Executing from Memory Using ActiveMQ CVE-2023-46604 - Blog - VulnCheck
Common Information
Type Value
UUID c9f08509-7970-4b49-8c9e-9e819b9a215a
Fingerprint aab09b95c9a7b011
Analysis status DONE
Considered CTI value 0
Text language
Published Nov. 15, 2023, midnight
Added to db Nov. 20, 2023, 12:57 a.m.
Last updated Nov. 18, 2024, 1:38 a.m.
Headline Executing from Memory Using ActiveMQ CVE-2023-46604
Title Executing from Memory Using ActiveMQ CVE-2023-46604 - Blog - VulnCheck
Detected Hints/Tags/Attributes 34/1/17
RSS Feed
Details Id Enabled Feed title Url Added to db
Details 261 VulnCheck Blog https://vulncheck.com/feed/blog/atom.xml 2024-08-30 22:08
Attributes
Details Type #Events CTI Value
Details CVE 84
cve-2023-46604
Details Domain 6
www.springframework.org
Details Domain 150
www.w3.org
Details Domain 138
java.io
Details Domain 4
org.springframework.context.support
Details File 2127
cmd.exe
Details File 93
curl.exe
Details File 269
msiexec.exe
Details File 4
spring-beans.xsd
Details File 312
calc.exe
Details File 87
java.exe
Details File 6
activemq.log
Details IPv4 3
10.9.49.131
Details Url 5
http://www.springframework.org/schema/beans
Details Url 50
http://www.w3.org/2001/xmlschema-instance
Details Url 4
http://www.springframework.org/schema/beans/spring-beans.xsd
Details Url 2
http://10.9.49.131:8080/bppkarhowrrn