setuptools@0.7.5 vulnerabilities
Easily download, build, install, upgrade, and uninstall Python packages
-
latest version
75.6.0
-
latest non vulnerable version
-
first published
19 years ago
-
latest version published
9 days ago
-
licenses detected
- [0.6b1,19.5)
Direct Vulnerabilities
Known vulnerabilities in the setuptools package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
Affected versions of this package are vulnerable to Improper Control of Generation of Code ('Code Injection') through the Note Because How to fix Improper Control of Generation of Code ('Code Injection')? Upgrade |
[,70.0.0)
|
Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) via crafted HTML package or custom Note: Only a small portion of the user base is impacted by this flaw. Setuptools maintainers pointed out that How to fix Regular Expression Denial of Service (ReDoS)? Upgrade |
[,65.5.1)
|
Affected versions of
How to fix Directory Traversal? Upgrade |
[,3.0)
|
Affected versions of The ssl.match_hostname function does not properly handle wildcards in hostnames, which might allow man-in-the-middle attackers to spoof servers via a crafted certificate. (same as CVE-2013-7440). How to fix Man-in-the-Middle (MitM)? Upgrade |
[,1.3)
|
Affected versions of Algorithmic complexity vulnerability in the ssl.match_hostname function, allows remote attackers to cause a denial of service (CPU consumption) via multiple wildcard characters in the common name in a certificate.(same issue as CVE-2013-2099). How to fix Denial of Service (DoS)? Upgrade |
[,0.9.5)
|