Total
1399 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2017-14141 | 1 Kaltura | 1 Kaltura Server | 2024-02-04 | 6.5 MEDIUM | 7.2 HIGH |
The wiki_decode Developer System Helper function in the admin panel in Kaltura before 13.2.0 allows remote attackers to conduct PHP object injection attacks and execute arbitrary PHP code via a crafted serialized object. | |||||
CVE-2017-17672 | 1 Vbulletin | 1 Vbulletin | 2024-02-04 | 7.5 HIGH | 9.8 CRITICAL |
In vBulletin through 5.3.x, there is an unauthenticated deserialization vulnerability that leads to arbitrary file deletion and, under certain circumstances, code execution, because of unsafe usage of PHP's unserialize() in vB_Library_Template's cacheTemplates() function, which is a publicly exposed API. This is exploited with the templateidlist parameter to ajax/api/template/cacheTemplates. | |||||
CVE-2017-9844 | 1 Sap | 1 Netweaver | 2024-02-04 | 7.5 HIGH | 9.8 CRITICAL |
SAP NetWeaver 7400.12.21.30308 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted serialized Java object in a request to metadatauploader, aka SAP Security Note 2399804. | |||||
CVE-2016-8736 | 1 Apache | 1 Openmeetings | 2024-02-04 | 7.5 HIGH | 9.8 CRITICAL |
Apache OpenMeetings before 3.1.2 is vulnerable to Remote Code Execution via RMI deserialization attack. | |||||
CVE-2017-1000208 | 1 Swagger | 2 Swagger-codegen, Swagger-parser | 2024-02-04 | 6.8 MEDIUM | 8.8 HIGH |
A vulnerability in Swagger-Parser's (version <= 1.0.30) yaml parsing functionality results in arbitrary code being executed when a maliciously crafted yaml Open-API specification is parsed. This in particular, affects the 'generate' and 'validate' command in swagger-codegen (<= 2.2.2) and can lead to arbitrary code being executed when these commands are used on a well-crafted yaml specification. | |||||
CVE-2017-8045 | 1 Pivotal Software | 1 Spring Advanced Message Queuing Protocol | 2024-02-04 | 7.5 HIGH | 9.8 CRITICAL |
In Pivotal Spring AMQP versions prior to 1.7.4, 1.6.11, and 1.5.7, an org.springframework.amqp.core.Message may be unsafely deserialized when being converted into a string. A malicious payload could be crafted to exploit this and enable a remote code execution attack. | |||||
CVE-2017-14035 | 1 Crushftp | 1 Crushftp | 2024-02-04 | 7.5 HIGH | 9.8 CRITICAL |
CrushFTP 8.x before 8.2.0 has a serialization vulnerability. | |||||
CVE-2016-8744 | 1 Apache | 1 Brooklyn | 2024-02-04 | 9.0 HIGH | 8.8 HIGH |
Apache Brooklyn uses the SnakeYAML library for parsing YAML inputs. SnakeYAML allows the use of YAML tags to indicate that SnakeYAML should unmarshal data to a Java type. In the default configuration in Brooklyn before 0.10.0, SnakeYAML will allow unmarshalling to any Java type available on the classpath. This could provide an authenticated user with a means to cause the JVM running Brooklyn to load and run Java code without detection by Brooklyn. Such code would have the privileges of the Java process running Brooklyn, including the ability to open files and network connections, and execute system commands. There is known to be a proof-of-concept exploit using this vulnerability. | |||||
CVE-2017-0903 | 4 Canonical, Debian, Redhat and 1 more | 9 Ubuntu Linux, Debian Linux, Enterprise Linux Desktop and 6 more | 2024-02-04 | 7.5 HIGH | 9.8 CRITICAL |
RubyGems versions between 2.0.0 and 2.6.13 are vulnerable to a possible remote code execution vulnerability. YAML deserialization of gem specifications can bypass class white lists. Specially crafted serialized objects can possibly be used to escalate to remote code execution. | |||||
CVE-2017-10803 | 1 Odoo | 1 Odoo | 2024-02-04 | 8.5 HIGH | 6.5 MEDIUM |
