[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-CVE-2026-42778":6},{"stargazers_count":4,"fetched_at":5},5,"2026-05-02T06:24:39.445Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":24,"aliases":25,"duplicate_of":9,"upstream":26,"downstream":27,"duplicates":28,"related":29,"reserved_at":9,"published_at":30,"modified_at":31,"state":32,"summary":33,"references_raw":42,"kevs":51,"epss":52,"epss_history":55,"metrics":57,"affected":64},"CVE-2026-42778","The fix for CVE-2026-41409 was not applied to the 2.1.X and 2.2.X branches. Here was the original issue description:\n\n\n\n\nThe fix for CVE-2024-52046 in Apache MINA AbstractIoBuffer.getObject() was incomplete. The classname allowlist of classes allowed to be deserialized was applied too late after a static initializer in a class to be read might already have been executed.\n\n\n\n\nAffected versions are Apache MINA 2.1.0 \u003C= 2.1.11, and 2.2.0 \u003C= 2.2.6.\n\n\n\n\nThe problem is resolved in Apache MINA 2.1.12, and 2.2.7 by \napplying the classname allowlist earlier.\n\n\n\n\nAffected are applications using Apache MINA that call IoBuffer.getObject().\n\n\n\n\nApplications using Apache MINA are advised to upgrade\n\n\n\n\n\n\nThe fix for CVE-2024-52046 in Apache MINA AbstractIoBuffer.getObject() was incomplete. The classname allowlist of classes allowed to be deserialized was applied too late after a static initializer in a class to be read might already have been executed.\n\n\n\n\nAffected versions are Apache MINA 2.1.0 \u003C= 2.1.110, and 2.2.0 \u003C= 2.2.6.\n\n\n\n\nThe problem is resolved in Apache MINA 2.1.12, and 2.2.7 by \napplying the classname allowlist earlier.\n\n\n\n\nAffected are applications using Apache MINA that call IoBuffer.getObject().\n\n\n\n\nApplications using Apache MINA are advised to upgrade",null,[11],{"_key":12,"id":12,"name":13,"description":14,"type":15,"status":16,"abstraction":17,"likelihood_of_exploit":18,"capec":19},"CWE-502","Deserialization of Untrusted Data","The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.","weakness","Draft","Base","Medium",[20],{"id":21,"name":22,"techniques":23},"CAPEC-586","Object Injection",[],[],[],[],[],[],[],"2026-05-01T10:01:10.081Z","2026-05-02T03:55:26.868Z","Analyzed",{"cisa_kev":34,"cisa_ransomware":34,"cisa_vendor":9,"epss_severity":35,"epss_score":36,"severity":37,"severity_score":38,"severity_version":39,"severity_source":40,"severity_vector":41,"severity_status":32},false,"low",0.00046,"critical",9.8,"v3.1","cve.org","CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",[43],{"url":44,"sources":45,"tags":47},"https://lists.apache.org/thread/fhlx5k91hrkgyzh7yk1nghrn3k27gxy0",[40,46],"nvd",[48,49,50],"Vendor Advisory","Mailing List","Patch",[],{"date":53,"score":36,"percentile":54},"2026-05-01",0.13951,[56],{"date":53,"score":36,"percentile":54},[58,62],{"source":40,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":59,"cvss_v4_0":9},{"baseScore":38,"baseSeverity":60,"vectorString":41,"impactScore":38,"exploitabilityScore":61},"CRITICAL",10,{"source":46,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":63,"cvss_v4_0":9},{"baseScore":38,"baseSeverity":60,"vectorString":41,"impactScore":38,"exploitabilityScore":61},[65,81],{"ecosystem":9,"name":66,"vendor":67,"product":68,"cpe_part":69,"purl_type":9,"purl_namespace":9,"purl_name":9,"source":9,"versions":70},"Apache MINA","apache software foundation","apache mina","a",[71,77],{"version":72,"is_range":73,"range_type":40,"version_start":74,"version_start_type":75,"version_end":76,"version_end_type":75,"fixed_in":9},">= 2.2.X, \u003C= 2.2.6",true,"2.2.X","including","2.2.6",{"version":78,"is_range":73,"range_type":40,"version_start":79,"version_start_type":75,"version_end":80,"version_end_type":75,"fixed_in":9},">= 2.1.X, \u003C= 2.1.11","2.1.X","2.1.11",{"ecosystem":9,"name":82,"vendor":83,"product":82,"cpe_part":69,"purl_type":9,"purl_namespace":9,"purl_name":9,"source":9,"versions":84},"mina","apache",[85,91],{"version":86,"is_range":73,"range_type":87,"version_start":88,"version_start_type":75,"version_end":89,"version_end_type":90,"fixed_in":9},"gte2.1.0_lt2.1.12","cpe","2.1.0","2.1.12","excluding",{"version":92,"is_range":73,"range_type":87,"version_start":93,"version_start_type":75,"version_end":94,"version_end_type":90,"fixed_in":9},"gte2.2.0_lt2.2.7","2.2.0","2.2.7"]