platform-python-pip vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the platform-python-pip package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • M
Open Redirect

*
  • M
Open Redirect

*
  • M
Directory Traversal

<0:9.0.3-22.1.el8_8
  • M
Directory Traversal

<0:9.0.3-22.1.el8_8
  • M
Directory Traversal

<0:9.0.3-22.1.el8_8
  • M
Directory Traversal

<0:9.0.3-22.1.el8_8
  • M
Directory Traversal

<0:9.0.3-22.1.el8_6
  • M
Directory Traversal

<0:9.0.3-22.1.el8_6
  • M
Directory Traversal

<0:9.0.3-22.1.el8_6
  • M
Directory Traversal

<0:9.0.3-22.1.el8_6
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Directory Traversal

<0:9.0.3-23.el8
  • M
Directory Traversal

<0:9.0.3-18.el8
  • M
Directory Traversal

<0:9.0.3-18.el8
  • M
Directory Traversal

<0:9.0.3-18.el8
  • M
Directory Traversal

<0:9.0.3-18.el8
  • M
Directory Traversal

<0:9.0.3-18.el8
  • M
Directory Traversal

<0:9.0.3-18.el8
  • M
Directory Traversal

<0:9.0.3-18.el8
  • M
Directory Traversal

<0:9.0.3-18.el8
  • M
Directory Traversal

<0:9.0.3-18.el8
  • M
Directory Traversal

<0:9.0.3-18.el8
  • M
Directory Traversal

<0:9.0.3-18.el8
  • M
Directory Traversal

<0:9.0.3-18.el8
  • M
Directory Traversal

<0:9.0.3-18.el8
  • M
Insufficiently Protected Credentials

<0:9.0.3-16.el8
  • M
Insufficiently Protected Credentials

<0:9.0.3-16.el8
  • M
Insufficiently Protected Credentials

<0:9.0.3-16.el8
  • M
Insufficiently Protected Credentials

<0:9.0.3-16.el8
  • M
Insufficiently Protected Credentials

<0:9.0.3-16.el8
  • M
Insufficiently Protected Credentials

<0:9.0.3-16.el8
  • M
Insufficiently Protected Credentials

<0:9.0.3-16.el8
  • M
Insufficiently Protected Credentials

<0:9.0.3-16.el8
  • M
Insufficiently Protected Credentials

<0:9.0.3-16.el8
  • M
Insufficiently Protected Credentials

<0:9.0.3-16.el8
  • M
Insufficiently Protected Credentials

<0:9.0.3-16.el8
  • M
Insufficiently Protected Credentials

<0:9.0.3-16.el8
  • M
Insufficiently Protected Credentials

<0:9.0.3-16.el8
  • M
Insufficiently Protected Credentials

<0:9.0.3-16.el8
  • M
Insufficiently Protected Credentials

<0:9.0.3-16.el8
  • M
Insufficiently Protected Credentials

<0:9.0.3-16.el8
  • M
Insufficiently Protected Credentials

<0:9.0.3-16.el8
  • M
Insufficiently Protected Credentials

<0:9.0.3-16.el8
  • M
Insufficiently Protected Credentials

<0:9.0.3-16.el8
  • M
Insufficiently Protected Credentials

<0:9.0.3-16.el8
  • M
Insufficiently Protected Credentials

<0:9.0.3-16.el8
  • M
Insufficiently Protected Credentials

<0:9.0.3-16.el8
  • M
Insufficiently Protected Credentials

<0:9.0.3-16.el8
  • M
Insufficiently Protected Credentials

<0:9.0.3-16.el8
  • M
Insufficiently Protected Credentials

<0:9.0.3-16.el8
  • M
Insufficiently Protected Credentials

<0:9.0.3-16.el8
  • M
Insufficiently Protected Credentials

<0:9.0.3-16.el8
  • M
Insufficiently Protected Credentials

<0:9.0.3-16.el8
  • M
Insufficiently Protected Credentials

<0:9.0.3-16.el8
  • M
Insufficiently Protected Credentials

<0:9.0.3-16.el8
  • M
Insufficiently Protected Credentials

<0:9.0.3-16.el8
  • M
Insufficiently Protected Credentials

<0:9.0.3-16.el8
  • M
Insufficiently Protected Credentials

<0:9.0.3-16.el8
  • M
Insufficiently Protected Credentials

<0:9.0.3-16.el8
  • M
HTTP Response Splitting

<0:9.0.3-16.el8
  • M
HTTP Response Splitting

<0:9.0.3-16.el8
  • M
HTTP Response Splitting

<0:9.0.3-16.el8
  • M
HTTP Response Splitting

<0:9.0.3-16.el8
  • M
HTTP Response Splitting

<0:9.0.3-16.el8
  • M
HTTP Response Splitting

<0:9.0.3-16.el8
  • M
HTTP Response Splitting

<0:9.0.3-16.el8
  • M
HTTP Response Splitting

<0:9.0.3-16.el8
  • M
HTTP Response Splitting

<0:9.0.3-16.el8
  • M
HTTP Response Splitting

<0:9.0.3-16.el8
  • M
HTTP Response Splitting

<0:9.0.3-16.el8
  • M
HTTP Response Splitting

<0:9.0.3-16.el8
  • M
HTTP Response Splitting

<0:9.0.3-16.el8
  • M
HTTP Response Splitting

<0:9.0.3-16.el8
  • M
HTTP Response Splitting

<0:9.0.3-16.el8
  • M
HTTP Response Splitting

<0:9.0.3-16.el8
  • M
HTTP Response Splitting

<0:9.0.3-16.el8
  • M
Improper Certificate Validation

<0:9.0.3-16.el8
  • M
Improper Certificate Validation

<0:9.0.3-16.el8
  • M
Improper Certificate Validation

<0:9.0.3-16.el8
  • M
Improper Certificate Validation

<0:9.0.3-16.el8
  • M
Improper Certificate Validation

<0:9.0.3-16.el8
  • M
Improper Certificate Validation

<0:9.0.3-16.el8
  • M
Improper Certificate Validation

<0:9.0.3-16.el8
  • M
Improper Certificate Validation

<0:9.0.3-16.el8
  • M
Improper Certificate Validation

<0:9.0.3-16.el8
  • M
Improper Certificate Validation

<0:9.0.3-16.el8
  • M
Improper Certificate Validation

<0:9.0.3-16.el8
  • M
Improper Certificate Validation

<0:9.0.3-16.el8
  • M
Improper Certificate Validation

<0:9.0.3-16.el8
  • M
Improper Certificate Validation

<0:9.0.3-16.el8
  • M
Improper Certificate Validation

<0:9.0.3-16.el8
  • M
Improper Certificate Validation

<0:9.0.3-16.el8
  • M
Improper Certificate Validation

<0:9.0.3-16.el8
  • L
Improper Input Validation

<0:9.0.3-20.el8
  • L
Improper Input Validation

<0:9.0.3-20.el8
  • L
Improper Input Validation

<0:9.0.3-20.el8
  • L
Improper Input Validation

<0:9.0.3-20.el8
  • L
Improper Input Validation

<0:9.0.3-20.el8
  • L
Improper Input Validation

<0:9.0.3-20.el8
  • L
Improper Input Validation

<0:9.0.3-20.el8
  • L
Improper Input Validation

<0:9.0.3-20.el8
  • L
Improper Input Validation

<0:9.0.3-20.el8
  • L
Use of Less Trusted Source

*