Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2020-13091

Опубликовано: 15 мая 2020
Источник: nvd
CVSS3: 9.8
CVSS2: 7.5
EPSS Низкий

Описание

pandas through 1.0.3 can unserialize and execute commands from an untrusted file that is passed to the read_pickle() function, if reduce makes an os.system call. NOTE: third parties dispute this issue because the read_pickle() function is documented as unsafe and it is the user's responsibility to use the function in a secure manner

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:numfocus:pandas:*:*:*:*:*:*:*:*
Версия до 1.0.3 (включая)

EPSS

Процентиль: 78%
0.01143
Низкий

9.8 Critical

CVSS3

7.5 High

CVSS2

Дефекты

CWE-502

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 5 лет назад

pandas through 1.0.3 can unserialize and execute commands from an untrusted file that is passed to the read_pickle() function, if __reduce__ makes an os.system call. NOTE: third parties dispute this issue because the read_pickle() function is documented as unsafe and it is the user's responsibility to use the function in a secure manner

CVSS3: 9.8
debian
больше 5 лет назад

pandas through 1.0.3 can unserialize and execute commands from an untr ...

github
больше 3 лет назад

pandas through 1.0.3 can unserialize and execute commands from an untrusted file that is passed to the read_pickle() function, if __reduce__ makes an os.system call.

EPSS

Процентиль: 78%
0.01143
Низкий

9.8 Critical

CVSS3

7.5 High

CVSS2

Дефекты

CWE-502