Metrics
Affected Vendors & Products
Thu, 13 Nov 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Thu, 02 Oct 2025 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:mmaitre314:picklescan:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Thu, 18 Sep 2025 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mmaitre314
Mmaitre314 picklescan |
|
| Vendors & Products |
Mmaitre314
Mmaitre314 picklescan |
Wed, 17 Sep 2025 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 17 Sep 2025 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A Protection Mechanism Failure vulnerability in mmaitre314 picklescan versions up to and including 0.0.30 allows a remote attacker to bypass the unsafe globals check. This is possible because the scanner performs an exact match for module names, allowing malicious payloads to be loaded via submodules of dangerous packages (e.g., 'asyncio.unix_events' instead of 'asyncio'). When the incorrectly considered safe file is loaded after scan, it can lead to the execution of malicious code. | |
| Title | PickleScan Bypasses Unsafe Globals Check Using Submodule Imports | |
| Weaknesses | CWE-693 | |
| References |
|
|
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: JFROG
Published:
Updated: 2025-09-17T13:07:38.291Z
Reserved: 2025-09-09T11:07:37.837Z
Link: CVE-2025-10157
Updated: 2025-09-17T13:07:33.193Z
Status : Analyzed
Published: 2025-09-17T12:15:38.097
Modified: 2025-11-13T17:02:36.447
Link: CVE-2025-10157
No data.