An issue was discovered in NumPy before 1.16.3. It uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, as demonstrated by a numpy.load call. NOTE: third parties dispute this issue because it is a behavior that might have legitimate applications in (for example) loading serialized Python object arrays from trusted and authenticated sources.
Metrics
Affected Vendors & Products
References
History
Mon, 21 Jul 2025 22:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An issue was discovered in NumPy 1.16.0 and earlier. It uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, as demonstrated by a numpy.load call. NOTE: third parties dispute this issue because it is a behavior that might have legitimate applications in (for example) loading serialized Python object arrays from trusted and authenticated sources | An issue was discovered in NumPy before 1.16.3. It uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, as demonstrated by a numpy.load call. NOTE: third parties dispute this issue because it is a behavior that might have legitimate applications in (for example) loading serialized Python object arrays from trusted and authenticated sources. |
References |
|

Status: PUBLISHED
Assigner: mitre
Published: 2019-01-16T05:00:00.000Z
Updated: 2025-07-21T22:10:51.613Z
Reserved: 2019-01-15T00:00:00.000Z
Link: CVE-2019-6446

No data.

Status : Modified
Published: 2019-01-16T05:29:01.370
Modified: 2025-07-21T23:15:25.020
Link: CVE-2019-6446
