Количество 56
Количество 56

CVE-2021-28861
CVE-2021-28861
Python 3.x through 3.10 has an open redirection vulnerability in lib/h ...

CVE-2022-45061
An issue was discovered in Python before 3.11.1. An unnecessary quadratic algorithm exists in one path when processing some inputs to the IDNA (RFC 3490) decoder, such that a crafted, unreasonably long name being presented to the decoder could lead to a CPU denial of service. Hostnames are often supplied by remote servers that could be controlled by a malicious actor; in such a scenario, they could trigger excessive CPU consumption on the client attempting to make use of an attacker-supplied supposed hostname. For example, the attack payload could be placed in the Location header of an HTTP response with status code 302. A fix is planned in 3.11.1, 3.10.9, 3.9.16, 3.8.16, and 3.7.16.

CVE-2022-45061
An issue was discovered in Python before 3.11.1. An unnecessary quadratic algorithm exists in one path when processing some inputs to the IDNA (RFC 3490) decoder, such that a crafted, unreasonably long name being presented to the decoder could lead to a CPU denial of service. Hostnames are often supplied by remote servers that could be controlled by a malicious actor; in such a scenario, they could trigger excessive CPU consumption on the client attempting to make use of an attacker-supplied supposed hostname. For example, the attack payload could be placed in the Location header of an HTTP response with status code 302. A fix is planned in 3.11.1, 3.10.9, 3.9.16, 3.8.16, and 3.7.16.

CVE-2022-45061
An issue was discovered in Python before 3.11.1. An unnecessary quadratic algorithm exists in one path when processing some inputs to the IDNA (RFC 3490) decoder, such that a crafted, unreasonably long name being presented to the decoder could lead to a CPU denial of service. Hostnames are often supplied by remote servers that could be controlled by a malicious actor; in such a scenario, they could trigger excessive CPU consumption on the client attempting to make use of an attacker-supplied supposed hostname. For example, the attack payload could be placed in the Location header of an HTTP response with status code 302. A fix is planned in 3.11.1, 3.10.9, 3.9.16, 3.8.16, and 3.7.16.

CVE-2022-45061
CVE-2022-45061
An issue was discovered in Python before 3.11.1. An unnecessary quadra ...

SUSE-SU-2022:4281-1
Security update for python3

SUSE-SU-2022:3940-1
Security update for python

SUSE-SU-2022:3593-1
Security update for python3

SUSE-SU-2022:3553-1
Security update for python

SUSE-SU-2022:3544-1
Security update for python3

SUSE-SU-2022:3512-2
Security update for python

SUSE-SU-2022:3512-1
Security update for python

SUSE-SU-2022:3511-2
Security update for python3

SUSE-SU-2022:3511-1
Security update for python3

SUSE-SU-2022:3483-1
Security update for python36
GHSA-h7f6-hc46-frrv
Python 3.x through 3.10 has an open redirection vulnerability in lib/http/server.py due to no protection against multiple (/) at the beginning of URI path which may leads to information disclosure.

SUSE-SU-2023:0616-1
Security update for python36

SUSE-SU-2023:0549-1
Security update for python3
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVSS3: 7.4 | 0% Низкий | почти 3 года назад | |
CVE-2021-28861 Python 3.x through 3.10 has an open redirection vulnerability in lib/h ... | CVSS3: 7.4 | 0% Низкий | почти 3 года назад | |
![]() | CVE-2022-45061 An issue was discovered in Python before 3.11.1. An unnecessary quadratic algorithm exists in one path when processing some inputs to the IDNA (RFC 3490) decoder, such that a crafted, unreasonably long name being presented to the decoder could lead to a CPU denial of service. Hostnames are often supplied by remote servers that could be controlled by a malicious actor; in such a scenario, they could trigger excessive CPU consumption on the client attempting to make use of an attacker-supplied supposed hostname. For example, the attack payload could be placed in the Location header of an HTTP response with status code 302. A fix is planned in 3.11.1, 3.10.9, 3.9.16, 3.8.16, and 3.7.16. | CVSS3: 7.5 | 0% Низкий | больше 2 лет назад |
![]() | CVE-2022-45061 An issue was discovered in Python before 3.11.1. An unnecessary quadratic algorithm exists in one path when processing some inputs to the IDNA (RFC 3490) decoder, such that a crafted, unreasonably long name being presented to the decoder could lead to a CPU denial of service. Hostnames are often supplied by remote servers that could be controlled by a malicious actor; in such a scenario, they could trigger excessive CPU consumption on the client attempting to make use of an attacker-supplied supposed hostname. For example, the attack payload could be placed in the Location header of an HTTP response with status code 302. A fix is planned in 3.11.1, 3.10.9, 3.9.16, 3.8.16, and 3.7.16. | CVSS3: 7.5 | 0% Низкий | больше 2 лет назад |
![]() | CVE-2022-45061 An issue was discovered in Python before 3.11.1. An unnecessary quadratic algorithm exists in one path when processing some inputs to the IDNA (RFC 3490) decoder, such that a crafted, unreasonably long name being presented to the decoder could lead to a CPU denial of service. Hostnames are often supplied by remote servers that could be controlled by a malicious actor; in such a scenario, they could trigger excessive CPU consumption on the client attempting to make use of an attacker-supplied supposed hostname. For example, the attack payload could be placed in the Location header of an HTTP response with status code 302. A fix is planned in 3.11.1, 3.10.9, 3.9.16, 3.8.16, and 3.7.16. | CVSS3: 7.5 | 0% Низкий | больше 2 лет назад |
![]() | CVSS3: 7.5 | 0% Низкий | больше 2 лет назад | |
CVE-2022-45061 An issue was discovered in Python before 3.11.1. An unnecessary quadra ... | CVSS3: 7.5 | 0% Низкий | больше 2 лет назад | |
![]() | SUSE-SU-2022:4281-1 Security update for python3 | больше 2 лет назад | ||
![]() | SUSE-SU-2022:3940-1 Security update for python | 0% Низкий | больше 2 лет назад | |
![]() | SUSE-SU-2022:3593-1 Security update for python3 | 0% Низкий | больше 2 лет назад | |
![]() | SUSE-SU-2022:3553-1 Security update for python | 0% Низкий | больше 2 лет назад | |
![]() | SUSE-SU-2022:3544-1 Security update for python3 | 0% Низкий | больше 2 лет назад | |
![]() | SUSE-SU-2022:3512-2 Security update for python | 0% Низкий | больше 2 лет назад | |
![]() | SUSE-SU-2022:3512-1 Security update for python | 0% Низкий | больше 2 лет назад | |
![]() | SUSE-SU-2022:3511-2 Security update for python3 | 0% Низкий | больше 2 лет назад | |
![]() | SUSE-SU-2022:3511-1 Security update for python3 | 0% Низкий | больше 2 лет назад | |
![]() | SUSE-SU-2022:3483-1 Security update for python36 | 0% Низкий | больше 2 лет назад | |
GHSA-h7f6-hc46-frrv Python 3.x through 3.10 has an open redirection vulnerability in lib/http/server.py due to no protection against multiple (/) at the beginning of URI path which may leads to information disclosure. | CVSS3: 7.4 | 0% Низкий | почти 3 года назад | |
![]() | SUSE-SU-2023:0616-1 Security update for python36 | 0% Низкий | больше 2 лет назад | |
![]() | SUSE-SU-2023:0549-1 Security update for python3 | 0% Низкий | больше 2 лет назад |
Уязвимостей на страницу