Логотип exploitDog
bind:"CVE-2019-16056" OR bind:"CVE-2018-20852"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2019-16056" OR bind:"CVE-2018-20852"

Количество 44

Количество 44

suse-cvrf логотип

SUSE-SU-2019:2798-1

больше 5 лет назад

Security update for python3

EPSS: Низкий
oracle-oval логотип

ELSA-2020-1764

около 5 лет назад

ELSA-2020-1764: python3 security and bug fix update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2020-1132

около 5 лет назад

ELSA-2020-1132: python3 security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2020-1131

около 5 лет назад

ELSA-2020-1131: python security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2020-1605

около 5 лет назад

ELSA-2020-1605: python27:2.7 security, bug fix, and enhancement update (MODERATE)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:2699-1

больше 4 лет назад

Security update for python3

EPSS: Низкий
rocky логотип

RLSA-2020:1605

около 5 лет назад

Moderate: python27:2.7 security, bug fix, and enhancement update

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:0302-1

больше 5 лет назад

Security update for python36

EPSS: Низкий
ubuntu логотип

CVE-2018-20852

почти 6 лет назад

http.cookiejar.DefaultPolicy.domain_return_ok in Lib/http/cookiejar.py in Python before 3.7.3 does not correctly validate the domain: it can be tricked into sending existing cookies to the wrong server. An attacker may abuse this flaw by using a server with a hostname that has another valid hostname as a suffix (e.g., pythonicexample.com to steal cookies for example.com). When a program uses http.cookiejar.DefaultPolicy and tries to do an HTTP connection to an attacker-controlled server, existing cookies can be leaked to the attacker. This affects 2.x through 2.7.16, 3.x before 3.4.10, 3.5.x before 3.5.7, 3.6.x before 3.6.9, and 3.7.x before 3.7.3.

CVSS3: 5.3
EPSS: Низкий
redhat логотип

CVE-2018-20852

больше 6 лет назад

http.cookiejar.DefaultPolicy.domain_return_ok in Lib/http/cookiejar.py in Python before 3.7.3 does not correctly validate the domain: it can be tricked into sending existing cookies to the wrong server. An attacker may abuse this flaw by using a server with a hostname that has another valid hostname as a suffix (e.g., pythonicexample.com to steal cookies for example.com). When a program uses http.cookiejar.DefaultPolicy and tries to do an HTTP connection to an attacker-controlled server, existing cookies can be leaked to the attacker. This affects 2.x through 2.7.16, 3.x before 3.4.10, 3.5.x before 3.5.7, 3.6.x before 3.6.9, and 3.7.x before 3.7.3.

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2018-20852

почти 6 лет назад

http.cookiejar.DefaultPolicy.domain_return_ok in Lib/http/cookiejar.py in Python before 3.7.3 does not correctly validate the domain: it can be tricked into sending existing cookies to the wrong server. An attacker may abuse this flaw by using a server with a hostname that has another valid hostname as a suffix (e.g., pythonicexample.com to steal cookies for example.com). When a program uses http.cookiejar.DefaultPolicy and tries to do an HTTP connection to an attacker-controlled server, existing cookies can be leaked to the attacker. This affects 2.x through 2.7.16, 3.x before 3.4.10, 3.5.x before 3.5.7, 3.6.x before 3.6.9, and 3.7.x before 3.7.3.

CVSS3: 5.3
EPSS: Низкий
debian логотип

CVE-2018-20852

почти 6 лет назад

http.cookiejar.DefaultPolicy.domain_return_ok in Lib/http/cookiejar.py ...

CVSS3: 5.3
EPSS: Низкий
ubuntu логотип

CVE-2019-16056

почти 6 лет назад

An issue was discovered in Python through 2.7.16, 3.x through 3.5.7, 3.6.x through 3.6.9, and 3.7.x through 3.7.4. The email module wrongly parses email addresses that contain multiple @ characters. An application that uses the email module and implements some kind of checks on the From/To headers of a message could be tricked into accepting an email address that should be denied. An attack may be the same as in CVE-2019-11340; however, this CVE applies to Python more generally.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2019-16056

почти 7 лет назад

An issue was discovered in Python through 2.7.16, 3.x through 3.5.7, 3.6.x through 3.6.9, and 3.7.x through 3.7.4. The email module wrongly parses email addresses that contain multiple @ characters. An application that uses the email module and implements some kind of checks on the From/To headers of a message could be tricked into accepting an email address that should be denied. An attack may be the same as in CVE-2019-11340; however, this CVE applies to Python more generally.

CVSS3: 7.3
EPSS: Низкий
nvd логотип

CVE-2019-16056

почти 6 лет назад

An issue was discovered in Python through 2.7.16, 3.x through 3.5.7, 3.6.x through 3.6.9, and 3.7.x through 3.7.4. The email module wrongly parses email addresses that contain multiple @ characters. An application that uses the email module and implements some kind of checks on the From/To headers of a message could be tricked into accepting an email address that should be denied. An attack may be the same as in CVE-2019-11340; however, this CVE applies to Python more generally.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2019-16056

почти 6 лет назад

An issue was discovered in Python through 2.7.16, 3.x through 3.5.7, 3 ...

