Pypa

Pip

9 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.06%
  • Published 24.09.2025 15:15:41
  • Last modified 24.09.2025 18:11:24

When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a "fixed" version for this vulnerability doesn't fix all known vulnerabilit...

  • EPSS 0.04%
  • Published 25.10.2023 18:17:44
  • Last modified 13.02.2025 18:16:01

When installing a package from a Mercurial VCS URL (ie "pip install hg+...") with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the "hg clone" call (ie "--config"). Controlling the...

  • EPSS 0.24%
  • Published 10.11.2021 18:15:09
  • Last modified 21.11.2024 06:21:52

A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrit...

Exploit
  • EPSS 0.62%
  • Published 04.09.2020 20:15:11
  • Last modified 21.11.2024 04:39:40

The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occ...

  • EPSS 3.22%
  • Published 08.05.2020 18:15:10
  • Last modified 21.11.2024 04:01:07

An issue was discovered in pip (all versions) because it installs the version with the highest version number, even if the user had intended to obtain a private package from a private index. This only affects use of the --extra-index-url option, and ...

  • EPSS 12.86%
  • Published 05.11.2019 22:15:10
  • Last modified 21.11.2024 01:57:03

The mirroring support (-M, --use-mirrors) in Python Pip before 1.5 uses insecure DNS querying and authenticity checks which allows attackers to perform man-in-the-middle attacks.

  • EPSS 0.13%
  • Published 24.11.2014 15:59:15
  • Last modified 12.04.2025 10:46:40

pip 1.3 through 1.5.6 allows local users to cause a denial of service (prevention of package installation) by creating a /tmp/pip-build-* file for another user.

  • EPSS 0.04%
  • Published 17.08.2013 06:54:57
  • Last modified 11.04.2025 00:51:21

pip before 1.3 allows local users to overwrite arbitrary files via a symlink attack on a file in the /tmp/pip-build temporary directory.

Exploit
  • EPSS 39.92%
  • Published 06.08.2013 02:52:10
  • Last modified 11.04.2025 00:51:21

pip before 1.3 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary code via a crafted response to a "pip install" operation.