Total
1363 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2018-1000059 | 1 Validformbuilder | 1 Validform Builder | 2020-08-24 | 7.5 HIGH | 9.8 CRITICAL |
ValidFormBuilder version 4.5.4 contains a PHP Object Injection vulnerability in Valid Form unserialize method that can result in Possible to execute unauthorised system commands remotely and disclose file contents in file system. | |||||
CVE-2018-1000641 | 1 Yeswiki | 1 Yeswiki | 2020-08-24 | 7.5 HIGH | 9.8 CRITICAL |
YesWiki version <= cercopitheque beta 1 contains a PHP Object Injection vulnerability in Unserialising user entered parameter in i18n.inc.php that can result in execution of code, disclosure of information. | |||||
CVE-2019-9365 | 1 Google | 1 Android | 2020-08-24 | 7.5 HIGH | 9.8 CRITICAL |
In Bluetooth, there is a possible deserialization error due to missing string validation. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-109838537 | |||||
CVE-2019-19909 | 1 Sfu | 1 Open Journal System | 2020-08-24 | 6.8 MEDIUM | 8.8 HIGH |
An issue was discovered in Public Knowledge Project (PKP) pkp-lib before 3.1.2-2, as used in Open Journal Systems (OJS) before 3.1.2-2. Code injection can occur in the OJS report generator if an authenticated Journal Manager user visits a crafted URL, because unserialize is used. | |||||
CVE-2018-10085 | 1 Cmsmadesimple | 1 Cms Made Simple | 2020-08-24 | 7.5 HIGH | 9.8 CRITICAL |
CMS Made Simple (CMSMS) through 2.2.6 allows PHP object injection because of an unserialize call in the _get_data function of \lib\classes\internal\class.LoginOperations.php. By sending a crafted cookie, a remote attacker can upload and execute code, or delete files. | |||||
CVE-2019-20453 | 1 Pydio | 1 Pydio | 2020-08-24 | 6.5 MEDIUM | 8.8 HIGH |
A problem was found in Pydio Core before 8.2.4 and Pydio Enterprise before 8.2.4. A PHP object injection is present in the page plugins/uploader.http/HttpDownload.php. An authenticated user with basic privileges can inject objects and achieve remote code execution. | |||||
CVE-2019-1010306 | 1 Teller | 1 Slanger | 2020-08-24 | 7.5 HIGH | 9.8 CRITICAL |
Slanger 0.6.0 is affected by: Remote Code Execution (RCE). The impact is: A remote attacker can execute arbitrary commands by sending a crafted request to the server. The component is: Message handler & request validator. The attack vector is: Remote unauthenticated. The fixed version is: after commit 5267b455caeb2e055cccf0d2b6a22727c111f5c3. | |||||
CVE-2019-20452 | 1 Pydio | 1 Pydio | 2020-08-24 | 6.5 MEDIUM | 8.8 HIGH |
A problem was found in Pydio Core before 8.2.4 and Pydio Enterprise before 8.2.4. A PHP object injection is present in the page plugins/core.access/src/RecycleBinManager.php. An authenticated user with basic privileges can inject objects and achieve remote code execution. | |||||
CVE-2018-20984 | 1 Patreon | 1 Patreon Wordpress | 2020-08-24 | 7.5 HIGH | 9.8 CRITICAL |
The patreon-connect plugin before 1.2.2 for WordPress has Object Injection. | |||||
CVE-2019-11286 | 1 Vmware | 2 Gemfire, Tanzu Gemfire For Virtual Machines | 2020-08-11 | 6.5 MEDIUM | 9.1 CRITICAL |
VMware GemFire versions prior to 9.10.0, 9.9.1, 9.8.5, and 9.7.5, and VMware Tanzu GemFire for VMs versions prior to 1.11.0, 1.10.1, 1.9.2, and 1.8.2, contain a JMX service available to the network which does not properly restrict input. A remote authenticated malicious user may request against the service with a crafted set of credentials leading to remote code execution. | |||||
CVE-2020-5411 | 1 Pivotal Software | 1 Spring Batch | 2020-08-07 | 6.8 MEDIUM | 8.1 HIGH |
