Описание
S3QL 1.18.1 and earlier uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object in (1) common.py or (2) local.py in backends/.
| Релиз | Статус | Примечание |
|---|---|---|
| artful | ignored | end of life |
| bionic | not-affected | 2.10.1+dfsg-4 |
| cosmic | not-affected | 2.10.1+dfsg-4 |
| devel | not-affected | 2.10.1+dfsg-4 |
| disco | not-affected | 2.10.1+dfsg-4 |
| esm-apps/bionic | not-affected | 2.10.1+dfsg-4 |
| esm-apps/xenial | not-affected | 2.10.1+dfsg-4 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was needed] |
| lucid | DNE | |
| precise | ignored | end of life |
Показывать по
Ссылки на источники
EPSS
7.5 High
CVSS2
Связанные уязвимости
S3QL 1.18.1 and earlier uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object in (1) common.py or (2) local.py in backends/.
S3QL 1.18.1 and earlier uses the pickle Python module unsafely, which ...
S3QL 1.18.1 and earlier uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object in (1) common.py or (2) local.py in backends/.
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
EPSS
7.5 High
CVSS2