python3-pip vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the python3-pip package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Insufficiently Protected Credentials

*
  • M
Improper Certificate Validation

<0:9.0.3-7.el7_8
  • M
HTTP Response Splitting

<0:9.0.3-7.el7_8
  • M
Insufficiently Protected Credentials

<0:9.0.3-7.el7_8
  • M
Insufficiently Protected Credentials

<0:9.0.3-7.el7_8
  • M
Incorrect Resource Transfer Between Spheres

*
  • L
Arbitrary Command Injection

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Resource Exhaustion

*
  • M
Directory Traversal

*
  • M
Insufficiently Protected Credentials

<0:9.0.3-7.el7_7
  • M
Insufficiently Protected Credentials

<0:9.0.3-7.el7_8
  • M
Insufficiently Protected Credentials

<0:9.0.3-7.el7_7
  • M
Insufficiently Protected Credentials

<0:9.0.3-7.el7_7
  • M
Insufficiently Protected Credentials

<0:9.0.3-7.el7_7
  • M
Insufficiently Protected Credentials

<0:9.0.3-7.el7_7
  • M
Insufficiently Protected Credentials

<0:9.0.3-7.el7_7
  • M
Insufficiently Protected Credentials

<0:9.0.3-7.el7_7
  • M
Insufficiently Protected Credentials

<0:9.0.3-7.el7_7
  • M
Insufficiently Protected Credentials

<0:9.0.3-7.el7_8
  • M
HTTP Response Splitting

<0:9.0.3-7.el7_7
  • M
HTTP Response Splitting

<0:9.0.3-7.el7_7
  • M
HTTP Response Splitting

<0:9.0.3-7.el7_7
  • M
HTTP Response Splitting

<0:9.0.3-7.el7_7
  • M
HTTP Response Splitting

<0:9.0.3-7.el7_8
  • M
Improper Certificate Validation

<0:9.0.3-7.el7_7
  • M
Improper Certificate Validation

<0:9.0.3-7.el7_7
  • M
Improper Certificate Validation

<0:9.0.3-7.el7_7
  • M
Improper Certificate Validation

<0:9.0.3-7.el7_7
  • M
Improper Certificate Validation

<0:9.0.3-7.el7_8
  • L
Improper Input Validation

*
  • L
Use of Less Trusted Source

*