Safety vulnerability ID: 66881
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Cheetah 0.9.15 and 0.9.16 searches the /tmp directory for modules before using the paths in the PYTHONPATH variable, which allows local users to execute arbitrary code via a malicious module in /tmp/.
Latest version: 2.4.4
Cheetah is a template engine and code generation tool.
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application