Логотип exploitDog
product: "python"
Консоль
Логотип exploitDog

exploitDog

product: "python"

Количество 870

Количество 870

suse-cvrf логотип

SUSE-SU-2021:0299-1

больше 4 лет назад

Security update for python-urllib3

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:3262-1

больше 4 лет назад

Security update for python3

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:3121-1

больше 4 лет назад

Security update for python

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:3115-1

больше 4 лет назад

Security update for python

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:14550-1

больше 4 лет назад

Security update for python

EPSS: Низкий
rocky логотип

RLSA-2024:3062

около 2 месяцев назад

Moderate: python3.11 security update

EPSS: Низкий
rocky логотип

RLSA-2024:0256

больше 1 года назад

Moderate: python3 security update

EPSS: Низкий
github логотип

GHSA-w7gf-rpqw-gx4f

около 3 лет назад

http.client in Python 3.x before 3.5.10, 3.6.x before 3.6.12, 3.7.x before 3.7.9, and 3.8.x before 3.8.5 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of HTTPConnection.request.

CVSS3: 7.2
EPSS: Низкий
github логотип

GHSA-q8w9-7fww-v592

около 3 лет назад

The XML parser (xmlparse.c) in expat before 2.1.0 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via an XML file with many identifiers with the same value.

EPSS: Низкий
github логотип

GHSA-cgfh-jp5w-8cmx

почти 2 года назад

An issue was discovered in compare_digest in Lib/hmac.py in Python through 3.9.1. Constant-time-defeating optimisations were possible in the accumulator variable in hmac.compare_digest.

CVSS3: 8.1
EPSS: Низкий
github логотип

GHSA-855w-qg6f-ffh7

около 3 лет назад

The overflow protection in Expat is removed by compilers with certain optimization settings, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via crafted XML data. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-1283 and CVE-2015-2716.

CVSS3: 8.1
EPSS: Низкий
github логотип

GHSA-6jr7-xr67-mgxw

почти 3 года назад

A flaw was found in python. In algorithms with quadratic time complexity using non-binary bases, when using int("text"), a system could take 50ms to parse an int string with 100,000 digits and 5s for 1,000,000 digits (float, decimal, int.from_bytes(), and int() for binary bases 2, 4, 8, 16, and 32 are not affected). The highest threat from this vulnerability is to system availability.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-67xf-xphq-9mcc

почти 3 года назад

A flaw was found in Python, specifically in the FTP (File Transfer Protocol) client library in PASV (passive) mode. The issue is how the FTP client trusts the host from the PASV response by default. This flaw allows an attacker to set up a malicious FTP server that can trick FTP clients into connecting back to a given IP address and port. This vulnerability could lead to FTP client scanning ports, which otherwise would not have been possible.

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-5mwm-wccq-xqcp

около 2 лет назад

The e-mail module of Python 0 - 2.7.18, 3.x - 3.11 incorrectly parses e-mail addresses which contain a special character. This vulnerability allows attackers to send messages from e-ail addresses that would otherwise be rejected.

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-3f7p-x3g9-9grh

больше 3 лет назад

In Python before 3.10.3 on Windows, local users can gain privileges because the search path is inadequately secured. The installer may allow a local attacker to add user-writable directories to the system search path. To exploit, an administrator must have installed Python for all users and enabled PATH entries. A non-administrative user can trigger a repair that incorrectly adds user-writable paths into PATH, enabling search-path hijacking of other users and system services. This affects Python (CPython) through 3.7.12, 3.8.x through 3.8.12, 3.9.x through 3.9.10, and 3.10.x through 3.10.2.

CVSS3: 7
EPSS: Низкий
ubuntu логотип

CVE-2023-27043

около 2 лет назад

The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 header is identified as the value of the addr-spec. In some applications, an attacker can bypass a protection mechanism in which application access is granted only after verifying receipt of e-mail to a specific domain (e.g., only @company.example.com addresses may be used for signup). This occurs in email/_parseaddr.py in recent versions of Python.

CVSS3: 5.3
EPSS: Низкий
redhat логотип

CVE-2023-27043

около 2 лет назад

The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 header is identified as the value of the addr-spec. In some applications, an attacker can bypass a protection mechanism in which application access is granted only after verifying receipt of e-mail to a specific domain (e.g., only @company.example.com addresses may be used for signup). This occurs in email/_parseaddr.py in recent versions of Python.

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2023-27043

около 2 лет назад

The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 header is identified as the value of the addr-spec. In some applications, an attacker can bypass a protection mechanism in which application access is granted only after verifying receipt of e-mail to a specific domain (e.g., only @company.example.com addresses may be used for signup). This occurs in email/_parseaddr.py in recent versions of Python.

CVSS3: 5.3
EPSS: Низкий
debian логотип

CVE-2023-27043

около 2 лет назад

The email module of Python through 3.11.3 incorrectly parses e-mail ad ...

CVSS3: 5.3
EPSS: Низкий
ubuntu логотип

CVE-2022-48566

почти 2 года назад

An issue was discovered in compare_digest in Lib/hmac.py in Python through 3.9.1. Constant-time-defeating optimisations were possible in the accumulator variable in hmac.compare_digest.

