Package | Installed | Affected | Info |
---|---|---|---|
pytorch-lightning | 1.5.10 | <1.6.0 |
show Pytorch-lightning 1.6.0 updates its dependency 'pyyaml' to v5.4 and uses yaml.safe_load() to fix code execution vulnerabilities. |
pytorch-lightning | 1.5.10 | <1.6.0 |
show Pytorch-lightning 1.6.0 updates its dependency 'pyyaml' to v5.4 and uses yaml.safe_load() to fix code execution vulnerabilities. |
pytorch-lightning | 1.5.10 | >=0,<1.6.0 |
show PyTorch Lightning version 1.5.10 and prior is vulnerable to code injection. An attacker could execute commands on the target OS running the operating system by setting the `PL_TRAINER_GPUS` when using the `Trainer` module. A [patch](https://github.com/pytorchlightning/pytorch-lightning/commit/8b7a12c52e52a06408e9231647839ddb4665e8ae) is included in the `1.6.0` release. Affected functions: pytorch_lightning.utilities.argparse.parse_env_variables |
pytorch-lightning | 1.5.10 | >=0,<1.6.0 |
show Pytorch-lightning before 1.6.0 is vulnerable to Deserialization of Untrusted Data. |
pytorch-lightning | 1.5.10 | <2.4.0 |
show In lightning-ai/pytorch-lightning version 2.3.2, a vulnerability exists in the LightningApp when running on a Windows host. The vulnerability occurs at the /api/v1/upload_file/ endpoint, allowing an attacker to write or overwrite arbitrary files by providing a crafted filename. This can lead to potential remote code execution (RCE) by overwriting critical files or placing malicious files in sensitive locations. |
pytorch-lightning | 1.5.10 | <2.3.2 |
show A vulnerability in lightning-ai/pytorch-lightning version 2.3.2 allows an attacker to cause a denial of service by sending an unexpected POST request to the /api/v1/state endpoint of LightningApp. This issue occurs due to improper handling of unexpected state values, which results in the server shutting down. |
Package | Installed | Affected | Info |
---|---|---|---|
pytorch-lightning | 1.5.9 | <1.6.0 |
show Pytorch-lightning 1.6.0 updates its dependency 'pyyaml' to v5.4 and uses yaml.safe_load() to fix code execution vulnerabilities. |
pytorch-lightning | 1.5.9 | <1.6.0 |
show Pytorch-lightning 1.6.0 updates its dependency 'pyyaml' to v5.4 and uses yaml.safe_load() to fix code execution vulnerabilities. |
pytorch-lightning | 1.5.9 | >=0,<1.6.0 |
show PyTorch Lightning version 1.5.10 and prior is vulnerable to code injection. An attacker could execute commands on the target OS running the operating system by setting the `PL_TRAINER_GPUS` when using the `Trainer` module. A [patch](https://github.com/pytorchlightning/pytorch-lightning/commit/8b7a12c52e52a06408e9231647839ddb4665e8ae) is included in the `1.6.0` release. Affected functions: pytorch_lightning.utilities.argparse.parse_env_variables |
pytorch-lightning | 1.5.9 | >=0,<1.6.0 |
show Pytorch-lightning before 1.6.0 is vulnerable to Deserialization of Untrusted Data. |
pytorch-lightning | 1.5.9 | <2.4.0 |
show In lightning-ai/pytorch-lightning version 2.3.2, a vulnerability exists in the LightningApp when running on a Windows host. The vulnerability occurs at the /api/v1/upload_file/ endpoint, allowing an attacker to write or overwrite arbitrary files by providing a crafted filename. This can lead to potential remote code execution (RCE) by overwriting critical files or placing malicious files in sensitive locations. |
pytorch-lightning | 1.5.9 | <2.3.2 |
show A vulnerability in lightning-ai/pytorch-lightning version 2.3.2 allows an attacker to cause a denial of service by sending an unexpected POST request to the /api/v1/state endpoint of LightningApp. This issue occurs due to improper handling of unexpected state values, which results in the server shutting down. |