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:0086-1

больше 5 лет назад

Security update for python3

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:0114-1

больше 5 лет назад

Security update for python3

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2019:1989-1

почти 6 лет назад

Security update for python

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2019:1988-1

почти 6 лет назад

Security update for python

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
suse-cvrf логотип
SUSE-SU-2019:2798-1

Security update for python3

больше 5 лет назад
oracle-oval логотип
ELSA-2020-1764

ELSA-2020-1764: python3 security and bug fix update (MODERATE)

около 5 лет назад
oracle-oval логотип
ELSA-2020-1132

ELSA-2020-1132: python3 security update (MODERATE)

около 5 лет назад
oracle-oval логотип
ELSA-2020-1131

ELSA-2020-1131: python security update (MODERATE)

около 5 лет назад
oracle-oval логотип
ELSA-2020-1605

ELSA-2020-1605: python27:2.7 security, bug fix, and enhancement update (MODERATE)

около 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:2699-1

Security update for python3

больше 4 лет назад
rocky логотип
RLSA-2020:1605

Moderate: python27:2.7 security, bug fix, and enhancement update

около 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:0302-1

Security update for python36

больше 5 лет назад
ubuntu логотип
CVE-2018-20852

http.cookiejar.DefaultPolicy.domain_return_ok in Lib/http/cookiejar.py in Python before 3.7.3 does not correctly validate the domain: it can be tricked into sending existing cookies to the wrong server. An attacker may abuse this flaw by using a server with a hostname that has another valid hostname as a suffix (e.g., pythonicexample.com to steal cookies for example.com). When a program uses http.cookiejar.DefaultPolicy and tries to do an HTTP connection to an attacker-controlled server, existing cookies can be leaked to the attacker. This affects 2.x through 2.7.16, 3.x before 3.4.10, 3.5.x before 3.5.7, 3.6.x before 3.6.9, and 3.7.x before 3.7.3.

CVSS3: 5.3
1%
Низкий
почти 6 лет назад
redhat логотип
CVE-2018-20852

http.cookiejar.DefaultPolicy.domain_return_ok in Lib/http/cookiejar.py in Python before 3.7.3 does not correctly validate the domain: it can be tricked into sending existing cookies to the wrong server. An attacker may abuse this flaw by using a server with a hostname that has another valid hostname as a suffix (e.g., pythonicexample.com to steal cookies for example.com). When a program uses http.cookiejar.DefaultPolicy and tries to do an HTTP connection to an attacker-controlled server, existing cookies can be leaked to the attacker. This affects 2.x through 2.7.16, 3.x before 3.4.10, 3.5.x before 3.5.7, 3.6.x before 3.6.9, and 3.7.x before 3.7.3.

CVSS3: 5.3
1%
Низкий
больше 6 лет назад
nvd логотип
CVE-2018-20852

http.cookiejar.DefaultPolicy.domain_return_ok in Lib/http/cookiejar.py in Python before 3.7.3 does not correctly validate the domain: it can be tricked into sending existing cookies to the wrong server. An attacker may abuse this flaw by using a server with a hostname that has another valid hostname as a suffix (e.g., pythonicexample.com to steal cookies for example.com). When a program uses http.cookiejar.DefaultPolicy and tries to do an HTTP connection to an attacker-controlled server, existing cookies can be leaked to the attacker. This affects 2.x through 2.7.16, 3.x before 3.4.10, 3.5.x before 3.5.7, 3.6.x before 3.6.9, and 3.7.x before 3.7.3.

CVSS3: 5.3
1%
Низкий
почти 6 лет назад
debian логотип
CVE-2018-20852

http.cookiejar.DefaultPolicy.domain_return_ok in Lib/http/cookiejar.py ...

CVSS3: 5.3
1%
Низкий
почти 6 лет назад
ubuntu логотип
CVE-2019-16056

An issue was discovered in Python through 2.7.16, 3.x through 3.5.7, 3.6.x through 3.6.9, and 3.7.x through 3.7.4. The email module wrongly parses email addresses that contain multiple @ characters. An application that uses the email module and implements some kind of checks on the From/To headers of a message could be tricked into accepting an email address that should be denied. An attack may be the same as in CVE-2019-11340; however, this CVE applies to Python more generally.

CVSS3: 7.5
1%
Низкий
почти 6 лет назад
redhat логотип
CVE-2019-16056

An issue was discovered in Python through 2.7.16, 3.x through 3.5.7, 3.6.x through 3.6.9, and 3.7.x through 3.7.4. The email module wrongly parses email addresses that contain multiple @ characters. An application that uses the email module and implements some kind of checks on the From/To headers of a message could be tricked into accepting an email address that should be denied. An attack may be the same as in CVE-2019-11340; however, this CVE applies to Python more generally.

CVSS3: 7.3
1%
Низкий
почти 7 лет назад
nvd логотип
CVE-2019-16056

An issue was discovered in Python through 2.7.16, 3.x through 3.5.7, 3.6.x through 3.6.9, and 3.7.x through 3.7.4. The email module wrongly parses email addresses that contain multiple @ characters. An application that uses the email module and implements some kind of checks on the From/To headers of a message could be tricked into accepting an email address that should be denied. An attack may be the same as in CVE-2019-11340; however, this CVE applies to Python more generally.

CVSS3: 7.5
1%
Низкий
почти 6 лет назад
debian логотип
CVE-2019-16056

An issue was discovered in Python through 2.7.16, 3.x through 3.5.7, 3 ...

CVSS3: 7.5
1%
Низкий
почти 6 лет назад
suse-cvrf логотип
openSUSE-SU-2020:0086-1

Security update for python3

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:0114-1

Security update for python3

больше 5 лет назад
suse-cvrf логотип
openSUSE-SU-2019:1989-1

Security update for python

1%
Низкий
почти 6 лет назад
suse-cvrf логотип
openSUSE-SU-2019:1988-1

Security update for python

1%
Низкий
почти 6 лет назад

Уязвимостей на страницу