Количество 915
Количество 915
RLSA-2024:8374
Moderate: python3.11 security update
RLSA-2024:8359
Moderate: python39:3.9 and python39-devel:3.9 security update
RLSA-2024:11111
Moderate: python3.11 security update
RLSA-2024:10979
Moderate: python3.11 security update
RLSA-2023:5997
Important: python3 security update
RLSA-2023:5463
Important: python3.11 security update
RLSA-2022:8493
Important: python3.9 security update
RLSA-2022:8492
Important: python39:3.9 security update
GHSA-wh3w-rqc7-4mpf
Python 2.7 through 2.7.17, 3.5 through 3.5.9, 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1 allows an HTTP server to conduct Regular Expression Denial of Service (ReDoS) attacks against a client because of urllib.request.AbstractBasicAuthHandler catastrophic backtracking.
GHSA-w84r-7gx4-7v92
A vulnerability classified as problematic was found in Python 2.7.13. This vulnerability affects unknown code of the component pgAdmin4. The manipulation leads to uncontrolled search path. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
GHSA-w2rh-7p2w-889c
The SimpleXMLRPCServer library module in Python 2.2, 2.3 before 2.3.5, and 2.4, when used by XML-RPC servers that use the register_instance method to register an object without a _dispatch method, allows remote attackers to read or modify globals of the associated module, and possibly execute arbitrary code, via dotted attributes.
GHSA-vrgr-679p-vf6w
Visual Studio Code Python Extension Remote Code Execution Vulnerability
GHSA-vp8q-678w-8xq9
The ssl.match_hostname function in the SSL module in Python 2.6 through 3.4 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
GHSA-vjph-xp4h-fpjw
** DISPUTED ** The MSI installer for Python through 2.7.16 on Windows defaults to the C:\Python27 directory, which makes it easier for local users to deploy Trojan horse code. (This also affects old 3.x releases before 3.5.) NOTE: the vendor's position is that it is the user's responsibility to ensure C:\Python27 access control or choose a different directory, because backwards compatibility requires that C:\Python27 remain the default for 2.7.x.
GHSA-vc2m-m665-8xm2
If the value passed to os.path.expandvars() is user-controlled a performance degradation is possible when expanding environment variables.
GHSA-v7q9-qwmc-9665
A remote code execution vulnerability exists in Visual Studio Code when the Python extension loads configuration files after opening a project, aka 'Visual Studio Code Python Extension Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1192.
GHSA-v6fx-m8cj-52v3
The ssl.match_hostname function in CPython (aka Python) before 2.7.9 and 3.x before 3.3.3 does not properly handle wildcards in hostnames, which might allow man-in-the-middle attackers to spoof servers via a crafted certificate.
GHSA-v59x-92cq-qv2v
os._execvpe from os.py in Python 2.2.1 and earlier creates temporary files with predictable names, which could allow local users to execute arbitrary code via a symlink attack.
GHSA-v4w5-5ggg-69xc
Multiple integer overflows in imageop.c in Python before 2.5.3 allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted images that trigger heap-based buffer overflows. NOTE: this issue is due to an incomplete fix for CVE-2007-4965.
