Show filters
6 Total Results
Displaying 1-6 of 6
Sort by:
Attacker Value
Unknown

CVE-2024-1240

Disclosure Date: November 15, 2024 (last updated November 20, 2024)
An open redirection vulnerability exists in pyload/pyload version 0.5.0. The vulnerability is due to improper handling of the 'next' parameter in the login functionality. An attacker can exploit this vulnerability to redirect users to malicious sites, which can be used for phishing or other malicious activities. The issue is fixed in pyload-ng 0.5.0b3.dev79.
Attacker Value
Unknown

CVE-2023-47890

Disclosure Date: January 08, 2024 (last updated January 12, 2024)
pyLoad 0.5.0 is vulnerable to Unrestricted File Upload.
Attacker Value
Unknown

CVE-2024-21645

Disclosure Date: January 08, 2024 (last updated January 12, 2024)
pyLoad is the free and open-source Download Manager written in pure Python. A log injection vulnerability was identified in `pyload` allowing any unauthenticated actor to inject arbitrary messages into the logs gathered by `pyload`. Forged or otherwise, corrupted log files can be used to cover an attacker’s tracks or even to implicate another party in the commission of a malicious act. This vulnerability has been patched in version 0.5.0b3.dev77.
Attacker Value
Unknown

CVE-2024-21644

Disclosure Date: January 08, 2024 (last updated January 12, 2024)
pyLoad is the free and open-source Download Manager written in pure Python. Any unauthenticated user can browse to a specific URL to expose the Flask config, including the `SECRET_KEY` variable. This issue has been patched in version 0.5.0b3.dev77.
Attacker Value
Unknown

CVE-2023-0434

Disclosure Date: January 22, 2023 (last updated February 24, 2025)
Improper Input Validation in GitHub repository pyload/pyload prior to 0.5.0b3.dev40.
Attacker Value
Unknown

CVE-2023-0055

Disclosure Date: January 04, 2023 (last updated February 24, 2025)
Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in GitHub repository pyload/pyload prior to 0.5.0b3.dev32.