{"uuid": "57b65bf6-4e7a-41df-b35f-09b1411574b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-35728", "type": "seen", "source": "https://t.me/arpsyndicate/190", "content": "#ExploitObserverAlert\n\nCVE-2020-35728\n\nDESCRIPTION: Exploit Observer has 16 entries related to CVE-2020-35728. FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool (aka embedded Xalan in org.glassfish.web/javax.servlet.jsp.jstl).\n\nFIRST-EPSS: 0.006740000\nNVD-IS: 5.9\nNVD-ES: 2.2", "creation_timestamp": "2023-11-17T03:29:20.000000Z"}