 
                        We found results for “”
CVE-2025-5175
Good to know:
 
                                    Date: May 26, 2025
A vulnerability was found in erdogant pypickle up to 1.1.5. It has been classified as critical. This affects the function Save of the file pypickle/pypickle.py. The manipulation leads to improper authorization. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. Upgrading to version 2.0.0 is able to address this issue. The patch is named 14b4cae704a0bb4eb6723e238f25382d847a1917. It is recommended to upgrade the affected component.
Severity Score
Related Resources (13)
Severity Score
Top Fix
 
                                    Upgrade Version
Upgrade to version pypickle - 2.0.0;pypickle - 2.0.0;https://github.com/erdogant/pypickle.git - 2.0.0
CVSS v3.1
| Base Score: |  | 
|---|---|
| Attack Vector (AV): | LOCAL | 
| Attack Complexity (AC): | LOW | 
| Privileges Required (PR): | LOW | 
| User Interaction (UI): | NONE | 
| Scope (S): | UNCHANGED | 
| Confidentiality (C): | LOW | 
| Integrity (I): | LOW | 
| Availability (A): | LOW | 
CVSS v2
| Base Score: |  | 
|---|---|
| Access Vector (AV): | LOCAL | 
| Access Complexity (AC): | LOW | 
| Authentication (AU): | SINGLE | 
| Confidentiality (C): | PARTIAL | 
| Integrity (I): | PARTIAL | 
| Availability (A): | PARTIAL | 
| Additional information: | 
 Vulnerabilities
                        Vulnerabilities
                 Projects
                        Projects
                 Vulnerability Disclosure
                        Vulnerability Disclosure
                 About Us
                    About Us
                 Contact Us
                    Contact Us
                

