CVE-2014-0485
S3QL 1.18.1 and earlier uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object in (1) common.py or (2) local.py in backends/.
Ver en NVDSeveridad
N/A
EPSS
Probabilidad de explotación (próx. 30 días): 0.0160 (1.6%)
Percentil: 81.8%
EPSS: 2026-05-06
Afecta
s3ql_project:s3qlDescripción técnica
S3QL 1.18.1 and earlier uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object in (1) common.py or (2) local.py in backends/.
Publicada: 2/9/2014, 14:55:03
Última modificación: 6/5/2026, 22:30:45
Referencias
- http://www.debian.org/security/2014/dsa-3013
- http://www.openwall.com/lists/oss-security/2014/08/28/3
- https://bitbucket.org/nikratio/s3ql/commits/091ac263809b4e8
- http://www.debian.org/security/2014/dsa-3013
- http://www.openwall.com/lists/oss-security/2014/08/28/3
- https://bitbucket.org/nikratio/s3ql/commits/091ac263809b4e8