Show filters
443 Total Results
Displaying 71-80 of 443
Sort by:
Attacker Value
Unknown
CVE-2021-27470
Disclosure Date: March 23, 2022 (last updated February 23, 2025)
A deserialization vulnerability exists in how the LogService.rem service in Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier verifies serialized data. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary commands in FactoryTalk AssetCentre.
0
Attacker Value
Unknown
CVE-2021-27466
Disclosure Date: March 23, 2022 (last updated February 23, 2025)
A deserialization vulnerability exists in how the ArchiveService.rem service in Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier verifies serialized data. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary commands in FactoryTalk AssetCentre.
0
Attacker Value
Unknown
CVE-2021-27462
Disclosure Date: March 23, 2022 (last updated February 23, 2025)
A deserialization vulnerability exists in how the AosService.rem service in Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier verifies serialized data. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary commands in FactoryTalk AssetCentre.
0
Attacker Value
Unknown
CVE-2021-27460
Disclosure Date: March 23, 2022 (last updated February 23, 2025)
Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier components contain .NET remoting endpoints that deserialize untrusted data without sufficiently verifying that the resulting data will be valid. This vulnerability may allow a remote, unauthenticated attacker to gain full access to the FactoryTalk AssetCentre main server and all agent machines.
0
Attacker Value
Unknown
CVE-2022-26503
Disclosure Date: March 17, 2022 (last updated February 23, 2025)
Deserialization of untrusted data in Veeam Agent for Windows 2.0, 2.1, 2.2, 3.0.2, 4.x, and 5.x allows local users to run arbitrary code with local system privileges.
0
Attacker Value
Unknown
CVE-2022-0749
Disclosure Date: March 17, 2022 (last updated February 23, 2025)
This affects all versions of package SinGooCMS.Utility. The socket client in the package can pass in the payload via the user-controllable input after it has been established, because this socket client transmission does not have the appropriate restrictions or type bindings for the BinaryFormatter.
0
Attacker Value
Unknown
CVE-2022-23940
Disclosure Date: March 10, 2022 (last updated February 23, 2025)
SuiteCRM through 7.12.1 and 8.x through 8.0.1 allows Remote Code Execution. Authenticated users with access to the Scheduled Reports module can achieve this by leveraging PHP deserialization in the email_recipients property. By using a crafted request, they can create a malicious report, containing a PHP-deserialization payload in the email_recipients field. Once someone accesses this report, the backend will deserialize the content of the email_recipients field and the payload gets executed. Project dependencies include a number of interesting PHP deserialization gadgets (e.g., Monolog/RCE1 from phpggc) that can be used for Code Execution.
0
Attacker Value
Unknown
CVE-2022-24282
Disclosure Date: March 08, 2022 (last updated February 23, 2025)
A vulnerability has been identified in SINEC NMS (All versions >= V1.0.3 < V2.0), SINEC NMS (All versions < V1.0.3), SINEMA Server V14 (All versions). The affected system allows to upload JSON objects that are deserialized to Java objects. Due to insecure deserialization of user-supplied content by the affected software, a privileged attacker could exploit this vulnerability by sending a maliciously crafted serialized Java object. This could allow the attacker to execute arbitrary code on the device with root privileges.
0
Attacker Value
Unknown
CVE-2022-21828
Disclosure Date: March 04, 2022 (last updated February 23, 2025)
A user with high privilege access to the Incapptic Connect web console can remotely execute code on the Incapptic Connect server using a unspecified attack vector in Incapptic Connect version 1.40.0, 1.39.1, 1.39.0, 1.38.1, 1.38.0, 1.37.1, 1.37.0, 1.36.0, 1.35.5, 1.35.4 and 1.35.3.
0
Attacker Value
Unknown
CVE-2021-46364
Disclosure Date: February 11, 2022 (last updated February 23, 2025)
A vulnerability in the Snake YAML parser of Magnolia CMS v6.2.3 and below allows attackers to execute arbitrary code via a crafted YAML file.
0