Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2013-5942

Опубликовано: 27 сент. 2013
Источник: debian
EPSS Низкий

Описание

Graphite 0.9.5 through 0.9.10 uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, related to (1) remote_storage.py, (2) storage.py, (3) render/datalib.py, and (4) whitelist/views.py, a different vulnerability than CVE-2013-5093.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
graphite-webfixed0.9.12+debian-1package

EPSS

Процентиль: 81%
0.01535
Низкий

Связанные уязвимости

ubuntu
больше 12 лет назад

Graphite 0.9.5 through 0.9.10 uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, related to (1) remote_storage.py, (2) storage.py, (3) render/datalib.py, and (4) whitelist/views.py, a different vulnerability than CVE-2013-5093.

nvd
больше 12 лет назад

Graphite 0.9.5 through 0.9.10 uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, related to (1) remote_storage.py, (2) storage.py, (3) render/datalib.py, and (4) whitelist/views.py, a different vulnerability than CVE-2013-5093.

CVSS3: 9
github
больше 3 лет назад

graphite-web is vulnerable to Remote Code Execution

EPSS

Процентиль: 81%
0.01535
Низкий