Логотип exploitDog
product: "python"
Консоль
Логотип exploitDog

exploitDog

product: "python"
Python

Pythonвысокоуровневый язык программирования общего назначения. Его философия дизайна делает акцент на читаемости кода.

Релизный цикл, информация об уязвимостях

Продукт: Python
Вендор: python

График релизов

3.103.113.123.133.1420212022202320242025202620272028202920302031

Недавние уязвимости Python

Количество 886

suse-cvrf логотип

SUSE-SU-2024:0329-1

больше 1 года назад

Security update for python

EPSS: Низкий
rocky логотип

RLSA-2024:0256

почти 2 года назад

Moderate: python3 security update

EPSS: Низкий
github логотип

GHSA-vrgr-679p-vf6w

почти 2 года назад

Visual Studio Code Python Extension Remote Code Execution Vulnerability

CVSS3: 7.8
EPSS: Низкий
nvd логотип

CVE-2020-17163

почти 2 года назад

Visual Studio Code Python Extension Remote Code Execution Vulnerability

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-4wxh-fpjf-c8wf

почти 2 года назад

An issue was found in CPython 3.12.0 `subprocess` module on POSIX platforms. The issue was fixed in CPython 3.12.1 and does not affect other stable releases. When using the `extra_groups=` parameter with an empty list as a value (ie `extra_groups=[]`) the logic regressed to not call `setgroups(0, NULL)` before calling `exec()`, thus not dropping the original processes' groups before starting the new process. There is no issue when the parameter isn't used or when any value is used besides an empty list. This issue only impacts CPython processes run with sufficient privilege to make the `setgroups` system call (typically `root`).

CVSS3: 6.1
EPSS: Низкий
nvd логотип

CVE-2023-6507

почти 2 года назад

An issue was found in CPython 3.12.0 `subprocess` module on POSIX platforms. The issue was fixed in CPython 3.12.1 and does not affect other stable releases. When using the `extra_groups=` parameter with an empty list as a value (ie `extra_groups=[]`) the logic regressed to not call `setgroups(0, NULL)` before calling `exec()`, thus not dropping the original processes' groups before starting the new process. There is no issue when the parameter isn't used or when any value is used besides an empty list. This issue only impacts CPython processes run with sufficient privilege to make the `setgroups` system call (typically `root`).

CVSS3: 6.1
EPSS: Низкий
debian логотип

CVE-2023-6507

почти 2 года назад

An issue was found in CPython 3.12.0 `subprocess` module on POSIX plat ...

CVSS3: 6.1
EPSS: Низкий
ubuntu логотип

CVE-2023-6507

почти 2 года назад

An issue was found in CPython 3.12.0 `subprocess` module on POSIX platforms. The issue was fixed in CPython 3.12.1 and does not affect other stable releases. When using the `extra_groups=` parameter with an empty list as a value (ie `extra_groups=[]`) the logic regressed to not call `setgroups(0, NULL)` before calling `exec()`, thus not dropping the original processes' groups before starting the new process. There is no issue when the parameter isn't used or when any value is used besides an empty list. This issue only impacts CPython processes run with sufficient privilege to make the `setgroups` system call (typically `root`).

CVSS3: 6.1
EPSS: Низкий
redhat логотип

CVE-2023-6507

почти 2 года назад

An issue was found in CPython 3.12.0 `subprocess` module on POSIX platforms. The issue was fixed in CPython 3.12.1 and does not affect other stable releases. When using the `extra_groups=` parameter with an empty list as a value (ie `extra_groups=[]`) the logic regressed to not call `setgroups(0, NULL)` before calling `exec()`, thus not dropping the original processes' groups before starting the new process. There is no issue when the parameter isn't used or when any value is used besides an empty list. This issue only impacts CPython processes run with sufficient privilege to make the `setgroups` system call (typically `root`).

