https://cve.circl.lu/rss/recent/pysec/10Most recent entries from pysec2025-07-16T11:41:05.061389+00:00Vulnerability-Lookupinfo@circl.lupython-feedgenContains only the most 10 recent entries.https://cve.circl.lu/vuln/pysec-2025-67pysec-2025-672025-07-16T11:41:05.072895+00:00A vulnerability classified as critical was found in Upsonic up to 0.55.6. This vulnerability affects the function os.path.join of the file markdown/server.py. The manipulation of the argument file.filename leads to path traversal. The exploit has been disclosed to the public and may be used.https://cve.circl.lu/vuln/pysec-2025-68pysec-2025-682025-07-16T11:41:05.072878+00:00A vulnerability, which was classified as critical, has been found in Upsonic up to 0.55.6. This issue affects the function cloudpickle.loads of the file /tools/add_tool of the component Pickle Handler. The manipulation leads to deserialization. The exploit has been disclosed to the public and may be used.https://cve.circl.lu/vuln/pysec-2025-69pysec-2025-692025-07-16T11:41:05.072861+00:00In Roundup before 2.5.0, XSS can occur via interaction between URLs and issue tracker templates (devel and responsive).https://cve.circl.lu/vuln/pysec-2023-278pysec-2023-2782025-07-16T11:41:05.072845+00:00MindsDB connects artificial intelligence models to real time data. Versions prior to 23.11.4.1 contain a limited file write vulnerability in `file.py` Users should use MindsDB's `staging` branch or v23.11.4.1, which contain a fix for the issue.https://cve.circl.lu/vuln/pysec-2024-82pysec-2024-822025-07-16T11:41:05.072829+00:00Deserialization of untrusted data can occur in versions 23.3.2.0 and newer of the MindsDB platform, enabling a maliciously uploaded model to run arbitrary code on the server when interacted with.https://cve.circl.lu/vuln/pysec-2024-83pysec-2024-832025-07-16T11:41:05.072813+00:00Deserialization of untrusted data can occur in versions 23.10.2.0 and newer of the MindsDB platform, enabling a maliciously uploaded ‘inhouse’ model to run arbitrary code on the server when used for a prediction.https://cve.circl.lu/vuln/pysec-2024-84pysec-2024-842025-07-16T11:41:05.072796+00:00Deserialization of untrusted data can occur in versions 23.10.3.0 and newer of the MindsDB platform, enabling a maliciously uploaded ‘inhouse’ model to run arbitrary code on the server when a ‘describe’ query is run on it.https://cve.circl.lu/vuln/pysec-2024-85pysec-2024-852025-07-16T11:41:05.072779+00:00Deserialization of untrusted data can occur in versions 23.10.2.0 and newer of the MindsDB platform, enabling a maliciously uploaded ‘inhouse’ model to run arbitrary code on the server when using ‘finetune’ on it.https://cve.circl.lu/vuln/pysec-2024-258pysec-2024-2582025-07-16T11:41:05.072755+00:00In scrapy/scrapy, an issue was identified where the Authorization header is not removed during redirects that only change the scheme (e.g., HTTPS to HTTP) but remain within the same domain. This behavior contravenes the Fetch standard, which mandates the removal of Authorization headers in cross-origin requests when the scheme, host, or port changes. Consequently, when a redirect downgrades from HTTPS to HTTP, the Authorization header may be inadvertently exposed in plaintext, leading to potential sensitive information disclosure to unauthorized actors. The flaw is located in the _build_redirect_request function of the redirect middleware.https://cve.circl.lu/vuln/pysec-2024-259pysec-2024-2592025-07-16T11:41:05.072701+00:00In PyTorch <=2.4.1, the RemoteModule has Deserialization RCE. NOTE: this is disputed by multiple parties because this is intended behavior in PyTorch distributed computing.