Package | Installed | Affected | Info |
---|---|---|---|
pytorch-lightning | 1.5.8 | <1.6.0 |
show Pytorch-lightning 1.6.0 updates its dependency 'pyyaml' to v5.4 and uses yaml.safe_load() to fix code execution vulnerabilities. |
pytorch-lightning | 1.5.8 | <1.6.0 |
show Pytorch-lightning 1.6.0 updates its dependency 'pyyaml' to v5.4 and uses yaml.safe_load() to fix code execution vulnerabilities. |
pytorch-lightning | 1.5.8 | >=0,<1.6.0 |
show PyTorch Lightning version 1.5.10 and prior is vulnerable to code injection. An attacker could execute commands on the target OS running the operating system by setting the `PL_TRAINER_GPUS` when using the `Trainer` module. A [patch](https://github.com/pytorchlightning/pytorch-lightning/commit/8b7a12c52e52a06408e9231647839ddb4665e8ae) is included in the `1.6.0` release. Affected functions: pytorch_lightning.utilities.argparse.parse_env_variables |
pytorch-lightning | 1.5.8 | >=0,<1.6.0 |
show Pytorch-lightning before 1.6.0 is vulnerable to Deserialization of Untrusted Data. |
pytorch-lightning | 1.5.8 | <2.4.0 |
show In lightning-ai/pytorch-lightning version 2.3.2, a vulnerability exists in the LightningApp when running on a Windows host. The vulnerability occurs at the /api/v1/upload_file/ endpoint, allowing an attacker to write or overwrite arbitrary files by providing a crafted filename. This can lead to potential remote code execution (RCE) by overwriting critical files or placing malicious files in sensitive locations. |
pytorch-lightning | 1.5.8 | <2.3.2 |
show A vulnerability in lightning-ai/pytorch-lightning version 2.3.2 allows an attacker to cause a denial of service by sending an unexpected POST request to the /api/v1/state endpoint of LightningApp. This issue occurs due to improper handling of unexpected state values, which results in the server shutting down. |
https://pyup.io/repos/github/PhosphorylatedRabbits/brontes/python-3-shield.svg
[](https://pyup.io/repos/github/PhosphorylatedRabbits/brontes/)
.. image:: https://pyup.io/repos/github/PhosphorylatedRabbits/brontes/python-3-shield.svg :target: https://pyup.io/repos/github/PhosphorylatedRabbits/brontes/ :alt: Python 3
<a href="https://pyup.io/repos/github/PhosphorylatedRabbits/brontes/"><img src="https://pyup.io/repos/github/PhosphorylatedRabbits/brontes/shield.svg" alt="Python 3" /></a>
!https://pyup.io/repos/github/PhosphorylatedRabbits/brontes/python-3-shield.svg(Python 3)!:https://pyup.io/repos/github/PhosphorylatedRabbits/brontes/
{<img src="https://pyup.io/repos/github/PhosphorylatedRabbits/brontes/python-3-shield.svg" alt="Python 3" />}[https://pyup.io/repos/github/PhosphorylatedRabbits/brontes/]
https://pyup.io/repos/github/PhosphorylatedRabbits/brontes/shield.svg
[](https://pyup.io/repos/github/PhosphorylatedRabbits/brontes/)
.. image:: https://pyup.io/repos/github/PhosphorylatedRabbits/brontes/shield.svg :target: https://pyup.io/repos/github/PhosphorylatedRabbits/brontes/ :alt: Updates
<a href="https://pyup.io/repos/github/PhosphorylatedRabbits/brontes/"><img src="https://pyup.io/repos/github/PhosphorylatedRabbits/brontes/shield.svg" alt="Updates" /></a>
!https://pyup.io/repos/github/PhosphorylatedRabbits/brontes/shield.svg(Updates)!:https://pyup.io/repos/github/PhosphorylatedRabbits/brontes/
{<img src="https://pyup.io/repos/github/PhosphorylatedRabbits/brontes/shield.svg" alt="Updates" />}[https://pyup.io/repos/github/PhosphorylatedRabbits/brontes/]