CVE-2013-4271
10.10.2013, 00:55
The default configuration of the ObjectRepresentation class in Restlet before 2.1.4 deserializes objects from untrusted sources, which allows remote attackers to execute arbitrary Java code via a serialized object, a different vulnerability than CVE-2013-4221.Enginsight
Vendor | Product | Version |
---|---|---|
restlet | restlet | 𝑥 ≤ 2.1.3 |
restlet | restlet | 2.1:milestone1 |
restlet | restlet | 2.1:milestone2 |
restlet | restlet | 2.1:milestone3 |
restlet | restlet | 2.1:milestone4 |
restlet | restlet | 2.1:milestone5 |
restlet | restlet | 2.1:milestone6 |
restlet | restlet | 2.1:rc1 |
restlet | restlet | 2.1:rc2 |
restlet | restlet | 2.1:rc3 |
restlet | restlet | 2.1:rc4 |
restlet | restlet | 2.1:rc5 |
restlet | restlet | 2.1:rc6 |
restlet | restlet | 2.1.0 |
restlet | restlet | 2.1.1 |
restlet | restlet | 2.1.2 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Ubuntu Product | |||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
restlet |
|
Common Weakness Enumeration
References