Количество 84
Количество 84
CVE-2023-43804
urllib3 is a user-friendly HTTP client library for Python. urllib3 doe ...

CVE-2023-27043
The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 header is identified as the value of the addr-spec. In some applications, an attacker can bypass a protection mechanism in which application access is granted only after verifying receipt of e-mail to a specific domain (e.g., only @company.example.com addresses may be used for signup). This occurs in email/_parseaddr.py in recent versions of Python.

CVE-2023-27043
The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 header is identified as the value of the addr-spec. In some applications, an attacker can bypass a protection mechanism in which application access is granted only after verifying receipt of e-mail to a specific domain (e.g., only @company.example.com addresses may be used for signup). This occurs in email/_parseaddr.py in recent versions of Python.

CVE-2023-27043
The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 header is identified as the value of the addr-spec. In some applications, an attacker can bypass a protection mechanism in which application access is granted only after verifying receipt of e-mail to a specific domain (e.g., only @company.example.com addresses may be used for signup). This occurs in email/_parseaddr.py in recent versions of Python.

CVE-2023-27043
CVE-2023-27043
The email module of Python through 3.11.3 incorrectly parses e-mail ad ...

ROS-20230620-06
Множественные уязвимости python3-cryptography

SUSE-SU-2023:4108-1
Security update for python-urllib3

SUSE-SU-2023:4064-1
Security update for python-urllib3

RLSA-2024:2986
Moderate: python3.11-urllib3 security update
GHSA-v845-jxx5-vc9f
`Cookie` HTTP header isn't stripped on cross-origin redirects
ELSA-2024-2986
ELSA-2024-2986: python3.11-urllib3 security update (MODERATE)
ELSA-2024-2159
ELSA-2024-2159: python3.11-urllib3 security update (MODERATE)

BDU:2023-08730
Уязвимость модуля urllib3 интерпретатора языка программирования Python, связанная с отсутствием защиты служебных данных, позволяющая нарушителю раскрыть защищаемую информацию

SUSE-SU-2024:0595-1
Security update for python310

SUSE-SU-2024:0581-1
Security update for python3

SUSE-SU-2024:0438-1
Security update for python3

SUSE-SU-2024:0437-1
Security update for python

SUSE-SU-2024:0436-1
Security update for python36

SUSE-SU-2024:0329-2
Security update for python
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
CVE-2023-43804 urllib3 is a user-friendly HTTP client library for Python. urllib3 doe ... | CVSS3: 5.9 | 1% Низкий | больше 1 года назад | |
![]() | CVE-2023-27043 The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 header is identified as the value of the addr-spec. In some applications, an attacker can bypass a protection mechanism in which application access is granted only after verifying receipt of e-mail to a specific domain (e.g., only @company.example.com addresses may be used for signup). This occurs in email/_parseaddr.py in recent versions of Python. | CVSS3: 5.3 | 0% Низкий | около 2 лет назад |
![]() | CVE-2023-27043 The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 header is identified as the value of the addr-spec. In some applications, an attacker can bypass a protection mechanism in which application access is granted only after verifying receipt of e-mail to a specific domain (e.g., only @company.example.com addresses may be used for signup). This occurs in email/_parseaddr.py in recent versions of Python. | CVSS3: 5.3 | 0% Низкий | около 2 лет назад |
![]() | CVE-2023-27043 The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 header is identified as the value of the addr-spec. In some applications, an attacker can bypass a protection mechanism in which application access is granted only after verifying receipt of e-mail to a specific domain (e.g., only @company.example.com addresses may be used for signup). This occurs in email/_parseaddr.py in recent versions of Python. | CVSS3: 5.3 | 0% Низкий | около 2 лет назад |
![]() | CVSS3: 5.3 | 0% Низкий | 5 месяцев назад | |
CVE-2023-27043 The email module of Python through 3.11.3 incorrectly parses e-mail ad ... | CVSS3: 5.3 | 0% Низкий | около 2 лет назад | |
![]() | ROS-20230620-06 Множественные уязвимости python3-cryptography | CVSS3: 9.1 | почти 2 года назад | |
![]() | SUSE-SU-2023:4108-1 Security update for python-urllib3 | 1% Низкий | больше 1 года назад | |
![]() | SUSE-SU-2023:4064-1 Security update for python-urllib3 | 1% Низкий | больше 1 года назад | |
![]() | RLSA-2024:2986 Moderate: python3.11-urllib3 security update | 1% Низкий | около 1 года назад | |
GHSA-v845-jxx5-vc9f `Cookie` HTTP header isn't stripped on cross-origin redirects | CVSS3: 5.9 | 1% Низкий | больше 1 года назад | |
ELSA-2024-2986 ELSA-2024-2986: python3.11-urllib3 security update (MODERATE) | около 1 года назад | |||
ELSA-2024-2159 ELSA-2024-2159: python3.11-urllib3 security update (MODERATE) | около 1 года назад | |||
![]() | BDU:2023-08730 Уязвимость модуля urllib3 интерпретатора языка программирования Python, связанная с отсутствием защиты служебных данных, позволяющая нарушителю раскрыть защищаемую информацию | CVSS3: 8.1 | 1% Низкий | больше 1 года назад |
![]() | SUSE-SU-2024:0595-1 Security update for python310 | 0% Низкий | больше 1 года назад | |
![]() | SUSE-SU-2024:0581-1 Security update for python3 | 0% Низкий | больше 1 года назад | |
![]() | SUSE-SU-2024:0438-1 Security update for python3 | 0% Низкий | больше 1 года назад | |
![]() | SUSE-SU-2024:0437-1 Security update for python | 0% Низкий | больше 1 года назад | |
![]() | SUSE-SU-2024:0436-1 Security update for python36 | 0% Низкий | больше 1 года назад | |
![]() | SUSE-SU-2024:0329-2 Security update for python | 0% Низкий | больше 1 года назад |
Уязвимостей на страницу