Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2014-5340

Опубликовано: 02 сент. 2014
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 9.3

Описание

The wato component in Check_MK before 1.2.4p4 and 1.2.5 before 1.2.5i4 uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, related to an automation URL.

РелизСтатусПримечание
artful

ignored

end of life
bionic

not-affected

cosmic

not-affected

devel

not-affected

disco

not-affected

esm-apps/bionic

not-affected

esm-apps/xenial

not-affected

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was needed]
lucid

DNE

precise

ignored

end of life

Показывать по

EPSS

Процентиль: 87%
0.0315
Низкий

9.3 Critical

CVSS2

Связанные уязвимости

redhat
почти 12 лет назад

The wato component in Check_MK before 1.2.4p4 and 1.2.5 before 1.2.5i4 uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, related to an automation URL.

nvd
больше 11 лет назад

The wato component in Check_MK before 1.2.4p4 and 1.2.5 before 1.2.5i4 uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, related to an automation URL.

debian
больше 11 лет назад

The wato component in Check_MK before 1.2.4p4 and 1.2.5 before 1.2.5i4 ...

github
больше 3 лет назад

The wato component in Check_MK before 1.2.4p4 and 1.2.5 before 1.2.5i4 uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, related to an automation URL.

EPSS

Процентиль: 87%
0.0315
Низкий

9.3 Critical

CVSS2