When configured to enable default typing, Jackson contained a deserialization vulnerability that could lead to arbitrary code execution. Jackson fixed this vulnerability by blacklisting known "deserialization gadgets". Spring Batch configures Jackson with global default typing enabled which means that through the previous exploit, arbitrary code could be executed if all of the following is true: * Spring Batch's Jackson support is being leveraged to serialize a job's ExecutionContext. * A malicious user gains write access to the data store used by the JobRepository (where the data to be deserialized is stored). In order to protect against this type of attack, Jackson prevents a set of untrusted gadget classes from being deserialized. Spring Batch should be proactive against blocking unknown "deserialization gadgets" when enabling default typing. | |||||
CVE-2017-5878 | 1 Red5 | 1 Media Server | 2020-08-05 | 7.5 HIGH | 9.8 CRITICAL |
The AMF unmarshallers in Red5 Media Server before 1.0.8 do not restrict the classes for which it performs deserialization, which allows remote attackers to execute arbitrary code via crafted serialized Java data. | |||||
CVE-2010-3258 | 1 Google | 1 Chrome | 2020-08-04 | 9.3 HIGH | N/A |
The sandbox implementation in Google Chrome before 6.0.472.53 does not properly deserialize parameters, which has unspecified impact and remote attack vectors. | |||||
CVE-2017-1000195 | 1 Octobercms | 1 October | 2020-08-03 | 6.4 MEDIUM | 7.5 HIGH |
October CMS build 412 is vulnerable to PHP object injection in asset move functionality resulting in ability to delete files limited by file permissions on the server. | |||||
CVE-2010-4574 | 2 Google, Linux | 3 Chrome, Chrome Os, Linux Kernel | 2020-07-31 | 7.5 HIGH | N/A |
The Pickle::Pickle function in base/pickle.cc in Google Chrome before 8.0.552.224 and Chrome OS before 8.0.552.343 on 64-bit Linux platforms does not properly perform pointer arithmetic, which allows remote attackers to bypass message deserialization validation, and cause a denial of service or possibly have unspecified other impact, via invalid pickle data. | |||||
CVE-2017-14702 | 1 Branaghgroup | 1 Ers Data System | 2020-07-29 | 7.5 HIGH | 9.8 CRITICAL |
ERS Data System 1.8.1.0 allows remote attackers to execute arbitrary code, related to "com.branaghgroup.ecers.update.UpdateRequest" object deserialization. | |||||
CVE-2020-12009 | 2 Iconics, Mitsubishielectric | 11 Bizviz, Energy Analytix, Facility Analytix and 8 more | 2020-07-29 | 5.0 MEDIUM | 7.5 HIGH |
A specially crafted communication packet sent to the affected device could cause a denial-of-service condition due to a deserialization vulnerability. This affects: Mitsubishi Electric MC Works64 Version 4.02C (10.95.208.31) and earlier, all versions; Mitsubishi Electric MC Works32 Version 3.00A (9.50.255.02); ICONICS GenBroker64, Platform Services, Workbench, FrameWorX Server v10.96 and prior; ICONICS GenBroker32 v9.5 and prior. | |||||
CVE-2020-10917 | 1 Nec | 1 Esmpro Manager | 2020-07-28 | 7.5 HIGH | 9.8 CRITICAL |
This vulnerability allows remote attackers to execute arbitrary code on affected installations of NEC ESMPRO Manager 6.42. Authentication is not required to exploit this vulnerability. The specific flaw exists within the RMI service. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-10007. | |||||
CVE-2020-15842 | 1 Liferay | 2 Dxp, Liferay Portal | 2020-07-24 | 6.8 MEDIUM | 8.1 HIGH |
Liferay Portal before 7.3.0, and Liferay DXP 7.0 before fix pack 90, 7.1 before fix pack 17, and 7.2 before fix pack 5, allows man-in-the-middle attackers to execute arbitrary code via crafted serialized payloads, because of insecure deserialization. | |||||
CVE-2020-11982 | 1 Apache | 1 Airflow | 2020-07-24 | 7.5 HIGH | 9.8 CRITICAL |
An issue was found in Apache Airflow versions 1.10.10 and below. When using CeleryExecutor, if an attack can connect to the broker (Redis, RabbitMQ) directly, it was possible to insert a malicious payload directly to the broker which could lead to a deserialization attack (and thus remote code execution) on the Worker. |