untrusted data when enabledForExtensions setting is enabled. A remote attacker could use this vulnerability to execute arbitrary code via a crafted serialized Java object in a <ex:serializable> element.
Solutions
oracle-linux-upgrade-xmlrpc3-clientoracle-linux-upgrade-xmlrpc3-client-develoracle-linux-upgrade-xmlrpc3-commonoracle-linux-upgrade-xmlrpc3-common-develoracle-linux-upgrade-xmlrpc3-javadocoracle-linux-upgrade-xmlrpc3-serveroracle-linux-upgrade-xmlrpc3-server-develoracle-linux-upgrade-xmlrpc-clientoracle-linux-upgrade-xmlrpc-commonoracle-linux-upgrade-xmlrpc-javadocoracle-linux-upgrade-xmlrpc-server
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.