Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-13091

Опубликовано: 15 мая 2020
Источник: debian
EPSS Низкий

Описание

pandas through 1.0.3 can unserialize and execute commands from an untrusted file that is passed to the read_pickle() function, if __reduce__ makes an os.system call. NOTE: third parties dispute this issue because the read_pickle() function is documented as unsafe and it is the user's responsibility to use the function in a secure manner

Пакеты

ПакетСтатусВерсия исправленияРелизТип
pandasunfixedpackage

EPSS

Процентиль: 78%
0.01143
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 5 лет назад

pandas through 1.0.3 can unserialize and execute commands from an untrusted file that is passed to the read_pickle() function, if __reduce__ makes an os.system call. NOTE: third parties dispute this issue because the read_pickle() function is documented as unsafe and it is the user's responsibility to use the function in a secure manner

CVSS3: 9.8
nvd
больше 5 лет назад

pandas through 1.0.3 can unserialize and execute commands from an untrusted file that is passed to the read_pickle() function, if __reduce__ makes an os.system call. NOTE: third parties dispute this issue because the read_pickle() function is documented as unsafe and it is the user's responsibility to use the function in a secure manner

github
больше 3 лет назад

pandas through 1.0.3 can unserialize and execute commands from an untrusted file that is passed to the read_pickle() function, if __reduce__ makes an os.system call.

EPSS

Процентиль: 78%
0.01143
Низкий