RSS   Vulnerabilities for 'Pyxdg'   RSS

2019-06-06
 
CVE-2019-12761

CWE-91
 

 
A code injection issue was discovered in PyXDG before 0.26 via crafted Python code in a Category element of a Menu XML document in a .menu file. XDG_CONFIG_DIRS must be set up to trigger xdg.Menu.parse parsing within the directory containing this file. This is due to a lack of sanitization in xdg/Menu.py before an eval call.

 
2014-01-27
 
CVE-2014-1624

CWE-59
 

 
Race condition in the xdg.BaseDirectory.get_runtime_dir function in python-xdg 0.25 allows local users to overwrite arbitrary files by pre-creating /tmp/pyxdg-runtime-dir-fallback-victim to point to a victim-owned location, then replacing it with a symlink to an attacker-controlled location once the get_runtime_dir function is called.

 

 >>> Vendor: Python 28 Products
Python
Virtualenv
Beaker
Keyring
PIP
Setuptools
RPLY
Pyxdg
Pillow
Python-gnupg
Requests
Tgcaptcha2
Python priority library
Hpack
Hyper
Urllib3
Openpyxl
Tablib
Simplejson
Pykerberos
Pypiserver
RSA
Novajoin
Pyxml
Typed ast
Py-bcrypt
Jw.util
Pybluemonday


Copyright 2024, cxsecurity.com

 

Back to Top