Safety vulnerability ID: 78158
The information on this page was manually curated by our Cybersecurity Intelligence Team.
An unsafe JavaScript evaluation vulnerability in pyLoad’s CAPTCHA processing code allows unauthenticated remote attackers to execute arbitrary code in the client browser and potentially the backend server. Exploitation requires no user interaction or authentication and can result in session hijacking, credential theft, and full system rce.
Latest version: 0.5.0b3.dev92
The free and open-source Download Manager written in pure Python
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application