pyLoad is the free and open-source Download Manager written in pure Python. A log injection vulnerability was identified in `pyload` allowing any unauthenticated actor to inject arbitrary messages into the logs gathered by `pyload`. Forged or otherwise, corrupted log files can be used to cover an attacker’s tracks or even to implicate another party in the commission of a malicious act. This vulnerability has been patched in version 0.5.0b3.dev77.
Metrics
Affected Vendors & Products
References
History
Thu, 14 Nov 2024 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-11-14T17:38:32.866Z
Reserved: 2023-12-29T03:00:44.958Z
Link: CVE-2024-21645

Updated: 2024-08-01T22:27:35.862Z

Status : Modified
Published: 2024-01-08T14:15:47.420
Modified: 2024-11-21T08:54:47.520
Link: CVE-2024-21645

No data.