In Odoo 8.0, Odoo Community Edition 9.0 and 10.0, and Odoo Enterprise Edition 9.0 and 10.0, insecure handling of anonymization data in the Database Anonymization module allows remote authenticated privileged users to execute arbitrary Python code, because unpickle is used. | |||||
CVE-2016-6793 | 1 Apache | 1 Wicket | 2024-02-04 | 6.4 MEDIUM | 9.1 CRITICAL |
The DiskFileItem class in Apache Wicket 6.x before 6.25.0 and 1.5.x before 1.5.17 allows remote attackers to cause a denial of service (infinite loop) and write to, move, and delete files with the permissions of DiskFileItem, and if running on a Java VM before 1.3.1, execute arbitrary code via a crafted serialized Java object. | |||||
CVE-2017-11283 | 1 Adobe | 1 Coldfusion | 2024-02-04 | 7.5 HIGH | 9.8 CRITICAL |
Adobe ColdFusion has an Untrusted Data Deserialization vulnerability. This affects Update 4 and earlier versions for ColdFusion 2016, and Update 12 and earlier versions for ColdFusion 11. | |||||
CVE-2017-12628 | 1 Apache | 1 James Server | 2024-02-04 | 7.2 HIGH | 7.8 HIGH |
The JMX server embedded in Apache James, also used by the command line client is exposed to a java de-serialization issue, and thus can be used to execute arbitrary commands. As James exposes JMX socket by default only on local-host, this vulnerability can only be used for privilege escalation. Release 3.0.1 upgrades the incriminated library. | |||||
CVE-2017-14702 | 1 Branaghgroup | 1 Ers Data System | 2024-02-04 | 7.5 HIGH | 9.8 CRITICAL |
ERS Data System 1.8.1.0 allows remote attackers to execute arbitrary code, related to "com.branaghgroup.ecers.update.UpdateRequest" object deserialization. | |||||
CVE-2017-9830 | 1 Code42 | 1 Crashplan | 2024-02-04 | 7.5 HIGH | 9.8 CRITICAL |
Remote Code Execution is possible in Code42 CrashPlan 5.4.x via the org.apache.commons.ssl.rmi.DateRMI Java class, because (upon instantiation) it creates an RMI server that listens on a TCP port and deserializes objects sent by TCP clients. | |||||
CVE-2015-5164 | 2 Pulpproject, Redhat | 2 Qpid, Satellite | 2024-02-04 | 9.0 HIGH | 7.2 HIGH |
The Qpid server on Red Hat Satellite 6 does not properly restrict message types, which allows remote authenticated users with administrative access on a managed content host to execute arbitrary code via a crafted message, related to a pickle processing problem in pulp. | |||||
CVE-2016-3690 | 1 Redhat | 1 Jboss Enterprise Application Platform | 2024-02-04 | 7.5 HIGH | 9.8 CRITICAL |
The PooledInvokerServlet in JBoss EAP 4.x and 5.x allows remote attackers to execute arbitrary code via a crafted serialized payload. | |||||
CVE-2017-1000053 | 1 Plug Project | 1 Plug | 2024-02-04 | 6.8 MEDIUM | 8.1 HIGH |
Elixir Plug before v1.0.4, v1.1.7, v1.2.3 and v1.3.2 is vulnerable to arbitrary code execution in the deserialization functions of Plug.Session. | |||||
CVE-2017-2292 | 1 Puppet | 1 Mcollective | 2024-02-04 | 7.5 HIGH | 9.0 CRITICAL |
Versions of MCollective prior to 2.10.4 deserialized YAML from agents without calling safe_load, allowing the potential for arbitrary code execution on the server. The fix for this is to call YAML.safe_load on input. This has been tested in all Puppet-supplied MCollective plugins, but there is a chance that third-party plugins could rely on this insecure behavior. | |||||
CVE-2017-4914 | 1 Vmware | 1 Vsphere Data Protection | 2024-02-04 | 7.5 HIGH | 9.8 CRITICAL |
VMware vSphere Data Protection (VDP) 6.1.x, 6.0.x, 5.8.x, and 5.5.x contains a deserialization issue. Exploitation of this issue may allow a remote attacker to execute commands on the appliance. |