Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2005-2875
Py2Play allows remote attackers to execute arbitrary Python code via pickled objects, which Py2Play unpickles and executes.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.015
EPSS Ranking
80.7%
CVSS Severity
CVSS v2 Score
7.5
References
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=326976
http://secunia.com/advisories/16855
http://secunia.com/advisories/17106
http://soya.literati.org/
http://www.debian.org/security/2005/dsa-856
http://www.gentoo.org/security/en/glsa/glsa-200509-09.xml
http://www.securityfocus.com/bid/14864
https://bugs.gentoo.org/show_bug.cgi?id=103524
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=326976
http://secunia.com/advisories/16855
http://secunia.com/advisories/17106
http://soya.literati.org/
http://www.debian.org/security/2005/dsa-856
http://www.gentoo.org/security/en/glsa/glsa-200509-09.xml
http://www.securityfocus.com/bid/14864
https://bugs.gentoo.org/show_bug.cgi?id=103524
Products affected by CVE-2005-2875
Py2play
»
Py2play
»
Version:
Any
cpe:2.3:a:py2play:py2play:*
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved