CVE-2021-35196
21.06.2021, 23:15
Manuskript through 0.12.0 allows remote attackers to execute arbitrary code via a crafted settings.pickle file in a project file, because there is insecure deserialization via the pickle.load() function in settings.py. NOTE: the vendor's position is that the product is not intended for opening an untrusted project fileEnginsight
| Vendor | Product | Version |
|---|---|---|
| theologeek | manuskript | 𝑥 ≤ 0.12.0 |
𝑥
= Vulnerable software versions
Debian Releases
Ubuntu Releases
Common Weakness Enumeration