Логотип exploitDog
product: "python"
Консоль
Логотип exploitDog

exploitDog

product: "python"

Количество 887

Количество 887

nvd логотип

CVE-2014-7185

около 11 лет назад

Integer overflow in bufferobject.c in Python before 2.7.8 allows context-dependent attackers to obtain sensitive information from process memory via a large size and offset in a "buffer" function.

CVSS2: 6.4
EPSS: Низкий
debian логотип

CVE-2014-7185

около 11 лет назад

Integer overflow in bufferobject.c in Python before 2.7.8 allows conte ...

CVSS2: 6.4
EPSS: Низкий
ubuntu логотип

CVE-2014-2667

почти 11 лет назад

Race condition in the _get_masked_mode function in Lib/os.py in Python 3.2 through 3.5, when exist_ok is set to true and multiple threads are used, might allow local users to bypass intended file permissions by leveraging a separate application vulnerability before the umask has been set to the expected value.

CVSS2: 3.3
EPSS: Низкий
redhat логотип

CVE-2014-2667

больше 11 лет назад

Race condition in the _get_masked_mode function in Lib/os.py in Python 3.2 through 3.5, when exist_ok is set to true and multiple threads are used, might allow local users to bypass intended file permissions by leveraging a separate application vulnerability before the umask has been set to the expected value.

CVSS2: 4.6
EPSS: Низкий
nvd логотип

CVE-2014-2667

почти 11 лет назад

Race condition in the _get_masked_mode function in Lib/os.py in Python 3.2 through 3.5, when exist_ok is set to true and multiple threads are used, might allow local users to bypass intended file permissions by leveraging a separate application vulnerability before the umask has been set to the expected value.

CVSS2: 3.3
EPSS: Низкий
debian логотип

CVE-2014-2667

почти 11 лет назад

Race condition in the _get_masked_mode function in Lib/os.py in Python ...

CVSS2: 3.3
EPSS: Низкий
ubuntu логотип

CVE-2014-1912

больше 11 лет назад

Buffer overflow in the socket.recvfrom_into function in Modules/socketmodule.c in Python 2.5 before 2.7.7, 3.x before 3.3.4, and 3.4.x before 3.4rc1 allows remote attackers to execute arbitrary code via a crafted string.

CVSS2: 7.5
EPSS: Средний
redhat логотип

CVE-2014-1912

почти 12 лет назад

Buffer overflow in the socket.recvfrom_into function in Modules/socketmodule.c in Python 2.5 before 2.7.7, 3.x before 3.3.4, and 3.4.x before 3.4rc1 allows remote attackers to execute arbitrary code via a crafted string.

CVSS2: 5.1
EPSS: Средний
nvd логотип

CVE-2014-1912

больше 11 лет назад

Buffer overflow in the socket.recvfrom_into function in Modules/socketmodule.c in Python 2.5 before 2.7.7, 3.x before 3.3.4, and 3.4.x before 3.4rc1 allows remote attackers to execute arbitrary code via a crafted string.

CVSS2: 7.5
EPSS: Средний
debian логотип

CVE-2014-1912

больше 11 лет назад

Buffer overflow in the socket.recvfrom_into function in Modules/socket ...

CVSS2: 7.5
EPSS: Средний
ubuntu логотип

CVE-2013-7440

больше 9 лет назад

The ssl.match_hostname function in CPython (aka Python) before 2.7.9 and 3.x before 3.3.3 does not properly handle wildcards in hostnames, which might allow man-in-the-middle attackers to spoof servers via a crafted certificate.

CVSS3: 5.9
EPSS: Низкий
redhat логотип

CVE-2013-7440

около 12 лет назад

The ssl.match_hostname function in CPython (aka Python) before 2.7.9 and 3.x before 3.3.3 does not properly handle wildcards in hostnames, which might allow man-in-the-middle attackers to spoof servers via a crafted certificate.

CVSS2: 4
EPSS: Низкий
nvd логотип

CVE-2013-7440

больше 9 лет назад

The ssl.match_hostname function in CPython (aka Python) before 2.7.9 and 3.x before 3.3.3 does not properly handle wildcards in hostnames, which might allow man-in-the-middle attackers to spoof servers via a crafted certificate.

