Логотип exploitDog
product: "python"
Консоль
Логотип exploitDog

exploitDog

product: "python"
Python

Pythonвысокоуровневый язык программирования общего назначения. Его философия дизайна делает акцент на читаемости кода.

Релизный цикл, информация об уязвимостях

Продукт: Python
Вендор: python

График релизов

3.103.113.123.133.1420212022202320242025202620272028202920302031

Недавние уязвимости Python

Количество 897

suse-cvrf логотип

SUSE-SU-2024:3924-1

около 1 года назад

Security update for python310

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3879-1

около 1 года назад

Security update for python3

EPSS: Низкий
rocky логотип

RLSA-2024:8374

около 1 года назад

Moderate: python3.11 security update

EPSS: Низкий
rocky логотип

RLSA-2024:8447

около 1 года назад

Moderate: python3.12 security update

EPSS: Низкий
rocky логотип

RLSA-2024:8446

около 1 года назад

Moderate: python3.9 security update

EPSS: Низкий
rocky логотип

RLSA-2024:8359

около 1 года назад

Moderate: python39:3.9 and python39-devel:3.9 security update

EPSS: Низкий
github логотип

GHSA-grqq-hcc7-crmr

около 1 года назад

A vulnerability has been found in the CPython `venv` module and CLI where path names provided when creating a virtual environment were not quoted properly, allowing the creator to inject commands into virtual environment "activation" scripts (ie "source venv/bin/activate"). This means that attacker-controlled virtual environments are able to run commands when the virtual environment is activated. Virtual environments which are not created by an attacker or which aren't activated before being used (ie "./venv/bin/python") are not affected.

CVSS3: 7.8
EPSS: Низкий
nvd логотип

CVE-2024-9287

около 1 года назад

A vulnerability has been found in the CPython `venv` module and CLI where path names provided when creating a virtual environment were not quoted properly, allowing the creator to inject commands into virtual environment "activation" scripts (ie "source venv/bin/activate"). This means that attacker-controlled virtual environments are able to run commands when the virtual environment is activated. Virtual environments which are not created by an attacker or which aren't activated before being used (ie "./venv/bin/python") are not affected.

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2024-9287

около 1 года назад

A vulnerability has been found in the CPython `venv` module and CLI wh ...

CVSS3: 7.8
EPSS: Низкий
ubuntu логотип

CVE-2024-9287

около 1 года назад

A vulnerability has been found in the CPython `venv` module and CLI where path names provided when creating a virtual environment were not quoted properly, allowing the creator to inject commands into virtual environment "activation" scripts (ie "source venv/bin/activate"). This means that attacker-controlled virtual environments are able to run commands when the virtual environment is activated. Virtual environments which are not created by an attacker or which aren't activated before being used (ie "./venv/bin/python") are not affected.

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
suse-cvrf логотип
SUSE-SU-2024:3924-1

Security update for python310

0%
Низкий
около 1 года назад
suse-cvrf логотип
SUSE-SU-2024:3879-1

Security update for python3

0%
Низкий
около 1 года назад
rocky логотип
RLSA-2024:8374

Moderate: python3.11 security update

3%
Низкий
около 1 года назад
rocky логотип
RLSA-2024:8447

Moderate: python3.12 security update

3%
Низкий
около 1 года назад
rocky логотип
RLSA-2024:8446

Moderate: python3.9 security update

3%
Низкий
около 1 года назад
rocky логотип
RLSA-2024:8359

Moderate: python39:3.9 and python39-devel:3.9 security update

3%
Низкий
около 1 года назад
github логотип
GHSA-grqq-hcc7-crmr

A vulnerability has been found in the CPython `venv` module and CLI where path names provided when creating a virtual environment were not quoted properly, allowing the creator to inject commands into virtual environment "activation" scripts (ie "source venv/bin/activate"). This means that attacker-controlled virtual environments are able to run commands when the virtual environment is activated. Virtual environments which are not created by an attacker or which aren't activated before being used (ie "./venv/bin/python") are not affected.

CVSS3: 7.8
0%
Низкий
около 1 года назад
nvd логотип
CVE-2024-9287

A vulnerability has been found in the CPython `venv` module and CLI where path names provided when creating a virtual environment were not quoted properly, allowing the creator to inject commands into virtual environment "activation" scripts (ie "source venv/bin/activate"). This means that attacker-controlled virtual environments are able to run commands when the virtual environment is activated. Virtual environments which are not created by an attacker or which aren't activated before being used (ie "./venv/bin/python") are not affected.

CVSS3: 7.8
0%
Низкий
около 1 года назад
debian логотип
CVE-2024-9287

A vulnerability has been found in the CPython `venv` module and CLI wh ...

CVSS3: 7.8
0%
Низкий
около 1 года назад
ubuntu логотип
CVE-2024-9287

A vulnerability has been found in the CPython `venv` module and CLI where path names provided when creating a virtual environment were not quoted properly, allowing the creator to inject commands into virtual environment "activation" scripts (ie "source venv/bin/activate"). This means that attacker-controlled virtual environments are able to run commands when the virtual environment is activated. Virtual environments which are not created by an attacker or which aren't activated before being used (ie "./venv/bin/python") are not affected.

CVSS3: 7.8
0%
Низкий
около 1 года назад

Уязвимостей на страницу


Поделиться