Tag
Hyperledger Fabric SDK Java Deserialization RCE
2 rules 1 TTPThe deprecated fabric-sdk-java client SDK is vulnerable to Java deserialization RCE due to the use of ObjectInputStream.readObject() without an ObjectInputFilter in Channel.java, allowing remote code execution if an attacker can supply crafted serialized Channel bytes to the client application.
Apache MINA Arbitrary Code Execution Vulnerability
2 rules 1 TTP 1 CVEA critical arbitrary code execution vulnerability (CVE-2026-41635) exists in Apache MINA versions 2.0.0 through 2.0.27, 2.1.0 through 2.1.10, and 2.2.0 through 2.2.5 due to missing class validation in the AbstractIoBuffer.resolveClass() method, potentially allowing attackers to execute arbitrary code on applications using Apache MINA.
ERB Deserialization Bypass via def_module/def_method/def_class
2 rules 2 TTPs 1 CVEA deserialization vulnerability exists in Ruby ERB versions before 4.0.3.1, version 4.0.4, ERB versions 5.0.0 before 6.0.1.1, and ERB versions 6.0.2 before 6.0.4. The `@_init` instance variable guard in `ERB#result` and `ERB#run` can be bypassed via `ERB#def_module`, `ERB#def_method`, and `ERB#def_class`, allowing arbitrary code execution when an ERB object is reconstructed via `Marshal.load` on untrusted data.
Ray Data Remote Code Execution via Parquet Arrow Extension Type Deserialization
2 rules 1 TTPRay Data is vulnerable to remote code execution via Parquet Arrow Extension Type Deserialization; specifically, a maliciously crafted Parquet file can trigger arbitrary code execution due to the unsafe deserialization of Arrow extension metadata, affecting Ray versions 2.49.0 through 2.54.0.
Insecure Deserialization Vulnerability in Telerik UI for AJAX RadFilter Control (CVE-2026-6023)
2 rules 1 TTP 1 CVEAn insecure deserialization vulnerability exists in Progress Telerik UI for AJAX's RadFilter control (versions 2024.4.1114 through 2026.1.421) allowing remote code execution via tampering with the filter state exposed to the client.
MetaSlider Responsive Slider Plugin Deserialization Vulnerability (CVE-2026-39467)
2 rules 1 TTP 1 CVEA deserialization of untrusted data vulnerability in the MetaSlider Responsive Slider plugin for WordPress (versions up to 3.106.0) allows for unauthenticated object injection, potentially leading to remote code execution.
Critical Remote Code Execution Vulnerability in Talend JobServer and Talend Runtime
2 rules 2 TTPs 1 CVECVE-2026-6264, a critical deserialization vulnerability in Talend JobServer and Runtime, allows unauthenticated remote code execution via the JMX monitoring port, leading to complete system compromise.
Azure Monitor Agent Deserialization Vulnerability (CVE-2026-32192) Allows Local Privilege Escalation
2 rules 1 TTP 1 CVECVE-2026-32192 allows a locally authorized attacker to escalate privileges on a host running the Azure Monitor Agent via deserialization of untrusted data.
Red Hat Quay Deserialization Vulnerability Leads to Remote Code Execution (CVE-2026-32590)
2 rules 2 TTPs 1 CVECVE-2026-32590 describes a deserialization vulnerability in Red Hat Quay's handling of resumable container image layer uploads, potentially allowing an attacker to execute arbitrary code on the Quay server by tampering with intermediate data stored in the database.
IBM Langflow Desktop Deserialization RCE (CVE-2026-3357)
2 rules 1 TTP 1 CVEIBM Langflow Desktop versions 1.6.0 through 1.8.2 is vulnerable to arbitrary code execution due to insecure deserialization of untrusted data, allowing an authenticated user to execute code on the system.
NVIDIA DALI Deserialization Vulnerability (CVE-2026-24156)
2 rules 2 TTPs 1 CVE 1 IOCNVIDIA DALI contains a deserialization of untrusted data vulnerability, identified as CVE-2026-24156, which may lead to arbitrary code execution.
phpBB Arbitrary File Upload Vulnerability (CVE-2019-25685)
2 rules 1 CVEphpBB is vulnerable to arbitrary file upload (CVE-2019-25685) by exploiting the plupload functionality and phar:// stream wrapper, allowing authenticated attackers to upload crafted zip files containing serialized PHP objects that execute arbitrary code via the imagick parameter.
pyLoad Arbitrary Code Execution via Malicious Session Deserialization
2 rules 4 TTPs 1 CVE 2 IOCspyLoad is vulnerable to arbitrary code execution via an unprotected `storage_folder` configuration option, allowing an attacker with `SETTINGS` and `ADD` permissions to write a malicious pickle payload to the Flask session store and execute arbitrary code upon subsequent HTTP requests.
NVIDIA BioNeMo Deserialization Vulnerability (CVE-2026-24164)
2 rules 1 TTP 1 CVE 1 IOCNVIDIA BioNeMo is vulnerable to deserialization of untrusted data (CVE-2026-24164), potentially leading to code execution, denial of service, information disclosure, and data tampering.
Active Exploitation of SharePoint Deserialization Vulnerability (CVE-2026-20963)
2 rules 1 TTP 1 IOCCVE-2026-20963, a SharePoint deserialization vulnerability, is under active exploitation and has been added to the CISA Known Exploited Vulnerabilities (KEV) catalog, requiring immediate patching and auditing of potentially compromised data.
PhpSpreadsheet SSRF and RCE Vulnerability via IOFactory::load
2 rules 2 TTPsPhpSpreadsheet is vulnerable to Server-Side Request Forgery (SSRF) and Remote Code Execution (RCE) due to improper validation of filenames in the IOFactory::load function, exploitable via PHP wrappers like `phar://` and `ftp://`.
xmldom XML Node Injection via Comment Serialization
2 rules 1 TTPThe xmldom library is vulnerable to XML node injection, allowing attackers to inject arbitrary XML nodes into serialized output by manipulating comment content; this is mitigated by using the `requireWellFormed` option in `serializeToString` after upgrading to version 0.8.13 or 0.9.10.
Pipecat Remote Code Execution via Pickle Deserialization in LivekitFrameSerializer
2 rules 1 TTP 1 CVE 1 IOCA critical vulnerability, CVE-2025-62373, exists in Pipecat's LivekitFrameSerializer where the deserialize() method uses Python's pickle.loads() on WebSocket data without validation, allowing a malicious WebSocket client to execute arbitrary code on the Pipecat server if LivekitFrameSerializer is explicitly enabled.