https://vulnerability.cert.dk/rss/recent/pysec/10Most recent entries from pysec2025-08-18T00:59:57.880601+00:00Vulnerability-Lookupcert@cert.dkpython-feedgenContains only the most 10 recent entries.https://vulnerability.cert.dk/vuln/pysec-2024-258pysec-2024-2582025-08-18T00:59:57.902426+00:00In scrapy/scrapy, an issue was identified where the Authorization header is not removed during redirects that only change the scheme (e.g., HTTPS to HTTP) but remain within the same domain. This behavior contravenes the Fetch standard, which mandates the removal of Authorization headers in cross-origin requests when the scheme, host, or port changes. Consequently, when a redirect downgrades from HTTPS to HTTP, the Authorization header may be inadvertently exposed in plaintext, leading to potential sensitive information disclosure to unauthorized actors. The flaw is located in the _build_redirect_request function of the redirect middleware.https://vulnerability.cert.dk/vuln/pysec-2024-259pysec-2024-2592025-08-18T00:59:57.902399+00:00In PyTorch <=2.4.1, the RemoteModule has Deserialization RCE. NOTE: this is disputed by multiple parties because this is intended behavior in PyTorch distributed computing.https://vulnerability.cert.dk/vuln/pysec-2025-70pysec-2025-702025-08-18T00:59:57.902372+00:00A Server-Side Request Forgery (SSRF) vulnerability exists in the RequestsToolkit component of the langchain-community package (specifically, langchain_community.agent_toolkits.openapi.toolkit.RequestsToolkit) in langchain-ai/langchain version 0.0.27. This vulnerability occurs because the toolkit does not enforce restrictions on requests to remote internet addresses, allowing it to also access local addresses. As a result, an attacker could exploit this flaw to perform port scans, access local services, retrieve instance metadata from cloud environments (e.g., Azure, AWS), and interact with servers on the local network. This issue has been fixed in version 0.0.28.https://vulnerability.cert.dk/vuln/pysec-2025-71pysec-2025-712025-08-18T00:59:57.902343+00:00Cadwyn creates production-ready community-driven modern Stripe-like API versioning in FastAPI. In versions before 5.4.3, the version parameter of the "/docs" endpoint is vulnerable to a Reflected XSS (Cross-Site Scripting) attack. This XSS would notably allow an attacker to execute JavaScript code on a user's session for any application based on Cadwyn via a one-click attack. The vulnerability has been fixed in version 5.4.3.https://vulnerability.cert.dk/vuln/pysec-2023-278pysec-2023-2782025-08-18T00:59:57.902315+00:00MindsDB connects artificial intelligence models to real time data. Versions prior to 23.11.4.1 contain a limited file write vulnerability in `file.py` Users should use MindsDB's `staging` branch or v23.11.4.1, which contain a fix for the issue.https://vulnerability.cert.dk/vuln/pysec-2024-82pysec-2024-822025-08-18T00:59:57.902287+00:00Deserialization of untrusted data can occur in versions 23.3.2.0 and newer of the MindsDB platform, enabling a maliciously uploaded model to run arbitrary code on the server when interacted with.https://vulnerability.cert.dk/vuln/pysec-2024-83pysec-2024-832025-08-18T00:59:57.902260+00:00Deserialization of untrusted data can occur in versions 23.10.2.0 and newer of the MindsDB platform, enabling a maliciously uploaded ‘inhouse’ model to run arbitrary code on the server when used for a prediction.https://vulnerability.cert.dk/vuln/pysec-2024-84pysec-2024-842025-08-18T00:59:57.902221+00:00Deserialization of untrusted data can occur in versions 23.10.3.0 and newer of the MindsDB platform, enabling a maliciously uploaded ‘inhouse’ model to run arbitrary code on the server when a ‘describe’ query is run on it.https://vulnerability.cert.dk/vuln/pysec-2024-85pysec-2024-852025-08-18T00:59:57.902164+00:00Deserialization of untrusted data can occur in versions 23.10.2.0 and newer of the MindsDB platform, enabling a maliciously uploaded ‘inhouse’ model to run arbitrary code on the server when using ‘finetune’ on it.https://vulnerability.cert.dk/vuln/pysec-2025-72pysec-2025-722025-08-18T00:59:57.885301+00:00The `num2words` project was compromised via a phishing attack
and two new versions were uploaded to PyPI containing malicious code.
The affected versions have been removed from PyPI,
and users are advised to remove the affected versions from their environments.