Total vulnerabilities in the database
pip before 1.3 uses HTTP to retrieve packages from the PyPI repository, and does not perform integrity checks on package contents, which allows man-in-the-middle attackers to execute arbitrary code via a crafted response to a "pip install" operation.
Software | From | Fixed in |
---|---|---|
pypa / pip | - | 1.3 |
![]() |
- | 1.3 |