Логотип exploitDog
product: "python"
Консоль
Логотип exploitDog

exploitDog

product: "python"
Python

Pythonвысокоуровневый язык программирования общего назначения. Его философия дизайна делает акцент на читаемости кода.

Релизный цикл, информация об уязвимостях

Продукт: Python
Вендор: python

График релизов

3.103.113.123.133.1420212022202320242025202620272028202920302031

Недавние уязвимости Python

Количество 915

github логотип

GHSA-qhx6-hpfj-8m4g

2 месяца назад

When loading a plist file, the plistlib module reads data in size specified by the file itself, meaning a malicious file can cause OOM and DoS issues

CVSS3: 5.5
EPSS: Низкий
github логотип

GHSA-399h-rrqc-rpgv

2 месяца назад

When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amounts of data into memory, potentially causing OOM or other DoS.

CVSS3: 9.1
EPSS: Низкий
nvd логотип

CVE-2025-13837

2 месяца назад

When loading a plist file, the plistlib module reads data in size specified by the file itself, meaning a malicious file can cause OOM and DoS issues

CVSS3: 5.5
EPSS: Низкий
debian логотип

CVE-2025-13837

2 месяца назад

When loading a plist file, the plistlib module reads data in size spec ...

CVSS3: 5.5
EPSS: Низкий
nvd логотип

CVE-2025-13836

2 месяца назад

When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amounts of data into memory, potentially causing OOM or other DoS.

CVSS3: 9.1
EPSS: Низкий
debian логотип

CVE-2025-13836

2 месяца назад

When reading an HTTP response from a server, if no read amount is spec ...

CVSS3: 9.1
EPSS: Низкий
ubuntu логотип

CVE-2025-13836

2 месяца назад

When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amounts of data into memory, potentially causing OOM or other DoS.

CVSS3: 9.1
EPSS: Низкий
ubuntu логотип

CVE-2025-13837

2 месяца назад

When loading a plist file, the plistlib module reads data in size specified by the file itself, meaning a malicious file can cause OOM and DoS issues

CVSS3: 5.5
EPSS: Низкий
github логотип

GHSA-vc2m-m665-8xm2

3 месяца назад

If the value passed to os.path.expandvars() is user-controlled a performance degradation is possible when expanding environment variables.

EPSS: Низкий
debian логотип

CVE-2025-6075

3 месяца назад

If the value passed to os.path.expandvars() is user-controlled a perf ...

CVSS3: 5.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
github логотип
GHSA-qhx6-hpfj-8m4g

When loading a plist file, the plistlib module reads data in size specified by the file itself, meaning a malicious file can cause OOM and DoS issues

CVSS3: 5.5
0%
Низкий
2 месяца назад
github логотип
GHSA-399h-rrqc-rpgv

When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amounts of data into memory, potentially causing OOM or other DoS.

CVSS3: 9.1
0%
Низкий
2 месяца назад
nvd логотип
CVE-2025-13837

When loading a plist file, the plistlib module reads data in size specified by the file itself, meaning a malicious file can cause OOM and DoS issues

CVSS3: 5.5
0%
Низкий
2 месяца назад
debian логотип
CVE-2025-13837

When loading a plist file, the plistlib module reads data in size spec ...

CVSS3: 5.5
0%
Низкий
2 месяца назад
nvd логотип
CVE-2025-13836

When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amounts of data into memory, potentially causing OOM or other DoS.

CVSS3: 9.1
0%
Низкий
2 месяца назад
debian логотип
CVE-2025-13836

When reading an HTTP response from a server, if no read amount is spec ...

CVSS3: 9.1
0%
Низкий
2 месяца назад
ubuntu логотип
CVE-2025-13836

When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amounts of data into memory, potentially causing OOM or other DoS.

CVSS3: 9.1
0%
Низкий
2 месяца назад
ubuntu логотип
CVE-2025-13837

When loading a plist file, the plistlib module reads data in size specified by the file itself, meaning a malicious file can cause OOM and DoS issues

CVSS3: 5.5
0%
Низкий
2 месяца назад
github логотип
GHSA-vc2m-m665-8xm2

If the value passed to os.path.expandvars() is user-controlled a performance degradation is possible when expanding environment variables.

0%
Низкий
3 месяца назад
debian логотип
CVE-2025-6075

If the value passed to os.path.expandvars() is user-controlled a perf ...

CVSS3: 5.5
0%
Низкий
3 месяца назад

Уязвимостей на страницу


Поделиться