Количество 7
Количество 7
GHSA-45fw-qrx2-rj7m
In Python 3.8.4, sys.path restrictions specified in a python38._pth file are ignored, allowing code to be loaded from arbitrary locations. The <executable-name>._pth file (e.g., the python._pth file) is not affected.

CVE-2020-15801
In Python 3.8.4, sys.path restrictions specified in a python38._pth file are ignored, allowing code to be loaded from arbitrary locations. The <executable-name>._pth file (e.g., the python._pth file) is not affected.

CVE-2020-15801
In Python 3.8.4, sys.path restrictions specified in a python38._pth file are ignored, allowing code to be loaded from arbitrary locations. The <executable-name>._pth file (e.g., the python._pth file) is not affected.

CVE-2020-15801
In Python 3.8.4, sys.path restrictions specified in a python38._pth file are ignored, allowing code to be loaded from arbitrary locations. The <executable-name>._pth file (e.g., the python._pth file) is not affected.
CVE-2020-15801
In Python 3.8.4, sys.path restrictions specified in a python38._pth fi ...

BDU:2024-09146
Уязвимость файла python38._pth интерпретатора языка программирования Python, связанная с игнорированием ограничений sys.path, указанных в файле python38._pth, позволяющая нарушителю выполнить произвольный код

ROS-20240704-10
Множественные уязвимости python3
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
GHSA-45fw-qrx2-rj7m In Python 3.8.4, sys.path restrictions specified in a python38._pth file are ignored, allowing code to be loaded from arbitrary locations. The <executable-name>._pth file (e.g., the python._pth file) is not affected. | CVSS3: 9.8 | 1% Низкий | около 3 лет назад | |
![]() | CVE-2020-15801 In Python 3.8.4, sys.path restrictions specified in a python38._pth file are ignored, allowing code to be loaded from arbitrary locations. The <executable-name>._pth file (e.g., the python._pth file) is not affected. | CVSS3: 9.8 | 1% Низкий | почти 5 лет назад |
![]() | CVE-2020-15801 In Python 3.8.4, sys.path restrictions specified in a python38._pth file are ignored, allowing code to be loaded from arbitrary locations. The <executable-name>._pth file (e.g., the python._pth file) is not affected. | CVSS3: 8.4 | 1% Низкий | почти 5 лет назад |
![]() | CVE-2020-15801 In Python 3.8.4, sys.path restrictions specified in a python38._pth file are ignored, allowing code to be loaded from arbitrary locations. The <executable-name>._pth file (e.g., the python._pth file) is not affected. | CVSS3: 9.8 | 1% Низкий | почти 5 лет назад |
CVE-2020-15801 In Python 3.8.4, sys.path restrictions specified in a python38._pth fi ... | CVSS3: 9.8 | 1% Низкий | почти 5 лет назад | |
![]() | BDU:2024-09146 Уязвимость файла python38._pth интерпретатора языка программирования Python, связанная с игнорированием ограничений sys.path, указанных в файле python38._pth, позволяющая нарушителю выполнить произвольный код | CVSS3: 9.8 | 1% Низкий | почти 5 лет назад |
![]() | ROS-20240704-10 Множественные уязвимости python3 | CVSS3: 9.8 | 12 месяцев назад |
Уязвимостей на страницу