Description
All versions of package ajaxpro.2 are vulnerable to Deserialization of Untrusted Data due to the possibility of deserialization of arbitrary .NET classes, which can be abused to gain remote code execution.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-74r6-grj9-8rq6 | Remote Code Execution in AjaxNetProfessional |
Github GHSA |
GHSA-6r7c-6w96-8pvw | Remote Code Execution in AjaxNetProfessional |
References
History
No history.
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2024-09-17T01:16:27.750Z
Reserved: 2021-01-08T00:00:00.000Z
Link: CVE-2021-23758
No data.
Status : Modified
Published: 2021-12-03T20:15:07.557
Modified: 2024-11-21T05:51:52.743
Link: CVE-2021-23758
No data.
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA