Логотип exploitDog
bind:CVE-2026-3989
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2026-3989

Количество 2

Количество 2

nvd логотип

CVE-2026-3989

около 1 месяца назад

SGLangs `replay_request_dump.py` contains an insecure pickle.load() without validation and proper deserialization. An attacker can take advantage of this by providing a malicious .pkl file, which will execute the attackers code on the device running the script.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-hvwj-8w5g-28rg

около 1 месяца назад

SGLangs `replay_request_dump.py` contains an insecure pickle.load() without validation and proper deserialization

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2026-3989

SGLangs `replay_request_dump.py` contains an insecure pickle.load() without validation and proper deserialization. An attacker can take advantage of this by providing a malicious .pkl file, which will execute the attackers code on the device running the script.

CVSS3: 7.8
0%
Низкий
около 1 месяца назад
github логотип
GHSA-hvwj-8w5g-28rg

SGLangs `replay_request_dump.py` contains an insecure pickle.load() without validation and proper deserialization

CVSS3: 7.8
0%
Низкий
около 1 месяца назад

Уязвимостей на страницу