{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2021-23758","assignerOrgId":"bae035ff-b466-4ff4-94d0-fc9efd9e1730","assignerShortName":"snyk","dateUpdated":"2024-09-17T01:16:27.750Z","dateReserved":"2021-01-08T00:00:00.000Z","datePublished":"2021-12-03T20:05:12.932Z"},"containers":{"cna":{"title":"Deserialization of Untrusted Data","datePublic":"2021-12-03T00:00:00.000Z","providerMetadata":{"orgId":"bae035ff-b466-4ff4-94d0-fc9efd9e1730","shortName":"snyk","dateUpdated":"2023-11-14T03:06:35.776Z"},"descriptions":[{"lang":"en","value":"All versions of package ajaxpro.2 are vulnerable to Deserialization of Untrusted Data due to the possibility of deserialization of arbitrary .NET classes, which can be abused to gain remote code execution."}],"affected":[{"vendor":"n/a","product":"AjaxPro.2","versions":[{"version":"0","status":"affected","lessThan":"unspecified","versionType":"custom"}]}],"references":[{"url":"https://snyk.io/vuln/SNYK-DOTNET-AJAXPRO2-1925971"},{"url":"https://github.com/michaelschwarz/Ajax.NET-Professional/commit/b0e63be5f0bb20dfce507cb8a1a9568f6e73de57"},{"url":"http://packetstormsecurity.com/files/175677/AjaxPro-Deserialization-Remote-Code-Execution.html"}],"credits":[{"lang":"en","value":"Hans-Martin Münch (MOGWAI LABS)"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.1,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"text","lang":"en","description":"Deserialization of Untrusted Data"}]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T19:14:09.129Z"},"title":"CVE Program Container","references":[{"url":"https://snyk.io/vuln/SNYK-DOTNET-AJAXPRO2-1925971","tags":["x_transferred"]},{"url":"https://github.com/michaelschwarz/Ajax.NET-Professional/commit/b0e63be5f0bb20dfce507cb8a1a9568f6e73de57","tags":["x_transferred"]},{"url":"http://packetstormsecurity.com/files/175677/AjaxPro-Deserialization-Remote-Code-Execution.html","tags":["x_transferred"]}]}]}}