{"id":"CVE-2014-0485","details":"S3QL 1.18.1 and earlier uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object in (1) common.py or (2) local.py in backends/.","modified":"2026-01-27T04:12:29.642277Z","published":"2014-09-02T14:55:03Z","withdrawn":"2026-01-27T04:12:29.642277Z","references":[{"type":"ADVISORY","url":"http://www.debian.org/security/2014/dsa-3013"},{"type":"FIX","url":"https://bitbucket.org/nikratio/s3ql/commits/091ac263809b4e8"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2014/08/28/3"}],"schema_version":"1.7.3"}