https://cve.circl.lu/rss/recent/pysec/10Most recent entries from pysec2024-12-11T22:45:16.465802+00:00Vulnerability Lookupinfo@circl.lupython-feedgenContains only the most 10 recent entries.https://cve.circl.lu/vuln/pysec-2015-42pysec-2015-422024-12-11T22:45:16.478327+00:00providers/saml2/admin.py in the Identity Provider (IdP) server in Ipsilon 0.1.0 before 1.0.2 and 1.1.x before 1.1.1 does not properly check permissions, which allows remote authenticated users to cause a denial of service by deleting a SAML2 Service Provider (SP).https://cve.circl.lu/vuln/pysec-2022-43162pysec-2022-431622024-12-11T22:45:16.478307+00:00Redis v7.0 was discovered to contain a memory leak via the component streamGetEdgeID.https://cve.circl.lu/vuln/pysec-2020-343pysec-2020-3432024-12-11T22:45:16.478289+00:00blosc2.c in Blosc C-Blosc2 through 2.0.0.beta.5 has a heap-based buffer overflow when there is a lack of space to write compressed data.https://cve.circl.lu/vuln/pysec-2024-154pysec-2024-1542024-12-11T22:45:16.478269+00:00Ultralytics has identified a supply chain attack
affecting affecting multiple versions of the ultralytics package.
The compromised versions contained unauthorized code that
downloaded and executed cryptocurrency mining software
when instantiating YOLO models.
This code was injected into the PyPI release artifacts and was not present
in the public GitHub repository.
https://cve.circl.lu/vuln/pysec-2024-111pysec-2024-1112024-12-11T22:45:16.478248+00:00A path traversal vulnerability exists in the `getFullPath` method of langchain-ai/langchainjs version 0.2.5. This vulnerability allows attackers to save files anywhere in the filesystem, overwrite existing text files, read `.txt` files, and delete files. The vulnerability is exploited through the `setFileContent`, `getParsedFile`, and `mdelete` methods, which do not properly sanitize user input.https://cve.circl.lu/vuln/pysec-2023-278pysec-2023-2782024-12-11T22:45:16.478229+00:00MindsDB connects artificial intelligence models to real time data. Versions prior to 23.11.4.1 contain a limited file write vulnerability in `file.py` Users should use MindsDB's `staging` branch or v23.11.4.1, which contain a fix for the issue.https://cve.circl.lu/vuln/pysec-2024-82pysec-2024-822024-12-11T22:45:16.478210+00:00Deserialization of untrusted data can occur in versions 23.3.2.0 and newer of the MindsDB platform, enabling a maliciously uploaded model to run arbitrary code on the server when interacted with.https://cve.circl.lu/vuln/pysec-2024-83pysec-2024-832024-12-11T22:45:16.478190+00:00Deserialization of untrusted data can occur in versions 23.10.2.0 and newer of the MindsDB platform, enabling a maliciously uploaded ‘inhouse’ model to run arbitrary code on the server when used for a prediction.https://cve.circl.lu/vuln/pysec-2024-84pysec-2024-842024-12-11T22:45:16.478161+00:00Deserialization of untrusted data can occur in versions 23.10.3.0 and newer of the MindsDB platform, enabling a maliciously uploaded ‘inhouse’ model to run arbitrary code on the server when a ‘describe’ query is run on it.https://cve.circl.lu/vuln/pysec-2024-85pysec-2024-852024-12-11T22:45:16.478089+00:00Deserialization of untrusted data can occur in versions 23.10.2.0 and newer of the MindsDB platform, enabling a maliciously uploaded ‘inhouse’ model to run arbitrary code on the server when using ‘finetune’ on it.