Vulnerabilities > Deserialization of Untrusted Data

DATE CVE VULNERABILITY TITLE RISK
2022-08-04 CVE-2022-33947 Deserialization of Untrusted Data vulnerability in F5 Big-Ip Domain Name System
In BIG-IP Versions 16.1.x before 16.1.3, 15.1.x before 15.1.6.1, 14.1.x before 14.1.5, and all versions of 13.1.x, a vulnerability exists in undisclosed pages of the BIG-IP DNS Traffic Management User Interface (TMUI) that allows an authenticated attacker with at least operator role privileges to cause the Tomcat process to restart and perform unauthorized DNS requests and operations through undisclosed requests.
network
low complexity
f5 CWE-502
6.5
2022-07-25 CVE-2022-35870 Deserialization of Untrusted Data vulnerability in Inductiveautomation Ignition 8.1.15
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Inductive Automation Ignition 8.1.15 (b2022030114).
local
low complexity
inductiveautomation CWE-502
7.8
2022-07-20 CVE-2022-33315 Deserialization of Untrusted Data vulnerability in multiple products
Deserialization of Untrusted Data vulnerability in ICONICS GENESIS64 versions 10.97.1 and prior and Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior allows an unauthenticated attacker to execute an arbitrary malicious code by leading a user to load a monitoring screen file including malicious XAML codes.
local
low complexity
iconics mitsubishielectric CWE-502
7.8
2022-07-20 CVE-2022-33316 Deserialization of Untrusted Data vulnerability in multiple products
Deserialization of Untrusted Data vulnerability in ICONICS GENESIS64 versions 10.97.1 and prior and Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior allows an unauthenticated attacker to execute an arbitrary malicious code by leading a user to load a monitoring screen file including malicious XAML codes.
local
low complexity
iconics mitsubishielectric CWE-502
7.8
2022-07-20 CVE-2022-33318 Deserialization of Untrusted Data vulnerability in multiple products
Deserialization of Untrusted Data vulnerability in ICONICS GENESIS64 versions 10.97.1 and prior and Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior allows a remote unauthenticated attacker to execute an arbitrary malicious code by sending specially crafted packets to the GENESIS64 server.
network
low complexity
iconics mitsubishielectric CWE-502
critical
9.8
2022-07-20 CVE-2022-33320 Deserialization of Untrusted Data vulnerability in multiple products
Deserialization of Untrusted Data vulnerability in ICONICS GENESIS64 versions 10.97.1 and prior and Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior allows an unauthenticated attacker to execute an arbitrary malicious code by leading a user to load a project configuration file including malicious XML codes.
local
low complexity
iconics mitsubishielectric CWE-502
7.8
2022-07-19 CVE-2022-27579 Deserialization of Untrusted Data vulnerability in Sick Flexi Soft Designer
A deserialization vulnerability in a .NET framework class used and not properly checked by Flexi Soft Designer in all versions up to and including 1.9.4 SP1 allows an attacker to craft malicious project files.
local
low complexity
sick CWE-502
7.8
2022-07-19 CVE-2022-27580 Deserialization of Untrusted Data vulnerability in Sick Safety Designer
A deserialization vulnerability in a .NET framework class used and not properly checked by Safety Designer all versions up to and including 1.11.0 allows an attacker to craft malicious project files.
local
low complexity
sick CWE-502
7.8
2022-07-19 CVE-2022-1984 Deserialization of Untrusted Data vulnerability in Hypr Workforce Access
This issue affects: HYPR Windows WFA versions prior to 7.2; Unsafe Deserialization vulnerability in HYPR Workforce Access (WFA) before version 7.2 may allow local authenticated attackers to elevate privileges via a malicious serialized payload.
local
low complexity
hypr CWE-502
7.8
2022-07-19 CVE-2022-24082 Deserialization of Untrusted Data vulnerability in Pega Infinity
If an on-premise installation of the Pega Platform is configured with the port for the JMX interface exposed to the Internet and port filtering is not properly configured, then it may be possible to upload serialized payloads to attack the underlying system.
network
low complexity
pega CWE-502
critical
9.8