Количество 86
Количество 86
ELSA-2023-12348
ELSA-2023-12348: python3-setuptools security update (IMPORTANT)
ELSA-2023-0952
ELSA-2023-0952: python-setuptools security update (MODERATE)
ELSA-2023-0835
ELSA-2023-0835: python-setuptools security update (MODERATE)
BDU:2023-02445
Уязвимость инструментов установки пакетов Python Packaging Authority, связанная с некорректным регулярным выражением, позволяющая нарушителю вызывать отказ в обслуживании
CVE-2023-23931
cryptography is a package designed to expose cryptographic primitives and recipes to Python developers. In affected versions `Cipher.update_into` would accept Python objects which implement the buffer protocol, but provide only immutable buffers. This would allow immutable objects (such as `bytes`) to be mutated, thus violating fundamental rules of Python and resulting in corrupted output. This now correctly raises an exception. This issue has been present since `update_into` was originally introduced in cryptography 1.8.
CVE-2023-23931
cryptography is a package designed to expose cryptographic primitives and recipes to Python developers. In affected versions `Cipher.update_into` would accept Python objects which implement the buffer protocol, but provide only immutable buffers. This would allow immutable objects (such as `bytes`) to be mutated, thus violating fundamental rules of Python and resulting in corrupted output. This now correctly raises an exception. This issue has been present since `update_into` was originally introduced in cryptography 1.8.
CVE-2023-23931
cryptography is a package designed to expose cryptographic primitives and recipes to Python developers. In affected versions `Cipher.update_into` would accept Python objects which implement the buffer protocol, but provide only immutable buffers. This would allow immutable objects (such as `bytes`) to be mutated, thus violating fundamental rules of Python and resulting in corrupted output. This now correctly raises an exception. This issue has been present since `update_into` was originally introduced in cryptography 1.8.
CVE-2023-23931
CVE-2023-23931
cryptography is a package designed to expose cryptographic primitives ...
SUSE-SU-2023:1767-1
Security update for python-cryptography
SUSE-SU-2023:1763-1
Security update for python-cryptography
SUSE-SU-2023:0837-1
Security update for python-cffi
SUSE-SU-2023:0737-1
Security update for python-cryptography
SUSE-SU-2023:0722-1
Security update for python-cryptography
GHSA-w7pp-m8wf-vj6r
Cipher.update_into can corrupt memory if passed an immutable python object as the outbuf
ELSA-2023-7096
ELSA-2023-7096: python-cryptography security update (MODERATE)
ELSA-2023-6615
ELSA-2023-6615: python-cryptography security update (MODERATE)
BDU:2023-02656
Уязвимость функции Cipher.update_into пакета cryptography интерпретатора языка программирования Python, позволяющая нарушителю оказать воздействие на целостность и доступность выходных данных
CVE-2023-43804
urllib3 is a user-friendly HTTP client library for Python. urllib3 doesn't treat the `Cookie` HTTP header special or provide any helpers for managing cookies over HTTP, that is the responsibility of the user. However, it is possible for a user to specify a `Cookie` header and unknowingly leak information via HTTP redirects to a different origin if that user doesn't disable redirects explicitly. This issue has been patched in urllib3 version 1.26.17 or 2.0.5.
