Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-cmm9-mgm5-9r42

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

pandas through 1.0.3 can unserialize and execute commands from an untrusted file that is passed to the read_pickle() function, if reduce makes an os.system call.

pandas through 1.0.3 can unserialize and execute commands from an untrusted file that is passed to the read_pickle() function, if reduce makes an os.system call.

EPSS

Процентиль: 78%
0.01143
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 5 лет назад

pandas through 1.0.3 can unserialize and execute commands from an untrusted file that is passed to the read_pickle() function, if __reduce__ makes an os.system call. NOTE: third parties dispute this issue because the read_pickle() function is documented as unsafe and it is the user's responsibility to use the function in a secure manner

CVSS3: 9.8
nvd
больше 5 лет назад

pandas through 1.0.3 can unserialize and execute commands from an untrusted file that is passed to the read_pickle() function, if __reduce__ makes an os.system call. NOTE: third parties dispute this issue because the read_pickle() function is documented as unsafe and it is the user's responsibility to use the function in a secure manner

CVSS3: 9.8
debian
больше 5 лет назад

pandas through 1.0.3 can unserialize and execute commands from an untr ...

EPSS

Процентиль: 78%
0.01143
Низкий