Логотип exploitDog
product: "python"
Консоль
Логотип exploitDog

exploitDog

product: "python"
Python

Pythonвысокоуровневый язык программирования общего назначения. Его философия дизайна делает акцент на читаемости кода.

Релизный цикл, информация об уязвимостях

Продукт: Python
Вендор: python

График релизов

3.103.113.123.133.1420212022202320242025202620272028202920302031

Недавние уязвимости Python

Количество 915

suse-cvrf логотип

SUSE-SU-2023:0213-1

около 3 лет назад

Security update for python

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:4275-1

около 3 лет назад

Security update for python

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:4258-1

около 3 лет назад

Security update for python3

EPSS: Низкий
rocky логотип

RLSA-2022:8493

около 3 лет назад

Important: python3.9 security update

EPSS: Низкий
rocky логотип

RLSA-2022:8492

около 3 лет назад

Important: python39:3.9 security update

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:3940-1

около 3 лет назад

Security update for python

EPSS: Низкий
github логотип

GHSA-2mp6-9mjc-p6jg

около 3 лет назад

An issue was discovered in Python before 3.11.1. An unnecessary quadratic algorithm exists in one path when processing some inputs to the IDNA (RFC 3490) decoder, such that a crafted, unreasonably long name being presented to the decoder could lead to a CPU denial of service. Hostnames are often supplied by remote servers that could be controlled by a malicious actor; in such a scenario, they could trigger excessive CPU consumption on the client attempting to make use of an attacker-supplied supposed hostname. For example, the attack payload could be placed in the Location header of an HTTP response with status code 302. A fix is planned in 3.11.1, 3.10.9, 3.9.16, 3.8.16, and 3.7.16.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2022-45061

около 3 лет назад

An issue was discovered in Python before 3.11.1. An unnecessary quadratic algorithm exists in one path when processing some inputs to the IDNA (RFC 3490) decoder, such that a crafted, unreasonably long name being presented to the decoder could lead to a CPU denial of service. Hostnames are often supplied by remote servers that could be controlled by a malicious actor; in such a scenario, they could trigger excessive CPU consumption on the client attempting to make use of an attacker-supplied supposed hostname. For example, the attack payload could be placed in the Location header of an HTTP response with status code 302. A fix is planned in 3.11.1, 3.10.9, 3.9.16, 3.8.16, and 3.7.16.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2022-45061

около 3 лет назад

An issue was discovered in Python before 3.11.1. An unnecessary quadra ...

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2022-45061

около 3 лет назад

An issue was discovered in Python before 3.11.1. An unnecessary quadratic algorithm exists in one path when processing some inputs to the IDNA (RFC 3490) decoder, such that a crafted, unreasonably long name being presented to the decoder could lead to a CPU denial of service. Hostnames are often supplied by remote servers that could be controlled by a malicious actor; in such a scenario, they could trigger excessive CPU consumption on the client attempting to make use of an attacker-supplied supposed hostname. For example, the attack payload could be placed in the Location header of an HTTP response with status code 302. A fix is planned in 3.11.1, 3.10.9, 3.9.16, 3.8.16, and 3.7.16.

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
suse-cvrf логотип
SUSE-SU-2023:0213-1

Security update for python

0%
Низкий
около 3 лет назад
suse-cvrf логотип
SUSE-SU-2022:4275-1

Security update for python

0%
Низкий
около 3 лет назад
suse-cvrf логотип
SUSE-SU-2022:4258-1

Security update for python3

0%
Низкий
около 3 лет назад
rocky логотип
RLSA-2022:8493

Important: python3.9 security update

0%
Низкий
около 3 лет назад
rocky логотип
RLSA-2022:8492

Important: python39:3.9 security update

0%
Низкий
около 3 лет назад
suse-cvrf логотип
SUSE-SU-2022:3940-1

Security update for python

1%
Низкий
около 3 лет назад
github логотип
GHSA-2mp6-9mjc-p6jg

An issue was discovered in Python before 3.11.1. An unnecessary quadratic algorithm exists in one path when processing some inputs to the IDNA (RFC 3490) decoder, such that a crafted, unreasonably long name being presented to the decoder could lead to a CPU denial of service. Hostnames are often supplied by remote servers that could be controlled by a malicious actor; in such a scenario, they could trigger excessive CPU consumption on the client attempting to make use of an attacker-supplied supposed hostname. For example, the attack payload could be placed in the Location header of an HTTP response with status code 302. A fix is planned in 3.11.1, 3.10.9, 3.9.16, 3.8.16, and 3.7.16.

CVSS3: 7.5
0%
Низкий
около 3 лет назад
nvd логотип
CVE-2022-45061

An issue was discovered in Python before 3.11.1. An unnecessary quadratic algorithm exists in one path when processing some inputs to the IDNA (RFC 3490) decoder, such that a crafted, unreasonably long name being presented to the decoder could lead to a CPU denial of service. Hostnames are often supplied by remote servers that could be controlled by a malicious actor; in such a scenario, they could trigger excessive CPU consumption on the client attempting to make use of an attacker-supplied supposed hostname. For example, the attack payload could be placed in the Location header of an HTTP response with status code 302. A fix is planned in 3.11.1, 3.10.9, 3.9.16, 3.8.16, and 3.7.16.

CVSS3: 7.5
0%
Низкий
около 3 лет назад
debian логотип
CVE-2022-45061

An issue was discovered in Python before 3.11.1. An unnecessary quadra ...

CVSS3: 7.5
0%
Низкий
около 3 лет назад
ubuntu логотип
CVE-2022-45061

An issue was discovered in Python before 3.11.1. An unnecessary quadratic algorithm exists in one path when processing some inputs to the IDNA (RFC 3490) decoder, such that a crafted, unreasonably long name being presented to the decoder could lead to a CPU denial of service. Hostnames are often supplied by remote servers that could be controlled by a malicious actor; in such a scenario, they could trigger excessive CPU consumption on the client attempting to make use of an attacker-supplied supposed hostname. For example, the attack payload could be placed in the Location header of an HTTP response with status code 302. A fix is planned in 3.11.1, 3.10.9, 3.9.16, 3.8.16, and 3.7.16.

CVSS3: 7.5
0%
Низкий
около 3 лет назад

Уязвимостей на страницу


Поделиться