CVE-2024-25359

An issue in zuoxingdong lagom v.0.1.2 allows a local attacker to execute arbitrary code via the pickle_load function of the serialize.py file.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:zuoxingdong:lagom:0.1.2:*:*:*:*:*:*:*

History

17 Jun 2025, 13:57

Type Values Removed Values Added
References () https://github.com/bayuncao/vul-cve-10 - () https://github.com/bayuncao/vul-cve-10 - Broken Link
First Time Zuoxingdong lagom
Zuoxingdong
CPE cpe:2.3:a:zuoxingdong:lagom:0.1.2:*:*:*:*:*:*:*

21 Nov 2024, 09:00

Type Values Removed Values Added
References () https://github.com/bayuncao/vul-cve-10 - () https://github.com/bayuncao/vul-cve-10 -

02 Aug 2024, 20:35

Type Values Removed Values Added
Summary
  • (es) Un problema en zuoxingdong lagom v.0.1.2 permite a un atacante local ejecutar código arbitrario a través de la función pickle_load del archivo serialize.py.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.6
CWE CWE-94

21 Mar 2024, 02:52

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-21 02:52

Updated : 2025-06-17 13:57


NVD link : CVE-2024-25359

Mitre link : CVE-2024-25359

CVE.ORG link : CVE-2024-25359


JSON object : View

Products Affected

zuoxingdong

  • lagom
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')