CVE-2014-0485
S3QL 1.18.1 and earlier uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object in (1) common.py or (2) local.py in backends/.
View on NVDSeverity
N/A
EPSS
Probability of exploitation (next 30 days): 0.0160 (1.6%)
Percentile: 81.8%
EPSS: 2026-05-06
Affects
s3ql_project:s3qlTechnical description
S3QL 1.18.1 and earlier uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object in (1) common.py or (2) local.py in backends/.
Published: 9/2/2014, 2:55:03 PM
Last modified: 5/6/2026, 10:30:45 PM
References
- http://www.debian.org/security/2014/dsa-3013
- http://www.openwall.com/lists/oss-security/2014/08/28/3
- https://bitbucket.org/nikratio/s3ql/commits/091ac263809b4e8
- http://www.debian.org/security/2014/dsa-3013
- http://www.openwall.com/lists/oss-security/2014/08/28/3
- https://bitbucket.org/nikratio/s3ql/commits/091ac263809b4e8