Improper Input Validation in pyload/pyload
CVE-2023-0434
7.5HIGH
Summary
The vulnerability in the Pyload project arises from improper input validation, enabling potentially malicious users to exploit weaknesses in the software before version 0.5.0b3.dev40. This flaw could allow attackers to manipulate inputs, leading to unintended behaviors or security breaches. Developers and users should ensure they are using the updated versions and implement proper input validation techniques in their applications.
Affected Version(s)
pyload/pyload < 0.5.0b3.dev40
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
CVSS V3.0
Score:
5.4
Severity:
MEDIUM
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Physical
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved