Логотип exploitDog
bind:CVE-2011-4104
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2011-4104

Количество 4

Количество 4

ubuntu логотип

CVE-2011-4104

больше 11 лет назад

The from_yaml method in serializers.py in Django Tastypie before 0.9.10 does not properly deserialize YAML data, which allows remote attackers to execute arbitrary Python code via vectors related to the yaml.load method.

CVSS2: 7.5
EPSS: Низкий
nvd логотип

CVE-2011-4104

больше 11 лет назад

The from_yaml method in serializers.py in Django Tastypie before 0.9.10 does not properly deserialize YAML data, which allows remote attackers to execute arbitrary Python code via vectors related to the yaml.load method.

CVSS2: 7.5
EPSS: Низкий
debian логотип

CVE-2011-4104

больше 11 лет назад

The from_yaml method in serializers.py in Django Tastypie before 0.9.1 ...

CVSS2: 7.5
EPSS: Низкий
github логотип

GHSA-qgvw-qc2q-gv5q

больше 3 лет назад

Django Tastypie Improper Deserialization of YAML Data

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2011-4104

The from_yaml method in serializers.py in Django Tastypie before 0.9.10 does not properly deserialize YAML data, which allows remote attackers to execute arbitrary Python code via vectors related to the yaml.load method.

CVSS2: 7.5
1%
Низкий
больше 11 лет назад
nvd логотип
CVE-2011-4104

The from_yaml method in serializers.py in Django Tastypie before 0.9.10 does not properly deserialize YAML data, which allows remote attackers to execute arbitrary Python code via vectors related to the yaml.load method.

CVSS2: 7.5
1%
Низкий
больше 11 лет назад
debian логотип
CVE-2011-4104

The from_yaml method in serializers.py in Django Tastypie before 0.9.1 ...

CVSS2: 7.5
1%
Низкий
больше 11 лет назад
github логотип
GHSA-qgvw-qc2q-gv5q

Django Tastypie Improper Deserialization of YAML Data

CVSS3: 9.8
1%
Низкий
больше 3 лет назад

Уязвимостей на страницу