Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-r9pp-r4xf-597r | pyload-ng vulnerable to RCE with js2py sandbox escape |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 14 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Wed, 30 Oct 2024 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pyload-ng Project
Pyload-ng Project pyload-ng |
|
| CPEs | cpe:2.3:a:pyload-ng_project:pyload-ng:-:*:*:*:*:python:*:* | |
| Vendors & Products |
Pyload-ng Project
Pyload-ng Project pyload-ng |
|
| Metrics |
cvssV3_1
|
Mon, 28 Oct 2024 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An issue in pyload-ng v0.5.0b3.dev85 running under python3.11 or below allows attackers to execute arbitrary code via a crafted HTTP request. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-10-30T20:56:49.427Z
Reserved: 2024-06-21T00:00:00
Link: CVE-2024-39205
Updated: 2024-10-30T20:54:36.731Z
Status : Awaiting Analysis
Published: 2024-10-28T20:15:05.517
Modified: 2024-10-30T21:35:03.770
Link: CVE-2024-39205
No data.
OpenCVE Enrichment
No data.
Github GHSA