Python — высокоуровневый язык программирования общего назначения. Его философия дизайна делает акцент на читаемости кода.
Релизный цикл, информация об уязвимостях
График релизов
Количество 915
CVE-2019-10160
A security regression of CVE-2019-9636 was discovered in python since commit d537ab0ff9767ef024f26246899728f0116b1ec3 affecting versions 2.7, 3.5, 3.6, 3.7 and from v3.8.0a4 through v3.8.0b1, which still allows an attacker to exploit CVE-2019-9636 by abusing the user and password parts of a URL. When an application parses user-supplied URLs to store cookies, authentication credentials, or other kind of information, it is possible for an attacker to provide specially crafted URLs to make the application locate host-related information (e.g. cookies, authentication data) and send them to a different host than where it should, unlike if the URLs had been correctly parsed. The result of an attack may vary based on the application.
SUSE-SU-2019:1352-1
Security update for python3
openSUSE-SU-2019:1435-1
Security update for bzip2
openSUSE-SU-2019:1398-1
Security update for bzip2
SUSE-SU-2019:1206-1
Security update for bzip2
openSUSE-SU-2019:1371-1
Security update for python3
openSUSE-SU-2019:1282-1
Security update for python3
SUSE-SU-2019:0971-1
Security update for python3
SUSE-SU-2019:0961-1
Security update for python3
BDU:2020-03946
Уязвимость модуля для работы с ZIP-файлами zipfile пакета программ Python, позволяющая нарушителю вызвать отказ в обслуживании
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано 1 | |
|---|---|---|---|---|
CVE-2019-10160 A security regression of CVE-2019-9636 was discovered in python since commit d537ab0ff9767ef024f26246899728f0116b1ec3 affecting versions 2.7, 3.5, 3.6, 3.7 and from v3.8.0a4 through v3.8.0b1, which still allows an attacker to exploit CVE-2019-9636 by abusing the user and password parts of a URL. When an application parses user-supplied URLs to store cookies, authentication credentials, or other kind of information, it is possible for an attacker to provide specially crafted URLs to make the application locate host-related information (e.g. cookies, authentication data) and send them to a different host than where it should, unlike if the URLs had been correctly parsed. The result of an attack may vary based on the application. | CVSS3: 9.8 | 2% Низкий | больше 6 лет назад | |
SUSE-SU-2019:1352-1 Security update for python3 | 1% Низкий | больше 6 лет назад | ||
openSUSE-SU-2019:1435-1 Security update for bzip2 | 24% Средний | больше 6 лет назад | ||
openSUSE-SU-2019:1398-1 Security update for bzip2 | 24% Средний | больше 6 лет назад | ||
SUSE-SU-2019:1206-1 Security update for bzip2 | 24% Средний | больше 6 лет назад | ||
openSUSE-SU-2019:1371-1 Security update for python3 | 9% Низкий | больше 6 лет назад | ||
openSUSE-SU-2019:1282-1 Security update for python3 | 9% Низкий | почти 7 лет назад | ||
SUSE-SU-2019:0971-1 Security update for python3 | 9% Низкий | почти 7 лет назад | ||
SUSE-SU-2019:0961-1 Security update for python3 | 9% Низкий | почти 7 лет назад | ||
BDU:2020-03946 Уязвимость модуля для работы с ZIP-файлами zipfile пакета программ Python, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 7.5 | 1% Низкий | почти 7 лет назад |
Уязвимостей на страницу