Логотип exploitDog
product: "python"
Консоль
Логотип exploitDog

exploitDog

product: "python"

Количество 870

Количество 870

rocky логотип

RLSA-2023:5463

больше 1 года назад

Important: python3.11 security update

EPSS: Низкий
rocky логотип

RLSA-2022:8493

больше 2 лет назад

Important: python3.9 security update

EPSS: Низкий
rocky логотип

RLSA-2022:8492

больше 2 лет назад

Important: python39:3.9 security update

EPSS: Низкий
github логотип

GHSA-wh3w-rqc7-4mpf

около 3 лет назад

Python 2.7 through 2.7.17, 3.5 through 3.5.9, 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1 allows an HTTP server to conduct Regular Expression Denial of Service (ReDoS) attacks against a client because of urllib.request.AbstractBasicAuthHandler catastrophic backtracking.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-w84r-7gx4-7v92

около 3 лет назад

A vulnerability classified as problematic was found in Python 2.7.13. This vulnerability affects unknown code of the component pgAdmin4. The manipulation leads to uncontrolled search path. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-w2rh-7p2w-889c

около 3 лет назад

The SimpleXMLRPCServer library module in Python 2.2, 2.3 before 2.3.5, and 2.4, when used by XML-RPC servers that use the register_instance method to register an object without a _dispatch method, allows remote attackers to read or modify globals of the associated module, and possibly execute arbitrary code, via dotted attributes.

EPSS: Низкий
github логотип

GHSA-vp8q-678w-8xq9

около 3 лет назад

The ssl.match_hostname function in the SSL module in Python 2.6 through 3.4 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.

EPSS: Низкий
github логотип

GHSA-vjph-xp4h-fpjw

около 3 лет назад

** DISPUTED ** The MSI installer for Python through 2.7.16 on Windows defaults to the C:\Python27 directory, which makes it easier for local users to deploy Trojan horse code. (This also affects old 3.x releases before 3.5.) NOTE: the vendor's position is that it is the user's responsibility to ensure C:\Python27 access control or choose a different directory, because backwards compatibility requires that C:\Python27 remain the default for 2.7.x.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-v6fx-m8cj-52v3

около 3 лет назад

The ssl.match_hostname function in CPython (aka Python) before 2.7.9 and 3.x before 3.3.3 does not properly handle wildcards in hostnames, which might allow man-in-the-middle attackers to spoof servers via a crafted certificate.

CVSS3: 5.9
EPSS: Низкий
github логотип

GHSA-v59x-92cq-qv2v

около 3 лет назад

os._execvpe from os.py in Python 2.2.1 and earlier creates temporary files with predictable names, which could allow local users to execute arbitrary code via a symlink attack.

EPSS: Низкий
github логотип

GHSA-v4w5-5ggg-69xc

около 3 лет назад

Multiple integer overflows in imageop.c in Python before 2.5.3 allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted images that trigger heap-based buffer overflows. NOTE: this issue is due to an incomplete fix for CVE-2007-4965.

EPSS: Низкий
github логотип

GHSA-v3f8-6665-x7rx

около 3 лет назад

An issue was discovered in urllib2 in Python 2.x through 2.7.17 and urllib in Python 3.x through 3.8.0. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the host component of a URL) followed by an HTTP header. This is similar to the CVE-2019-9740 query string issue and the CVE-2019-9947 path string issue. (This is not exploitable when glibc has CVE-2016-10739 fixed.)

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-rwj4-fxr5-gh64

около 3 лет назад

Python 2.7.14 is vulnerable to a Heap-Buffer-Overflow as well as a Heap-Use-After-Free. Python versions prior to 2.7.14 may also be vulnerable and it appears that Python 2.7.17 and prior may also be vulnerable however this has not been confirmed. The vulnerability lies when multiply threads are handling large amounts of data. In both cases there is essentially a race condition that occurs. For the Heap-Buffer-Overflow, Thread 2 is creating the size for a buffer, but Thread1 is already writing to the buffer without knowing how much to write. So when a large amount of data is being processed, it is very easy to cause memory corruption using a Heap-Buffer-Overflow. As for the Use-After-Free, Thread3->Malloc->Thread1->Free's->Thread2-Re-uses-Free'd Memory. The PSRT has stated that this is not a security vulnerability due to the fact that the attacker must be able to run code, however in some situations, such as function as a service, this vulnerability can potentially be used by an atta...

