Picklescan

6 CVEs product

Monthly

CVE-2025-10157 CRITICAL POC PATCH Act Now

A Protection Mechanism Failure vulnerability in mmaitre314 picklescan versions up to and including 0.0.30 allows a remote attacker to bypass the unsafe globals check. Rated critical severity (CVSS 9.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

Authentication Bypass Picklescan
NVD GitHub
CVSS 4.0
9.3
EPSS
0.1%
CVE-2025-10156 CRITICAL POC PATCH Act Now

An Improper Handling of Exceptional Conditions vulnerability in the ZIP archive scanning component of mmaitre314 picklescan allows a remote attacker to bypass security scans. Rated critical severity (CVSS 9.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

Authentication Bypass Picklescan
NVD GitHub
CVSS 4.0
9.3
EPSS
0.4%
CVE-2025-10155 CRITICAL POC PATCH Act Now

An Improper Input Validation vulnerability in the scanning logic of mmaitre314 picklescan versions up to and including 0.0.30 allows a remote attacker to bypass pickle files security checks by. Rated critical severity (CVSS 9.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

Authentication Bypass Picklescan Pytorch AI / ML
NVD GitHub
CVSS 4.0
9.3
EPSS
0.0%
CVE-2025-46417 MEDIUM POC PATCH This Month

The unsafe globals in Picklescan before 0.0.25 do not include ssl. Rated medium severity (CVSS 6.8), this vulnerability is no authentication required, low attack complexity. Public exploit code available.

Deserialization Picklescan
NVD GitHub
CVSS 4.0
6.8
EPSS
0.2%
CVE-2025-1889 MEDIUM POC PATCH This Month

picklescan before 0.0.22 only considers standard pickle file extensions in the scope for its vulnerability scan. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

Information Disclosure Picklescan
NVD GitHub
CVSS 4.0
5.3
EPSS
0.0%
CVE-2025-1716 MEDIUM POC PATCH This Month

picklescan before 0.0.21 does not treat 'pip' as an unsafe global. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available.

Information Disclosure Picklescan
NVD GitHub
CVSS 4.0
5.3
EPSS
4.2%
CVE-2025-10157
EPSS 0% CVSS 9.3
CRITICAL POC PATCH Act Now

A Protection Mechanism Failure vulnerability in mmaitre314 picklescan versions up to and including 0.0.30 allows a remote attacker to bypass the unsafe globals check. Rated critical severity (CVSS 9.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

Authentication Bypass Picklescan
NVD GitHub
CVE-2025-10156
EPSS 0% CVSS 9.3
CRITICAL POC PATCH Act Now

An Improper Handling of Exceptional Conditions vulnerability in the ZIP archive scanning component of mmaitre314 picklescan allows a remote attacker to bypass security scans. Rated critical severity (CVSS 9.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

Authentication Bypass Picklescan
NVD GitHub
CVE-2025-10155
EPSS 0% CVSS 9.3
CRITICAL POC PATCH Act Now

An Improper Input Validation vulnerability in the scanning logic of mmaitre314 picklescan versions up to and including 0.0.30 allows a remote attacker to bypass pickle files security checks by. Rated critical severity (CVSS 9.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

Authentication Bypass Picklescan Pytorch +1
NVD GitHub
CVE-2025-46417
EPSS 0% CVSS 6.8
MEDIUM POC PATCH This Month

The unsafe globals in Picklescan before 0.0.25 do not include ssl. Rated medium severity (CVSS 6.8), this vulnerability is no authentication required, low attack complexity. Public exploit code available.

Deserialization Picklescan
NVD GitHub
CVE-2025-1889
EPSS 0% CVSS 5.3
MEDIUM POC PATCH This Month

picklescan before 0.0.22 only considers standard pickle file extensions in the scope for its vulnerability scan. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

Information Disclosure Picklescan
NVD GitHub
CVE-2025-1716
EPSS 4% CVSS 5.3
MEDIUM POC PATCH This Month

picklescan before 0.0.21 does not treat 'pip' as an unsafe global. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available.

Information Disclosure Picklescan
NVD GitHub

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy