Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2019-20477

Опубликовано: 19 фев. 2020
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 7.5
CVSS3: 9.8

Описание

PyYAML 5.1 through 5.1.2 has insufficient restrictions on the load and load_all functions because of a class deserialization issue, e.g., Popen is a class in the subprocess module. NOTE: this issue exists because of an incomplete fix for CVE-2017-18342.

РелизСтатусПримечание
bionic

not-affected

code not present
devel

not-affected

5.3-1ubuntu2
eoan

ignored

end of life
esm-infra-legacy/trusty

not-affected

code not present
esm-infra/bionic

not-affected

code not present
esm-infra/focal

not-affected

5.3-1ubuntu2
esm-infra/xenial

not-affected

code not present
focal

not-affected

5.3-1ubuntu2
precise/esm

not-affected

code not present
trusty

ignored

end of standard support

Показывать по

EPSS

Процентиль: 65%
0.00504
Низкий

7.5 High

CVSS2

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
redhat
больше 5 лет назад

PyYAML 5.1 through 5.1.2 has insufficient restrictions on the load and load_all functions because of a class deserialization issue, e.g., Popen is a class in the subprocess module. NOTE: this issue exists because of an incomplete fix for CVE-2017-18342.

CVSS3: 9.8
nvd
больше 5 лет назад

PyYAML 5.1 through 5.1.2 has insufficient restrictions on the load and load_all functions because of a class deserialization issue, e.g., Popen is a class in the subprocess module. NOTE: this issue exists because of an incomplete fix for CVE-2017-18342.

CVSS3: 9.8
debian
больше 5 лет назад

PyYAML 5.1 through 5.1.2 has insufficient restrictions on the load and ...

CVSS3: 9.8
github
больше 4 лет назад

Deserialization of Untrusted Data in PyYAML

rocky
почти 5 лет назад

Moderate: python38:3.8 security, bug fix, and enhancement update

EPSS

Процентиль: 65%
0.00504
Низкий

7.5 High

CVSS2

9.8 Critical

CVSS3