Safety vulnerability ID: 79030
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Affected versions of the pyLoad package are vulnerable to Denial of Service (DoS) attacks due to insufficient validation of JavaScript code in the Click'n'Load (CNL) Blueprint handler. The `/flash/addcrypted2` endpoint accepts a `jk` parameter containing JavaScript code that is directly passed to the `eval_js()` function, which executes it through either `dukpy.evaljs()` or `js2py.eval_js()` without any timeout or resource limitations.
Latest version: 0.5.0b3.dev92
The free and open-source Download Manager written in pure Python
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application