Логотип exploitDog
bind:CVE-2021-43811
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-43811

Количество 2

Количество 2

nvd логотип

CVE-2021-43811

около 4 лет назад

Sockeye is an open-source sequence-to-sequence framework for Neural Machine Translation built on PyTorch. Sockeye uses YAML to store model and data configurations on disk. Versions below 2.3.24 use unsafe YAML loading, which can be made to execute arbitrary code embedded in config files. An attacker can add malicious code to the config file of a trained model and attempt to convince users to download and run it. If users run the model, the embedded code will run locally. The issue is fixed in version 2.3.24.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-ggmr-44cv-24pm

около 4 лет назад

Code injection via unsafe YAML loading

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2021-43811

Sockeye is an open-source sequence-to-sequence framework for Neural Machine Translation built on PyTorch. Sockeye uses YAML to store model and data configurations on disk. Versions below 2.3.24 use unsafe YAML loading, which can be made to execute arbitrary code embedded in config files. An attacker can add malicious code to the config file of a trained model and attempt to convince users to download and run it. If users run the model, the embedded code will run locally. The issue is fixed in version 2.3.24.

CVSS3: 7.8
9%
Низкий
около 4 лет назад
github логотип
GHSA-ggmr-44cv-24pm

Code injection via unsafe YAML loading

CVSS3: 7.8
9%
Низкий
около 4 лет назад

Уязвимостей на страницу