Search Results (2529 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2026-23946 1 Tendenci 1 Tendenci 2026-02-17 6.8 Medium
Tendenci is an open source content management system built for non-profits, associations and cause-based sites. Versions 15.3.11 and below include a critical deserialization vulnerability in the Helpdesk module (which is not enabled by default). This vulnerability allows Remote Code Execution (RCE) by an authenticated user with staff security level due to using Python's pickle module in helpdesk /reports/. The original CVE-2020-14942 was incompletely patched. While ticket_list() was fixed to use safe JSON deserialization, the run_report() function still uses unsafe pickle.loads(). The impact is limited to the permissions of the user running the application, typically www-data, which generally lacks write (except for upload directories) and execute permissions. This issue has been fixed in version 15.3.12.
CVE-2026-23685 2 Sap, Sap Se 2 Netweaver, Sap Netweaver (jms Service) 2026-02-17 4.4 Medium
Due to a Deserialization vulnerability in SAP NetWeaver (JMS service), an attacker authenticated as an administrator with local access could submit specially crafted content to the server. If processed by the application, this content could trigger unintended behavior during internal logic execution, potentially causing a denial of service. Successful exploitation results in a high impact on availability, while confidentiality and integrity remain unaffected.
CVE-2026-26208 1 Alex4ssb 1 Adb-explorer 2026-02-13 7.8 High
ADB Explorer is a fluent UI for ADB on Windows. Prior to Beta 0.9.26020, ADB Explorer is vulnerable to Insecure Deserialization leading to Remote Code Execution. The application attempts to deserialize the App.txt settings file using Newtonsoft.Json with TypeNameHandling set to Objects. This allows an attacker to supply a crafted JSON file containing a gadget chain (e.g., ObjectDataProvider) to execute arbitrary code when the application launches and subsequently saves its settings. This vulnerability is fixed in Beta 0.9.26020.
CVE-2026-25614 2 Blesta, Phillipsdata 2 Blesta, Blesta 2026-02-13 7.5 High
Blesta 3.x through 5.x before 5.13.3 allows object injection, aka CORE-5680.
CVE-2026-25615 2 Blesta, Phillipsdata 2 Blesta, Blesta 2026-02-13 7.2 High
Blesta 3.x through 5.x before 5.13.3 allows object injection, aka CORE-5668.
CVE-2025-62204 1 Microsoft 5 Office Sharepoint Server, Sharepoint Enterprise Server 2016, Sharepoint Server and 2 more 2026-02-13 8 High
Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.
CVE-2025-59245 1 Microsoft 1 Sharepoint Online 2026-02-13 9.8 Critical
Microsoft SharePoint Online Elevation of Privilege Vulnerability
CVE-2025-47732 1 Microsoft 1 Dataverse 2026-02-13 8.7 High
Deserialization of untrusted data in Microsoft Dataverse allows an authorized attacker to execute code over a network.
CVE-2025-21364 1 Microsoft 3 365 Apps, Office 2024, Office Long Term Servicing Channel 2026-02-13 7.8 High
Microsoft Excel Security Feature Bypass Vulnerability
CVE-2025-29807 1 Microsoft 1 Dataverse 2026-02-13 8.7 High
Deserialization of untrusted data in Microsoft Dataverse allows an authorized attacker to execute code over a network.
CVE-2025-29793 1 Microsoft 4 Sharepoint Enterprise Server, Sharepoint Server, Sharepoint Server 2016 and 1 more 2026-02-13 7.2 High
Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.
CVE-2025-30384 1 Microsoft 3 Sharepoint Server, Sharepoint Server 2016, Sharepoint Server 2019 2026-02-13 7.4 High
Deserialization of untrusted data in Microsoft Office SharePoint allows an unauthorized attacker to execute code locally.
CVE-2025-30382 1 Microsoft 3 Sharepoint Server, Sharepoint Server 2016, Sharepoint Server 2019 2026-02-13 7.8 High
Deserialization of untrusted data in Microsoft Office SharePoint allows an unauthorized attacker to execute code locally.
CVE-2025-30378 1 Microsoft 3 Sharepoint Server, Sharepoint Server 2016, Sharepoint Server 2019 2026-02-13 7 High
Deserialization of untrusted data in Microsoft Office SharePoint allows an unauthorized attacker to execute code locally.
CVE-2025-53770 1 Microsoft 3 Sharepoint Server, Sharepoint Server 2016, Sharepoint Server 2019 2026-02-13 9.8 Critical
Deserialization of untrusted data in on-premises Microsoft SharePoint Server allows an unauthorized attacker to execute code over a network. Microsoft is aware that an exploit for CVE-2025-53770 exists in the wild. Microsoft is preparing and fully testing a comprehensive update to address this vulnerability. In the meantime, please make sure that the mitigation provided in this CVE documentation is in place so that you are protected from exploitation.
CVE-2025-49714 1 Microsoft 2 Python, Visual Studio Code 2026-02-13 7.8 High
Trust boundary violation in Visual Studio Code - Python extension allows an unauthorized attacker to execute code locally.
CVE-2025-47994 1 Microsoft 8 365 Apps, Office, Office 2016 and 5 more 2026-02-13 7.8 High
Deserialization of untrusted data in Microsoft Office allows an unauthorized attacker to elevate privileges locally.
CVE-2025-49712 1 Microsoft 5 Sharepoint Enterprise Server 2016, Sharepoint Server, Sharepoint Server 2010 and 2 more 2026-02-13 8.8 High
Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.
CVE-2025-53772 1 Microsoft 2 Web Deploy, Web Deploy 4.0 2026-02-13 8.8 High
Deserialization of untrusted data in Web Deploy allows an authorized attacker to execute code over a network.
CVE-2025-34153 1 Hyland 1 Onbase 2026-02-13 N/A
Hyland OnBase versions prior to 17.0.2.87 (other versions may be affected) are vulnerable to unauthenticated remote code execution via insecure deserialization on the .NET Remoting TCP channel. The service registers a listener on port 6031 with the URI endpoint TimerServer, implemented in Hyland.Core.Timers.dll. This endpoint deserializes untrusted input using the .NET BinaryFormatter, allowing attackers to execute arbitrary code under the context of NT AUTHORITY\SYSTEM.