Python — высокоуровневый язык программирования общего назначения. Его философия дизайна делает акцент на читаемости кода.
Релизный цикл, информация об уязвимостях
График релизов
Количество 879

SUSE-SU-2017:0719-1
Security update for java-1_7_1-ibm

SUSE-SU-2017:0716-1
Security update for java-1_7_0-ibm

CVE-2016-9063
An integer overflow during the parsing of XML using the Expat library. This vulnerability affects Firefox < 50.

CVE-2016-5699
CRLF injection vulnerability in the HTTPConnection.putheader function in urllib2 and urllib in CPython (aka Python) before 2.7.10 and 3.x before 3.4.4 allows remote attackers to inject arbitrary HTTP headers via CRLF sequences in a URL.
CVE-2016-5699
CRLF injection vulnerability in the HTTPConnection.putheader function ...

CVE-2016-5636
Integer overflow in the get_data function in zipimport.c in CPython (aka Python) before 2.7.12, 3.x before 3.4.5, and 3.5.x before 3.5.2 allows remote attackers to have unspecified impact via a negative data size value, which triggers a heap-based buffer overflow.
CVE-2016-5636
Integer overflow in the get_data function in zipimport.c in CPython (a ...

CVE-2016-0772
The smtplib library in CPython (aka Python) before 2.7.12, 3.x before 3.4.5, and 3.5.x before 3.5.2 does not return an error when StartTLS fails, which might allow man-in-the-middle attackers to bypass the TLS protections by leveraging a network position between the client and the registry to block the StartTLS command, aka a "StartTLS stripping attack."
CVE-2016-0772
The smtplib library in CPython (aka Python) before 2.7.12, 3.x before ...

CVE-2016-0772
The smtplib library in CPython (aka Python) before 2.7.12, 3.x before 3.4.5, and 3.5.x before 3.5.2 does not return an error when StartTLS fails, which might allow man-in-the-middle attackers to bypass the TLS protections by leveraging a network position between the client and the registry to block the StartTLS command, aka a "StartTLS stripping attack."
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано 1 | |
---|---|---|---|---|
![]() | SUSE-SU-2017:0719-1 Security update for java-1_7_1-ibm | 31% Средний | больше 8 лет назад | |
![]() | SUSE-SU-2017:0716-1 Security update for java-1_7_0-ibm | 31% Средний | больше 8 лет назад | |
![]() | CVE-2016-9063 An integer overflow during the parsing of XML using the Expat library. This vulnerability affects Firefox < 50. | CVSS3: 9.8 | 2% Низкий | почти 9 лет назад |
![]() | CVE-2016-5699 CRLF injection vulnerability in the HTTPConnection.putheader function in urllib2 and urllib in CPython (aka Python) before 2.7.10 and 3.x before 3.4.4 allows remote attackers to inject arbitrary HTTP headers via CRLF sequences in a URL. | CVSS3: 6.1 | 11% Средний | почти 9 лет назад |
CVE-2016-5699 CRLF injection vulnerability in the HTTPConnection.putheader function ... | CVSS3: 6.1 | 11% Средний | почти 9 лет назад | |
![]() | CVE-2016-5636 Integer overflow in the get_data function in zipimport.c in CPython (aka Python) before 2.7.12, 3.x before 3.4.5, and 3.5.x before 3.5.2 allows remote attackers to have unspecified impact via a negative data size value, which triggers a heap-based buffer overflow. | CVSS3: 9.8 | 66% Средний | почти 9 лет назад |
CVE-2016-5636 Integer overflow in the get_data function in zipimport.c in CPython (a ... | CVSS3: 9.8 | 66% Средний | почти 9 лет назад | |
![]() | CVE-2016-0772 The smtplib library in CPython (aka Python) before 2.7.12, 3.x before 3.4.5, and 3.5.x before 3.5.2 does not return an error when StartTLS fails, which might allow man-in-the-middle attackers to bypass the TLS protections by leveraging a network position between the client and the registry to block the StartTLS command, aka a "StartTLS stripping attack." | CVSS3: 6.5 | 7% Низкий | почти 9 лет назад |
CVE-2016-0772 The smtplib library in CPython (aka Python) before 2.7.12, 3.x before ... | CVSS3: 6.5 | 7% Низкий | почти 9 лет назад | |
![]() | CVE-2016-0772 The smtplib library in CPython (aka Python) before 2.7.12, 3.x before 3.4.5, and 3.5.x before 3.5.2 does not return an error when StartTLS fails, which might allow man-in-the-middle attackers to bypass the TLS protections by leveraging a network position between the client and the registry to block the StartTLS command, aka a "StartTLS stripping attack." | CVSS3: 6.5 | 7% Низкий | почти 9 лет назад |
Уязвимостей на страницу