Package | Installed | Affected | Info |
---|---|---|---|
pyinstaller | 6.9.0 | <6.13.0 |
show Affected versions of the bootloader were potentially vulnerable to uncontrolled search path element issues. An attacker could potentially exploit this by injecting DLLs that load runtime dependencies from an application's temporary directory, leading to persistence or arbitrary code execution. The vulnerability existed in the bootloader process handling in one-file mode. Users should ensure that system DLLs are pre-loaded to prevent such vulnerabilities. |
Package | Installed | Affected | Info |
---|---|---|---|
pyinstaller | 6.9.0 | <6.13.0 |
show Affected versions of the bootloader were potentially vulnerable to uncontrolled search path element issues. An attacker could potentially exploit this by injecting DLLs that load runtime dependencies from an application's temporary directory, leading to persistence or arbitrary code execution. The vulnerability existed in the bootloader process handling in one-file mode. Users should ensure that system DLLs are pre-loaded to prevent such vulnerabilities. |
Package | Installed | Affected | Info |
---|---|---|---|
pyinstaller | 6.9.0 | <6.13.0 |
show Affected versions of the bootloader were potentially vulnerable to uncontrolled search path element issues. An attacker could potentially exploit this by injecting DLLs that load runtime dependencies from an application's temporary directory, leading to persistence or arbitrary code execution. The vulnerability existed in the bootloader process handling in one-file mode. Users should ensure that system DLLs are pre-loaded to prevent such vulnerabilities. |
Package | Installed | Affected | Info |
---|---|---|---|
pyinstaller | 6.9.0 | <6.13.0 |
show Affected versions of the bootloader were potentially vulnerable to uncontrolled search path element issues. An attacker could potentially exploit this by injecting DLLs that load runtime dependencies from an application's temporary directory, leading to persistence or arbitrary code execution. The vulnerability existed in the bootloader process handling in one-file mode. Users should ensure that system DLLs are pre-loaded to prevent such vulnerabilities. |
Package | Installed | Affected | Info |
---|---|---|---|
pyinstaller | 6.9.0 | <6.13.0 |
show Affected versions of the bootloader were potentially vulnerable to uncontrolled search path element issues. An attacker could potentially exploit this by injecting DLLs that load runtime dependencies from an application's temporary directory, leading to persistence or arbitrary code execution. The vulnerability existed in the bootloader process handling in one-file mode. Users should ensure that system DLLs are pre-loaded to prevent such vulnerabilities. |
Package | Installed | Affected | Info |
---|---|---|---|
pyinstaller | 6.9.0 | <6.13.0 |
show Affected versions of the bootloader were potentially vulnerable to uncontrolled search path element issues. An attacker could potentially exploit this by injecting DLLs that load runtime dependencies from an application's temporary directory, leading to persistence or arbitrary code execution. The vulnerability existed in the bootloader process handling in one-file mode. Users should ensure that system DLLs are pre-loaded to prevent such vulnerabilities. |
Package | Installed | Affected | Info |
---|---|---|---|
pyinstaller | 6.9.0 | <6.13.0 |
show Affected versions of the bootloader were potentially vulnerable to uncontrolled search path element issues. An attacker could potentially exploit this by injecting DLLs that load runtime dependencies from an application's temporary directory, leading to persistence or arbitrary code execution. The vulnerability existed in the bootloader process handling in one-file mode. Users should ensure that system DLLs are pre-loaded to prevent such vulnerabilities. |
Package | Installed | Affected | Info |
---|---|---|---|
pyinstaller | 6.9.0 | <6.13.0 |
show Affected versions of the bootloader were potentially vulnerable to uncontrolled search path element issues. An attacker could potentially exploit this by injecting DLLs that load runtime dependencies from an application's temporary directory, leading to persistence or arbitrary code execution. The vulnerability existed in the bootloader process handling in one-file mode. Users should ensure that system DLLs are pre-loaded to prevent such vulnerabilities. |
Package | Installed | Affected | Info |
---|---|---|---|
pyinstaller | 6.9.0 | <6.13.0 |
show Affected versions of the bootloader were potentially vulnerable to uncontrolled search path element issues. An attacker could potentially exploit this by injecting DLLs that load runtime dependencies from an application's temporary directory, leading to persistence or arbitrary code execution. The vulnerability existed in the bootloader process handling in one-file mode. Users should ensure that system DLLs are pre-loaded to prevent such vulnerabilities. |
Package | Installed | Affected | Info |
---|---|---|---|
pyinstaller | 6.9.0 | <6.13.0 |
show Affected versions of the bootloader were potentially vulnerable to uncontrolled search path element issues. An attacker could potentially exploit this by injecting DLLs that load runtime dependencies from an application's temporary directory, leading to persistence or arbitrary code execution. The vulnerability existed in the bootloader process handling in one-file mode. Users should ensure that system DLLs are pre-loaded to prevent such vulnerabilities. |
Package | Installed | Affected | Info |
---|---|---|---|
