From 5edfed84ec8c94ce7c07ce964a97efe688115591 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 5 Jul 2019 11:00:53 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2019/12xxx/CVE-2019-12760.json | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/2019/12xxx/CVE-2019-12760.json b/2019/12xxx/CVE-2019-12760.json index dc052af00de..419506807f7 100644 --- a/2019/12xxx/CVE-2019-12760.json +++ b/2019/12xxx/CVE-2019-12760.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "** DISPUTED ** A deserialization vulnerability exists in the way parso through 0.4.0 handles grammar parsing from the cache. Cache loading relies on pickle and, provided that an evil pickle can be written to a cache grammar file and that its parsing can be triggered, this flaw leads to Arbitrary Code Execution. NOTE: This id is disputed because \"the cache directory is not under control of the attacker in any common configuration\"." + "value": "** DISPUTED ** A deserialization vulnerability exists in the way parso through 0.4.0 handles grammar parsing from the cache. Cache loading relies on pickle and, provided that an evil pickle can be written to a cache grammar file and that its parsing can be triggered, this flaw leads to Arbitrary Code Execution. NOTE: This is disputed because \"the cache directory is not under control of the attacker in any common configuration.\"" } ] },