Логотип exploitDog
bind:CVE-2022-35411
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-35411

Количество 2

Количество 2

nvd логотип

CVE-2022-35411

больше 3 лет назад

rpc.py through 0.6.0 allows Remote Code Execution because an unpickle occurs when the "serializer: pickle" HTTP header is sent. In other words, although JSON (not Pickle) is the default data format, an unauthenticated client can cause the data to be processed with unpickle.

CVSS3: 9.8
EPSS: Высокий
github логотип

GHSA-8rq8-f485-7v8x

больше 3 лет назад

rpc.py vulnerable to Deserialization of Untrusted Data

CVSS3: 9.8
EPSS: Высокий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2022-35411

rpc.py through 0.6.0 allows Remote Code Execution because an unpickle occurs when the "serializer: pickle" HTTP header is sent. In other words, although JSON (not Pickle) is the default data format, an unauthenticated client can cause the data to be processed with unpickle.

CVSS3: 9.8
71%
Высокий
больше 3 лет назад
github логотип
GHSA-8rq8-f485-7v8x

rpc.py vulnerable to Deserialization of Untrusted Data

CVSS3: 9.8
71%
Высокий
больше 3 лет назад

Уязвимостей на страницу