pyinstaller | 6.9.0 | <6.13.0 |
show Affected versions of the bootloader were potentially vulnerable to uncontrolled search path element issues. An attacker could potentially exploit this by injecting DLLs that load runtime dependencies from an application's temporary directory, leading to persistence or arbitrary code execution. The vulnerability existed in the bootloader process handling in one-file mode. Users should ensure that system DLLs are pre-loaded to prevent such vulnerabilities. |
setuptools | 70.0.0 | <78.1.1 |
show Affected versions of Setuptools are vulnerable to Path Traversal via PackageIndex.download(). The impact is Arbitrary File Overwrite: An attacker would be allowed to write files to arbitrary locations on the filesystem with the permissions of the process running the Python code, which could escalate to RCE depending on the context. |
Package | Installed | Affected | Info |
---|---|---|---|
pyinstaller | 6.9.0 | <6.13.0 |
show Affected versions of the bootloader were potentially vulnerable to uncontrolled search path element issues. An attacker could potentially exploit this by injecting DLLs that load runtime dependencies from an application's temporary directory, leading to persistence or arbitrary code execution. The vulnerability existed in the bootloader process handling in one-file mode. Users should ensure that system DLLs are pre-loaded to prevent such vulnerabilities. |
setuptools | 70.0.0 | <78.1.1 |
show Affected versions of Setuptools are vulnerable to Path Traversal via PackageIndex.download(). The impact is Arbitrary File Overwrite: An attacker would be allowed to write files to arbitrary locations on the filesystem with the permissions of the process running the Python code, which could escalate to RCE depending on the context. |
Package | Installed | Affected | Info |
---|---|---|---|
pyinstaller | 6.9.0 | <6.13.0 |
show Affected versions of the bootloader were potentially vulnerable to uncontrolled search path element issues. An attacker could potentially exploit this by injecting DLLs that load runtime dependencies from an application's temporary directory, leading to persistence or arbitrary code execution. The vulnerability existed in the bootloader process handling in one-file mode. Users should ensure that system DLLs are pre-loaded to prevent such vulnerabilities. |
setuptools | 70.0.0 | <78.1.1 |
show Affected versions of Setuptools are vulnerable to Path Traversal via PackageIndex.download(). The impact is Arbitrary File Overwrite: An attacker would be allowed to write files to arbitrary locations on the filesystem with the permissions of the process running the Python code, which could escalate to RCE depending on the context. |
Package | Installed | Affected | Info |
---|---|---|---|
pyinstaller | 6.9.0 | <6.13.0 |
show Affected versions of the bootloader were potentially vulnerable to uncontrolled search path element issues. An attacker could potentially exploit this by injecting DLLs that load runtime dependencies from an application's temporary directory, leading to persistence or arbitrary code execution. The vulnerability existed in the bootloader process handling in one-file mode. Users should ensure that system DLLs are pre-loaded to prevent such vulnerabilities. |
setuptools | 70.0.0 | <78.1.1 |
show Affected versions of Setuptools are vulnerable to Path Traversal via PackageIndex.download(). The impact is Arbitrary File Overwrite: An attacker would be allowed to write files to arbitrary locations on the filesystem with the permissions of the process running the Python code, which could escalate to RCE depending on the context. |
Package | Installed | Affected | Info |
---|---|---|---|
pyinstaller | 6.9.0 | <6.13.0 |
show Affected versions of the bootloader were potentially vulnerable to uncontrolled search path element issues. An attacker could potentially exploit this by injecting DLLs that load runtime dependencies from an application's temporary directory, leading to persistence or arbitrary code execution. The vulnerability existed in the bootloader process handling in one-file mode. Users should ensure that system DLLs are pre-loaded to prevent such vulnerabilities. |
https://pyup.io/repos/github/libtcod/python-tcod/python-3-shield.svg
[](https://pyup.io/repos/github/libtcod/python-tcod/)
.. image:: https://pyup.io/repos/github/libtcod/python-tcod/python-3-shield.svg :target: https://pyup.io/repos/github/libtcod/python-tcod/ :alt: Python 3
<a href="https://pyup.io/repos/github/libtcod/python-tcod/"><img src="https://pyup.io/repos/github/libtcod/python-tcod/shield.svg" alt="Python 3" /></a>
!https://pyup.io/repos/github/libtcod/python-tcod/python-3-shield.svg(Python 3)!:https://pyup.io/repos/github/libtcod/python-tcod/
{<img src="https://pyup.io/repos/github/libtcod/python-tcod/python-3-shield.svg" alt="Python 3" />}[https://pyup.io/repos/github/libtcod/python-tcod/]
https://pyup.io/repos/github/libtcod/python-tcod/shield.svg
[](https://pyup.io/repos/github/libtcod/python-tcod/)
.. image:: https://pyup.io/repos/github/libtcod/python-tcod/shield.svg :target: https://pyup.io/repos/github/libtcod/python-tcod/ :alt: Updates
<a href="https://pyup.io/repos/github/libtcod/python-tcod/"><img src="https://pyup.io/repos/github/libtcod/python-tcod/shield.svg" alt="Updates" /></a>
!https://pyup.io/repos/github/libtcod/python-tcod/shield.svg(Updates)!:https://pyup.io/repos/github/libtcod/python-tcod/
{<img src="https://pyup.io/repos/github/libtcod/python-tcod/shield.svg" alt="Updates" />}[https://pyup.io/repos/github/libtcod/python-tcod/]