CVSS3: 6.1
EPSS: Низкий
fstec логотип

BDU:2024-02120

почти 2 года назад

Уязвимость интерпретатора языка программирования Python, связанная с ошибками при обработке символических ссылок, позволяющая нарушителю повысить свои привилегии

CVSS3: 8.4
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
suse-cvrf логотип
SUSE-SU-2024:0329-1

Security update for python

0%
Низкий
больше 1 года назад
rocky логотип
RLSA-2024:0256

Moderate: python3 security update

0%
Низкий
почти 2 года назад
github логотип
GHSA-vrgr-679p-vf6w

Visual Studio Code Python Extension Remote Code Execution Vulnerability

CVSS3: 7.8
1%
Низкий
почти 2 года назад
nvd логотип
CVE-2020-17163

Visual Studio Code Python Extension Remote Code Execution Vulnerability

CVSS3: 7.8
1%
Низкий
почти 2 года назад
github логотип
GHSA-4wxh-fpjf-c8wf

An issue was found in CPython 3.12.0 `subprocess` module on POSIX platforms. The issue was fixed in CPython 3.12.1 and does not affect other stable releases. When using the `extra_groups=` parameter with an empty list as a value (ie `extra_groups=[]`) the logic regressed to not call `setgroups(0, NULL)` before calling `exec()`, thus not dropping the original processes' groups before starting the new process. There is no issue when the parameter isn't used or when any value is used besides an empty list. This issue only impacts CPython processes run with sufficient privilege to make the `setgroups` system call (typically `root`).

CVSS3: 6.1
0%
Низкий
почти 2 года назад
nvd логотип
CVE-2023-6507

An issue was found in CPython 3.12.0 `subprocess` module on POSIX platforms. The issue was fixed in CPython 3.12.1 and does not affect other stable releases. When using the `extra_groups=` parameter with an empty list as a value (ie `extra_groups=[]`) the logic regressed to not call `setgroups(0, NULL)` before calling `exec()`, thus not dropping the original processes' groups before starting the new process. There is no issue when the parameter isn't used or when any value is used besides an empty list. This issue only impacts CPython processes run with sufficient privilege to make the `setgroups` system call (typically `root`).

CVSS3: 6.1
0%
Низкий
почти 2 года назад
debian логотип
CVE-2023-6507

An issue was found in CPython 3.12.0 `subprocess` module on POSIX plat ...

CVSS3: 6.1
0%
Низкий
почти 2 года назад
ubuntu логотип
CVE-2023-6507

An issue was found in CPython 3.12.0 `subprocess` module on POSIX platforms. The issue was fixed in CPython 3.12.1 and does not affect other stable releases. When using the `extra_groups=` parameter with an empty list as a value (ie `extra_groups=[]`) the logic regressed to not call `setgroups(0, NULL)` before calling `exec()`, thus not dropping the original processes' groups before starting the new process. There is no issue when the parameter isn't used or when any value is used besides an empty list. This issue only impacts CPython processes run with sufficient privilege to make the `setgroups` system call (typically `root`).

CVSS3: 6.1
0%
Низкий
почти 2 года назад
redhat логотип
CVE-2023-6507

An issue was found in CPython 3.12.0 `subprocess` module on POSIX platforms. The issue was fixed in CPython 3.12.1 and does not affect other stable releases. When using the `extra_groups=` parameter with an empty list as a value (ie `extra_groups=[]`) the logic regressed to not call `setgroups(0, NULL)` before calling `exec()`, thus not dropping the original processes' groups before starting the new process. There is no issue when the parameter isn't used or when any value is used besides an empty list. This issue only impacts CPython processes run with sufficient privilege to make the `setgroups` system call (typically `root`).

CVSS3: 6.1
0%
Низкий
почти 2 года назад
fstec логотип
BDU:2024-02120

Уязвимость интерпретатора языка программирования Python, связанная с ошибками при обработке символических ссылок, позволяющая нарушителю повысить свои привилегии

CVSS3: 8.4
0%
Низкий
почти 2 года назад

Уязвимостей на страницу


Поделиться