Total
1658 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2023-40619 | 1 Phppgadmin Project | 1 Phppgadmin | 2023-11-03 | N/A | 9.8 CRITICAL |
phpPgAdmin 7.14.4 and earlier is vulnerable to deserialization of untrusted data which may lead to remote code execution because user-controlled data is directly passed to the PHP 'unserialize()' function in multiple places. An example is the functionality to manage tables in 'tables.php' where the 'ma[]' POST parameter is deserialized. | |||||
CVE-2023-40121 | 1 Google | 1 Android | 2023-10-30 | N/A | 5.5 MEDIUM |
In appendEscapedSQLString of DatabaseUtils.java, there is a possible SQL injection due to unsafe deserialization. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation. | |||||
CVE-2023-34052 | 1 Vmware | 1 Aria Operations For Logs | 2023-10-30 | N/A | 7.8 HIGH |
VMware Aria Operations for Logs contains a deserialization vulnerability. A malicious actor with non-administrative access to the local system can trigger the deserialization of data which could result in authentication bypass. | |||||
CVE-2023-45146 | 1 Xxl-rpc Project | 1 Xxl-rpc | 2023-10-30 | N/A | 10.0 CRITICAL |
XXL-RPC is a high performance, distributed RPC framework. With it, a TCP server can be set up using the Netty framework and the Hessian serialization mechanism. When such a configuration is used, attackers may be able to connect to the server and provide malicious serialized objects that, once deserialized, force it to execute arbitrary code. This can be abused to take control of the machine the server is running by way of remote code execution. This issue has not been fixed. | |||||
CVE-2023-39680 | 1 Sollace | 1 Unicopia | 2023-10-26 | N/A | 9.8 CRITICAL |
Sollace Unicopia version 1.1.1 and before was discovered to deserialize untrusted data, allowing attackers to execute arbitrary code. | |||||
CVE-2023-35186 | 1 Solarwinds | 1 Access Rights Manager | 2023-10-25 | N/A | 8.8 HIGH |
The SolarWinds Access Rights Manager was susceptible to Remote Code Execution Vulnerability. This vulnerability allows an authenticated user to abuse SolarWinds service resulting in remote code execution. | |||||
CVE-2023-35184 | 1 Solarwinds | 1 Access Rights Manager | 2023-10-25 | N/A | 9.8 CRITICAL |
The SolarWinds Access Rights Manager was susceptible to Remote Code Execution Vulnerability. This vulnerability allows an unauthenticated user to abuse a SolarWinds service resulting in a remote code execution. | |||||
CVE-2023-35182 | 1 Solarwinds | 1 Access Rights Manager | 2023-10-25 | N/A | 9.8 CRITICAL |
The SolarWinds Access Rights Manager was susceptible to Remote Code Execution Vulnerability. This vulnerability can be abused by unauthenticated users on SolarWinds ARM Server. | |||||
CVE-2020-2123 | 1 Jenkins | 1 Radargun | 2023-10-25 | 6.5 MEDIUM | 8.8 HIGH |
Jenkins RadarGun Plugin 1.7 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types, resulting in a remote code execution vulnerability. | |||||
CVE-2021-21604 | 1 Jenkins | 1 Jenkins | 2023-10-25 | 6.0 MEDIUM | 8.0 HIGH |
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier allows attackers with permission to create or configure various objects to inject crafted content into Old Data Monitor that results in the instantiation of potentially unsafe objects once discarded by an administrator. | |||||
CVE-2020-2180 | 1 Jenkins | 1 Amazon Web Services Serverless Application Model | 2023-10-25 | 6.5 MEDIUM | 8.8 HIGH |
Jenkins AWS SAM Plugin 1.2.2 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types, resulting in a remote code execution vulnerability. | |||||
CVE-2020-2189 | 1 Jenkins | 1 Source Code Management Filter Jervis | 2023-10-25 | 6.5 MEDIUM | 8.8 HIGH |
Jenkins SCM Filter Jervis Plugin 0.2.1 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types, resulting in a remote code execution vulnerability. | |||||
CVE-2020-2211 | 1 Jenkins | 1 Kubernetes Ci | 2023-10-25 | 6.5 MEDIUM | 8.8 HIGH |
Jenkins ElasticBox Jenkins Kubernetes CI/CD Plugin 1.3 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types, resulting in a remote code execution vulnerability. | |||||
