Количество 63
Количество 63
GHSA-mh6q-v4mp-2cc7
The “ipaddress” module contained incorrect information about whether certain IPv4 and IPv6 addresses were designated as “globally reachable” or “private”. This affected the is_private and is_global properties of the ipaddress.IPv4Address, ipaddress.IPv4Network, ipaddress.IPv6Address, and ipaddress.IPv6Network classes, where values wouldn’t be returned in accordance with the latest information from the IANA Special-Purpose Address Registries. CPython 3.12.4 and 3.13.0a6 contain updated information from these registries and thus have the intended behavior.
ELSA-2024-4779
ELSA-2024-4779: python3 security update (LOW)
ELSA-2024-4766
ELSA-2024-4766: python3 security update (LOW)
BDU:2024-05196
Уязвимость классов ipaddress.IPv4Address, ipaddress.IPv4Network, ipaddress.IPv6Address и ipaddress.IPv6Network модуля ipaddress интерпретатора языка программирования Python (CPython), позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
SUSE-SU-2024:2280-1
Security update for python39
SUSE-SU-2024:2274-1
Security update for python39
ROS-20240917-08
Уязвимость python3
CVE-2024-8088
There is a HIGH severity vulnerability affecting the CPython "zipfile" module affecting "zipfile.Path". Note that the more common API "zipfile.ZipFile" class is unaffected. When iterating over names of entries in a zip archive (for example, methods of "zipfile.Path" like "namelist()", "iterdir()", etc) the process can be put into an infinite loop with a maliciously crafted zip archive. This defect applies when reading only metadata or extracting the contents of the zip archive. Programs that are not handling user-controlled zip archives are not affected.
CVE-2024-8088
There is a HIGH severity vulnerability affecting the CPython "zipfile" module affecting "zipfile.Path". Note that the more common API "zipfile.ZipFile" class is unaffected. When iterating over names of entries in a zip archive (for example, methods of "zipfile.Path" like "namelist()", "iterdir()", etc) the process can be put into an infinite loop with a maliciously crafted zip archive. This defect applies when reading only metadata or extracting the contents of the zip archive. Programs that are not handling user-controlled zip archives are not affected.
CVE-2024-8088
There is a HIGH severity vulnerability affecting the CPython "zipfile" module affecting "zipfile.Path". Note that the more common API "zipfile.ZipFile" class is unaffected. When iterating over names of entries in a zip archive (for example, methods of "zipfile.Path" like "namelist()", "iterdir()", etc) the process can be put into an infinite loop with a maliciously crafted zip archive. This defect applies when reading only metadata or extracting the contents of the zip archive. Programs that are not handling user-controlled zip archives are not affected.
CVE-2024-8088
CVE-2024-8088
There is a HIGH severity vulnerability affecting the CPython "zipfile" ...
SUSE-SU-2024:2572-1
Security update for python312
CVE-2024-6923
There is a MEDIUM severity vulnerability affecting CPython. The email module didn’t properly quote newlines for email headers when serializing an email message allowing for header injection when an email is serialized.
CVE-2024-6923
There is a MEDIUM severity vulnerability affecting CPython. The email module didn’t properly quote newlines for email headers when serializing an email message allowing for header injection when an email is serialized.
CVE-2024-6923
There is a MEDIUM severity vulnerability affecting CPython. The email module didn’t properly quote newlines for email headers when serializing an email message allowing for header injection when an email is serialized.
CVE-2024-6923
CVE-2024-6923
There is a MEDIUM severity vulnerability affecting CPython. The emai ...
