CVE-2013-4271

The default configuration of the ObjectRepresentation class in Restlet before 2.1.4 deserializes objects from untrusted sources, which allows remote attackers to execute arbitrary Java code via a serialized object, a different vulnerability than CVE-2013-4221.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 64%
VendorProductVersion
restletrestlet
𝑥
≤ 2.1.3
restletrestlet
2.1:milestone1
restletrestlet
2.1:milestone2
restletrestlet
2.1:milestone3
restletrestlet
2.1:milestone4
restletrestlet
2.1:milestone5
restletrestlet
2.1:milestone6
restletrestlet
2.1:rc1
restletrestlet
2.1:rc2
restletrestlet
2.1:rc3
restletrestlet
2.1:rc4
restletrestlet
2.1:rc5
restletrestlet
2.1:rc6
restletrestlet
2.1.0
restletrestlet
2.1.1
restletrestlet
2.1.2
𝑥
= Vulnerable software versions
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
restlet
noble
dne
mantic
dne
lunar
dne
kinetic
dne
jammy
dne
impish
dne
hirsute
dne
groovy
dne
focal
dne
eoan
dne
disco
dne
cosmic
ignored
bionic
needed
artful
ignored
zesty
ignored
yakkety
ignored
xenial
needed
wily
ignored
vivid
ignored
utopic
ignored
trusty
dne
saucy
ignored
raring
ignored
quantal
ignored
precise
dne
lucid
dne