Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 14 Apr 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-284 CWE-287 |
Tue, 14 Apr 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Talend talend Jobserver
|
|
| Vendors & Products |
Talend talend Jobserver
|
Tue, 14 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 14 Apr 2026 02:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A critical vulnerability in the Talend JobServer and Talend Runtime allows unauthenticated remote code execution via the JMX monitoring port. The attack vector is the JMX monitoring port of the Talend JobServer. The vulnerability can be mitigated for the Talend JobServer by requiring TLS client authentication for the monitoring port; however, the patch must be applied for full mitigation. For Talend ESB Runtime, the vulnerability can be mitigated by disabling the JobServer JMX monitoring port, which is disabled by default from the R2024-07-RT patch. | |
| Title | Critical Security fix for the Talend JobServer and Talend Runtime | |
| First Time appeared |
Talend
Talend esb Runtime Talend jobserver |
|
| CPEs | cpe:2.3:a:talend:esb_runtime:*:*:*:*:*:*:*:* cpe:2.3:a:talend:jobserver:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Talend
Talend esb Runtime Talend jobserver |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Bugcrowd
Published:
Updated: 2026-04-14T13:14:17.018Z
Reserved: 2026-04-14T01:12:19.962Z
Link: CVE-2026-6264
Updated: 2026-04-14T13:08:52.873Z
Status : Received
Published: 2026-04-14T03:16:09.050
Modified: 2026-04-14T03:16:09.050
Link: CVE-2026-6264
No data.
OpenCVE Enrichment
Updated: 2026-04-14T16:31:00Z