CVE-2025-10157
- EPSS 0.11%
- Veröffentlicht 17.09.2025 11:33:03
- Zuletzt bearbeitet 13.11.2025 17:02:36
A Protection Mechanism Failure vulnerability in mmaitre314 picklescan versions up to and including 0.0.30 allows a remote attacker to bypass the unsafe globals check. This is possible because the scanner performs an exact match for module names, allo...
CVE-2025-10156
- EPSS 0.41%
- Veröffentlicht 17.09.2025 10:41:51
- Zuletzt bearbeitet 02.10.2025 19:04:56
An Improper Handling of Exceptional Conditions vulnerability in the ZIP archive scanning component of mmaitre314 picklescan allows a remote attacker to bypass security scans. This is achieved by crafting a ZIP archive containing a file with a bad Cyc...
CVE-2025-10155
- EPSS 0.1%
- Veröffentlicht 17.09.2025 09:38:15
- Zuletzt bearbeitet 02.10.2025 19:07:57
An Improper Input Validation vulnerability in the scanning logic of mmaitre314 picklescan versions up to and including 0.0.30 allows a remote attacker to bypass pickle files security checks by supplying a standard pickle file with a PyTorch-related f...
CVE-2025-46417
- EPSS 0.19%
- Veröffentlicht 24.04.2025 00:00:00
- Zuletzt bearbeitet 01.10.2025 19:39:33
The unsafe globals in Picklescan before 0.0.25 do not include ssl. Consequently, ssl.get_server_certificate can exfiltrate data via DNS after deserialization.
CVE-2025-1945
- EPSS 0.31%
- Veröffentlicht 10.03.2025 11:43:02
- Zuletzt bearbeitet 29.12.2025 15:16:01
picklescan before 0.0.23 fails to detect malicious pickle files inside PyTorch model archives when certain ZIP file flag bits are modified. By flipping specific bits in the ZIP file headers, an attacker can embed malicious pickle files that remain un...
CVE-2025-1944
- EPSS 0.14%
- Veröffentlicht 10.03.2025 11:30:32
- Zuletzt bearbeitet 29.12.2025 15:16:01
picklescan before 0.0.23 is vulnerable to a ZIP archive manipulation attack that causes it to crash when attempting to extract and scan PyTorch model archives. By modifying the filename in the ZIP header while keeping the original filename in the dir...
CVE-2025-1889
- EPSS 0.04%
- Veröffentlicht 03.03.2025 19:15:34
- Zuletzt bearbeitet 29.12.2025 15:16:01
picklescan before 0.0.22 only considers standard pickle file extensions in the scope for its vulnerability scan. An attacker could craft a malicious model that uses Pickle and include a malicious pickle file with a non-standard file extension. Becaus...
CVE-2025-1716
- EPSS 4.25%
- Veröffentlicht 26.02.2025 15:15:24
- Zuletzt bearbeitet 29.12.2025 15:16:00
picklescan before 0.0.21 does not treat 'pip' as an unsafe global. An attacker could craft a malicious model that uses Pickle to pull in a malicious PyPI package (hosted, for example, on pypi.org or GitHub) via `pip.main()`. Because pip is not a rest...