Metrics
Affected Vendors & Products
Link | Providers |
---|---|
https://www.cve.org/CVERecord?id=CVE-2024-10096 |
![]() |
Wed, 18 Jun 2025 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | github.com/dask/dask: Remote Unauthorized Pickle Deserialization Command Execution in dask/dask | |
Weaknesses | CWE-77 | |
References |
| |
Metrics |
cvssV3_0
|
Wed, 26 Mar 2025 17:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-77 | |
References |
|
|
Metrics |
cvssV3_0
|
Wed, 26 Mar 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | Remote Unauthorized Pickle Deserialization Command Execution in dask/dask | |
Metrics |
ssvc
|
Wed, 26 Mar 2025 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Dask versions <=2024.8.2 contain a vulnerability in the Dask Distributed Server where the use of pickle serialization allows attackers to craft malicious objects. These objects can be serialized on the client side and sent to the server for deserialization, leading to remote command execution and potentially granting full control over the Dask server. | This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. |
Thu, 20 Mar 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 20 Mar 2025 10:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Dask versions <=2024.8.2 contain a vulnerability in the Dask Distributed Server where the use of pickle serialization allows attackers to craft malicious objects. These objects can be serialized on the client side and sent to the server for deserialization, leading to remote command execution and potentially granting full control over the Dask server. | |
Title | Remote Unauthorized Pickle Deserialization Command Execution in dask/dask | |
Weaknesses | CWE-77 | |
References |
| |
Metrics |
cvssV3_0
|

Status: REJECTED
Assigner: @huntr_ai
Published: 2025-03-20T10:09:07.496Z
Updated: 2025-03-26T16:41:42.163Z
Reserved: 2024-10-17T16:51:20.707Z
Link: CVE-2024-10096

Updated:

Status : Rejected
Published: 2025-03-20T10:15:14.613
Modified: 2025-03-26T17:15:23.943
Link: CVE-2024-10096
