Vulnerabilities > Deserialization of Untrusted Data

DATE CVE VULNERABILITY TITLE RISK
2020-06-05 CVE-2020-4449 Deserialization of Untrusted Data vulnerability in IBM Websphere Application Server
IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 traditional could allow a remote attacker to obtain sensitive information with a specially-crafted sequence of serialized objects.
network
low complexity
ibm CWE-502
7.5
2020-06-05 CVE-2020-4448 Deserialization of Untrusted Data vulnerability in IBM products
IBM WebSphere Application Server Network Deployment 7.0, 8.0, 8.5, and 9.0 could allow a remote attacker to execute arbitrary code on the system with a specially-crafted sequence of serialized objects from untrusted sources.
network
low complexity
ibm CWE-502
critical
9.8
2020-06-01 CVE-2020-7660 Deserialization of Untrusted Data vulnerability in Verizon Serialize-Javascript
serialize-javascript prior to 3.1.0 allows remote attackers to inject arbitrary code via the function "deleteFunctions" within "index.js".
network
high complexity
verizon CWE-502
8.1
2020-05-26 CVE-2020-12390 Deserialization of Untrusted Data vulnerability in Mozilla Firefox
Incorrect origin serialization of URLs with IPv6 addresses could lead to incorrect security checks.
network
low complexity
mozilla CWE-502
critical
9.8
2020-05-22 CVE-2020-3280 Deserialization of Untrusted Data vulnerability in Cisco Unified Contact Center Express 12.0/12.0(1)
A vulnerability in the Java Remote Management Interface of Cisco Unified Contact Center Express (Unified CCX) could allow an unauthenticated, remote attacker to execute arbitrary code on an affected device.
network
low complexity
cisco CWE-502
critical
9.8
2020-05-21 CVE-2018-21234 Deserialization of Untrusted Data vulnerability in multiple products
Jodd before 5.0.4 performs Deserialization of Untrusted JSON Data when setClassMetadataName is set.
network
low complexity
jodd apache CWE-502
critical
9.8
2020-05-20 CVE-2020-9484 Deserialization of Untrusted Data vulnerability in multiple products
When using Apache Tomcat versions 10.0.0-M1 to 10.0.0-M4, 9.0.0.M1 to 9.0.34, 8.5.0 to 8.5.54 and 7.0.0 to 7.0.103 if a) an attacker is able to control the contents and name of a file on the server; and b) the server is configured to use the PersistenceManager with a FileStore; and c) the PersistenceManager is configured with sessionAttributeValueClassNameFilter="null" (the default unless a SecurityManager is used) or a sufficiently lax filter to allow the attacker provided object to be deserialized; and d) the attacker knows the relative file path from the storage location used by FileStore to the file the attacker has control over; then, using a specifically crafted request, the attacker will be able to trigger remote code execution via deserialization of the file under their control.
7.0
2020-05-20 CVE-2020-12835 Deserialization of Untrusted Data vulnerability in Smartbear Readyapi 3.2.5
An issue was discovered in SmartBear ReadyAPI SoapUI Pro 3.2.5.
network
low complexity
smartbear CWE-502
critical
9.8
2020-05-15 CVE-2020-13092 Deserialization of Untrusted Data vulnerability in Scikit-Learn
scikit-learn (aka sklearn) through 0.23.0 can unserialize and execute commands from an untrusted file that is passed to the joblib.load() function, if __reduce__ makes an os.system call.
network
low complexity
scikit-learn CWE-502
critical
9.8
2020-05-15 CVE-2020-13091 Deserialization of Untrusted Data vulnerability in Numfocus Pandas
pandas through 1.0.3 can unserialize and execute commands from an untrusted file that is passed to the read_pickle() function, if __reduce__ makes an os.system call.
network
low complexity
numfocus CWE-502
critical
9.8