CVSS3: 5.9
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
suse-cvrf логотип
SUSE-SU-2021:0299-1

Security update for python-urllib3

0%
Низкий
больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2020:3262-1

Security update for python3

0%
Низкий
больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2020:3121-1

Security update for python

0%
Низкий
больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2020:3115-1

Security update for python

0%
Низкий
больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2020:14550-1

Security update for python

0%
Низкий
больше 4 лет назад
rocky логотип
RLSA-2024:3062

Moderate: python3.11 security update

0%
Низкий
около 2 месяцев назад
rocky логотип
RLSA-2024:0256

Moderate: python3 security update

0%
Низкий
больше 1 года назад
github логотип
GHSA-w7gf-rpqw-gx4f

http.client in Python 3.x before 3.5.10, 3.6.x before 3.6.12, 3.7.x before 3.7.9, and 3.8.x before 3.8.5 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of HTTPConnection.request.

CVSS3: 7.2
0%
Низкий
около 3 лет назад
github логотип
GHSA-q8w9-7fww-v592

The XML parser (xmlparse.c) in expat before 2.1.0 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via an XML file with many identifiers with the same value.

0%
Низкий
около 3 лет назад
github логотип
GHSA-cgfh-jp5w-8cmx

An issue was discovered in compare_digest in Lib/hmac.py in Python through 3.9.1. Constant-time-defeating optimisations were possible in the accumulator variable in hmac.compare_digest.

CVSS3: 8.1
0%
Низкий
почти 2 года назад
github логотип
GHSA-855w-qg6f-ffh7

The overflow protection in Expat is removed by compilers with certain optimization settings, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via crafted XML data. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-1283 and CVE-2015-2716.

CVSS3: 8.1
3%
Низкий
около 3 лет назад
github логотип
GHSA-6jr7-xr67-mgxw

A flaw was found in python. In algorithms with quadratic time complexity using non-binary bases, when using int("text"), a system could take 50ms to parse an int string with 100,000 digits and 5s for 1,000,000 digits (float, decimal, int.from_bytes(), and int() for binary bases 2, 4, 8, 16, and 32 are not affected). The highest threat from this vulnerability is to system availability.

CVSS3: 7.5
0%
Низкий
почти 3 года назад
github логотип
GHSA-67xf-xphq-9mcc

A flaw was found in Python, specifically in the FTP (File Transfer Protocol) client library in PASV (passive) mode. The issue is how the FTP client trusts the host from the PASV response by default. This flaw allows an attacker to set up a malicious FTP server that can trick FTP clients into connecting back to a given IP address and port. This vulnerability could lead to FTP client scanning ports, which otherwise would not have been possible.

CVSS3: 5.3
0%
Низкий
почти 3 года назад
github логотип
GHSA-5mwm-wccq-xqcp

The e-mail module of Python 0 - 2.7.18, 3.x - 3.11 incorrectly parses e-mail addresses which contain a special character. This vulnerability allows attackers to send messages from e-ail addresses that would otherwise be rejected.

CVSS3: 5.3
0%
Низкий
около 2 лет назад
github логотип
GHSA-3f7p-x3g9-9grh

In Python before 3.10.3 on Windows, local users can gain privileges because the search path is inadequately secured. The installer may allow a local attacker to add user-writable directories to the system search path. To exploit, an administrator must have installed Python for all users and enabled PATH entries. A non-administrative user can trigger a repair that incorrectly adds user-writable paths into PATH, enabling search-path hijacking of other users and system services. This affects Python (CPython) through 3.7.12, 3.8.x through 3.8.12, 3.9.x through 3.9.10, and 3.10.x through 3.10.2.

CVSS3: 7
1%
Низкий
больше 3 лет назад
ubuntu логотип
CVE-2023-27043

The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 header is identified as the value of the addr-spec. In some applications, an attacker can bypass a protection mechanism in which application access is granted only after verifying receipt of e-mail to a specific domain (e.g., only @company.example.com addresses may be used for signup). This occurs in email/_parseaddr.py in recent versions of Python.

CVSS3: 5.3
0%
Низкий
около 2 лет назад
redhat логотип
CVE-2023-27043

The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 header is identified as the value of the addr-spec. In some applications, an attacker can bypass a protection mechanism in which application access is granted only after verifying receipt of e-mail to a specific domain (e.g., only @company.example.com addresses may be used for signup). This occurs in email/_parseaddr.py in recent versions of Python.

CVSS3: 5.3
0%
Низкий
около 2 лет назад
nvd логотип
CVE-2023-27043

The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 header is identified as the value of the addr-spec. In some applications, an attacker can bypass a protection mechanism in which application access is granted only after verifying receipt of e-mail to a specific domain (e.g., only @company.example.com addresses may be used for signup). This occurs in email/_parseaddr.py in recent versions of Python.

CVSS3: 5.3
0%
Низкий
около 2 лет назад
debian логотип
CVE-2023-27043

The email module of Python through 3.11.3 incorrectly parses e-mail ad ...

CVSS3: 5.3
0%
Низкий
около 2 лет назад
ubuntu логотип
CVE-2022-48566

An issue was discovered in compare_digest in Lib/hmac.py in Python through 3.9.1. Constant-time-defeating optimisations were possible in the accumulator variable in hmac.compare_digest.

CVSS3: 5.9
0%
Низкий
почти 2 года назад

Уязвимостей на страницу