Логотип exploitDog
bind:"BDU:2026-03615" OR bind:"CVE-2025-61765"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2026-03615" OR bind:"CVE-2025-61765"

Количество 7

Количество 7

fstec логотип

BDU:2026-03615

6 месяцев назад

Уязвимость библиотеки python-socketio, связанная с недостатками механизма десериализации, позволяющая нарушителю выполнить произвольный код

CVSS3: 6.4
EPSS: Низкий
redos логотип

ROS-20260216-73-0004

около 2 месяцев назад

Уязвимость python-socketio

CVSS3: 6.4
EPSS: Низкий
ubuntu логотип

CVE-2025-61765

6 месяцев назад

python-socketio is a Python implementation of the Socket.IO realtime client and server. A remote code execution vulnerability in python-socketio versions prior to 5.14.0 allows attackers to execute arbitrary Python code through malicious pickle deserialization in multi-server deployments on which the attacker previously gained access to the message queue that the servers use for internal communications. When Socket.IO servers are configured to use a message queue backend such as Redis for inter-server communication, messages sent between the servers are encoded using the `pickle` Python module. When a server receives one of these messages through the message queue, it assumes it is trusted and immediately deserializes it. The vulnerability stems from deserialization of messages using Python's `pickle.loads()` function. Having previously obtained access to the message queue, the attacker can send a python-socketio server a crafted pickle payload that executes arbitrary code during de...

CVSS3: 6.4
EPSS: Низкий
nvd логотип

CVE-2025-61765

6 месяцев назад

python-socketio is a Python implementation of the Socket.IO realtime client and server. A remote code execution vulnerability in python-socketio versions prior to 5.14.0 allows attackers to execute arbitrary Python code through malicious pickle deserialization in multi-server deployments on which the attacker previously gained access to the message queue that the servers use for internal communications. When Socket.IO servers are configured to use a message queue backend such as Redis for inter-server communication, messages sent between the servers are encoded using the `pickle` Python module. When a server receives one of these messages through the message queue, it assumes it is trusted and immediately deserializes it. The vulnerability stems from deserialization of messages using Python's `pickle.loads()` function. Having previously obtained access to the message queue, the attacker can send a python-socketio server a crafted pickle payload that executes arbitrary code during deser

CVSS3: 6.4
EPSS: Низкий
debian логотип

CVE-2025-61765

6 месяцев назад

python-socketio is a Python implementation of the Socket.IO realtime c ...

CVSS3: 6.4
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:3780-1

6 месяцев назад

Security update for python-python-socketio

EPSS: Низкий
github логотип

GHSA-g8c6-8fjj-2r4m

6 месяцев назад

python-socketio vulnerable to arbitrary Python code execution (RCE) through malicious pickle deserialization in certain multi-server deployments

CVSS3: 6.4
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2026-03615

Уязвимость библиотеки python-socketio, связанная с недостатками механизма десериализации, позволяющая нарушителю выполнить произвольный код

CVSS3: 6.4
1%
Низкий
6 месяцев назад
redos логотип
ROS-20260216-73-0004

Уязвимость python-socketio

CVSS3: 6.4
1%
Низкий
около 2 месяцев назад
ubuntu логотип
CVE-2025-61765

python-socketio is a Python implementation of the Socket.IO realtime client and server. A remote code execution vulnerability in python-socketio versions prior to 5.14.0 allows attackers to execute arbitrary Python code through malicious pickle deserialization in multi-server deployments on which the attacker previously gained access to the message queue that the servers use for internal communications. When Socket.IO servers are configured to use a message queue backend such as Redis for inter-server communication, messages sent between the servers are encoded using the `pickle` Python module. When a server receives one of these messages through the message queue, it assumes it is trusted and immediately deserializes it. The vulnerability stems from deserialization of messages using Python's `pickle.loads()` function. Having previously obtained access to the message queue, the attacker can send a python-socketio server a crafted pickle payload that executes arbitrary code during de...

CVSS3: 6.4
1%
Низкий
6 месяцев назад
nvd логотип
CVE-2025-61765

python-socketio is a Python implementation of the Socket.IO realtime client and server. A remote code execution vulnerability in python-socketio versions prior to 5.14.0 allows attackers to execute arbitrary Python code through malicious pickle deserialization in multi-server deployments on which the attacker previously gained access to the message queue that the servers use for internal communications. When Socket.IO servers are configured to use a message queue backend such as Redis for inter-server communication, messages sent between the servers are encoded using the `pickle` Python module. When a server receives one of these messages through the message queue, it assumes it is trusted and immediately deserializes it. The vulnerability stems from deserialization of messages using Python's `pickle.loads()` function. Having previously obtained access to the message queue, the attacker can send a python-socketio server a crafted pickle payload that executes arbitrary code during deser

CVSS3: 6.4
1%
Низкий
6 месяцев назад
debian логотип
CVE-2025-61765

python-socketio is a Python implementation of the Socket.IO realtime c ...

CVSS3: 6.4
1%
Низкий
6 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:3780-1

Security update for python-python-socketio

1%
Низкий
6 месяцев назад
github логотип
GHSA-g8c6-8fjj-2r4m

python-socketio vulnerable to arbitrary Python code execution (RCE) through malicious pickle deserialization in certain multi-server deployments

CVSS3: 6.4
1%
Низкий
6 месяцев назад

Уязвимостей на страницу