CVE-2020-2158 | 1 Jenkins | 1 Literate | 2023-10-25 | 6.5 MEDIUM | 8.8 HIGH |
Jenkins Literate Plugin 1.0 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types, resulting in a remote code execution vulnerability. | |||||
CVE-2020-2179 | 1 Jenkins | 1 Yaml Axis | 2023-10-25 | 6.5 MEDIUM | 8.8 HIGH |
Jenkins Yaml Axis Plugin 0.2.0 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types, resulting in a remote code execution vulnerability. | |||||
CVE-2023-35180 | 1 Solarwinds | 1 Access Rights Manager | 2023-10-25 | N/A | 8.8 HIGH |
The SolarWinds Access Rights Manager was susceptible to Remote Code Execution Vulnerability. This vulnerability allows authenticated users to abuse SolarWinds ARM API. | |||||
CVE-2023-34050 | 1 Vmware | 1 Spring Advanced Message Queuing Protocol | 2023-10-25 | N/A | 4.3 MEDIUM |
In spring AMQP versions 1.0.0 to 2.4.16 and 3.0.0 to 3.0.9 , allowed list patterns for deserializable class names were added to Spring AMQP, allowing users to lock down deserialization of data in messages from untrusted sources; however by default, when no allowed list was provided, all classes could be deserialized. Specifically, an application is vulnerable if * the SimpleMessageConverter or SerializerMessageConverter is used * the user does not configure allowed list patterns * untrusted message originators gain permissions to write messages to the RabbitMQ broker to send malicious content | |||||
CVE-2023-35084 | 1 Ivanti | 1 Endpoint Manager | 2023-10-25 | N/A | 9.8 CRITICAL |
Unsafe Deserialization of User Input could lead to Execution of Unauthorized Operations in Ivanti Endpoint Manager 2022 su3 and all previous versions, which could allow an attacker to execute commands remotely. | |||||
CVE-2023-34040 | 1 Vmware | 1 Spring For Apache Kafka | 2023-10-18 | N/A | 7.8 HIGH |
In Spring for Apache Kafka 3.0.9 and earlier and versions 2.9.10 and earlier, a possible deserialization attack vector existed, but only if unusual configuration was applied. An attacker would have to construct a malicious serialized object in one of the deserialization exception record headers. Specifically, an application is vulnerable when all of the following are true: * The user does not configure an ErrorHandlingDeserializer for the key and/or value of the record * The user explicitly sets container properties checkDeserExWhenKeyNull and/or checkDeserExWhenValueNull container properties to true. * The user allows untrusted sources to publish to a Kafka topic By default, these properties are false, and the container only attempts to deserialize the headers if an ErrorHandlingDeserializer is configured. The ErrorHandlingDeserializer prevents the vulnerability by removing any such malicious headers before processing the record. | |||||
CVE-2023-44392 | 1 Garden | 1 Garden | 2023-10-16 | N/A | 9.0 CRITICAL |
Garden provides automation for Kubernetes development and testing. Prior tov ersions 0.13.17 and 0.12.65, Garden has a dependency on the cryo library, which is vulnerable to code injection due to an insecure implementation of deserialization. Garden stores serialized objects using cryo in the Kubernetes `ConfigMap` resources prefixed with `test-result` and `run-result` to cache Garden test and run results. These `ConfigMaps` are stored either in the `garden-system` namespace or the configured user namespace. When a user invokes the command `garden test` or `garden run` objects stored in the `ConfigMap` are retrieved and deserialized. This can be used by an attacker with access to the Kubernetes cluster to store malicious objects in the `ConfigMap`, which can trigger a remote code execution on the users machine when cryo deserializes the object. In order to exploit this vulnerability, an attacker must have access to the Kubernetes cluster used to deploy garden remote environments. Further, a user must actively invoke either a `garden test` or `garden run` which has previously cached results. The issue has been patched in Garden versions `0.13.17` (Bonsai) and `0.12.65` (Acorn). Only Garden versions prior to these are vulnerable. No known workarounds are available. |