Логотип exploitDog
product: "python"
Консоль
Логотип exploitDog

exploitDog

product: "python"
Python

Pythonвысокоуровневый язык программирования общего назначения. Его философия дизайна делает акцент на читаемости кода.

Релизный цикл, информация об уязвимостях

Продукт: Python
Вендор: python

График релизов

3.93.103.113.123.1320202021202220232024202520262027202820292030

Недавние уязвимости Python

Количество 879

debian логотип

CVE-2023-33595

около 2 лет назад

CPython v3.12.0 alpha 7 was discovered to contain a heap use-after-fre ...

CVSS3: 5.5
EPSS: Низкий
ubuntu логотип

CVE-2023-33595

около 2 лет назад

CPython v3.12.0 alpha 7 was discovered to contain a heap use-after-free via the function ascii_decode at /Objects/unicodeobject.c.

CVSS3: 5.5
EPSS: Низкий
fstec логотип

BDU:2023-03652

около 2 лет назад

Уязвимость библиотеки OpenSSL, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
EPSS: Критический
github логотип

GHSA-6w4m-2xhg-2658

около 2 лет назад

Buffer overflow in sponge queue functions

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-5mwm-wccq-xqcp

больше 2 лет назад

The e-mail module of Python 0 - 2.7.18, 3.x - 3.11 incorrectly parses e-mail addresses which contain a special character. This vulnerability allows attackers to send messages from e-ail addresses that would otherwise be rejected.

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2023-27043

больше 2 лет назад

The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 header is identified as the value of the addr-spec. In some applications, an attacker can bypass a protection mechanism in which application access is granted only after verifying receipt of e-mail to a specific domain (e.g., only @company.example.com addresses may be used for signup). This occurs in email/_parseaddr.py in recent versions of Python.

CVSS3: 5.3
EPSS: Низкий
debian логотип

CVE-2023-27043

больше 2 лет назад

The email module of Python through 3.11.3 incorrectly parses e-mail ad ...

CVSS3: 5.3
EPSS: Низкий
ubuntu логотип

CVE-2023-27043

больше 2 лет назад

The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 header is identified as the value of the addr-spec. In some applications, an attacker can bypass a protection mechanism in which application access is granted only after verifying receipt of e-mail to a specific domain (e.g., only @company.example.com addresses may be used for signup). This occurs in email/_parseaddr.py in recent versions of Python.

CVSS3: 5.3
EPSS: Низкий
redhat логотип

CVE-2023-27043

больше 2 лет назад

The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 header is identified as the value of the addr-spec. In some applications, an attacker can bypass a protection mechanism in which application access is granted only after verifying receipt of e-mail to a specific domain (e.g., only @company.example.com addresses may be used for signup). This occurs in email/_parseaddr.py in recent versions of Python.

CVSS3: 5.3
EPSS: Низкий
fstec логотип

BDU:2023-04980

больше 2 лет назад

Уязвимость модуля электронной почты интерпретатора языка программирования Python, позволяющая нарушителю обойти механизм защиты

CVSS3: 5.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
debian логотип
CVE-2023-33595

CPython v3.12.0 alpha 7 was discovered to contain a heap use-after-fre ...

CVSS3: 5.5
0%
Низкий
около 2 лет назад
ubuntu логотип
CVE-2023-33595

CPython v3.12.0 alpha 7 was discovered to contain a heap use-after-free via the function ascii_decode at /Objects/unicodeobject.c.

CVSS3: 5.5
0%
Низкий
около 2 лет назад
fstec логотип
BDU:2023-03652

Уязвимость библиотеки OpenSSL, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
92%
Критический
около 2 лет назад
github логотип
GHSA-6w4m-2xhg-2658

Buffer overflow in sponge queue functions

CVSS3: 9.8
1%
Низкий
около 2 лет назад
github логотип
GHSA-5mwm-wccq-xqcp

The e-mail module of Python 0 - 2.7.18, 3.x - 3.11 incorrectly parses e-mail addresses which contain a special character. This vulnerability allows attackers to send messages from e-ail addresses that would otherwise be rejected.

CVSS3: 5.3
0%
Низкий
больше 2 лет назад
nvd логотип
CVE-2023-27043

The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 header is identified as the value of the addr-spec. In some applications, an attacker can bypass a protection mechanism in which application access is granted only after verifying receipt of e-mail to a specific domain (e.g., only @company.example.com addresses may be used for signup). This occurs in email/_parseaddr.py in recent versions of Python.

CVSS3: 5.3
0%
Низкий
больше 2 лет назад
debian логотип
CVE-2023-27043

The email module of Python through 3.11.3 incorrectly parses e-mail ad ...

CVSS3: 5.3
0%
Низкий
больше 2 лет назад
ubuntu логотип
CVE-2023-27043

The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 header is identified as the value of the addr-spec. In some applications, an attacker can bypass a protection mechanism in which application access is granted only after verifying receipt of e-mail to a specific domain (e.g., only @company.example.com addresses may be used for signup). This occurs in email/_parseaddr.py in recent versions of Python.

CVSS3: 5.3
0%
Низкий
больше 2 лет назад
redhat логотип
CVE-2023-27043

The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 header is identified as the value of the addr-spec. In some applications, an attacker can bypass a protection mechanism in which application access is granted only after verifying receipt of e-mail to a specific domain (e.g., only @company.example.com addresses may be used for signup). This occurs in email/_parseaddr.py in recent versions of Python.

CVSS3: 5.3
0%
Низкий
больше 2 лет назад
fstec логотип
BDU:2023-04980

Уязвимость модуля электронной почты интерпретатора языка программирования Python, позволяющая нарушителю обойти механизм защиты

CVSS3: 5.3
0%
Низкий
больше 2 лет назад

Уязвимостей на страницу


Поделиться