[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-CVE-2021-47952":6},{"stargazers_count":4,"fetched_at":5},6,"2026-05-17T05:03:47.720Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":62,"aliases":77,"duplicate_of":9,"upstream":78,"downstream":79,"duplicates":80,"related":81,"reserved_at":9,"published_at":82,"modified_at":82,"state":83,"summary":84,"references_raw":90,"kevs":110,"epss":9,"epss_history":111,"metrics":112,"affected":124},"CVE-2021-47952","python jsonpickle 2.0.0 contains a remote code execution vulnerability that allows attackers to execute arbitrary Python commands by deserializing malicious JSON payloads containing py/repr objects. Attackers can craft JSON strings with py/repr directives that invoke the eval function during deserialization to execute system commands and arbitrary code.",null,[11],{"_key":12,"id":12,"name":13,"description":14,"type":15,"status":16,"abstraction":17,"likelihood_of_exploit":18,"capec":19},"CWE-94","Improper Control of Generation of Code ('Code Injection')","The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.","weakness","Draft","Base","Medium",[20,24,58],{"id":21,"name":22,"techniques":23},"CAPEC-242","Code Injection",[],{"id":25,"name":26,"techniques":27},"CAPEC-35","Leverage Executable Code in Non-Executable Files",[28,39,46],{"id":29,"name":30,"tactics":31,"countermeasures":38},"T1027.006","HTML Smuggling",[32,35],{"id":33,"name":34},"TA0030","Defense Evasion",{"id":36,"name":37},"TA0005","Stealth",[],{"id":40,"name":41,"tactics":42,"countermeasures":45},"T1027.009","Embedded Payloads",[43,44],{"id":33,"name":34},{"id":36,"name":37},[],{"id":47,"name":48,"tactics":49,"countermeasures":52},"T1564.009","Resource Forking",[50,51],{"id":33,"name":34},{"id":36,"name":37},[53],{"id":54,"name":55,"tactic":56},"D3-FFV","File Format Verification",{"name":57},"Isolate",{"id":59,"name":60,"techniques":61},"CAPEC-77","Manipulating User-Controlled Variables",[],[63],{"_key":64,"name":65,"source":66,"url":67,"maturity":68,"reliability_score":69,"verified":70,"type":71,"platforms":72,"requires_auth":9,"exploitdb":74,"metasploit":9},"49585","python jsonpickle 2.0.0 - Remote Code Execution","exploit-database","https://www.exploit-db.com/exploits/49585","poc",0.5,false,"remote",[73],"multiple",{"verified":70,"type":71,"platform":73,"file":75,"codes":76},"exploits/multiple/remote/49585.py",[],[],[],[],[],[],"2026-05-16T15:26:06.248Z","Received",{"cisa_kev":70,"cisa_ransomware":70,"cisa_vendor":9,"epss_severity":9,"epss_score":9,"severity":85,"severity_score":86,"severity_version":87,"severity_source":88,"severity_vector":89,"severity_status":83},"critical",9.8,"v3.1","cve.org","CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",[91,96,101,105],{"url":67,"sources":92,"tags":94},[88,93],"nvd",[95],"Exploit",{"url":97,"sources":98,"tags":99},"https://jsonpickle.github.io",[88,93],[100],"Product",{"url":102,"sources":103,"tags":104},"https://github.com/jsonpickle/jsonpickle",[88,93],[100],{"url":106,"sources":107,"tags":108},"https://www.vulncheck.com/advisories/python-jsonpickle-remote-code-execution-via-py-repr",[88,93],[109],"Third Party Advisory",[],[],[113,120],{"source":88,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":114,"cvss_v4_0":117},{"baseScore":86,"baseSeverity":115,"vectorString":89,"impactScore":86,"exploitabilityScore":116},"CRITICAL",10,{"baseScore":118,"baseSeverity":115,"vectorString":119,"impactScore":9,"exploitabilityScore":9},9.3,"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",{"source":93,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":121,"cvss_v4_0":122},{"baseScore":86,"baseSeverity":115,"vectorString":89,"impactScore":86,"exploitabilityScore":116},{"baseScore":118,"baseSeverity":115,"vectorString":123,"impactScore":9,"exploitabilityScore":9},"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",[125],{"ecosystem":9,"name":126,"vendor":127,"product":126,"cpe_part":128,"purl_type":9,"purl_namespace":9,"purl_name":9,"source":9,"versions":129},"python jsonpickle","jsonpickle","a",[130],{"version":131,"is_range":70,"range_type":88,"version_start":131,"version_start_type":132,"version_end":131,"version_end_type":132,"fixed_in":9},"2.0.0","including"]