Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

CVE ID:CVE-2017-15095
Description:A deserialization flaw was discovered in the jackson-databind in versions before 2.8.10 and 2.9.1, which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper. This issue extends the previous flaw CVE-2017-7525 by blacklisting more classes that could be used maliciously.
Test IDs: 1.3.6.1.4.1.25623.1.0.813691   1.3.6.1.4.1.25623.1.0.704037   1.3.6.1.4.1.25623.1.0.892091   1.3.6.1.4.1.25623.1.1.10.2017.0408   1.3.6.1.4.1.25623.1.0.892342  
Cross References: Common Vulnerability Exposure (CVE) ID: CVE-2017-15095
BugTraq ID: 103880
http://www.securityfocus.com/bid/103880
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
https://github.com/FasterXML/jackson-databind/issues/1680
https://github.com/FasterXML/jackson-databind/issues/1737
https://security.netapp.com/advisory/ntap-20171214-0003/
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
Debian Security Information: DSA-4037 (Google Search)
https://www.debian.org/security/2017/dsa-4037
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00037.html
https://lists.apache.org/thread.html/f095a791bda6c0595f691eddd0febb2d396987eec5cbd29120d8c629@%3Csolr-user.lucene.apache.org%3E
RedHat Security Advisories: RHSA-2017:3189
https://access.redhat.com/errata/RHSA-2017:3189
RedHat Security Advisories: RHSA-2017:3190
https://access.redhat.com/errata/RHSA-2017:3190
RedHat Security Advisories: RHSA-2018:0342
https://access.redhat.com/errata/RHSA-2018:0342
RedHat Security Advisories: RHSA-2018:0478
https://access.redhat.com/errata/RHSA-2018:0478
RedHat Security Advisories: RHSA-2018:0479
https://access.redhat.com/errata/RHSA-2018:0479
RedHat Security Advisories: RHSA-2018:0480
https://access.redhat.com/errata/RHSA-2018:0480
RedHat Security Advisories: RHSA-2018:0481
https://access.redhat.com/errata/RHSA-2018:0481
RedHat Security Advisories: RHSA-2018:0576
https://access.redhat.com/errata/RHSA-2018:0576
RedHat Security Advisories: RHSA-2018:0577
https://access.redhat.com/errata/RHSA-2018:0577
RedHat Security Advisories: RHSA-2018:1447
https://access.redhat.com/errata/RHSA-2018:1447
RedHat Security Advisories: RHSA-2018:1448
https://access.redhat.com/errata/RHSA-2018:1448
RedHat Security Advisories: RHSA-2018:1449
https://access.redhat.com/errata/RHSA-2018:1449
RedHat Security Advisories: RHSA-2018:1450
https://access.redhat.com/errata/RHSA-2018:1450
RedHat Security Advisories: RHSA-2018:1451
https://access.redhat.com/errata/RHSA-2018:1451
RedHat Security Advisories: RHSA-2018:2927
https://access.redhat.com/errata/RHSA-2018:2927
RedHat Security Advisories: RHSA-2019:2858
https://access.redhat.com/errata/RHSA-2019:2858
RedHat Security Advisories: RHSA-2019:3149
https://access.redhat.com/errata/RHSA-2019:3149
RedHat Security Advisories: RHSA-2019:3892
https://access.redhat.com/errata/RHSA-2019:3892
http://www.securitytracker.com/id/1039769




© 1998-2025 E-Soft Inc. All rights reserved.