Количество 46
Количество 46

SUSE-SU-2024:4193-1
Security update for python3

SUSE-SU-2024:4169-1
Security update for python36

SUSE-SU-2024:4166-1
Security update for python3

SUSE-SU-2024:4165-1
Security update for python

SUSE-SU-2024:4153-1
Security update for python310

SUSE-SU-2024:4151-1
Security update for python

SUSE-SU-2024:4135-1
Security update for python39
GHSA-qxg5-mcmp-m3m9
The urllib.parse.urlsplit() and urlparse() functions improperly validated bracketed hosts (`[]`), allowing hosts that weren't IPv6 or IPvFuture. This behavior was not conformant to RFC 3986 and potentially enabled SSRF if a URL is processed by more than one URL parser.

SUSE-SU-2025:0048-1
Security update for python312

SUSE-SU-2024:3959-1
Security update for python312

SUSE-SU-2024:3958-1
Security update for python311

SUSE-SU-2024:3957-1
Security update for python311

SUSE-SU-2024:3945-1
Security update for python39

SUSE-SU-2024:3944-1
Security update for python3

SUSE-SU-2024:3929-1
Security update for python36

SUSE-SU-2024:3924-1
Security update for python310

SUSE-SU-2024:3879-1
Security update for python3

ROS-20250212-03
Уязвимость python3

RLSA-2024:10979
Moderate: python3.11 security update
GHSA-grqq-hcc7-crmr
A vulnerability has been found in the CPython `venv` module and CLI where path names provided when creating a virtual environment were not quoted properly, allowing the creator to inject commands into virtual environment "activation" scripts (ie "source venv/bin/activate"). This means that attacker-controlled virtual environments are able to run commands when the virtual environment is activated. Virtual environments which are not created by an attacker or which aren't activated before being used (ie "./venv/bin/python") are not affected.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | SUSE-SU-2024:4193-1 Security update for python3 | 0% Низкий | 7 месяцев назад | |
![]() | SUSE-SU-2024:4169-1 Security update for python36 | 0% Низкий | 7 месяцев назад | |
![]() | SUSE-SU-2024:4166-1 Security update for python3 | 0% Низкий | 7 месяцев назад | |
![]() | SUSE-SU-2024:4165-1 Security update for python | 0% Низкий | 7 месяцев назад | |
![]() | SUSE-SU-2024:4153-1 Security update for python310 | 0% Низкий | 7 месяцев назад | |
![]() | SUSE-SU-2024:4151-1 Security update for python | 0% Низкий | 7 месяцев назад | |
![]() | SUSE-SU-2024:4135-1 Security update for python39 | 0% Низкий | 7 месяцев назад | |
GHSA-qxg5-mcmp-m3m9 The urllib.parse.urlsplit() and urlparse() functions improperly validated bracketed hosts (`[]`), allowing hosts that weren't IPv6 or IPvFuture. This behavior was not conformant to RFC 3986 and potentially enabled SSRF if a URL is processed by more than one URL parser. | CVSS3: 3.7 | 0% Низкий | 7 месяцев назад | |
![]() | SUSE-SU-2025:0048-1 Security update for python312 | 0% Низкий | 5 месяцев назад | |
![]() | SUSE-SU-2024:3959-1 Security update for python312 | 0% Низкий | 7 месяцев назад | |
![]() | SUSE-SU-2024:3958-1 Security update for python311 | 0% Низкий | 7 месяцев назад | |
![]() | SUSE-SU-2024:3957-1 Security update for python311 | 0% Низкий | 7 месяцев назад | |
![]() | SUSE-SU-2024:3945-1 Security update for python39 | 0% Низкий | 7 месяцев назад | |
![]() | SUSE-SU-2024:3944-1 Security update for python3 | 0% Низкий | 7 месяцев назад | |
![]() | SUSE-SU-2024:3929-1 Security update for python36 | 0% Низкий | 8 месяцев назад | |
![]() | SUSE-SU-2024:3924-1 Security update for python310 | 0% Низкий | 8 месяцев назад | |
![]() | SUSE-SU-2024:3879-1 Security update for python3 | 0% Низкий | 8 месяцев назад | |
![]() | ROS-20250212-03 Уязвимость python3 | CVSS3: 7.8 | 0% Низкий | 4 месяца назад |
![]() | RLSA-2024:10979 Moderate: python3.11 security update | 0% Низкий | 6 месяцев назад | |
GHSA-grqq-hcc7-crmr A vulnerability has been found in the CPython `venv` module and CLI where path names provided when creating a virtual environment were not quoted properly, allowing the creator to inject commands into virtual environment "activation" scripts (ie "source venv/bin/activate"). This means that attacker-controlled virtual environments are able to run commands when the virtual environment is activated. Virtual environments which are not created by an attacker or which aren't activated before being used (ie "./venv/bin/python") are not affected. | CVSS3: 7.8 | 0% Низкий | 8 месяцев назад |
Уязвимостей на страницу