CVSS3: 3.6
EPSS: Низкий
github логотип

GHSA-rgg2-785f-2868

около 3 лет назад

The utf-16 decoder in Python 3.1 through 3.3 does not update the aligned_end variable after calling the unicode_decode_call_errorhandler function, which allows remote attackers to obtain sensitive information (process memory) or cause a denial of service (memory corruption and crash) via unspecified vectors.

EPSS: Низкий
github логотип

GHSA-rg2r-27jq-959f

около 3 лет назад

The gzip_decode function in the xmlrpc client library in Python 3.4 and earlier allows remote attackers to cause a denial of service (memory consumption) via a crafted HTTP request.

EPSS: Низкий
github логотип

GHSA-rcg8-wv74-2qwr

около 3 лет назад

Multiple buffer overflows in the RLE decoder in the rgbimg module in Python 2.5 allow remote attackers to have an unspecified impact via an image file containing crafted data that triggers improper processing within the (1) longimagedata or (2) expandrow function.

EPSS: Низкий
github логотип

GHSA-r68f-4xcm-3xr6

около 3 лет назад

CPython (aka Python) up to 2.7.13 is vulnerable to an integer overflow in the PyString_DecodeEscape function in stringobject.c, resulting in heap-based buffer overflow (and possible arbitrary code execution)

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-qhmv-wcg2-h8hx

около 3 лет назад

The documentation XML-RPC server in Python through 2.7.16, 3.x through 3.6.9, and 3.7.x through 3.7.4 has XSS via the server_title field. This occurs in Lib/DocXMLRPCServer.py in Python 2.x, and in Lib/xmlrpc/server.py in Python 3.x. If set_server_title is called with untrusted input, arbitrary JavaScript can be delivered to clients that visit the http URL for this server.

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-pvw5-cvp6-cv92

почти 2 года назад

A use-after-free exists in Python through 3.9 via heappushpop in heapq.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-pr57-xgx2-vrxx

около 3 лет назад

Stack-based buffer overflow in the file_compress function in minigzip (Modules/zlib) in Python 2.5 allows context-dependent attackers to execute arbitrary code via a long file argument.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
rocky логотип
RLSA-2023:5463

Important: python3.11 security update

0%
Низкий
больше 1 года назад
rocky логотип
RLSA-2022:8493

Important: python3.9 security update

0%
Низкий
больше 2 лет назад
rocky логотип
RLSA-2022:8492

Important: python39:3.9 security update

0%
Низкий
больше 2 лет назад
github логотип
GHSA-wh3w-rqc7-4mpf

Python 2.7 through 2.7.17, 3.5 through 3.5.9, 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1 allows an HTTP server to conduct Regular Expression Denial of Service (ReDoS) attacks against a client because of urllib.request.AbstractBasicAuthHandler catastrophic backtracking.

CVSS3: 6.5
4%
Низкий
около 3 лет назад
github логотип
GHSA-w84r-7gx4-7v92

A vulnerability classified as problematic was found in Python 2.7.13. This vulnerability affects unknown code of the component pgAdmin4. The manipulation leads to uncontrolled search path. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

CVSS3: 7.8
0%
Низкий
около 3 лет назад
github логотип
GHSA-w2rh-7p2w-889c

The SimpleXMLRPCServer library module in Python 2.2, 2.3 before 2.3.5, and 2.4, when used by XML-RPC servers that use the register_instance method to register an object without a _dispatch method, allows remote attackers to read or modify globals of the associated module, and possibly execute arbitrary code, via dotted attributes.

10%
Низкий
около 3 лет назад
github логотип
GHSA-vp8q-678w-8xq9

The ssl.match_hostname function in the SSL module in Python 2.6 through 3.4 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.

4%
Низкий
около 3 лет назад
github логотип
GHSA-vjph-xp4h-fpjw

** DISPUTED ** The MSI installer for Python through 2.7.16 on Windows defaults to the C:\Python27 directory, which makes it easier for local users to deploy Trojan horse code. (This also affects old 3.x releases before 3.5.) NOTE: the vendor's position is that it is the user's responsibility to ensure C:\Python27 access control or choose a different directory, because backwards compatibility requires that C:\Python27 remain the default for 2.7.x.

CVSS3: 7.8
0%
Низкий
около 3 лет назад
github логотип
GHSA-v6fx-m8cj-52v3

The ssl.match_hostname function in CPython (aka Python) before 2.7.9 and 3.x before 3.3.3 does not properly handle wildcards in hostnames, which might allow man-in-the-middle attackers to spoof servers via a crafted certificate.

