jackson 代码执行 (CVE-2020-35728)
时间: 2023-09-23 14:11:47 浏览: 54
根据提供的引用内容,没有关于"jackson 代码执行 (CVE-2020-35728)"的详细信息。请确保提供的引用内容准确无误,或提供更多相关的信息,以便我能够更好地回答您的问题。<span class="em">1</span><span class="em">2</span><span class="em">3</span><span class="em">4</span>
相关问题
CVE-2020-35728)
CVE-2020-35728是指jackson-databind版本小于2.9.10.8存在的一个反序列化远程代码执行漏洞。攻击者可以利用该漏洞远程执行恶意代码从而控制服务器。该漏洞只在未使用enableDefaultTyping()方法时才会存在,如果使用了该方法则可以忽略该漏洞。<span class="em">1</span><span class="em">2</span><span class="em">3</span><span class="em">4</span>
CVE-2020-14343
抱歉,我无法找到关于CVE-2020-14343的相关信息。请确认您提供的引用内容是否正确。如果有其他问题,请随时提问。<span class="em">1</span><span class="em">2</span><span class="em">3</span>
#### 引用[.reference_title]
- *1* *3* [CVE-2020-14882/14883: Weblogic ConSole HTTP 协议代码执行漏洞通告](https://blog.csdn.net/weixin_45728976/article/details/109359771)[target="_blank" data-report-click={"spm":"1018.2226.3001.9630","extra":{"utm_source":"vip_chatgpt_common_search_pc_result","utm_medium":"distribute.pc_search_result.none-task-cask-2~all~insert_cask~default-1-null.142^v93^chatsearchT3_1"}}] [.reference_item style="max-width: 50%"]
- *2* [CVE-2020-36179:CVE-2020-36179~82 Jackson-databind SSRF&RCE](https://download.csdn.net/download/weixin_42181545/19185756)[target="_blank" data-report-click={"spm":"1018.2226.3001.9630","extra":{"utm_source":"vip_chatgpt_common_search_pc_result","utm_medium":"distribute.pc_search_result.none-task-cask-2~all~insert_cask~default-1-null.142^v93^chatsearchT3_1"}}] [.reference_item style="max-width: 50%"]
[ .reference_list ]