SUSE-SU-2024:2479-1
Security update for python3
ROS-20240904-07
Уязвимость python3
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
GHSA-mh6q-v4mp-2cc7 The “ipaddress” module contained incorrect information about whether certain IPv4 and IPv6 addresses were designated as “globally reachable” or “private”. This affected the is_private and is_global properties of the ipaddress.IPv4Address, ipaddress.IPv4Network, ipaddress.IPv6Address, and ipaddress.IPv6Network classes, where values wouldn’t be returned in accordance with the latest information from the IANA Special-Purpose Address Registries. CPython 3.12.4 and 3.13.0a6 contain updated information from these registries and thus have the intended behavior. | CVSS3: 7.5 | 1% Низкий | больше 1 года назад | |
ELSA-2024-4779 ELSA-2024-4779: python3 security update (LOW) | больше 1 года назад | |||
ELSA-2024-4766 ELSA-2024-4766: python3 security update (LOW) | больше 1 года назад | |||
BDU:2024-05196 Уязвимость классов ipaddress.IPv4Address, ipaddress.IPv4Network, ipaddress.IPv6Address и ipaddress.IPv6Network модуля ipaddress интерпретатора языка программирования Python (CPython), позволяющая нарушителю получить несанкционированный доступ к защищаемой информации | CVSS3: 3.7 | 1% Низкий | почти 2 года назад | |
SUSE-SU-2024:2280-1 Security update for python39 | больше 1 года назад | |||
SUSE-SU-2024:2274-1 Security update for python39 | больше 1 года назад | |||
ROS-20240917-08 Уязвимость python3 | CVSS3: 3.7 | 1% Низкий | около 1 года назад | |
CVE-2024-8088 There is a HIGH severity vulnerability affecting the CPython "zipfile" module affecting "zipfile.Path". Note that the more common API "zipfile.ZipFile" class is unaffected. When iterating over names of entries in a zip archive (for example, methods of "zipfile.Path" like "namelist()", "iterdir()", etc) the process can be put into an infinite loop with a maliciously crafted zip archive. This defect applies when reading only metadata or extracting the contents of the zip archive. Programs that are not handling user-controlled zip archives are not affected. | 0% Низкий | около 1 года назад | ||
CVE-2024-8088 There is a HIGH severity vulnerability affecting the CPython "zipfile" module affecting "zipfile.Path". Note that the more common API "zipfile.ZipFile" class is unaffected. When iterating over names of entries in a zip archive (for example, methods of "zipfile.Path" like "namelist()", "iterdir()", etc) the process can be put into an infinite loop with a maliciously crafted zip archive. This defect applies when reading only metadata or extracting the contents of the zip archive. Programs that are not handling user-controlled zip archives are not affected. | CVSS3: 5.3 | 0% Низкий | около 1 года назад | |
CVE-2024-8088 There is a HIGH severity vulnerability affecting the CPython "zipfile" module affecting "zipfile.Path". Note that the more common API "zipfile.ZipFile" class is unaffected. When iterating over names of entries in a zip archive (for example, methods of "zipfile.Path" like "namelist()", "iterdir()", etc) the process can be put into an infinite loop with a maliciously crafted zip archive. This defect applies when reading only metadata or extracting the contents of the zip archive. Programs that are not handling user-controlled zip archives are not affected. | 0% Низкий | около 1 года назад | ||
0% Низкий | около 1 года назад | |||
CVE-2024-8088 There is a HIGH severity vulnerability affecting the CPython "zipfile" ... | 0% Низкий | около 1 года назад | ||
SUSE-SU-2024:2572-1 Security update for python312 | больше 1 года назад | |||
CVE-2024-6923 There is a MEDIUM severity vulnerability affecting CPython. The email module didn’t properly quote newlines for email headers when serializing an email message allowing for header injection when an email is serialized. | CVSS3: 5.5 | 0% Низкий | больше 1 года назад | |
CVE-2024-6923 There is a MEDIUM severity vulnerability affecting CPython. The email module didn’t properly quote newlines for email headers when serializing an email message allowing for header injection when an email is serialized. | CVSS3: 6.8 | 0% Низкий | больше 1 года назад | |
CVE-2024-6923 There is a MEDIUM severity vulnerability affecting CPython. The email module didn’t properly quote newlines for email headers when serializing an email message allowing for header injection when an email is serialized. | CVSS3: 5.5 | 0% Низкий | больше 1 года назад | |
CVSS3: 5.5 | 0% Низкий | около 1 года назад | ||
CVE-2024-6923 There is a MEDIUM severity vulnerability affecting CPython. The emai ... | CVSS3: 5.5 | 0% Низкий | больше 1 года назад | |
SUSE-SU-2024:2479-1 Security update for python3 | больше 1 года назад | |||
ROS-20240904-07 Уязвимость python3 | CVSS3: 5.3 | 0% Низкий | около 1 года назад |
Уязвимостей на страницу