[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-CVE-2026-8838":6},{"stargazers_count":4,"fetched_at":5},6,"2026-05-19T01:41:25.914Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":62,"aliases":63,"duplicate_of":9,"upstream":64,"downstream":65,"duplicates":66,"related":67,"reserved_at":9,"published_at":68,"modified_at":69,"state":70,"summary":71,"references_raw":78,"kevs":95,"epss":9,"epss_history":96,"metrics":97,"affected":109},"CVE-2026-8838","Unsafe use of Python's eval() on server-received data in the vector_in() function in amazon-redshift-python-driver before 2.1.14 allows a rogue server or man-in-the-middle actor to execute arbitrary code on the client. \n\n\n\nTo remediate this issue, users should upgrade to version 2.1.14.",null,[11],{"_key":12,"id":12,"name":13,"description":14,"type":15,"status":16,"abstraction":17,"likelihood_of_exploit":18,"capec":19},"CWE-94","Improper Control of Generation of Code ('Code Injection')","The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.","weakness","Draft","Base","Medium",[20,24,58],{"id":21,"name":22,"techniques":23},"CAPEC-242","Code Injection",[],{"id":25,"name":26,"techniques":27},"CAPEC-35","Leverage Executable Code in Non-Executable Files",[28,39,46],{"id":29,"name":30,"tactics":31,"countermeasures":38},"T1027.006","HTML Smuggling",[32,35],{"id":33,"name":34},"TA0030","Defense Evasion",{"id":36,"name":37},"TA0005","Stealth",[],{"id":40,"name":41,"tactics":42,"countermeasures":45},"T1027.009","Embedded Payloads",[43,44],{"id":33,"name":34},{"id":36,"name":37},[],{"id":47,"name":48,"tactics":49,"countermeasures":52},"T1564.009","Resource Forking",[50,51],{"id":33,"name":34},{"id":36,"name":37},[53],{"id":54,"name":55,"tactic":56},"D3-FFV","File Format Verification",{"name":57},"Isolate",{"id":59,"name":60,"techniques":61},"CAPEC-77","Manipulating User-Controlled Variables",[],[],[],[],[],[],[],"2026-05-18T20:15:37.933Z","2026-05-18T20:19:16.159Z","Received",{"cisa_kev":72,"cisa_ransomware":72,"cisa_vendor":9,"epss_severity":9,"epss_score":9,"severity":73,"severity_score":74,"severity_version":75,"severity_source":76,"severity_vector":77,"severity_status":70},false,"critical",9.8,"v3.1","cve.org","CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",[79,85,90],{"url":80,"sources":81,"tags":83},"https://github.com/aws/amazon-redshift-python-driver/releases/tag/v2.1.14",[76,82],"nvd",[84],"Patch",{"url":86,"sources":87,"tags":88},"https://aws.amazon.com/security/security-bulletins/2026-033-aws/",[76,82],[89],"Vendor Advisory",{"url":91,"sources":92,"tags":93},"https://github.com/aws/amazon-redshift-python-driver/security/advisories/GHSA-29h4-r29x-hchv",[76,82],[94],"Third Party Advisory",[],[],[98,105],{"source":76,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":99,"cvss_v4_0":102},{"baseScore":74,"baseSeverity":100,"vectorString":77,"impactScore":74,"exploitabilityScore":101},"CRITICAL",10,{"baseScore":103,"baseSeverity":100,"vectorString":104,"impactScore":9,"exploitabilityScore":9},9.3,"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",{"source":82,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":106,"cvss_v4_0":107},{"baseScore":74,"baseSeverity":100,"vectorString":77,"impactScore":74,"exploitabilityScore":101},{"baseScore":103,"baseSeverity":100,"vectorString":108,"impactScore":9,"exploitabilityScore":9},"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",[110],{"ecosystem":9,"name":111,"vendor":112,"product":113,"cpe_part":114,"purl_type":9,"purl_namespace":9,"purl_name":9,"source":9,"versions":115},"Amazon Redshift connector for Python","aws","amazon redshift connector for python","a",[116],{"version":117,"is_range":118,"range_type":76,"version_start":9,"version_start_type":9,"version_end":119,"version_end_type":120,"fixed_in":9},"\u003C= 2.1.13",true,"2.1.13","including"]