Python — высокоуровневый язык программирования общего назначения. Его философия дизайна делает акцент на читаемости кода.
Релизный цикл, информация об уязвимостях
График релизов
Количество 915
GHSA-qhx6-hpfj-8m4g
When loading a plist file, the plistlib module reads data in size specified by the file itself, meaning a malicious file can cause OOM and DoS issues
GHSA-399h-rrqc-rpgv
When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amounts of data into memory, potentially causing OOM or other DoS.
CVE-2025-13837
When loading a plist file, the plistlib module reads data in size specified by the file itself, meaning a malicious file can cause OOM and DoS issues
CVE-2025-13837
When loading a plist file, the plistlib module reads data in size spec ...
CVE-2025-13836
When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amounts of data into memory, potentially causing OOM or other DoS.
CVE-2025-13836
When reading an HTTP response from a server, if no read amount is spec ...
CVE-2025-13836
When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amounts of data into memory, potentially causing OOM or other DoS.
CVE-2025-13837
When loading a plist file, the plistlib module reads data in size specified by the file itself, meaning a malicious file can cause OOM and DoS issues
GHSA-vc2m-m665-8xm2
If the value passed to os.path.expandvars() is user-controlled a performance degradation is possible when expanding environment variables.
CVE-2025-6075
If the value passed to os.path.expandvars() is user-controlled a perf ...
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано 1 | |
|---|---|---|---|---|
GHSA-qhx6-hpfj-8m4g When loading a plist file, the plistlib module reads data in size specified by the file itself, meaning a malicious file can cause OOM and DoS issues | CVSS3: 5.5 | 0% Низкий | 2 месяца назад | |
GHSA-399h-rrqc-rpgv When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amounts of data into memory, potentially causing OOM or other DoS. | CVSS3: 9.1 | 0% Низкий | 2 месяца назад | |
CVE-2025-13837 When loading a plist file, the plistlib module reads data in size specified by the file itself, meaning a malicious file can cause OOM and DoS issues | CVSS3: 5.5 | 0% Низкий | 2 месяца назад | |
CVE-2025-13837 When loading a plist file, the plistlib module reads data in size spec ... | CVSS3: 5.5 | 0% Низкий | 2 месяца назад | |
CVE-2025-13836 When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amounts of data into memory, potentially causing OOM or other DoS. | CVSS3: 9.1 | 0% Низкий | 2 месяца назад | |
CVE-2025-13836 When reading an HTTP response from a server, if no read amount is spec ... | CVSS3: 9.1 | 0% Низкий | 2 месяца назад | |
CVE-2025-13836 When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amounts of data into memory, potentially causing OOM or other DoS. | CVSS3: 9.1 | 0% Низкий | 2 месяца назад | |
CVE-2025-13837 When loading a plist file, the plistlib module reads data in size specified by the file itself, meaning a malicious file can cause OOM and DoS issues | CVSS3: 5.5 | 0% Низкий | 2 месяца назад | |
GHSA-vc2m-m665-8xm2 If the value passed to os.path.expandvars() is user-controlled a performance degradation is possible when expanding environment variables. | 0% Низкий | 3 месяца назад | ||
CVE-2025-6075 If the value passed to os.path.expandvars() is user-controlled a perf ... | CVSS3: 5.5 | 0% Низкий | 3 месяца назад |
Уязвимостей на страницу