$ pip-auditNo known vulnerabilities found审计给定requirements文件的依赖:
$ pip-audit -r ./requirements.txtNo known vulnerabilities found审计一个requirements文件 , 并排除系统包:
$ pip-audit -r ./requirements.txt -lNo known vulnerabilities found审计依赖中发现的安全漏洞:
$ pip-auditFound 2 known vulnerabilities in 1 packageNameVersion IDFix Versions----------- -------------- ------------Flask 0.5PYSEC-2019-179 1.0Flask 0.5PYSEC-2018-660.12.3审计依赖(包含描述):
$ pip-audit --descFound 2 known vulnerabilities in 1 packageNameVersion IDFix Versions Description----------- -------------- ------------ --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------Flask 0.5PYSEC-2019-179 1.0The Pallets Project Flask before 1.0 is affected by: unexpected memory usage. The impact is: denial of service. The attack vector is: crafted encoded JSON data. The fixed version is: 1. NOTE: this may overlap CVE-2018-1000656.Flask 0.5PYSEC-2018-660.12.3The Pallets Project flask version Before 0.12.3 contains a CWE-20: Improper Input Validation vulnerability in flask that can result in Large amount of memory usage possibly leading to denial of service. This attack appear to be exploitable via Attacker provides JSON data in incorrect encoding. This vulnerability appears to have been fixed in 0.12.3. NOTE: this may overlap CVE-2019-1010083.审计JSON格式依赖:
$ pip-audit -f json | jqFound 2 known vulnerabilities in 1 package[{"name": "flask","version": "0.5","vulns": [{"id": "PYSEC-2019-179","fix_versions": ["1.0"],"description": "The Pallets Project Flask before 1.0 is affected by: unexpected memory usage. The impact is: denial of service. The attack vector is: crafted encoded JSON data. The fixed version is: 1. NOTE: this may overlap CVE-2018-1000656."},{"id": "PYSEC-2018-66","fix_versions": ["0.12.3"],"description": "The Pallets Project flask version Before 0.12.3 contains a CWE-20: Improper Input Validation vulnerability in flask that can result in Large amount of memory usage possibly leading to denial of service. This attack appear to be exploitable via Attacker provides JSON data in incorrect encoding. This vulnerability appears to have been fixed in 0.12.3. NOTE: this may overlap CVE-2019-1010083."}]},{"name": "jinja2","version": "3.0.2","vulns": []},{"name": "pip","version": "21.3.1","vulns": []},{"name": "setuptools","version": "57.4.0","vulns": []},{"name": "werkzeug","version": "2.0.2","vulns": []},{"name": "markupsafe","version": "2.0.1","vulns": []}]
【一>所有资源关注我 , 私信回复“资料”获取<一】审计并尝试自动审计存在漏洞的依赖:
1、网络安全学习路线
2、电子书籍(白帽子)
3、安全大厂内部视频
4、100份src文档
5、常见安全面试题
6、ctf大赛经典题目解析
7、全套工具包
8、应急响应笔记
$ pip-audit --fixFound 2 known vulnerabilities in 1 package and fixed 2 vulnerabilities in 1 packageNameVersion IDFix Versions Applied Fix----- ------- -------------- ------------ ----------------------------------------flask 0.5PYSEC-2019-179 1.0Successfully upgraded flask (0.5 => 1.0)flask 0.5PYSEC-2018-660.12.3Successfully upgraded flask (0.5 => 1.0)许可证协议【漏洞扫描工具有哪些 常用web漏洞扫描工具推荐】本项目的开发与发布遵循 Apache 2.0开源许可证协议 。推荐阅读
- 测速工具都有哪些 最准确的测速app
- 检测u盘的软件 u盘检测工具电脑版
- 全境封锁2电工流怎么配装 全境封锁2最暴力电工配装分享_网
- 局域网流量监控软件哪个好 比较好用的监控工具分享?
- 2022年root工具最新 安卓暴力破解root
- 红米6aroot教程 红米一键root工具下载
- 硬盘修复工具软件哪个好 硬盘修复的简单方法
- 好用的抓包工具 免费的抓包工具
- 店铺装修工具 天猫店铺装修流程步骤
- 北京工商管理局官网 北京工商网上登记申请平台
