Package | Installed | Affected | Info |
---|---|---|---|
pywin32 | 227 | >=0,<301 |
show An integer overflow exists in pywin32 prior to version b301 when adding an access control entry (ACE) to an access control list (ACL) that would cause the size to be greater than 65535 bytes. An attacker who successfully exploited this vulnerability could crash the vulnerable process. |
Package | Installed | Affected | Info |
---|---|---|---|
pywin32 | 227 | >=0,<301 |
show An integer overflow exists in pywin32 prior to version b301 when adding an access control entry (ACE) to an access control list (ACL) that would cause the size to be greater than 65535 bytes. An attacker who successfully exploited this vulnerability could crash the vulnerable process. |
Package | Installed | Affected | Info |
---|---|---|---|
pywin32 | 227 | >=0,<301 |
show An integer overflow exists in pywin32 prior to version b301 when adding an access control entry (ACE) to an access control list (ACL) that would cause the size to be greater than 65535 bytes. An attacker who successfully exploited this vulnerability could crash the vulnerable process. |
Package | Installed | Affected | Info |
---|---|---|---|
pywin32 | 227 | >=0,<301 |
show An integer overflow exists in pywin32 prior to version b301 when adding an access control entry (ACE) to an access control list (ACL) that would cause the size to be greater than 65535 bytes. An attacker who successfully exploited this vulnerability could crash the vulnerable process. |
Package | Installed | Affected | Info |
---|---|---|---|
pywin32 | 227 | >=0,<301 |
show An integer overflow exists in pywin32 prior to version b301 when adding an access control entry (ACE) to an access control list (ACL) that would cause the size to be greater than 65535 bytes. An attacker who successfully exploited this vulnerability could crash the vulnerable process. |
PyYAML | 5.3.1 | <5.4 |
show Pyyaml version 5.4 includes a fix for CVE-2020-14343: A vulnerability was discovered in the PyYAML library in versions before 5.4, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. This flaw allows an attacker to execute arbitrary code on the system by abusing the python/object/new constructor. This flaw is due to an incomplete fix for CVE-2020-1747. https://bugzilla.redhat.com/show_bug.cgi?id=1860466 |
Package | Installed | Affected | Info |
---|---|---|---|
pywin32 | 227 | >=0,<301 |
show An integer overflow exists in pywin32 prior to version b301 when adding an access control entry (ACE) to an access control list (ACL) that would cause the size to be greater than 65535 bytes. An attacker who successfully exploited this vulnerability could crash the vulnerable process. |
PyYAML | 5.3.1 | <5.4 |
show Pyyaml version 5.4 includes a fix for CVE-2020-14343: A vulnerability was discovered in the PyYAML library in versions before 5.4, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. This flaw allows an attacker to execute arbitrary code on the system by abusing the python/object/new constructor. This flaw is due to an incomplete fix for CVE-2020-1747. https://bugzilla.redhat.com/show_bug.cgi?id=1860466 |
Package | Installed | Affected | Info |
---|---|---|---|
pywin32 | 227 | >=0,<301 |
show An integer overflow exists in pywin32 prior to version b301 when adding an access control entry (ACE) to an access control list (ACL) that would cause the size to be greater than 65535 bytes. An attacker who successfully exploited this vulnerability could crash the vulnerable process. |
PyYAML | 5.3.1 | <5.4 |
show Pyyaml version 5.4 includes a fix for CVE-2020-14343: A vulnerability was discovered in the PyYAML library in versions before 5.4, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. This flaw allows an attacker to execute arbitrary code on the system by abusing the python/object/new constructor. This flaw is due to an incomplete fix for CVE-2020-1747. https://bugzilla.redhat.com/show_bug.cgi?id=1860466 |
Package | Installed | Affected | Info |
---|---|---|---|
pywin32 | 227 | >=0,<301 |
show An integer overflow exists in pywin32 prior to version b301 when adding an access control entry (ACE) to an access control list (ACL) that would cause the size to be greater than 65535 bytes. An attacker who successfully exploited this vulnerability could crash the vulnerable process. |
PyYAML | 5.3.1 | <5.4 |
show Pyyaml version 5.4 includes a fix for CVE-2020-14343: A vulnerability was discovered in the PyYAML library in versions before 5.4, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. This flaw allows an attacker to execute arbitrary code on the system by abusing the python/object/new constructor. This flaw is due to an incomplete fix for CVE-2020-1747. https://bugzilla.redhat.com/show_bug.cgi?id=1860466 |
https://pyup.io/repos/github/feihoo87/QuLab/python-3-shield.svg
[](https://pyup.io/repos/github/feihoo87/QuLab/)
.. image:: https://pyup.io/repos/github/feihoo87/QuLab/python-3-shield.svg :target: https://pyup.io/repos/github/feihoo87/QuLab/ :alt: Python 3
<a href="https://pyup.io/repos/github/feihoo87/QuLab/"><img src="https://pyup.io/repos/github/feihoo87/QuLab/shield.svg" alt="Python 3" /></a>
!https://pyup.io/repos/github/feihoo87/QuLab/python-3-shield.svg(Python 3)!:https://pyup.io/repos/github/feihoo87/QuLab/
{<img src="https://pyup.io/repos/github/feihoo87/QuLab/python-3-shield.svg" alt="Python 3" />}[https://pyup.io/repos/github/feihoo87/QuLab/]
https://pyup.io/repos/github/feihoo87/QuLab/shield.svg
[](https://pyup.io/repos/github/feihoo87/QuLab/)
.. image:: https://pyup.io/repos/github/feihoo87/QuLab/shield.svg :target: https://pyup.io/repos/github/feihoo87/QuLab/ :alt: Updates
<a href="https://pyup.io/repos/github/feihoo87/QuLab/"><img src="https://pyup.io/repos/github/feihoo87/QuLab/shield.svg" alt="Updates" /></a>
!https://pyup.io/repos/github/feihoo87/QuLab/shield.svg(Updates)!:https://pyup.io/repos/github/feihoo87/QuLab/
{<img src="https://pyup.io/repos/github/feihoo87/QuLab/shield.svg" alt="Updates" />}[https://pyup.io/repos/github/feihoo87/QuLab/]