rpyc@4.1.0 vulnerabilities
Remote Python Call (RPyC) is a transparent and symmetric distributed computing library
-
latest version
6.0.0
-
latest non vulnerable version
-
first published
13 years ago
-
latest version published
3 months ago
-
licenses detected
- [0,)
Direct Vulnerabilities
Known vulnerabilities in the rpyc package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
rpyc is a transparent library for symmetrical remote procedure calls, clustering, and distributed-computing. Affected versions of this package are vulnerable to Remote Code Execution (RCE) when the server-side invokes the How to fix Remote Code Execution (RCE)? Upgrade |
[,6.0.0)
|
rpyc is a transparent library for symmetrical remote procedure calls, clustering, and distributed-computing. Affected versions of this package are vulnerable to Race Condition due to remote multithreading. This could stall the client during concurrent operations. How to fix Race Condition? Upgrade |
[,5.2.1)
|
rpyc is a transparent library for symmetrical remote procedure calls, clustering, and distributed-computing. Affected versions of this package are vulnerable to Remote Code Execution (RCE). It allows a remote attacker to dynamically modify object attributes to construct a remote procedure call that executes code for an RPyC service with default configuration settings. How to fix Remote Code Execution (RCE)? Upgrade |
[4.1.0,4.1.2)
|