rpc.py Project rpc.py 0.4.3

CPE Details

rpc.py Project rpc.py 0.4.3
0.4.3
2022-07-13
14h52 +00:00
2022-07-21
15h35 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:rpc.py_project:rpc.py:0.4.3:*:*:*:*:*:*:*

Informations

Vendor

rpc.py_project

Product

rpc.py

Version

0.4.3

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2022-35411 2022-07-08 16h07 +00:00 rpc.py through 0.6.0 allows Remote Code Execution because an unpickle occurs when the "serializer: pickle" HTTP header is sent. In other words, although JSON (not Pickle) is the default data format, an unauthenticated client can cause the data to be processed with unpickle.
9.8
Critique