Логотип exploitDog
product: "python"
Консоль
Логотип exploitDog

exploitDog

product: "python"

Количество 924

Количество 924

rocky логотип

RLSA-2024:8838

больше 1 года назад

Moderate: python3.11 security update

EPSS: Низкий
rocky логотип

RLSA-2024:8836

больше 1 года назад

Moderate: python3.12 security update

EPSS: Низкий
rocky логотип

RLSA-2024:8447

больше 1 года назад

Moderate: python3.12 security update

EPSS: Низкий
rocky логотип

RLSA-2024:8446

больше 1 года назад

Moderate: python3.9 security update

EPSS: Низкий
rocky логотип

RLSA-2024:8374

больше 1 года назад

Moderate: python3.11 security update

EPSS: Низкий
rocky логотип

RLSA-2024:8359

больше 1 года назад

Moderate: python39:3.9 and python39-devel:3.9 security update

EPSS: Низкий
rocky логотип

RLSA-2024:11111

около 1 года назад

Moderate: python3.11 security update

EPSS: Низкий
rocky логотип

RLSA-2024:10979

больше 1 года назад

Moderate: python3.11 security update

EPSS: Низкий
rocky логотип

RLSA-2023:5997

больше 2 лет назад

Important: python3 security update

EPSS: Низкий
rocky логотип

RLSA-2023:5463

больше 2 лет назад

Important: python3.11 security update

EPSS: Низкий
rocky логотип

RLSA-2022:8493

больше 3 лет назад

Important: python3.9 security update

EPSS: Низкий
rocky логотип

RLSA-2022:8492

больше 3 лет назад

Important: python39:3.9 security update

EPSS: Низкий
github логотип

GHSA-wh3w-rqc7-4mpf

почти 4 года назад

Python 2.7 through 2.7.17, 3.5 through 3.5.9, 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1 allows an HTTP server to conduct Regular Expression Denial of Service (ReDoS) attacks against a client because of urllib.request.AbstractBasicAuthHandler catastrophic backtracking.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-w84r-7gx4-7v92

почти 4 года назад

A vulnerability classified as problematic was found in Python 2.7.13. This vulnerability affects unknown code of the component pgAdmin4. The manipulation leads to uncontrolled search path. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-w2rh-7p2w-889c

почти 4 года назад

The SimpleXMLRPCServer library module in Python 2.2, 2.3 before 2.3.5, and 2.4, when used by XML-RPC servers that use the register_instance method to register an object without a _dispatch method, allows remote attackers to read or modify globals of the associated module, and possibly execute arbitrary code, via dotted attributes.

EPSS: Низкий
github логотип

GHSA-vrgr-679p-vf6w

около 2 лет назад

Visual Studio Code Python Extension Remote Code Execution Vulnerability

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-vp8q-678w-8xq9

почти 4 года назад

The ssl.match_hostname function in the SSL module in Python 2.6 through 3.4 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.

EPSS: Низкий
github логотип

GHSA-vjph-xp4h-fpjw

почти 4 года назад

** DISPUTED ** The MSI installer for Python through 2.7.16 on Windows defaults to the C:\Python27 directory, which makes it easier for local users to deploy Trojan horse code. (This also affects old 3.x releases before 3.5.) NOTE: the vendor's position is that it is the user's responsibility to ensure C:\Python27 access control or choose a different directory, because backwards compatibility requires that C:\Python27 remain the default for 2.7.x.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-vc2m-m665-8xm2

5 месяцев назад

If the value passed to os.path.expandvars() is user-controlled a performance degradation is possible when expanding environment variables.

EPSS: Низкий
github логотип

GHSA-v7q9-qwmc-9665

почти 4 года назад

A remote code execution vulnerability exists in Visual Studio Code when the Python extension loads configuration files after opening a project, aka 'Visual Studio Code Python Extension Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1192.

