Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-5340

Опубликовано: 05 мая 2014
Источник: redhat
CVSS2: 7.5
EPSS Низкий

Описание

The wato component in Check_MK before 1.2.4p4 and 1.2.5 before 1.2.5i4 uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, related to an automation URL.

Дополнительная информация

Статус:

Important
https://bugzilla.redhat.com/show_bug.cgi?id=1132337check-mk: multiple flaws fixed in versions 1.2.4p4 and 1.2.5i4

EPSS

Процентиль: 87%
0.0315
Низкий

7.5 High

CVSS2

Связанные уязвимости

ubuntu
больше 11 лет назад

The wato component in Check_MK before 1.2.4p4 and 1.2.5 before 1.2.5i4 uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, related to an automation URL.

nvd
больше 11 лет назад

The wato component in Check_MK before 1.2.4p4 and 1.2.5 before 1.2.5i4 uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, related to an automation URL.

debian
больше 11 лет назад

The wato component in Check_MK before 1.2.4p4 and 1.2.5 before 1.2.5i4 ...

github
больше 3 лет назад

The wato component in Check_MK before 1.2.4p4 and 1.2.5 before 1.2.5i4 uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, related to an automation URL.

EPSS

Процентиль: 87%
0.0315
Низкий

7.5 High

CVSS2