Advisory 2024-1282 - Python: Multiple Vulnerabilities allow manipulation of files and bypass of security measures
Date
2024-06-18
State
2024-11-19
Risk*
Damage: MEDIUM
Attack Probability: MEDIUM-HIGH
Attack
A remote anonymous attacker can exploit multiple vulnerabilities in Python in order to manipulate files and to bypass security measures.
* The probability of an attack is determined by the attacker's motivation, the necessary expend and the possibilities for an attack. The damage probability is determined by the expend needed to resolute the attack and probable indirecte consequences of an attack for business processes. Telekom Security assumes worst case scenarios.
Copyright © 1999-2024 Deutsche Telekom Security GmbH. All rights reserved. Reproduction and distribution of this publication in any form - even in parts - without prior written permission is forbidden.
The information contained herein has been obtained from sources believed to be reliable and trusted or have been verified. Telekom Security can take liability for completeness, accuracy and correctness only in so far, as gross negligence or intention create liability. Any liability beyond it, in particular possible damages resulting from using or non-usability of the information contained herein, is excluded.