CVE-2024-7104
Lun, 16/09/2024 – 15:15
CVE-2024-7104
CVE-2024-7104
Lun, 16/09/2024 – 15:15
CVE-2024-7104
CVE-2024-7098
Lun, 16/09/2024 – 15:15
CVE-2024-7098
CVE-2024-6401
Lun, 16/09/2024 – 15:15
CVE-2024-6401
CVE-2024-46937
Lun, 16/09/2024 – 13:15
CVE-2024-46937
CVE-2024-46451
Lun, 16/09/2024 – 13:15
CVE-2024-46451
CVE-2024-46424
Lun, 16/09/2024 – 13:15
CVE-2024-46424
CVE-2024-46970
Lun, 16/09/2024 – 11:15
CVE-2024-46970
CVE-2024-22399
Lun, 16/09/2024 – 12:15
CVE-2024-22399
When developers disable authentication on the Seata-Server and do not use the Seata client SDK dependencies, they may construct uncontrolled serialized malicious requests by directly sending bytecode based on the Seata private protocol.
This issue affects Apache Seata: 2.0.0, from 1.0.0 through 1.8.0.
Users are recommended to upgrade to version 2.1.0/1.8.1, which fixes the issue.
CVE-2024-8780
Lun, 16/09/2024 – 06:15
CVE-2024-8780
CVE-2024-8779
Lun, 16/09/2024 – 06:15
CVE-2024-8779