CVE-2023-43804
urllib3 is a user-friendly HTTP client library for Python. urllib3 doesn't treat the `Cookie` HTTP header special or provide any helpers for managing cookies over HTTP, that is the responsibility of the user. However, it is possible for a user to specify a `Cookie` header and unknowingly leak information via HTTP redirects to a different origin if that user doesn't disable redirects explicitly. This issue has been patched in urllib3 version 1.26.17 or 2.0.5.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
ELSA-2023-12348 ELSA-2023-12348: python3-setuptools security update (IMPORTANT) | больше 2 лет назад | |||
ELSA-2023-0952 ELSA-2023-0952: python-setuptools security update (MODERATE) | почти 3 года назад | |||
ELSA-2023-0835 ELSA-2023-0835: python-setuptools security update (MODERATE) | почти 3 года назад | |||
BDU:2023-02445 Уязвимость инструментов установки пакетов Python Packaging Authority, связанная с некорректным регулярным выражением, позволяющая нарушителю вызывать отказ в обслуживании | CVSS3: 5.9 | 0% Низкий | почти 3 года назад | |
CVE-2023-23931 cryptography is a package designed to expose cryptographic primitives and recipes to Python developers. In affected versions `Cipher.update_into` would accept Python objects which implement the buffer protocol, but provide only immutable buffers. This would allow immutable objects (such as `bytes`) to be mutated, thus violating fundamental rules of Python and resulting in corrupted output. This now correctly raises an exception. This issue has been present since `update_into` was originally introduced in cryptography 1.8. | CVSS3: 4.8 | 1% Низкий | почти 3 года назад | |
CVE-2023-23931 cryptography is a package designed to expose cryptographic primitives and recipes to Python developers. In affected versions `Cipher.update_into` would accept Python objects which implement the buffer protocol, but provide only immutable buffers. This would allow immutable objects (such as `bytes`) to be mutated, thus violating fundamental rules of Python and resulting in corrupted output. This now correctly raises an exception. This issue has been present since `update_into` was originally introduced in cryptography 1.8. | CVSS3: 6.5 | 1% Низкий | почти 3 года назад | |
CVE-2023-23931 cryptography is a package designed to expose cryptographic primitives and recipes to Python developers. In affected versions `Cipher.update_into` would accept Python objects which implement the buffer protocol, but provide only immutable buffers. This would allow immutable objects (such as `bytes`) to be mutated, thus violating fundamental rules of Python and resulting in corrupted output. This now correctly raises an exception. This issue has been present since `update_into` was originally introduced in cryptography 1.8. | CVSS3: 4.8 | 1% Низкий | почти 3 года назад | |
CVSS3: 6.5 | 1% Низкий | больше 1 года назад | ||
CVE-2023-23931 cryptography is a package designed to expose cryptographic primitives ... | CVSS3: 4.8 | 1% Низкий | почти 3 года назад | |
SUSE-SU-2023:1767-1 Security update for python-cryptography | 1% Низкий | больше 2 лет назад | ||
SUSE-SU-2023:1763-1 Security update for python-cryptography | 1% Низкий | больше 2 лет назад | ||
SUSE-SU-2023:0837-1 Security update for python-cffi | 1% Низкий | больше 2 лет назад | ||
SUSE-SU-2023:0737-1 Security update for python-cryptography | 1% Низкий | больше 2 лет назад | ||
SUSE-SU-2023:0722-1 Security update for python-cryptography | 1% Низкий | больше 2 лет назад | ||
GHSA-w7pp-m8wf-vj6r Cipher.update_into can corrupt memory if passed an immutable python object as the outbuf | CVSS3: 6.5 | 1% Низкий | почти 3 года назад | |
ELSA-2023-7096 ELSA-2023-7096: python-cryptography security update (MODERATE) | около 2 лет назад | |||
ELSA-2023-6615 ELSA-2023-6615: python-cryptography security update (MODERATE) | около 2 лет назад | |||
BDU:2023-02656 Уязвимость функции Cipher.update_into пакета cryptography интерпретатора языка программирования Python, позволяющая нарушителю оказать воздействие на целостность и доступность выходных данных | CVSS3: 6.5 | 1% Низкий | почти 3 года назад | |
CVE-2023-43804 urllib3 is a user-friendly HTTP client library for Python. urllib3 doesn't treat the `Cookie` HTTP header special or provide any helpers for managing cookies over HTTP, that is the responsibility of the user. However, it is possible for a user to specify a `Cookie` header and unknowingly leak information via HTTP redirects to a different origin if that user doesn't disable redirects explicitly. This issue has been patched in urllib3 version 1.26.17 or 2.0.5. | CVSS3: 5.9 | 1% Низкий | около 2 лет назад | |
CVE-2023-43804 urllib3 is a user-friendly HTTP client library for Python. urllib3 doesn't treat the `Cookie` HTTP header special or provide any helpers for managing cookies over HTTP, that is the responsibility of the user. However, it is possible for a user to specify a `Cookie` header and unknowingly leak information via HTTP redirects to a different origin if that user doesn't disable redirects explicitly. This issue has been patched in urllib3 version 1.26.17 or 2.0.5. | CVSS3: 5.9 | 1% Низкий | около 2 лет назад |
Уязвимостей на страницу