Search for packages
| purl | pkg:pypi/setuptools@32.1.1 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-ebnc-7f5a-effj
Aliases: BIT-setuptools-2022-40897 CVE-2022-40897 GHSA-r9hx-vwmv-q579 PYSEC-2022-43012 |
Python Packaging Authority (PyPA) setuptools before 65.5.1 allows remote attackers to cause a denial of service via HTML in a crafted package or custom PackageIndex page. There is a Regular Expression Denial of Service (ReDoS) in package_index.py. |
Affected by 2 other vulnerabilities. |
|
VCID-qt3x-msd9-tyct
Aliases: CVE-2024-6345 GHSA-cx63-2mw6-8hw5 |
setuptools vulnerable to Command Injection via package URL A vulnerability in the `package_index` module of pypa/setuptools versions up to 69.1.1 allows for remote code execution via its download functions. These functions, which are used to download packages from URLs provided by users or retrieved from package index servers, are susceptible to code injection. If these functions are exposed to user-controlled inputs, such as package URLs, they can execute arbitrary commands on the system. The issue is fixed in version 70.0. |
Affected by 1 other vulnerability. |
|
VCID-uqed-9p12-7bdx
Aliases: BIT-setuptools-2025-47273 CVE-2025-47273 GHSA-5rjg-fvgr-3xxf PYSEC-2025-49 |
setuptools is a package that allows users to download, build, install, upgrade, and uninstall Python packages. A path traversal vulnerability in `PackageIndex` is present in setuptools prior to version 78.1.1. An attacker would be allowed to write files to arbitrary locations on the filesystem with the permissions of the process running the Python code, which could escalate to remote code execution depending on the context. Version 78.1.1 fixes the issue. |
Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||