CVSS3: 5.9
1%
Низкий
около 3 лет назад
github логотип
GHSA-v59x-92cq-qv2v

os._execvpe from os.py in Python 2.2.1 and earlier creates temporary files with predictable names, which could allow local users to execute arbitrary code via a symlink attack.

0%
Низкий
около 3 лет назад
github логотип
GHSA-v4w5-5ggg-69xc

Multiple integer overflows in imageop.c in Python before 2.5.3 allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted images that trigger heap-based buffer overflows. NOTE: this issue is due to an incomplete fix for CVE-2007-4965.

1%
Низкий
около 3 лет назад
github логотип
GHSA-v3f8-6665-x7rx

An issue was discovered in urllib2 in Python 2.x through 2.7.17 and urllib in Python 3.x through 3.8.0. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the host component of a URL) followed by an HTTP header. This is similar to the CVE-2019-9740 query string issue and the CVE-2019-9947 path string issue. (This is not exploitable when glibc has CVE-2016-10739 fixed.)

CVSS3: 6.1
1%
Низкий
около 3 лет назад
github логотип
GHSA-rwj4-fxr5-gh64

Python 2.7.14 is vulnerable to a Heap-Buffer-Overflow as well as a Heap-Use-After-Free. Python versions prior to 2.7.14 may also be vulnerable and it appears that Python 2.7.17 and prior may also be vulnerable however this has not been confirmed. The vulnerability lies when multiply threads are handling large amounts of data. In both cases there is essentially a race condition that occurs. For the Heap-Buffer-Overflow, Thread 2 is creating the size for a buffer, but Thread1 is already writing to the buffer without knowing how much to write. So when a large amount of data is being processed, it is very easy to cause memory corruption using a Heap-Buffer-Overflow. As for the Use-After-Free, Thread3->Malloc->Thread1->Free's->Thread2-Re-uses-Free'd Memory. The PSRT has stated that this is not a security vulnerability due to the fact that the attacker must be able to run code, however in some situations, such as function as a service, this vulnerability can potentially be used by an atta...

CVSS3: 3.6
1%
Низкий
около 3 лет назад
github логотип
GHSA-rgg2-785f-2868

The utf-16 decoder in Python 3.1 through 3.3 does not update the aligned_end variable after calling the unicode_decode_call_errorhandler function, which allows remote attackers to obtain sensitive information (process memory) or cause a denial of service (memory corruption and crash) via unspecified vectors.

2%
Низкий
около 3 лет назад
github логотип
GHSA-rg2r-27jq-959f

The gzip_decode function in the xmlrpc client library in Python 3.4 and earlier allows remote attackers to cause a denial of service (memory consumption) via a crafted HTTP request.

1%
Низкий
около 3 лет назад
github логотип
GHSA-rcg8-wv74-2qwr

Multiple buffer overflows in the RLE decoder in the rgbimg module in Python 2.5 allow remote attackers to have an unspecified impact via an image file containing crafted data that triggers improper processing within the (1) longimagedata or (2) expandrow function.

3%
Низкий
около 3 лет назад
github логотип
GHSA-r68f-4xcm-3xr6

CPython (aka Python) up to 2.7.13 is vulnerable to an integer overflow in the PyString_DecodeEscape function in stringobject.c, resulting in heap-based buffer overflow (and possible arbitrary code execution)

CVSS3: 9.8
2%
Низкий
около 3 лет назад
github логотип
GHSA-qhmv-wcg2-h8hx

The documentation XML-RPC server in Python through 2.7.16, 3.x through 3.6.9, and 3.7.x through 3.7.4 has XSS via the server_title field. This occurs in Lib/DocXMLRPCServer.py in Python 2.x, and in Lib/xmlrpc/server.py in Python 3.x. If set_server_title is called with untrusted input, arbitrary JavaScript can be delivered to clients that visit the http URL for this server.

CVSS3: 6.1
1%
Низкий
около 3 лет назад
github логотип
GHSA-pvw5-cvp6-cv92

A use-after-free exists in Python through 3.9 via heappushpop in heapq.

CVSS3: 7.5
0%
Низкий
почти 2 года назад
github логотип
GHSA-pr57-xgx2-vrxx

Stack-based buffer overflow in the file_compress function in minigzip (Modules/zlib) in Python 2.5 allows context-dependent attackers to execute arbitrary code via a long file argument.

4%
Низкий
около 3 лет назад

Уязвимостей на страницу