Show filters
415 Total Results
Displaying 61-70 of 415
Sort by:
Attacker Value
Unknown

CVE-2021-45394

Disclosure Date: January 18, 2022 (last updated February 23, 2025)
An issue was discovered in Spipu HTML2PDF before 5.2.4. Attackers can trigger deserialization of arbitrary data via the injection of a malicious <link> tag in the converted HTML document.
Attacker Value
Unknown

CVE-2021-43297

Disclosure Date: January 10, 2022 (last updated February 23, 2025)
A deserialization vulnerability existed in dubbo hessian-lite 3.2.11 and its earlier versions, which could lead to malicious code execution. Most Dubbo users use Hessian2 as the default serialization/deserialization protocol, during Hessian catch unexpected exceptions, Hessian will log out some imformation for users, which may cause remote command execution. This issue affects Apache Dubbo Apache Dubbo 2.6.x versions prior to 2.6.12; Apache Dubbo 2.7.x versions prior to 2.7.15; Apache Dubbo 3.0.x versions prior to 3.0.5.
Attacker Value
Unknown

CVE-2021-42392

Disclosure Date: January 10, 2022 (last updated February 23, 2025)
The org.h2.util.JdbcUtils.getConnection method of the H2 database takes as parameters the class name of the driver and URL of the database. An attacker may pass a JNDI driver name and a URL leading to a LDAP or RMI servers, causing remote code execution. This can be exploited through various attack vectors, most notably through the H2 Console which leads to unauthenticated remote code execution.
Attacker Value
Unknown

CVE-2022-21663

Disclosure Date: January 06, 2022 (last updated February 23, 2025)
WordPress is a free and open-source content management system written in PHP and paired with a MariaDB database. On a multisite, users with Super Admin role can bypass explicit/additional hardening under certain conditions through object injection. This has been patched in WordPress version 5.8.3. Older affected versions are also fixed via security release, that go back till 3.7.37. We strongly recommend that you keep auto-updates enabled. There are no known workarounds for this issue.
Attacker Value
Unknown

CVE-2022-21647

Disclosure Date: January 04, 2022 (last updated February 23, 2025)
CodeIgniter is an open source PHP full-stack web framework. Deserialization of Untrusted Data was found in the `old()` function in CodeIgniter4. Remote attackers may inject auto-loadable arbitrary objects with this vulnerability, and possibly execute existing PHP code on the server. We are aware of a working exploit, which can lead to SQL injection. Users are advised to upgrade to v4.1.6 or later. Users unable to upgrade as advised to not use the `old()` function and form_helper nor `RedirectResponse::withInput()` and `redirect()->withInput()`.
Attacker Value
Unknown

CVE-2021-20318

Disclosure Date: December 23, 2021 (last updated February 23, 2025)
The HornetQ component of Artemis in EAP 7 was not updated with the fix for CVE-2016-4978. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using a JMS ObjectMessage.
Attacker Value
Unknown

CVE-2021-4118

Disclosure Date: December 23, 2021 (last updated February 23, 2025)
pytorch-lightning is vulnerable to Deserialization of Untrusted Data
Attacker Value
Unknown

CVE-2021-43853

Disclosure Date: December 22, 2021 (last updated February 23, 2025)
Ajax.NET Professional (AjaxPro) is an AJAX framework available for Microsoft ASP.NET. Affected versions of this package are vulnerable to JavaScript object injection which may result in cross site scripting when leveraged by a malicious user. The affected core relates to JavaScript object creation when parsing json input. Releases before version 21.12.22.1 are affected. A workaround exists that replaces one of the core JavaScript files embedded in the library. See the GHSA-5q7q-qqw2-hjq7 for workaround details.
Attacker Value
Unknown

CVE-2021-44029

Disclosure Date: December 22, 2021 (last updated February 23, 2025)
An issue was discovered in Quest KACE Desktop Authority before 11.2. This vulnerability allows attackers to execute remote code through a deserialization exploitation in the RadAsyncUpload function of ASP.NET AJAX. An attacker can leverage this vulnerability when the encryption keys are known (due to the presence of CVE-2017-11317, CVE-2017-11357, or other means). A default setting for the type whitelisting feature in more current versions of ASP.NET AJAX prevents exploitation.
Attacker Value
Unknown

CVE-2021-42550

Disclosure Date: December 16, 2021 (last updated February 23, 2025)
In logback version 1.2.7 and prior versions, an attacker with the required privileges to edit configurations files could craft a malicious configuration allowing to execute arbitrary code loaded from LDAP servers.