![]() This prevents a malicious FTP server from using the response to probe IPv4 address and port combinations on the client network. bpo-43285: ftplib no longer trusts the IP address value returned from the server in response to the PASV command by default. ![]() ![]() Vulnerability reported by David Schwörer. Moreover, even source code of Python modules can contain sensitive data like passwords.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |