Количество 924
Количество 924
RLSA-2024:8838
Moderate: python3.11 security update
RLSA-2024:8836
Moderate: python3.12 security update
RLSA-2024:8447
Moderate: python3.12 security update
RLSA-2024:8446
Moderate: python3.9 security update
RLSA-2024:8374
Moderate: python3.11 security update
RLSA-2024:8359
Moderate: python39:3.9 and python39-devel:3.9 security update
RLSA-2024:11111
Moderate: python3.11 security update
RLSA-2024:10979
Moderate: python3.11 security update
RLSA-2023:5997
Important: python3 security update
RLSA-2023:5463
Important: python3.11 security update
RLSA-2022:8493
Important: python3.9 security update
RLSA-2022:8492
Important: python39:3.9 security update
GHSA-wh3w-rqc7-4mpf
Python 2.7 through 2.7.17, 3.5 through 3.5.9, 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1 allows an HTTP server to conduct Regular Expression Denial of Service (ReDoS) attacks against a client because of urllib.request.AbstractBasicAuthHandler catastrophic backtracking.
GHSA-w84r-7gx4-7v92
A vulnerability classified as problematic was found in Python 2.7.13. This vulnerability affects unknown code of the component pgAdmin4. The manipulation leads to uncontrolled search path. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
GHSA-w2rh-7p2w-889c
The SimpleXMLRPCServer library module in Python 2.2, 2.3 before 2.3.5, and 2.4, when used by XML-RPC servers that use the register_instance method to register an object without a _dispatch method, allows remote attackers to read or modify globals of the associated module, and possibly execute arbitrary code, via dotted attributes.
GHSA-vrgr-679p-vf6w
Visual Studio Code Python Extension Remote Code Execution Vulnerability
GHSA-vp8q-678w-8xq9
The ssl.match_hostname function in the SSL module in Python 2.6 through 3.4 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
GHSA-vjph-xp4h-fpjw
** DISPUTED ** The MSI installer for Python through 2.7.16 on Windows defaults to the C:\Python27 directory, which makes it easier for local users to deploy Trojan horse code. (This also affects old 3.x releases before 3.5.) NOTE: the vendor's position is that it is the user's responsibility to ensure C:\Python27 access control or choose a different directory, because backwards compatibility requires that C:\Python27 remain the default for 2.7.x.
GHSA-vc2m-m665-8xm2
If the value passed to os.path.expandvars() is user-controlled a performance degradation is possible when expanding environment variables.
GHSA-v7q9-qwmc-9665
A remote code execution vulnerability exists in Visual Studio Code when the Python extension loads configuration files after opening a project, aka 'Visual Studio Code Python Extension Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1192.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
RLSA-2024:8838 Moderate: python3.11 security update | 3% Низкий | больше 1 года назад | ||
RLSA-2024:8836 Moderate: python3.12 security update | 3% Низкий | больше 1 года назад | ||
RLSA-2024:8447 Moderate: python3.12 security update | 3% Низкий | больше 1 года назад | ||
RLSA-2024:8446 Moderate: python3.9 security update | 3% Низкий | больше 1 года назад | ||
RLSA-2024:8374 Moderate: python3.11 security update | 3% Низкий | больше 1 года назад | ||
RLSA-2024:8359 Moderate: python39:3.9 and python39-devel:3.9 security update | 3% Низкий | больше 1 года назад | ||
RLSA-2024:11111 Moderate: python3.11 security update | 0% Низкий | около 1 года назад | ||
RLSA-2024:10979 Moderate: python3.11 security update | 0% Низкий | больше 1 года назад | ||
RLSA-2023:5997 Important: python3 security update | 1% Низкий | больше 2 лет назад | ||
RLSA-2023:5463 Important: python3.11 security update | 1% Низкий | больше 2 лет назад | ||
RLSA-2022:8493 Important: python3.9 security update | 0% Низкий | больше 3 лет назад | ||
RLSA-2022:8492 Important: python39:3.9 security update | 0% Низкий | больше 3 лет назад | ||
GHSA-wh3w-rqc7-4mpf Python 2.7 through 2.7.17, 3.5 through 3.5.9, 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1 allows an HTTP server to conduct Regular Expression Denial of Service (ReDoS) attacks against a client because of urllib.request.AbstractBasicAuthHandler catastrophic backtracking. | CVSS3: 6.5 | 5% Низкий | почти 4 года назад | |
GHSA-w84r-7gx4-7v92 A vulnerability classified as problematic was found in Python 2.7.13. This vulnerability affects unknown code of the component pgAdmin4. The manipulation leads to uncontrolled search path. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. | CVSS3: 7.8 | 0% Низкий | почти 4 года назад | |
GHSA-w2rh-7p2w-889c The SimpleXMLRPCServer library module in Python 2.2, 2.3 before 2.3.5, and 2.4, when used by XML-RPC servers that use the register_instance method to register an object without a _dispatch method, allows remote attackers to read or modify globals of the associated module, and possibly execute arbitrary code, via dotted attributes. | 9% Низкий | почти 4 года назад | ||
GHSA-vrgr-679p-vf6w Visual Studio Code Python Extension Remote Code Execution Vulnerability | CVSS3: 7.8 | 1% Низкий | около 2 лет назад | |
GHSA-vp8q-678w-8xq9 The ssl.match_hostname function in the SSL module in Python 2.6 through 3.4 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408. | 3% Низкий | почти 4 года назад | ||
GHSA-vjph-xp4h-fpjw ** DISPUTED ** The MSI installer for Python through 2.7.16 on Windows defaults to the C:\Python27 directory, which makes it easier for local users to deploy Trojan horse code. (This also affects old 3.x releases before 3.5.) NOTE: the vendor's position is that it is the user's responsibility to ensure C:\Python27 access control or choose a different directory, because backwards compatibility requires that C:\Python27 remain the default for 2.7.x. | CVSS3: 7.8 | 0% Низкий | почти 4 года назад | |
GHSA-vc2m-m665-8xm2 If the value passed to os.path.expandvars() is user-controlled a performance degradation is possible when expanding environment variables. | 0% Низкий | 5 месяцев назад | ||
GHSA-v7q9-qwmc-9665 A remote code execution vulnerability exists in Visual Studio Code when the Python extension loads configuration files after opening a project, aka 'Visual Studio Code Python Extension Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1192. | CVSS3: 8.8 | 36% Средний | почти 4 года назад |
Уязвимостей на страницу