Логотип exploitDog
product: "python"
Консоль
Логотип exploitDog

exploitDog

product: "python"
Python

Pythonвысокоуровневый язык программирования общего назначения. Его философия дизайна делает акцент на читаемости кода.

Релизный цикл, информация об уязвимостях

Продукт: Python
Вендор: python

График релизов

3.103.113.123.133.1420212022202320242025202620272028202920302031

Недавние уязвимости Python

Количество 924

nvd логотип

CVE-2025-13836

4 месяца назад

When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amounts of data into memory, potentially causing OOM or other DoS.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2025-13836

4 месяца назад

When reading an HTTP response from a server, if no read amount is spec ...

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2025-13836

4 месяца назад

When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amounts of data into memory, potentially causing OOM or other DoS.

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2025-13837

4 месяца назад

When loading a plist file, the plistlib module reads data in size specified by the file itself, meaning a malicious file can cause OOM and DoS issues

CVSS3: 5.5
EPSS: Низкий
redhat логотип

CVE-2025-13837

4 месяца назад

When loading a plist file, the plistlib module reads data in size specified by the file itself, meaning a malicious file can cause OOM and DoS issues

CVSS3: 5.9
EPSS: Низкий
redhat логотип

CVE-2025-13836

4 месяца назад

When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amounts of data into memory, potentially causing OOM or other DoS.

CVSS3: 6.8
EPSS: Низкий
github логотип

GHSA-vc2m-m665-8xm2

5 месяцев назад

If the value passed to os.path.expandvars() is user-controlled a performance degradation is possible when expanding environment variables.

EPSS: Низкий
debian логотип

CVE-2025-6075

5 месяцев назад

If the value passed to os.path.expandvars() is user-controlled a perf ...

CVSS3: 5.5
EPSS: Низкий
nvd логотип

CVE-2025-6075

5 месяцев назад

If the value passed to os.path.expandvars() is user-controlled a performance degradation is possible when expanding environment variables.

CVSS3: 5.5
EPSS: Низкий
ubuntu логотип

CVE-2025-6075

5 месяцев назад

If the value passed to os.path.expandvars() is user-controlled a performance degradation is possible when expanding environment variables.

CVSS3: 5.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
nvd логотип
CVE-2025-13836

When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amounts of data into memory, potentially causing OOM or other DoS.

CVSS3: 7.5
0%
Низкий
4 месяца назад
debian логотип
CVE-2025-13836

When reading an HTTP response from a server, if no read amount is spec ...

CVSS3: 7.5
0%
Низкий
4 месяца назад
ubuntu логотип
CVE-2025-13836

When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amounts of data into memory, potentially causing OOM or other DoS.

CVSS3: 7.5
0%
Низкий
4 месяца назад
ubuntu логотип
CVE-2025-13837

When loading a plist file, the plistlib module reads data in size specified by the file itself, meaning a malicious file can cause OOM and DoS issues

CVSS3: 5.5
0%
Низкий
4 месяца назад
redhat логотип
CVE-2025-13837

When loading a plist file, the plistlib module reads data in size specified by the file itself, meaning a malicious file can cause OOM and DoS issues

CVSS3: 5.9
0%
Низкий
4 месяца назад
redhat логотип
CVE-2025-13836

When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amounts of data into memory, potentially causing OOM or other DoS.

CVSS3: 6.8
0%
Низкий
4 месяца назад
github логотип
GHSA-vc2m-m665-8xm2

If the value passed to os.path.expandvars() is user-controlled a performance degradation is possible when expanding environment variables.

0%
Низкий
5 месяцев назад
debian логотип
CVE-2025-6075

If the value passed to os.path.expandvars() is user-controlled a perf ...

CVSS3: 5.5
0%
Низкий
5 месяцев назад
nvd логотип
CVE-2025-6075

If the value passed to os.path.expandvars() is user-controlled a performance degradation is possible when expanding environment variables.

CVSS3: 5.5
0%
Низкий
5 месяцев назад
ubuntu логотип
CVE-2025-6075

If the value passed to os.path.expandvars() is user-controlled a performance degradation is possible when expanding environment variables.

CVSS3: 5.5
0%
Низкий
5 месяцев назад

Уязвимостей на страницу


Поделиться