CVSS3: 5.9
EPSS: Низкий
debian логотип

CVE-2013-7440

больше 9 лет назад

The ssl.match_hostname function in CPython (aka Python) before 2.7.9 a ...

CVSS3: 5.9
EPSS: Низкий
ubuntu логотип

CVE-2013-7338

больше 11 лет назад

Python before 3.3.4 RC1 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a file size value larger than the size of the zip file to the (1) ZipExtFile.read, (2) ZipExtFile.read(n), (3) ZipExtFile.readlines, (4) ZipFile.extract, or (5) ZipFile.extractall function.

CVSS2: 7.1
EPSS: Низкий
redhat логотип

CVE-2013-7338

почти 12 лет назад

Python before 3.3.4 RC1 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a file size value larger than the size of the zip file to the (1) ZipExtFile.read, (2) ZipExtFile.read(n), (3) ZipExtFile.readlines, (4) ZipFile.extract, or (5) ZipFile.extractall function.

CVSS2: 4.3
EPSS: Низкий
nvd логотип

CVE-2013-7338

больше 11 лет назад

Python before 3.3.4 RC1 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a file size value larger than the size of the zip file to the (1) ZipExtFile.read, (2) ZipExtFile.read(n), (3) ZipExtFile.readlines, (4) ZipFile.extract, or (5) ZipFile.extractall function.

CVSS2: 7.1
EPSS: Низкий
debian логотип

CVE-2013-7338

больше 11 лет назад

Python before 3.3.4 RC1 allows remote attackers to cause a denial of s ...

CVSS2: 7.1
EPSS: Низкий
ubuntu логотип

CVE-2013-7040

больше 11 лет назад

Python 2.7 before 3.4 only uses the last eight bits of the prefix to randomize hash values, which causes it to compute hash values without restricting the ability to trigger hash collisions predictably and makes it easier for context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-1150.

CVSS2: 4.3
EPSS: Низкий
redhat логотип

CVE-2013-7040

почти 12 лет назад

Python 2.7 before 3.4 only uses the last eight bits of the prefix to randomize hash values, which causes it to compute hash values without restricting the ability to trigger hash collisions predictably and makes it easier for context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-1150.

CVSS2: 5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2014-7185

Integer overflow in bufferobject.c in Python before 2.7.8 allows context-dependent attackers to obtain sensitive information from process memory via a large size and offset in a "buffer" function.

CVSS2: 6.4
1%
Низкий
около 11 лет назад
debian логотип
CVE-2014-7185

Integer overflow in bufferobject.c in Python before 2.7.8 allows conte ...

CVSS2: 6.4
1%
Низкий
около 11 лет назад
ubuntu логотип
CVE-2014-2667

Race condition in the _get_masked_mode function in Lib/os.py in Python 3.2 through 3.5, when exist_ok is set to true and multiple threads are used, might allow local users to bypass intended file permissions by leveraging a separate application vulnerability before the umask has been set to the expected value.

CVSS2: 3.3
0%
Низкий
почти 11 лет назад
redhat логотип
CVE-2014-2667

Race condition in the _get_masked_mode function in Lib/os.py in Python 3.2 through 3.5, when exist_ok is set to true and multiple threads are used, might allow local users to bypass intended file permissions by leveraging a separate application vulnerability before the umask has been set to the expected value.

CVSS2: 4.6
0%
Низкий
больше 11 лет назад
nvd логотип
CVE-2014-2667

Race condition in the _get_masked_mode function in Lib/os.py in Python 3.2 through 3.5, when exist_ok is set to true and multiple threads are used, might allow local users to bypass intended file permissions by leveraging a separate application vulnerability before the umask has been set to the expected value.

CVSS2: 3.3
0%
Низкий
почти 11 лет назад
debian логотип
CVE-2014-2667

Race condition in the _get_masked_mode function in Lib/os.py in Python ...

CVSS2: 3.3
0%
Низкий
почти 11 лет назад
ubuntu логотип
CVE-2014-1912

Buffer overflow in the socket.recvfrom_into function in Modules/socketmodule.c in Python 2.5 before 2.7.7, 3.x before 3.3.4, and 3.4.x before 3.4rc1 allows remote attackers to execute arbitrary code via a crafted string.

