Rechercher
Contactez-nous Suivez-nous sur Twitter En francais English Language
 

Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

Vigil@nce - Vigil@nce - Python: file corruption via tempfile.mktemp(), analyzed on 30/08/2021

September 2021 by Vigil@nce

Vigil@nce - An attacker can create a symbolic link named tempfile.mktemp(), in order to alter the pointed file, with privileges of Python.

Plus d'information sur : https://vigilance.fr/vulnerability/Python-file-corruption-via-tempfile-mktemp-36264


See previous articles

    

See next articles


Your podcast Here

New, you can have your Podcast here. Contact us for more information ask:
Marc Brami
Phone: +33 1 40 92 05 55
Mail: ipsimp@free.fr

All new podcasts