Latest version: v0.5.0b3.dev87
CVE/PVE | Vulnerability ID | Advisory | Affected versions | Severity | Severity Score |
---|---|---|---|---|---|
CVE-2024-47821 | 73964 |
Affected versions of pyLoad are vulnerable to path traversal via the … |
|
- | - |
CVE-2024-21644 | 63601 |
Pyload-ng versions before 0.5.0b3.dev77 are vulnerable to Unauthentic… |
|
HIGH | 7.5 |
CVE-2024-21645 | 63602 |
Pyload-ng versions before 0.5.0b3.dev77 are vulnerable to Log Injecti… |
|
MEDIUM | 5.3 |
CVE-2024-22416 | 64457 |
The pyload API, which supports making API calls through GET requests,… |
|
HIGH | 8.8 |
CVE-2023-0297 | 53432 |
Pyload-ng 0.5.0b3.dev31 includes a fix for CVE-2023-0297: Code Inject… |
|
CRITICAL | 9.8 |
CVE-2024-24808 | 65294 |
pyLoad is an open-source Download Manager written in pure Python. The… |
|
MEDIUM | 6.1 |
CVE-2023-47890 | 65258 |
pyLoad 0.5.0 is vulnerable to Unrestricted File Upload. |
|
HIGH | 8.8 |
CVE-2023-0509 | 54646 |
Improper Certificate Validation in GitHub repository pyload/pyload pr… |
|
HIGH | 7.4 |
CVE-2023-0488 | 54629 |
Cross-site Scripting (XSS) - Stored in GitHub repository pyload/pyloa… |
|
MEDIUM | 5.4 |
CVE-2021-20088 | 65843 |
Improperly Controlled Modification of Object Prototype Attributes ('P… |
|
HIGH | 8.8 |
CVE-2023-0435 | 54622 |
Excessive Attack Surface in GitHub repository pyload/pyload prior to … |
|
CRITICAL | 9.8 |
CVE-2023-0434 | 54619 |
Improper Input Validation in GitHub repository pyload/pyload prior to… |
|
HIGH | 7.5 |
CVE-2023-0227 | 54610 |
Pyload 0.5.0b3.dev35 has an Insufficient Session Expiration vulnerabi… |
|
MEDIUM | 6.5 |
CVE-2023-0057 | 54643 |
Improper Restriction of Rendered UI Layers or Frames in GitHub reposi… |
|
MEDIUM | 6.1 |
CVE-2023-0055 | 54642 |
Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in GitHu… |
|
MEDIUM | 5.3 |
CVE-2024-28397 | 73186 |
pyload-ng affected versions are vulnerable to remote code execution (… |
|
- | - |
CVE-2024-32880 | 71929 |
An authenticated user can change the download folder and upload a cra… |
|
- | - |