CVSS3: 8.8
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
rocky логотип
RLSA-2024:8838

Moderate: python3.11 security update

3%
Низкий
больше 1 года назад
rocky логотип
RLSA-2024:8836

Moderate: python3.12 security update

3%
Низкий
больше 1 года назад
rocky логотип
RLSA-2024:8447

Moderate: python3.12 security update

3%
Низкий
больше 1 года назад
rocky логотип
RLSA-2024:8446

Moderate: python3.9 security update

3%
Низкий
больше 1 года назад
rocky логотип
RLSA-2024:8374

Moderate: python3.11 security update

3%
Низкий
больше 1 года назад
rocky логотип
RLSA-2024:8359

Moderate: python39:3.9 and python39-devel:3.9 security update

3%
Низкий
больше 1 года назад
rocky логотип
RLSA-2024:11111

Moderate: python3.11 security update

0%
Низкий
около 1 года назад
rocky логотип
RLSA-2024:10979

Moderate: python3.11 security update

0%
Низкий
больше 1 года назад
rocky логотип
RLSA-2023:5997

Important: python3 security update

1%
Низкий
больше 2 лет назад
rocky логотип
RLSA-2023:5463

Important: python3.11 security update

1%
Низкий
больше 2 лет назад
rocky логотип
RLSA-2022:8493

Important: python3.9 security update

0%
Низкий
больше 3 лет назад
rocky логотип
RLSA-2022:8492

Important: python39:3.9 security update

0%
Низкий
больше 3 лет назад
github логотип
GHSA-wh3w-rqc7-4mpf

Python 2.7 through 2.7.17, 3.5 through 3.5.9, 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1 allows an HTTP server to conduct Regular Expression Denial of Service (ReDoS) attacks against a client because of urllib.request.AbstractBasicAuthHandler catastrophic backtracking.

CVSS3: 6.5
5%
Низкий
почти 4 года назад
github логотип
GHSA-w84r-7gx4-7v92

A vulnerability classified as problematic was found in Python 2.7.13. This vulnerability affects unknown code of the component pgAdmin4. The manipulation leads to uncontrolled search path. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

CVSS3: 7.8
0%
Низкий
почти 4 года назад
github логотип
GHSA-w2rh-7p2w-889c

The SimpleXMLRPCServer library module in Python 2.2, 2.3 before 2.3.5, and 2.4, when used by XML-RPC servers that use the register_instance method to register an object without a _dispatch method, allows remote attackers to read or modify globals of the associated module, and possibly execute arbitrary code, via dotted attributes.

9%
Низкий
почти 4 года назад
github логотип
GHSA-vrgr-679p-vf6w

Visual Studio Code Python Extension Remote Code Execution Vulnerability

CVSS3: 7.8
1%
Низкий
около 2 лет назад
github логотип
GHSA-vp8q-678w-8xq9

The ssl.match_hostname function in the SSL module in Python 2.6 through 3.4 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.

3%
Низкий
почти 4 года назад
github логотип
GHSA-vjph-xp4h-fpjw

** DISPUTED ** The MSI installer for Python through 2.7.16 on Windows defaults to the C:\Python27 directory, which makes it easier for local users to deploy Trojan horse code. (This also affects old 3.x releases before 3.5.) NOTE: the vendor's position is that it is the user's responsibility to ensure C:\Python27 access control or choose a different directory, because backwards compatibility requires that C:\Python27 remain the default for 2.7.x.

CVSS3: 7.8
0%
Низкий
почти 4 года назад
github логотип
GHSA-vc2m-m665-8xm2

If the value passed to os.path.expandvars() is user-controlled a performance degradation is possible when expanding environment variables.

0%
Низкий
5 месяцев назад
github логотип
GHSA-v7q9-qwmc-9665

A remote code execution vulnerability exists in Visual Studio Code when the Python extension loads configuration files after opening a project, aka 'Visual Studio Code Python Extension Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1192.

CVSS3: 8.8
36%
Средний
почти 4 года назад

Уязвимостей на страницу