Логотип exploitDog
product: "python"
Консоль
Логотип exploitDog

exploitDog

product: "python"
Python

Pythonвысокоуровневый язык программирования общего назначения. Его философия дизайна делает акцент на читаемости кода.

Релизный цикл, информация об уязвимостях

Продукт: Python
Вендор: python

График релизов

3.103.113.123.133.1420212022202320242025202620272028202920302031

Недавние уязвимости Python

Количество 915

fstec логотип

BDU:2022-02303

почти 4 года назад

Уязвимость клиентской библиотеки FTP (File Transfer Protocol) интерпретатора языка программирования Python, позволяющая нарушителю выполнять SSRF-атаки

CVSS3: 6.1
EPSS: Низкий
fstec логотип

BDU:2022-02302

почти 4 года назад

Уязвимость модуля urllib.parse интерпретатора языка программирования Python, позволяющая нарушителю внедрить произвольные данные в ответ сервера

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-4qjw-vx62-3vqx

почти 4 года назад

Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')

CVSS3: 5.9
EPSS: Низкий
redhat логотип

CVE-2021-4189

около 4 лет назад

A flaw was found in Python, specifically in the FTP (File Transfer Protocol) client library in PASV (passive) mode. The issue is how the FTP client trusts the host from the PASV response by default. This flaw allows an attacker to set up a malicious FTP server that can trick FTP clients into connecting back to a given IP address and port. This vulnerability could lead to FTP client scanning ports, which otherwise would not have been possible.

CVSS3: 5.3
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:2940-1

больше 4 лет назад

Security update for python39

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:2940-1

больше 4 лет назад

Security update for python39

EPSS: Низкий
redhat логотип

CVE-2021-3733

больше 4 лет назад

There's a flaw in urllib's AbstractBasicAuthHandler class. An attacker who controls a malicious HTTP server that an HTTP client (such as web browser) connects to, could trigger a Regular Expression Denial of Service (ReDOS) during an authentication request with a specially crafted payload that is sent by the server to the client. The greatest threat that this flaw poses is to application availability.

CVSS3: 6.5
EPSS: Низкий
redhat логотип

CVE-2021-3737

больше 4 лет назад

A flaw was found in python. An improperly handled HTTP response in the HTTP client code of python may allow a remote attacker, who controls the HTTP server, to make the client script enter an infinite loop, consuming CPU time. The highest threat from this vulnerability is to system availability.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-qm57-vhq3-3fwf

больше 4 лет назад

Header injection possible in Django

CVSS3: 6.1
EPSS: Низкий
nvd логотип

CVE-2021-3426

больше 4 лет назад

There's a flaw in Python 3's pydoc. A local or adjacent attacker who discovers or is able to convince another local or adjacent user to start a pydoc server could access the server and use it to disclose sensitive information belonging to the other user that they would not normally be able to access. The highest risk of this flaw is to data confidentiality. This flaw affects Python versions before 3.8.9, Python versions before 3.9.3 and Python versions before 3.10.0a7.

CVSS3: 5.7
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
fstec логотип
BDU:2022-02303

Уязвимость клиентской библиотеки FTP (File Transfer Protocol) интерпретатора языка программирования Python, позволяющая нарушителю выполнять SSRF-атаки

CVSS3: 6.1
1%
Низкий
почти 4 года назад
fstec логотип
BDU:2022-02302

Уязвимость модуля urllib.parse интерпретатора языка программирования Python, позволяющая нарушителю внедрить произвольные данные в ответ сервера

CVSS3: 7.5
2%
Низкий
почти 4 года назад
github логотип
GHSA-4qjw-vx62-3vqx

Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')

CVSS3: 5.9
0%
Низкий
почти 4 года назад
redhat логотип
CVE-2021-4189

A flaw was found in Python, specifically in the FTP (File Transfer Protocol) client library in PASV (passive) mode. The issue is how the FTP client trusts the host from the PASV response by default. This flaw allows an attacker to set up a malicious FTP server that can trick FTP clients into connecting back to a given IP address and port. This vulnerability could lead to FTP client scanning ports, which otherwise would not have been possible.

CVSS3: 5.3
1%
Низкий
около 4 лет назад
suse-cvrf логотип
openSUSE-SU-2021:2940-1

Security update for python39

2%
Низкий
больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:2940-1

Security update for python39

2%
Низкий
больше 4 лет назад
redhat логотип
CVE-2021-3733

There's a flaw in urllib's AbstractBasicAuthHandler class. An attacker who controls a malicious HTTP server that an HTTP client (such as web browser) connects to, could trigger a Regular Expression Denial of Service (ReDOS) during an authentication request with a specially crafted payload that is sent by the server to the client. The greatest threat that this flaw poses is to application availability.

CVSS3: 6.5
1%
Низкий
больше 4 лет назад
redhat логотип
CVE-2021-3737

A flaw was found in python. An improperly handled HTTP response in the HTTP client code of python may allow a remote attacker, who controls the HTTP server, to make the client script enter an infinite loop, consuming CPU time. The highest threat from this vulnerability is to system availability.

CVSS3: 6.5
0%
Низкий
больше 4 лет назад
github логотип
GHSA-qm57-vhq3-3fwf

Header injection possible in Django

CVSS3: 6.1
2%
Низкий
больше 4 лет назад
nvd логотип
CVE-2021-3426

There's a flaw in Python 3's pydoc. A local or adjacent attacker who discovers or is able to convince another local or adjacent user to start a pydoc server could access the server and use it to disclose sensitive information belonging to the other user that they would not normally be able to access. The highest risk of this flaw is to data confidentiality. This flaw affects Python versions before 3.8.9, Python versions before 3.9.3 and Python versions before 3.10.0a7.

CVSS3: 5.7
0%
Низкий
больше 4 лет назад

Уязвимостей на страницу


Поделиться