Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2014-9515
Deferred
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-29 Dec, 2017 | 22:29
Updated At-20 Apr, 2025 | 01:37

Dozer improperly uses a reflection-based approach to type conversion, which might allow remote attackers to execute arbitrary code via a crafted serialized object.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Primary3.09.8CRITICAL
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Primary2.07.5HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
CPE Matches

dozer_project
dozer_project
>>dozer>>Versions up to 5.5.1(inclusive)
cpe:2.3:a:dozer_project:dozer:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-502Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://www.securityfocus.com/bid/107970cve@mitre.org
N/A
https://github.com/DozerMapper/dozer/issues/217cve@mitre.org
Issue Tracking
Third Party Advisory
https://github.com/DozerMapper/dozer/issues/410cve@mitre.org
N/A
https://github.com/DozerMapper/dozer/issues/786cve@mitre.org
N/A
https://github.com/DozerMapper/dozer/pull/447/commits/ccd550696f3df8545319ffa9c6adafc8eca2334ccve@mitre.org
N/A
https://github.com/pentestingforfunandprofit/research/tree/master/dozer-rcecve@mitre.org
Issue Tracking
Third Party Advisory
https://infocon.org/cons/SyScan/SyScan%202015%20Singapore/SyScan%202015%20Singapore%20presentations/SyScan15%20David%20Jorm%20-%20Finding%20and%20exploiting%20novel%20flaws%20in%20Java%20software.pdfcve@mitre.org
Issue Tracking
Third Party Advisory
https://security.netapp.com/advisory/ntap-20240719-0002/cve@mitre.org
N/A
https://www.oracle.com/security-alerts/cpuApr2021.htmlcve@mitre.org
N/A
http://www.securityfocus.com/bid/107970af854a3a-2127-422b-91ae-364da2661108
N/A
https://github.com/DozerMapper/dozer/issues/217af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
Third Party Advisory
https://github.com/DozerMapper/dozer/issues/410af854a3a-2127-422b-91ae-364da2661108
N/A
https://github.com/DozerMapper/dozer/issues/786af854a3a-2127-422b-91ae-364da2661108
N/A
https://github.com/DozerMapper/dozer/pull/447/commits/ccd550696f3df8545319ffa9c6adafc8eca2334caf854a3a-2127-422b-91ae-364da2661108
N/A
https://github.com/pentestingforfunandprofit/research/tree/master/dozer-rceaf854a3a-2127-422b-91ae-364da2661108
Issue Tracking
Third Party Advisory
https://infocon.org/cons/SyScan/SyScan%202015%20Singapore/SyScan%202015%20Singapore%20presentations/SyScan15%20David%20Jorm%20-%20Finding%20and%20exploiting%20novel%20flaws%20in%20Java%20software.pdfaf854a3a-2127-422b-91ae-364da2661108
Issue Tracking
Third Party Advisory
https://security.netapp.com/advisory/ntap-20240719-0002/af854a3a-2127-422b-91ae-364da2661108
N/A
https://www.oracle.com/security-alerts/cpuApr2021.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
Change History
0Changes found

Details not found