{"id":"CVE-2016-0750","details":"The hotrod java client in infinispan before 9.1.0.Final automatically deserializes bytearray message contents in certain events. A malicious user could exploit this flaw by injecting a specially-crafted serialized object to attain remote code execution or conduct other attacks.","modified":"2026-03-20T03:04:54.276163Z","published":"2018-09-11T13:29:00.433Z","references":[{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/101910"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:3244"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:0501"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-0750"},{"type":"REPORT","url":"https://issues.jboss.org/browse/ISPN-7781"},{"type":"FIX","url":"https://github.com/infinispan/infinispan/pull/5116"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/infinispan/infinispan","events":[{"introduced":"0"},{"fixed":"e0d389fd778a3a959941e9a7782f8dc295b9fe18"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"9.1.0"}]}}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-0750.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}