python3-pip-wheel vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the python3-pip-wheel package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Directory Traversal

<0:9.0.3-22.1.el8_8
  • M
Directory Traversal

<0:9.0.3-22.1.el8_8
  • M
Directory Traversal

<0:9.0.3-22.1.el8_8
  • M
Directory Traversal

<0:9.0.3-22.1.el8_8
  • M
Directory Traversal

<0:9.0.3-22.1.el8_6
  • M
Directory Traversal

<0:9.0.3-22.1.el8_6
  • M
Directory Traversal

<0:9.0.3-22.1.el8_6
  • M
Directory Traversal

<0:9.0.3-22.1.el8_6
  • M
Information Exposure

*
  • M
Directory Traversal

<0:9.0.3-23.el8
  • M
Directory Traversal

<0:9.0.3-18.el8
  • M
Directory Traversal

<0:9.0.3-18.el8
  • M
Directory Traversal

<0:9.0.3-18.el8
  • M
Directory Traversal

<0:9.0.3-18.el8
  • M
Directory Traversal

<0:9.0.3-18.el8
  • M
Directory Traversal

<0:9.0.3-18.el8
  • M
Directory Traversal

<0:9.0.3-18.el8
  • M
Directory Traversal

<0:9.0.3-18.el8
  • M
Directory Traversal

<0:9.0.3-18.el8
  • M
Directory Traversal

<0:9.0.3-18.el8
  • M
Directory Traversal

<0:9.0.3-18.el8
  • M
Directory Traversal

<0:9.0.3-18.el8
  • M
Directory Traversal

<0:9.0.3-18.el8
  • M
Insufficiently Protected Credentials

<0:9.0.3-16.el8
  • M
Insufficiently Protected Credentials

<0:9.0.3-16.el8
  • M
Insufficiently Protected Credentials

<0:9.0.3-16.el8
  • M
Insufficiently Protected Credentials

<0:9.0.3-16.el8
  • M
Insufficiently Protected Credentials

<0:9.0.3-16.el8
  • M
Insufficiently Protected Credentials

<0:9.0.3-16.el8
  • M
Insufficiently Protected Credentials

<0:9.0.3-16.el8
  • M
Insufficiently Protected Credentials

<0:9.0.3-16.el8
  • M
Insufficiently Protected Credentials

<0:9.0.3-16.el8
  • M
Insufficiently Protected Credentials

<0:9.0.3-16.el8
  • M
Insufficiently Protected Credentials

<0:9.0.3-16.el8
  • M
Insufficiently Protected Credentials

<0:9.0.3-16.el8
  • M
Insufficiently Protected Credentials

<0:9.0.3-16.el8
  • M
Insufficiently Protected Credentials

<0:9.0.3-16.el8
  • M
Insufficiently Protected Credentials

<0:9.0.3-16.el8
  • M
Insufficiently Protected Credentials

<0:9.0.3-16.el8
  • M
Insufficiently Protected Credentials

<0:9.0.3-16.el8
  • M
Insufficiently Protected Credentials

<0:9.0.3-16.el8
  • M
Insufficiently Protected Credentials

<0:9.0.3-16.el8
  • M
Insufficiently Protected Credentials

<0:9.0.3-16.el8
  • M
Insufficiently Protected Credentials

<0:9.0.3-16.el8
  • M
Insufficiently Protected Credentials

<0:9.0.3-16.el8
  • M
Insufficiently Protected Credentials

<0:9.0.3-16.el8
  • M
Insufficiently Protected Credentials

<0:9.0.3-16.el8
  • M
Insufficiently Protected Credentials

<0:9.0.3-16.el8
  • M
Insufficiently Protected Credentials

<0:9.0.3-16.el8
  • M
Insufficiently Protected Credentials

<0:9.0.3-16.el8
  • M
Insufficiently Protected Credentials

<0:9.0.3-16.el8
  • M
Insufficiently Protected Credentials

<0:9.0.3-16.el8
  • M
Insufficiently Protected Credentials

<0:9.0.3-16.el8
  • M
Insufficiently Protected Credentials

<0:9.0.3-16.el8
  • M
Insufficiently Protected Credentials

<0:9.0.3-16.el8
  • M
Insufficiently Protected Credentials

<0:9.0.3-16.el8
  • M
Insufficiently Protected Credentials

<0:9.0.3-16.el8
  • M
HTTP Response Splitting

<0:9.0.3-16.el8
  • M
HTTP Response Splitting

<0:9.0.3-16.el8
  • M
HTTP Response Splitting

<0:9.0.3-16.el8
  • M
HTTP Response Splitting

<0:9.0.3-16.el8
  • M
HTTP Response Splitting

<0:9.0.3-16.el8
  • M
HTTP Response Splitting

<0:9.0.3-16.el8
  • M
HTTP Response Splitting

<0:9.0.3-16.el8
  • M
HTTP Response Splitting

<0:9.0.3-16.el8
  • M
HTTP Response Splitting

<0:9.0.3-16.el8
  • M
HTTP Response Splitting

<0:9.0.3-16.el8
  • M
HTTP Response Splitting

<0:9.0.3-16.el8
  • M
HTTP Response Splitting

<0:9.0.3-16.el8
  • M
HTTP Response Splitting

<0:9.0.3-16.el8
  • M
HTTP Response Splitting

<0:9.0.3-16.el8
  • M
HTTP Response Splitting

<0:9.0.3-16.el8
  • M
HTTP Response Splitting

<0:9.0.3-16.el8
  • M
HTTP Response Splitting

<0:9.0.3-16.el8
  • M
Improper Certificate Validation

<0:9.0.3-16.el8
  • M
Improper Certificate Validation

<0:9.0.3-16.el8
  • M
Improper Certificate Validation

<0:9.0.3-16.el8
  • M
Improper Certificate Validation

<0:9.0.3-16.el8
  • M
Improper Certificate Validation

<0:9.0.3-16.el8
  • M
Improper Certificate Validation

<0:9.0.3-16.el8
  • M
Improper Certificate Validation

<0:9.0.3-16.el8
  • M
Improper Certificate Validation

<0:9.0.3-16.el8
  • M
Improper Certificate Validation

<0:9.0.3-16.el8
  • M
Improper Certificate Validation

<0:9.0.3-16.el8
  • M
Improper Certificate Validation

<0:9.0.3-16.el8
  • M
Improper Certificate Validation

<0:9.0.3-16.el8
  • M
Improper Certificate Validation

<0:9.0.3-16.el8
  • M
Improper Certificate Validation

<0:9.0.3-16.el8
  • M
Improper Certificate Validation

<0:9.0.3-16.el8
  • M
Improper Certificate Validation

<0:9.0.3-16.el8
  • M
Improper Certificate Validation

<0:9.0.3-16.el8
  • L
Improper Input Validation

<0:9.0.3-20.el8
  • L
Improper Input Validation

<0:9.0.3-20.el8
  • L
Improper Input Validation

<0:9.0.3-20.el8
  • L
Improper Input Validation

<0:9.0.3-20.el8
  • L
Improper Input Validation

<0:9.0.3-20.el8
  • L
Improper Input Validation

<0:9.0.3-20.el8
  • L
Improper Input Validation

<0:9.0.3-20.el8
  • L
Improper Input Validation

<0:9.0.3-20.el8
  • L
Improper Input Validation

<0:9.0.3-20.el8
  • L
Use of Less Trusted Source

*