Количество 924
Количество 924
SUSE-SU-2024:0437-1
Security update for python
SUSE-SU-2024:0436-1
Security update for python36
SUSE-SU-2024:0329-2
Security update for python
SUSE-SU-2024:0329-1
Security update for python
SUSE-SU-2021:0341-1
Security update for python-urllib3
SUSE-SU-2021:0299-1
Security update for python-urllib3
SUSE-SU-2020:3262-1
Security update for python3
SUSE-SU-2020:3121-1
Security update for python
SUSE-SU-2020:3115-1
Security update for python
SUSE-SU-2020:14550-1
Security update for python
RLSA-2024:3062
Moderate: python3.11 security update
RLSA-2024:0256
Moderate: python3 security update
RLSA-2022:7323
Moderate: python3.9 security update
GHSA-w7gf-rpqw-gx4f
http.client in Python 3.x before 3.5.10, 3.6.x before 3.6.12, 3.7.x before 3.7.9, and 3.8.x before 3.8.5 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of HTTPConnection.request.
GHSA-q8w9-7fww-v592
The XML parser (xmlparse.c) in expat before 2.1.0 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via an XML file with many identifiers with the same value.
GHSA-cgfh-jp5w-8cmx
An issue was discovered in compare_digest in Lib/hmac.py in Python through 3.9.1. Constant-time-defeating optimisations were possible in the accumulator variable in hmac.compare_digest.
GHSA-855w-qg6f-ffh7
The overflow protection in Expat is removed by compilers with certain optimization settings, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via crafted XML data. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-1283 and CVE-2015-2716.
GHSA-6jr7-xr67-mgxw
A flaw was found in python. In algorithms with quadratic time complexity using non-binary bases, when using int("text"), a system could take 50ms to parse an int string with 100,000 digits and 5s for 1,000,000 digits (float, decimal, int.from_bytes(), and int() for binary bases 2, 4, 8, 16, and 32 are not affected). The highest threat from this vulnerability is to system availability.
GHSA-67xf-xphq-9mcc
A flaw was found in Python, specifically in the FTP (File Transfer Protocol) client library in PASV (passive) mode. The issue is how the FTP client trusts the host from the PASV response by default. This flaw allows an attacker to set up a malicious FTP server that can trick FTP clients into connecting back to a given IP address and port. This vulnerability could lead to FTP client scanning ports, which otherwise would not have been possible.
GHSA-5mwm-wccq-xqcp
The e-mail module of Python 0 - 2.7.18, 3.x - 3.11 incorrectly parses e-mail addresses which contain a special character. This vulnerability allows attackers to send messages from e-ail addresses that would otherwise be rejected.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
SUSE-SU-2024:0437-1 Security update for python | 0% Низкий | около 2 лет назад | ||
SUSE-SU-2024:0436-1 Security update for python36 | 0% Низкий | около 2 лет назад | ||
SUSE-SU-2024:0329-2 Security update for python | 0% Низкий | около 2 лет назад | ||
SUSE-SU-2024:0329-1 Security update for python | 0% Низкий | около 2 лет назад | ||
SUSE-SU-2021:0341-1 Security update for python-urllib3 | 1% Низкий | около 5 лет назад | ||
SUSE-SU-2021:0299-1 Security update for python-urllib3 | 1% Низкий | около 5 лет назад | ||
SUSE-SU-2020:3262-1 Security update for python3 | 1% Низкий | больше 5 лет назад | ||
SUSE-SU-2020:3121-1 Security update for python | 1% Низкий | больше 5 лет назад | ||
SUSE-SU-2020:3115-1 Security update for python | 1% Низкий | больше 5 лет назад | ||
SUSE-SU-2020:14550-1 Security update for python | 1% Низкий | больше 5 лет назад | ||
RLSA-2024:3062 Moderate: python3.11 security update | 0% Низкий | 11 месяцев назад | ||
RLSA-2024:0256 Moderate: python3 security update | 0% Низкий | около 2 лет назад | ||
RLSA-2022:7323 Moderate: python3.9 security update | 0% Низкий | больше 3 лет назад | ||
GHSA-w7gf-rpqw-gx4f http.client in Python 3.x before 3.5.10, 3.6.x before 3.6.12, 3.7.x before 3.7.9, and 3.8.x before 3.8.5 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of HTTPConnection.request. | CVSS3: 7.2 | 1% Низкий | почти 4 года назад | |
GHSA-q8w9-7fww-v592 The XML parser (xmlparse.c) in expat before 2.1.0 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via an XML file with many identifiers with the same value. | 0% Низкий | почти 4 года назад | ||
GHSA-cgfh-jp5w-8cmx An issue was discovered in compare_digest in Lib/hmac.py in Python through 3.9.1. Constant-time-defeating optimisations were possible in the accumulator variable in hmac.compare_digest. | CVSS3: 8.1 | 0% Низкий | больше 2 лет назад | |
GHSA-855w-qg6f-ffh7 The overflow protection in Expat is removed by compilers with certain optimization settings, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via crafted XML data. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-1283 and CVE-2015-2716. | CVSS3: 8.1 | 2% Низкий | почти 4 года назад | |
GHSA-6jr7-xr67-mgxw A flaw was found in python. In algorithms with quadratic time complexity using non-binary bases, when using int("text"), a system could take 50ms to parse an int string with 100,000 digits and 5s for 1,000,000 digits (float, decimal, int.from_bytes(), and int() for binary bases 2, 4, 8, 16, and 32 are not affected). The highest threat from this vulnerability is to system availability. | CVSS3: 7.5 | 0% Низкий | больше 3 лет назад | |
GHSA-67xf-xphq-9mcc A flaw was found in Python, specifically in the FTP (File Transfer Protocol) client library in PASV (passive) mode. The issue is how the FTP client trusts the host from the PASV response by default. This flaw allows an attacker to set up a malicious FTP server that can trick FTP clients into connecting back to a given IP address and port. This vulnerability could lead to FTP client scanning ports, which otherwise would not have been possible. | CVSS3: 5.3 | 1% Низкий | больше 3 лет назад | |
GHSA-5mwm-wccq-xqcp The e-mail module of Python 0 - 2.7.18, 3.x - 3.11 incorrectly parses e-mail addresses which contain a special character. This vulnerability allows attackers to send messages from e-ail addresses that would otherwise be rejected. | CVSS3: 5.3 | 0% Низкий | почти 3 года назад |
Уязвимостей на страницу