Количество 879
Количество 879

openSUSE-SU-2020:1859-1
Security update for python

SUSE-SU-2024:0595-1
Security update for python310

SUSE-SU-2024:0581-1
Security update for python3

SUSE-SU-2024:0438-1
Security update for python3

SUSE-SU-2024:0437-1
Security update for python

SUSE-SU-2024:0436-1
Security update for python36

SUSE-SU-2024:0329-2
Security update for python

SUSE-SU-2024:0329-1
Security update for python

SUSE-SU-2021:0341-1
Security update for python-urllib3

SUSE-SU-2021:0299-1
Security update for python-urllib3

SUSE-SU-2020:3262-1
Security update for python3

SUSE-SU-2020:3121-1
Security update for python

SUSE-SU-2020:3115-1
Security update for python

SUSE-SU-2020:14550-1
Security update for python

RLSA-2024:3062
Moderate: python3.11 security update

RLSA-2024:0256
Moderate: python3 security update
GHSA-w7gf-rpqw-gx4f
http.client in Python 3.x before 3.5.10, 3.6.x before 3.6.12, 3.7.x before 3.7.9, and 3.8.x before 3.8.5 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of HTTPConnection.request.
GHSA-q8w9-7fww-v592
The XML parser (xmlparse.c) in expat before 2.1.0 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via an XML file with many identifiers with the same value.
GHSA-cgfh-jp5w-8cmx
An issue was discovered in compare_digest in Lib/hmac.py in Python through 3.9.1. Constant-time-defeating optimisations were possible in the accumulator variable in hmac.compare_digest.
GHSA-855w-qg6f-ffh7
The overflow protection in Expat is removed by compilers with certain optimization settings, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via crafted XML data. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-1283 and CVE-2015-2716.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | openSUSE-SU-2020:1859-1 Security update for python | 1% Низкий | почти 5 лет назад | |
![]() | SUSE-SU-2024:0595-1 Security update for python310 | 0% Низкий | больше 1 года назад | |
![]() | SUSE-SU-2024:0581-1 Security update for python3 | 0% Низкий | больше 1 года назад | |
![]() | SUSE-SU-2024:0438-1 Security update for python3 | 0% Низкий | больше 1 года назад | |
![]() | SUSE-SU-2024:0437-1 Security update for python | 0% Низкий | больше 1 года назад | |
![]() | SUSE-SU-2024:0436-1 Security update for python36 | 0% Низкий | больше 1 года назад | |
![]() | SUSE-SU-2024:0329-2 Security update for python | 0% Низкий | больше 1 года назад | |
![]() | SUSE-SU-2024:0329-1 Security update for python | 0% Низкий | больше 1 года назад | |
![]() | SUSE-SU-2021:0341-1 Security update for python-urllib3 | 1% Низкий | больше 4 лет назад | |
![]() | SUSE-SU-2021:0299-1 Security update for python-urllib3 | 1% Низкий | больше 4 лет назад | |
![]() | SUSE-SU-2020:3262-1 Security update for python3 | 1% Низкий | больше 4 лет назад | |
![]() | SUSE-SU-2020:3121-1 Security update for python | 1% Низкий | почти 5 лет назад | |
![]() | SUSE-SU-2020:3115-1 Security update for python | 1% Низкий | почти 5 лет назад | |
![]() | SUSE-SU-2020:14550-1 Security update for python | 1% Низкий | больше 4 лет назад | |
![]() | RLSA-2024:3062 Moderate: python3.11 security update | 0% Низкий | 3 месяца назад | |
![]() | RLSA-2024:0256 Moderate: python3 security update | 0% Низкий | больше 1 года назад | |
GHSA-w7gf-rpqw-gx4f http.client in Python 3.x before 3.5.10, 3.6.x before 3.6.12, 3.7.x before 3.7.9, and 3.8.x before 3.8.5 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of HTTPConnection.request. | CVSS3: 7.2 | 1% Низкий | около 3 лет назад | |
GHSA-q8w9-7fww-v592 The XML parser (xmlparse.c) in expat before 2.1.0 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via an XML file with many identifiers with the same value. | 0% Низкий | около 3 лет назад | ||
GHSA-cgfh-jp5w-8cmx An issue was discovered in compare_digest in Lib/hmac.py in Python through 3.9.1. Constant-time-defeating optimisations were possible in the accumulator variable in hmac.compare_digest. | CVSS3: 8.1 | 0% Низкий | почти 2 года назад | |
GHSA-855w-qg6f-ffh7 The overflow protection in Expat is removed by compilers with certain optimization settings, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via crafted XML data. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-1283 and CVE-2015-2716. | CVSS3: 8.1 | 2% Низкий | около 3 лет назад |
Уязвимостей на страницу