GHSA-v3f8-6665-x7rx
An issue was discovered in urllib2 in Python 2.x through 2.7.17 and urllib in Python 3.x through 3.8.0. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the host component of a URL) followed by an HTTP header. This is similar to the CVE-2019-9740 query string issue and the CVE-2019-9947 path string issue. (This is not exploitable when glibc has CVE-2016-10739 fixed.)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
RLSA-2024:8374 Moderate: python3.11 security update | 3% Низкий | больше 1 года назад | ||
RLSA-2024:8359 Moderate: python39:3.9 and python39-devel:3.9 security update | 3% Низкий | больше 1 года назад | ||
RLSA-2024:11111 Moderate: python3.11 security update | 0% Низкий | 11 месяцев назад | ||
RLSA-2024:10979 Moderate: python3.11 security update | 0% Низкий | около 1 года назад | ||
RLSA-2023:5997 Important: python3 security update | 1% Низкий | больше 2 лет назад | ||
RLSA-2023:5463 Important: python3.11 security update | 1% Низкий | больше 2 лет назад | ||
RLSA-2022:8493 Important: python3.9 security update | 0% Низкий | около 3 лет назад | ||
RLSA-2022:8492 Important: python39:3.9 security update | 0% Низкий | около 3 лет назад | ||
GHSA-wh3w-rqc7-4mpf Python 2.7 through 2.7.17, 3.5 through 3.5.9, 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1 allows an HTTP server to conduct Regular Expression Denial of Service (ReDoS) attacks against a client because of urllib.request.AbstractBasicAuthHandler catastrophic backtracking. | CVSS3: 6.5 | 4% Низкий | больше 3 лет назад | |
GHSA-w84r-7gx4-7v92 A vulnerability classified as problematic was found in Python 2.7.13. This vulnerability affects unknown code of the component pgAdmin4. The manipulation leads to uncontrolled search path. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. | CVSS3: 7.8 | 0% Низкий | больше 3 лет назад | |
GHSA-w2rh-7p2w-889c The SimpleXMLRPCServer library module in Python 2.2, 2.3 before 2.3.5, and 2.4, when used by XML-RPC servers that use the register_instance method to register an object without a _dispatch method, allows remote attackers to read or modify globals of the associated module, and possibly execute arbitrary code, via dotted attributes. | 9% Низкий | почти 4 года назад | ||
GHSA-vrgr-679p-vf6w Visual Studio Code Python Extension Remote Code Execution Vulnerability | CVSS3: 7.8 | 1% Низкий | около 2 лет назад | |
GHSA-vp8q-678w-8xq9 The ssl.match_hostname function in the SSL module in Python 2.6 through 3.4 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408. | 4% Низкий | больше 3 лет назад | ||
GHSA-vjph-xp4h-fpjw ** DISPUTED ** The MSI installer for Python through 2.7.16 on Windows defaults to the C:\Python27 directory, which makes it easier for local users to deploy Trojan horse code. (This also affects old 3.x releases before 3.5.) NOTE: the vendor's position is that it is the user's responsibility to ensure C:\Python27 access control or choose a different directory, because backwards compatibility requires that C:\Python27 remain the default for 2.7.x. | CVSS3: 7.8 | 0% Низкий | больше 3 лет назад | |
GHSA-vc2m-m665-8xm2 If the value passed to os.path.expandvars() is user-controlled a performance degradation is possible when expanding environment variables. | 0% Низкий | 3 месяца назад | ||
GHSA-v7q9-qwmc-9665 A remote code execution vulnerability exists in Visual Studio Code when the Python extension loads configuration files after opening a project, aka 'Visual Studio Code Python Extension Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1192. | CVSS3: 8.8 | 36% Средний | больше 3 лет назад | |
GHSA-v6fx-m8cj-52v3 The ssl.match_hostname function in CPython (aka Python) before 2.7.9 and 3.x before 3.3.3 does not properly handle wildcards in hostnames, which might allow man-in-the-middle attackers to spoof servers via a crafted certificate. | CVSS3: 5.9 | 0% Низкий | больше 3 лет назад | |
GHSA-v59x-92cq-qv2v os._execvpe from os.py in Python 2.2.1 and earlier creates temporary files with predictable names, which could allow local users to execute arbitrary code via a symlink attack. | 0% Низкий | почти 4 года назад | ||
GHSA-v4w5-5ggg-69xc Multiple integer overflows in imageop.c in Python before 2.5.3 allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted images that trigger heap-based buffer overflows. NOTE: this issue is due to an incomplete fix for CVE-2007-4965. | 0% Низкий | почти 4 года назад | ||
GHSA-v3f8-6665-x7rx An issue was discovered in urllib2 in Python 2.x through 2.7.17 and urllib in Python 3.x through 3.8.0. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the host component of a URL) followed by an HTTP header. This is similar to the CVE-2019-9740 query string issue and the CVE-2019-9947 path string issue. (This is not exploitable when glibc has CVE-2016-10739 fixed.) | CVSS3: 6.1 | 3% Низкий | больше 3 лет назад |
Уязвимостей на страницу