CVSS2: 7.5
31%
Средний
больше 11 лет назад
redhat логотип
CVE-2014-1912

Buffer overflow in the socket.recvfrom_into function in Modules/socketmodule.c in Python 2.5 before 2.7.7, 3.x before 3.3.4, and 3.4.x before 3.4rc1 allows remote attackers to execute arbitrary code via a crafted string.

CVSS2: 5.1
31%
Средний
почти 12 лет назад
nvd логотип
CVE-2014-1912

Buffer overflow in the socket.recvfrom_into function in Modules/socketmodule.c in Python 2.5 before 2.7.7, 3.x before 3.3.4, and 3.4.x before 3.4rc1 allows remote attackers to execute arbitrary code via a crafted string.

CVSS2: 7.5
31%
Средний
больше 11 лет назад
debian логотип
CVE-2014-1912

Buffer overflow in the socket.recvfrom_into function in Modules/socket ...

CVSS2: 7.5
31%
Средний
больше 11 лет назад
ubuntu логотип
CVE-2013-7440

The ssl.match_hostname function in CPython (aka Python) before 2.7.9 and 3.x before 3.3.3 does not properly handle wildcards in hostnames, which might allow man-in-the-middle attackers to spoof servers via a crafted certificate.

CVSS3: 5.9
0%
Низкий
больше 9 лет назад
redhat логотип
CVE-2013-7440

The ssl.match_hostname function in CPython (aka Python) before 2.7.9 and 3.x before 3.3.3 does not properly handle wildcards in hostnames, which might allow man-in-the-middle attackers to spoof servers via a crafted certificate.

CVSS2: 4
0%
Низкий
около 12 лет назад
nvd логотип
CVE-2013-7440

The ssl.match_hostname function in CPython (aka Python) before 2.7.9 and 3.x before 3.3.3 does not properly handle wildcards in hostnames, which might allow man-in-the-middle attackers to spoof servers via a crafted certificate.

CVSS3: 5.9
0%
Низкий
больше 9 лет назад
debian логотип
CVE-2013-7440

The ssl.match_hostname function in CPython (aka Python) before 2.7.9 a ...

CVSS3: 5.9
0%
Низкий
больше 9 лет назад
ubuntu логотип
CVE-2013-7338

Python before 3.3.4 RC1 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a file size value larger than the size of the zip file to the (1) ZipExtFile.read, (2) ZipExtFile.read(n), (3) ZipExtFile.readlines, (4) ZipFile.extract, or (5) ZipFile.extractall function.

CVSS2: 7.1
5%
Низкий
больше 11 лет назад
redhat логотип
CVE-2013-7338

Python before 3.3.4 RC1 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a file size value larger than the size of the zip file to the (1) ZipExtFile.read, (2) ZipExtFile.read(n), (3) ZipExtFile.readlines, (4) ZipFile.extract, or (5) ZipFile.extractall function.

CVSS2: 4.3
5%
Низкий
почти 12 лет назад
nvd логотип
CVE-2013-7338

Python before 3.3.4 RC1 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a file size value larger than the size of the zip file to the (1) ZipExtFile.read, (2) ZipExtFile.read(n), (3) ZipExtFile.readlines, (4) ZipFile.extract, or (5) ZipFile.extractall function.

CVSS2: 7.1
5%
Низкий
больше 11 лет назад
debian логотип
CVE-2013-7338

Python before 3.3.4 RC1 allows remote attackers to cause a denial of s ...

CVSS2: 7.1
5%
Низкий
больше 11 лет назад
ubuntu логотип
CVE-2013-7040

Python 2.7 before 3.4 only uses the last eight bits of the prefix to randomize hash values, which causes it to compute hash values without restricting the ability to trigger hash collisions predictably and makes it easier for context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-1150.

CVSS2: 4.3
1%
Низкий
больше 11 лет назад
redhat логотип
CVE-2013-7040

Python 2.7 before 3.4 only uses the last eight bits of the prefix to randomize hash values, which causes it to compute hash values without restricting the ability to trigger hash collisions predictably and makes it easier for context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-1150.

CVSS2: 5
1%
Низкий
почти 12 лет назад

Уязвимостей на страницу