An issue was discovered in NumPy before 1.16.3. It uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, as demonstrated by a numpy.load call. NOTE: third parties dispute this issue because it is a behavior that might have legitimate applications in (for example) loading serialized Python object arrays from trusted and authenticated sources.
No PoCs from references.
- https://github.com/0xT11/CVE-POC
- https://github.com/AISecMatrix/AISecMatrix
- https://github.com/AbdullahAlSolaiman/RockPaperScissors
- https://github.com/RayScri/CVE-2019-6446
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/duckstroms/Web-CTF-Cheatsheet
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/mrhenrike/Hacking-Cheatsheet
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/pwnosec/CTF-Cheatsheet
- https://github.com/w181496/Web-CTF-Cheatsheet