Exploit for Unauthenticated Remote Code Execution in Liferay Portal via JSONW
Reporter | Title | Published | Views | Family All 30 |
---|---|---|---|---|
![]() | Liferay Portal Java Unmarshalling Remote Code Execution Exploit | 16 Apr 202000:00 | â | zdt |
![]() | Liferay Portal Remote Code Execution Exploit | 12 Jul 202000:00 | â | zdt |
![]() | Liferay Portal - Java Unmarshalling via JSONWS RCE (Metasploit) | 16 Apr 202000:00 | â | exploitdb |
![]() | Deserialization of Untrusted Data in Liferay Portal | 24 May 202217:12 | â | github |
![]() | Liferay Portal Insecure Deserialization (CVE-2020-7961) | 10 May 202000:00 | â | checkpoint_advisories |
![]() | CVE-2020-7961 | 20 Mar 202018:16 | â | vulnrichment |
![]() | Deserialization of Untrusted Data in Liferay Portal | 24 May 202217:12 | â | osv |
![]() | Remote Code Execution (RCE) | 1 Jun 202002:05 | â | veracode |
![]() | CVE-2020-7961 | 20 Mar 202018:16 | â | cvelist |
![]() | Liferay Portal 6.2.x < 6.2.5 / 7.0.x < 7.0.6 / 7.1.x < 7.1.3 / 7.2.x < 7.2.1 RCE | 23 Nov 202100:00 | â | nessus |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo