python39-setuptools vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the python39-setuptools package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • L
Resource Exhaustion

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:50.3.2-6.module+el8.10.0+22183+c898c0c1
  • M
CVE-2024-6923

<0:50.3.2-6.module+el8.10.0+22183+c898c0c1
  • L
Race Condition

*
  • H
Arbitrary Code Injection

<0:50.3.2-6.module+el8.10.0+22183+c898c0c1
  • L
Improper Input Validation

*
  • L
Expected Behavior Violation

<0:50.3.2-6.module+el8.10.0+22183+c898c0c1
  • H
Resource Exhaustion

<0:50.3.2-5.module+el8.10.0+20345+671a55aa
  • M
Information Exposure

<0:50.3.2-5.module+el8.10.0+20345+671a55aa
  • M
Improper Check for Unusual or Exceptional Conditions

<0:50.3.2-5.module+el8.10.0+20345+671a55aa
  • H
Symlink Following

<0:50.3.2-5.module+el8.10.0+20345+671a55aa
  • H
Multiple Interpretations of UI Input

<0:50.3.2-5.module+el8.10.0+20345+671a55aa
  • M
Resource Leak

<0:50.3.2-4.module+el8.9.0+19644+d68f775d
  • H
Authentication Bypass by Primary Weakness

<0:50.3.2-4.module+el8.5.0+12204+54860423
  • M
Uncontrolled Recursion

*
  • M
Improper Input Validation

<0:50.3.2-5.module+el8.10.0+20345+671a55aa
  • H
Improper Input Validation

<0:50.3.2-4.module+el8.5.0+12204+54860423
  • M
Incorrect Regular Expression

<0:50.3.2-5.module+el8.10.0+20345+671a55aa
  • M
Resource Exhaustion

<0:50.3.2-4.module+el8.5.0+12204+54860423
  • M
Directory Traversal

<0:50.3.2-4.module+el8.9.0+19644+d68f775d
  • H
Improper Privilege Management

<0:50.3.2-4.module+el8.5.0+12204+54860423
  • M
Incorrect Type Conversion or Cast

<0:50.3.2-4.module+el8.5.0+12204+54860423
  • M
Open Redirect

<0:50.3.2-4.module+el8.5.0+12204+54860423
  • M
Improper Input Validation

<0:50.3.2-4.module+el8.5.0+12204+54860423
  • M
Arbitrary Code Injection

*
  • M
Arbitrary Command Injection

<0:50.3.2-4.module+el8.5.0+12204+54860423
  • M
Resource Exhaustion

<0:50.3.2-4.module+el8.5.0+12204+54860423
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:50.3.2-4.module+el8.5.0+12204+54860423
  • M
Improper Input Validation

<0:50.3.2-4.module+el8.5.0+12204+54860423
  • M
Information Exposure

<0:50.3.2-4.module+el8.5.0+12204+54860423
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:50.3.2-4.module+el8.5.0+12204+54860423
  • M
Cross-site Scripting (XSS)

<0:50.3.2-4.module+el8.5.0+12204+54860423
  • M
Improper Input Validation

<0:50.3.2-4.module+el8.5.0+12204+54860423