Package | Installed | Affected | Info |
---|---|---|---|
pip | 9.0.3 | <23.3 |
show Affected versions of Pip are vulnerable to Command Injection. When installing a package from a Mercurial VCS URL (ie "pip install hg+...") with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the "hg clone" call (ie "--config"). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial. |
pip | 9.0.3 | <19.2 |
show Versions of Pip prior to 19.2 are vulnerable to a directory traversal attack during the installation process from a URL. This vulnerability stems from improperly handling filenames in the Content-Disposition header that include path traversal sequences, potentially allowing unauthorized overwrite of critical files such as /root/.ssh/authorized_keys. The flaw is specifically found in the _download_http_url function within _internal/download.py. |
pip | 9.0.3 | <21.1 |
show A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. |
pip | 9.0.3 | <21.1 |
show Pip 21.1 updates its dependency 'urllib3' to v1.26.4 due to security issues. |
pip | 9.0.3 | <21.1 |
show An issue was discovered in Pip (all versions) because it installs the version with the highest version number, even if the user had intended to obtain a private package from a private index. This only affects use of the --extra-index-url option, and exploitation requires that the package does not already exist in the public index (and thus the attacker can put the package there with an arbitrary version number). A warning was added about this behavior in version 21.1. NOTE: it has been reported that this is intended functionality and the user is responsible for using --extra-index-url securely. |
pip | 9.0.3 | <25.0 |
show Pip solves a security vulnerability that previously allowed maliciously crafted wheel files to execute unauthorized code during installation. |
moto | 1.3.2 | <1.3.7 |
show Moto 1.3.7 updates a dependency (cryptography) with a known security vulnerability (CVE-2018-10903). https://github.com/spulec/moto/issues/1839 |
future | 0.16.0 | <=0.18.2 |
show Future 0.18.2 and earlier allows remote attackers to cause a denial of service via crafted Set-Cookie header from malicious web server. https://github.com/PythonCharmers/python-future/blob/master/src/future/backports/http/cookiejar.py#L215 https://github.com/python/cpython/pull/17157 |
Package | Installed | Affected | Info |
---|---|---|---|
pip | 9.0.3 | <23.3 |
show Affected versions of Pip are vulnerable to Command Injection. When installing a package from a Mercurial VCS URL (ie "pip install hg+...") with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the "hg clone" call (ie "--config"). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial. |
pip | 9.0.3 | <19.2 |
show Versions of Pip prior to 19.2 are vulnerable to a directory traversal attack during the installation process from a URL. This vulnerability stems from improperly handling filenames in the Content-Disposition header that include path traversal sequences, potentially allowing unauthorized overwrite of critical files such as /root/.ssh/authorized_keys. The flaw is specifically found in the _download_http_url function within _internal/download.py. |
pip | 9.0.3 | <21.1 |
show A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. |
pip | 9.0.3 | <21.1 |
show Pip 21.1 updates its dependency 'urllib3' to v1.26.4 due to security issues. |
pip | 9.0.3 | <21.1 |
show An issue was discovered in Pip (all versions) because it installs the version with the highest version number, even if the user had intended to obtain a private package from a private index. This only affects use of the --extra-index-url option, and exploitation requires that the package does not already exist in the public index (and thus the attacker can put the package there with an arbitrary version number). A warning was added about this behavior in version 21.1. NOTE: it has been reported that this is intended functionality and the user is responsible for using --extra-index-url securely. |
pip | 9.0.3 | <25.0 |
show Pip solves a security vulnerability that previously allowed maliciously crafted wheel files to execute unauthorized code during installation. |
moto | 1.3.2 | <1.3.7 |
show Moto 1.3.7 updates a dependency (cryptography) with a known security vulnerability (CVE-2018-10903). https://github.com/spulec/moto/issues/1839 |
future | 0.17.1 | <=0.18.2 |
show Future 0.18.2 and earlier allows remote attackers to cause a denial of service via crafted Set-Cookie header from malicious web server. https://github.com/PythonCharmers/python-future/blob/master/src/future/backports/http/cookiejar.py#L215 https://github.com/python/cpython/pull/17157 |
Package | Installed | Affected | Info |
---|---|---|---|
pip | 9.0.3 | <23.3 |
show Affected versions of Pip are vulnerable to Command Injection. When installing a package from a Mercurial VCS URL (ie "pip install hg+...") with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the "hg clone" call (ie "--config"). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial. |
pip | 9.0.3 | <19.2 |
show Versions of Pip prior to 19.2 are vulnerable to a directory traversal attack during the installation process from a URL. This vulnerability stems from improperly handling filenames in the Content-Disposition header that include path traversal sequences, potentially allowing unauthorized overwrite of critical files such as /root/.ssh/authorized_keys. The flaw is specifically found in the _download_http_url function within _internal/download.py. |
pip | 9.0.3 | <21.1 |
show A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. |
pip | 9.0.3 | <21.1 |
show Pip 21.1 updates its dependency 'urllib3' to v1.26.4 due to security issues. |
pip | 9.0.3 | <21.1 |
show An issue was discovered in Pip (all versions) because it installs the version with the highest version number, even if the user had intended to obtain a private package from a private index. This only affects use of the --extra-index-url option, and exploitation requires that the package does not already exist in the public index (and thus the attacker can put the package there with an arbitrary version number). A warning was added about this behavior in version 21.1. NOTE: it has been reported that this is intended functionality and the user is responsible for using --extra-index-url securely. |
pip | 9.0.3 | <25.0 |
show Pip solves a security vulnerability that previously allowed maliciously crafted wheel files to execute unauthorized code during installation. |
moto | 1.3.2 | <1.3.7 |
show Moto 1.3.7 updates a dependency (cryptography) with a known security vulnerability (CVE-2018-10903). https://github.com/spulec/moto/issues/1839 |
https://pyup.io/repos/github/avara1986/ardy/python-3-shield.svg
[](https://pyup.io/repos/github/avara1986/ardy/)
.. image:: https://pyup.io/repos/github/avara1986/ardy/python-3-shield.svg :target: https://pyup.io/repos/github/avara1986/ardy/ :alt: Python 3
<a href="https://pyup.io/repos/github/avara1986/ardy/"><img src="https://pyup.io/repos/github/avara1986/ardy/shield.svg" alt="Python 3" /></a>
!https://pyup.io/repos/github/avara1986/ardy/python-3-shield.svg(Python 3)!:https://pyup.io/repos/github/avara1986/ardy/
{<img src="https://pyup.io/repos/github/avara1986/ardy/python-3-shield.svg" alt="Python 3" />}[https://pyup.io/repos/github/avara1986/ardy/]
https://pyup.io/repos/github/avara1986/ardy/shield.svg
[](https://pyup.io/repos/github/avara1986/ardy/)
.. image:: https://pyup.io/repos/github/avara1986/ardy/shield.svg :target: https://pyup.io/repos/github/avara1986/ardy/ :alt: Updates
<a href="https://pyup.io/repos/github/avara1986/ardy/"><img src="https://pyup.io/repos/github/avara1986/ardy/shield.svg" alt="Updates" /></a>
!https://pyup.io/repos/github/avara1986/ardy/shield.svg(Updates)!:https://pyup.io/repos/github/avara1986/ardy/
{<img src="https://pyup.io/repos/github/avara1986/ardy/shield.svg" alt="Updates" />}[https://pyup.io/repos/github/avara1986/ardy/]