Количество 2
Количество 2
CVE-2022-35411
rpc.py through 0.6.0 allows Remote Code Execution because an unpickle occurs when the "serializer: pickle" HTTP header is sent. In other words, although JSON (not Pickle) is the default data format, an unauthenticated client can cause the data to be processed with unpickle.
GHSA-8rq8-f485-7v8x
rpc.py vulnerable to Deserialization of Untrusted Data
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2022-35411 rpc.py through 0.6.0 allows Remote Code Execution because an unpickle occurs when the "serializer: pickle" HTTP header is sent. In other words, although JSON (not Pickle) is the default data format, an unauthenticated client can cause the data to be processed with unpickle. | CVSS3: 9.8 | 71% Высокий | больше 3 лет назад | |
GHSA-8rq8-f485-7v8x rpc.py vulnerable to Deserialization of Untrusted Data | CVSS3: 9.8 | 71% Высокий | больше 3 лет назад |
Уязвимостей на страницу