{"uuid": "d67e5438-d811-4b9b-8d76-ff93bf7d62a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-12628", "type": "seen", "source": "https://t.me/arpsyndicate/2577", "content": "#ExploitObserverAlert\n\nCVE-2017-12628\n\nDESCRIPTION: Exploit Observer has 7 entries related to CVE-2017-12628. The JMX server embedded in Apache James, also used by the command line client is exposed to a java de-serialization issue, and thus can be used to execute arbitrary commands. As James exposes JMX socket by default only on local-host, this vulnerability can only be used for privilege escalation. Release 3.0.1 upgrades the incriminated library.\n\nFIRST-EPSS: 0.000420000\nNVD-IS: 5.9\nNVD-ES: 1.8", "creation_timestamp": "2024-01-06T21:48:33.000000Z"}