Логотип exploitDog
product: "python"
Консоль
Логотип exploitDog

exploitDog

product: "python"

Количество 924

Количество 924

suse-cvrf логотип

SUSE-SU-2024:0437-1

около 2 лет назад

Security update for python

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:0436-1

около 2 лет назад

Security update for python36

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:0329-2

около 2 лет назад

Security update for python

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:0329-1

около 2 лет назад

Security update for python

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:0341-1

около 5 лет назад

Security update for python-urllib3

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:0299-1

около 5 лет назад

Security update for python-urllib3

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:3262-1

больше 5 лет назад

Security update for python3

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:3121-1

больше 5 лет назад

Security update for python

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:3115-1

больше 5 лет назад

Security update for python

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:14550-1

больше 5 лет назад

Security update for python

EPSS: Низкий
rocky логотип

RLSA-2024:3062

11 месяцев назад

Moderate: python3.11 security update

EPSS: Низкий
rocky логотип

RLSA-2024:0256

около 2 лет назад

Moderate: python3 security update

EPSS: Низкий
rocky логотип

RLSA-2022:7323

больше 3 лет назад

Moderate: python3.9 security update

EPSS: Низкий
github логотип

GHSA-w7gf-rpqw-gx4f

почти 4 года назад

http.client in Python 3.x before 3.5.10, 3.6.x before 3.6.12, 3.7.x before 3.7.9, and 3.8.x before 3.8.5 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of HTTPConnection.request.

CVSS3: 7.2
EPSS: Низкий
github логотип

GHSA-q8w9-7fww-v592

почти 4 года назад

The XML parser (xmlparse.c) in expat before 2.1.0 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via an XML file with many identifiers with the same value.

EPSS: Низкий
github логотип

GHSA-cgfh-jp5w-8cmx

больше 2 лет назад

An issue was discovered in compare_digest in Lib/hmac.py in Python through 3.9.1. Constant-time-defeating optimisations were possible in the accumulator variable in hmac.compare_digest.

CVSS3: 8.1
EPSS: Низкий
github логотип

GHSA-855w-qg6f-ffh7

почти 4 года назад

The overflow protection in Expat is removed by compilers with certain optimization settings, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via crafted XML data. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-1283 and CVE-2015-2716.

CVSS3: 8.1
EPSS: Низкий
github логотип

GHSA-6jr7-xr67-mgxw

больше 3 лет назад

A flaw was found in python. In algorithms with quadratic time complexity using non-binary bases, when using int("text"), a system could take 50ms to parse an int string with 100,000 digits and 5s for 1,000,000 digits (float, decimal, int.from_bytes(), and int() for binary bases 2, 4, 8, 16, and 32 are not affected). The highest threat from this vulnerability is to system availability.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-67xf-xphq-9mcc

больше 3 лет назад

A flaw was found in Python, specifically in the FTP (File Transfer Protocol) client library in PASV (passive) mode. The issue is how the FTP client trusts the host from the PASV response by default. This flaw allows an attacker to set up a malicious FTP server that can trick FTP clients into connecting back to a given IP address and port. This vulnerability could lead to FTP client scanning ports, which otherwise would not have been possible.

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-5mwm-wccq-xqcp

почти 3 года назад

The e-mail module of Python 0 - 2.7.18, 3.x - 3.11 incorrectly parses e-mail addresses which contain a special character. This vulnerability allows attackers to send messages from e-ail addresses that would otherwise be rejected.

CVSS3: 5.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
suse-cvrf логотип
SUSE-SU-2024:0437-1

Security update for python

0%
Низкий
около 2 лет назад
suse-cvrf логотип
SUSE-SU-2024:0436-1

Security update for python36

0%
Низкий
около 2 лет назад
suse-cvrf логотип
SUSE-SU-2024:0329-2

Security update for python

0%
Низкий
около 2 лет назад
suse-cvrf логотип
SUSE-SU-2024:0329-1

Security update for python

0%
Низкий
около 2 лет назад
suse-cvrf логотип
SUSE-SU-2021:0341-1

Security update for python-urllib3

1%
Низкий
около 5 лет назад
suse-cvrf логотип
SUSE-SU-2021:0299-1

Security update for python-urllib3

1%
Низкий
около 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:3262-1

Security update for python3

1%
Низкий
больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:3121-1

Security update for python

1%
Низкий
больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:3115-1

Security update for python

1%
Низкий
больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:14550-1

Security update for python

1%
Низкий
больше 5 лет назад
rocky логотип
RLSA-2024:3062

Moderate: python3.11 security update

0%
Низкий
11 месяцев назад
rocky логотип
RLSA-2024:0256

Moderate: python3 security update

0%
Низкий
около 2 лет назад
rocky логотип
RLSA-2022:7323

Moderate: python3.9 security update

0%
Низкий
больше 3 лет назад
github логотип
GHSA-w7gf-rpqw-gx4f

http.client in Python 3.x before 3.5.10, 3.6.x before 3.6.12, 3.7.x before 3.7.9, and 3.8.x before 3.8.5 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of HTTPConnection.request.

CVSS3: 7.2
1%
Низкий
почти 4 года назад
github логотип
GHSA-q8w9-7fww-v592

The XML parser (xmlparse.c) in expat before 2.1.0 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via an XML file with many identifiers with the same value.

0%
Низкий
почти 4 года назад
github логотип
GHSA-cgfh-jp5w-8cmx

An issue was discovered in compare_digest in Lib/hmac.py in Python through 3.9.1. Constant-time-defeating optimisations were possible in the accumulator variable in hmac.compare_digest.

CVSS3: 8.1
0%
Низкий
больше 2 лет назад
github логотип
GHSA-855w-qg6f-ffh7

The overflow protection in Expat is removed by compilers with certain optimization settings, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via crafted XML data. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-1283 and CVE-2015-2716.

CVSS3: 8.1
2%
Низкий
почти 4 года назад
github логотип
GHSA-6jr7-xr67-mgxw

A flaw was found in python. In algorithms with quadratic time complexity using non-binary bases, when using int("text"), a system could take 50ms to parse an int string with 100,000 digits and 5s for 1,000,000 digits (float, decimal, int.from_bytes(), and int() for binary bases 2, 4, 8, 16, and 32 are not affected). The highest threat from this vulnerability is to system availability.

CVSS3: 7.5
0%
Низкий
больше 3 лет назад
github логотип
GHSA-67xf-xphq-9mcc

A flaw was found in Python, specifically in the FTP (File Transfer Protocol) client library in PASV (passive) mode. The issue is how the FTP client trusts the host from the PASV response by default. This flaw allows an attacker to set up a malicious FTP server that can trick FTP clients into connecting back to a given IP address and port. This vulnerability could lead to FTP client scanning ports, which otherwise would not have been possible.

CVSS3: 5.3
1%
Низкий
больше 3 лет назад
github логотип
GHSA-5mwm-wccq-xqcp

The e-mail module of Python 0 - 2.7.18, 3.x - 3.11 incorrectly parses e-mail addresses which contain a special character. This vulnerability allows attackers to send messages from e-ail addresses that would otherwise be rejected.

CVSS3: 5.3
0%
Низкий
почти 3 года назад

Уязвимостей на страницу