Show filters
207 Total Results
Displaying 11-20 of 207
Sort by:
Attacker Value
Moderate
CVE-2020-10740
Disclosure Date: June 22, 2020 (last updated February 21, 2025)
A vulnerability was found in Wildfly in versions before 20.0.0.Final, where a remote deserialization attack is possible in the Enterprise Application Beans(EJB) due to lack of validation/filtering capabilities in wildfly.
1
Attacker Value
Very High
CVE-2020-10644
Disclosure Date: June 09, 2020 (last updated February 21, 2025)
The affected product lacks proper validation of user-supplied data, which can result in deserialization of untrusted data on the Ignition 8 Gateway (versions prior to 8.0.10) and Ignition 7 Gateway (versions prior to 7.9.14), allowing an attacker to obtain sensitive information.
1
Attacker Value
Moderate
CVE-2020-9484 — PersistentManager Java deserialization vulnerability
Disclosure Date: May 20, 2020 (last updated February 21, 2025)
When using Apache Tomcat versions 10.0.0-M1 to 10.0.0-M4, 9.0.0.M1 to 9.0.34, 8.5.0 to 8.5.54 and 7.0.0 to 7.0.103 if a) an attacker is able to control the contents and name of a file on the server; and b) the server is configured to use the PersistenceManager with a FileStore; and c) the PersistenceManager is configured with sessionAttributeValueClassNameFilter="null" (the default unless a SecurityManager is used) or a sufficiently lax filter to allow the attacker provided object to be deserialized; and d) the attacker knows the relative file path from the storage location used by FileStore to the file the attacker has control over; then, using a specifically crafted request, the attacker will be able to trigger remote code execution via deserialization of the file under their control. Note that all of conditions a) to d) must be true for the attack to succeed.
0
Attacker Value
Low
CVE-2020-5741
Disclosure Date: May 08, 2020 (last updated February 21, 2025)
Deserialization of Untrusted Data in Plex Media Server on Windows allows a remote, authenticated attacker to execute arbitrary Python code.
1
Attacker Value
High
CVE-2020-0618
Disclosure Date: February 11, 2020 (last updated February 21, 2025)
A remote code execution vulnerability exists in Microsoft SQL Server Reporting Services when it incorrectly handles page requests, aka 'Microsoft SQL Server Reporting Services Remote Code Execution Vulnerability'.
0
Attacker Value
Very High
CVE-2021-26914
Disclosure Date: February 08, 2021 (last updated February 22, 2025)
NetMotion Mobility before 11.73 and 12.x before 12.02 allows unauthenticated remote attackers to execute arbitrary code as SYSTEM because of Java deserialization in MvcUtil valueStringToObject.
0
Attacker Value
Low
CVE-2020-14942
Disclosure Date: June 21, 2020 (last updated February 21, 2025)
Tendenci 12.0.10 allows unrestricted deserialization in apps\helpdesk\views\staff.py.
0
Attacker Value
Very Low
CVE-2020-14932
Disclosure Date: June 20, 2020 (last updated February 21, 2025)
compose.php in SquirrelMail 1.4.22 calls unserialize for the $mailtodata value, which originates from an HTTP GET request. This is related to mailto.php.
0
Attacker Value
Very Low
CVE-2020-14933
Disclosure Date: June 20, 2020 (last updated February 21, 2025)
compose.php in SquirrelMail 1.4.22 calls unserialize for the $attachments value, which originates from an HTTP POST request. NOTE: the vendor disputes this because these two conditions for PHP object injection are not satisfied: existence of a PHP magic method (such as __wakeup or __destruct), and any attack-relevant classes must be declared before unserialize is called (or must be autoloaded).
0
Attacker Value
Unknown
CVE-2020-12000
Disclosure Date: June 09, 2020 (last updated February 21, 2025)
The affected product is vulnerable to the handling of serialized data. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data on the Ignition 8 Gateway (versions prior to 8.0.10) and Ignition 7 Gateway (versions prior to 7.9.14), allowing an attacker to obtain sensitive information.
1