| Package | Installed | Affected | Info |
|---|---|---|---|
| setuptools | 69.5.1 | <70.0.0 |
show Affected versions of Setuptools allow for remote code execution via its download functions. These functions, which are used to download packages from URLs provided by users or retrieved from package index servers, are susceptible to code injection. If these functions are exposed to user-controlled inputs, such as package URLs, they can execute arbitrary commands on the system. |
| setuptools | 69.5.1 | <78.1.1 |
show Affected versions of Setuptools are vulnerable to Path Traversal via PackageIndex.download(). The impact is Arbitrary File Overwrite: An attacker would be allowed to write files to arbitrary locations on the filesystem with the permissions of the process running the Python code, which could escalate to RCE depending on the context. |
| Package | Installed | Affected | Info |
|---|---|---|---|
| setuptools | 69.5.1 | <70.0.0 |
show Affected versions of Setuptools allow for remote code execution via its download functions. These functions, which are used to download packages from URLs provided by users or retrieved from package index servers, are susceptible to code injection. If these functions are exposed to user-controlled inputs, such as package URLs, they can execute arbitrary commands on the system. |
| setuptools | 69.5.1 | <78.1.1 |
show Affected versions of Setuptools are vulnerable to Path Traversal via PackageIndex.download(). The impact is Arbitrary File Overwrite: An attacker would be allowed to write files to arbitrary locations on the filesystem with the permissions of the process running the Python code, which could escalate to RCE depending on the context. |
| Package | Installed | Affected | Info |
|---|---|---|---|
| setuptools | 69.5.1 | <70.0.0 |
show Affected versions of Setuptools allow for remote code execution via its download functions. These functions, which are used to download packages from URLs provided by users or retrieved from package index servers, are susceptible to code injection. If these functions are exposed to user-controlled inputs, such as package URLs, they can execute arbitrary commands on the system. |
| setuptools | 69.5.1 | <78.1.1 |
show Affected versions of Setuptools are vulnerable to Path Traversal via PackageIndex.download(). The impact is Arbitrary File Overwrite: An attacker would be allowed to write files to arbitrary locations on the filesystem with the permissions of the process running the Python code, which could escalate to RCE depending on the context. |
| Package | Installed | Affected | Info |
|---|---|---|---|
| gunicorn | 22.0.0 | >=22.0.0,<23.0.0 |
show A vulnerability in Gunicorn allowed the TolerateDangerousFraming setting to process conflicting headers (Transfer-Encoding and Content-Length) and dangerous characters in HTTP header fields. This could lead to HTTP request smuggling and header injection attacks. The issue was resolved by removing this setting and enforcing stricter header validation. Note: It happens due to an incomplete fix for CVE-2024-1135. |
| setuptools | 69.5.1 | <70.0.0 |
show Affected versions of Setuptools allow for remote code execution via its download functions. These functions, which are used to download packages from URLs provided by users or retrieved from package index servers, are susceptible to code injection. If these functions are exposed to user-controlled inputs, such as package URLs, they can execute arbitrary commands on the system. |
| setuptools | 69.5.1 | <78.1.1 |
show Affected versions of Setuptools are vulnerable to Path Traversal via PackageIndex.download(). The impact is Arbitrary File Overwrite: An attacker would be allowed to write files to arbitrary locations on the filesystem with the permissions of the process running the Python code, which could escalate to RCE depending on the context. |
https://pyup.io/repos/github/aguiardafa/projeto-base-stack-django/python-3-shield.svg
[](https://pyup.io/repos/github/aguiardafa/projeto-base-stack-django/)
.. image:: https://pyup.io/repos/github/aguiardafa/projeto-base-stack-django/python-3-shield.svg
:target: https://pyup.io/repos/github/aguiardafa/projeto-base-stack-django/
:alt: Python 3
<a href="https://pyup.io/repos/github/aguiardafa/projeto-base-stack-django/"><img src="https://pyup.io/repos/github/aguiardafa/projeto-base-stack-django/shield.svg" alt="Python 3" /></a>
!https://pyup.io/repos/github/aguiardafa/projeto-base-stack-django/python-3-shield.svg(Python 3)!:https://pyup.io/repos/github/aguiardafa/projeto-base-stack-django/
{<img src="https://pyup.io/repos/github/aguiardafa/projeto-base-stack-django/python-3-shield.svg" alt="Python 3" />}[https://pyup.io/repos/github/aguiardafa/projeto-base-stack-django/]
https://pyup.io/repos/github/aguiardafa/projeto-base-stack-django/shield.svg
[](https://pyup.io/repos/github/aguiardafa/projeto-base-stack-django/)
.. image:: https://pyup.io/repos/github/aguiardafa/projeto-base-stack-django/shield.svg
:target: https://pyup.io/repos/github/aguiardafa/projeto-base-stack-django/
:alt: Updates
<a href="https://pyup.io/repos/github/aguiardafa/projeto-base-stack-django/"><img src="https://pyup.io/repos/github/aguiardafa/projeto-base-stack-django/shield.svg" alt="Updates" /></a>
!https://pyup.io/repos/github/aguiardafa/projeto-base-stack-django/shield.svg(Updates)!:https://pyup.io/repos/github/aguiardafa/projeto-base-stack-django/
{<img src="https://pyup.io/repos/github/aguiardafa/projeto-base-stack-django/shield.svg" alt="Updates" />}[https://pyup.io/repos/github/aguiardafa/projeto-base-stack-django/]