Логотип exploitDog
product: "python"
Консоль
Логотип exploitDog

exploitDog

product: "python"

Количество 870

Количество 870

redhat логотип

CVE-2021-3733

почти 4 года назад

There's a flaw in urllib's AbstractBasicAuthHandler class. An attacker who controls a malicious HTTP server that an HTTP client (such as web browser) connects to, could trigger a Regular Expression Denial of Service (ReDOS) during an authentication request with a specially crafted payload that is sent by the server to the client. The greatest threat that this flaw poses is to application availability.

CVSS3: 6.5
EPSS: Низкий
nvd логотип

CVE-2021-3733

больше 3 лет назад

There's a flaw in urllib's AbstractBasicAuthHandler class. An attacker who controls a malicious HTTP server that an HTTP client (such as web browser) connects to, could trigger a Regular Expression Denial of Service (ReDOS) during an authentication request with a specially crafted payload that is sent by the server to the client. The greatest threat that this flaw poses is to application availability.

CVSS3: 6.5
EPSS: Низкий
debian логотип

CVE-2021-3733

больше 3 лет назад

There's a flaw in urllib's AbstractBasicAuthHandler class. An attacker ...

CVSS3: 6.5
EPSS: Низкий
ubuntu логотип

CVE-2021-3177

больше 4 лет назад

Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely.

CVSS3: 9.8
EPSS: Низкий
redhat логотип

CVE-2021-3177

больше 4 лет назад

Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely.

CVSS3: 5.9
EPSS: Низкий
nvd логотип

CVE-2021-3177

больше 4 лет назад

Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely.

CVSS3: 9.8
EPSS: Низкий
debian логотип

CVE-2021-3177

больше 4 лет назад

Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctyp ...

CVSS3: 9.8
EPSS: Низкий
ubuntu логотип

CVE-2016-2183

почти 9 лет назад

The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a "Sweet32" attack.

CVSS3: 7.5
EPSS: Средний
redhat логотип

CVE-2016-2183

почти 9 лет назад

The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a "Sweet32" attack.

CVSS3: 7.5
EPSS: Средний
nvd логотип

CVE-2016-2183

почти 9 лет назад

The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a "Sweet32" attack.

CVSS3: 7.5
EPSS: Средний
debian логотип

CVE-2016-2183

почти 9 лет назад

The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec pro ...

CVSS3: 7.5
EPSS: Средний
fstec логотип

BDU:2024-08618

10 месяцев назад

Уязвимость библиотеки http.cookies интерпретатора языка программирования Python, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
EPSS: Низкий
fstec логотип

BDU:2022-05599

почти 3 года назад

Уязвимость интерпретатора языка программирования Python, связанная с ошибками при преобразовании типов данных int и str, позволяющая нарушителю вызвать отказ в обслуживании из-за алгоритмической сложности

CVSS3: 7.1
EPSS: Низкий
fstec логотип

BDU:2019-04237

почти 7 лет назад

Уязвимость метода pop3lib apop() интерпретатора языка программирования Python, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:0435-1

больше 4 лет назад

Security update for python

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:0947-1

около 4 лет назад

Security update for python3

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:0887-1

около 4 лет назад

Security update for python36

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:0886-1

около 4 лет назад

Security update for python3

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:0768-1

больше 4 лет назад

Security update for python

EPSS: Низкий
github логотип

GHSA-84gm-v5wh-659w

около 3 лет назад

OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the "CCS Injection" vulnerability.

CVSS3: 7.4
EPSS: Критический

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2021-3733

There's a flaw in urllib's AbstractBasicAuthHandler class. An attacker who controls a malicious HTTP server that an HTTP client (such as web browser) connects to, could trigger a Regular Expression Denial of Service (ReDOS) during an authentication request with a specially crafted payload that is sent by the server to the client. The greatest threat that this flaw poses is to application availability.

CVSS3: 6.5
0%
Низкий
почти 4 года назад
nvd логотип
CVE-2021-3733

There's a flaw in urllib's AbstractBasicAuthHandler class. An attacker who controls a malicious HTTP server that an HTTP client (such as web browser) connects to, could trigger a Regular Expression Denial of Service (ReDOS) during an authentication request with a specially crafted payload that is sent by the server to the client. The greatest threat that this flaw poses is to application availability.

CVSS3: 6.5
0%
Низкий
больше 3 лет назад
debian логотип
CVE-2021-3733

There's a flaw in urllib's AbstractBasicAuthHandler class. An attacker ...

CVSS3: 6.5
0%
Низкий
больше 3 лет назад
ubuntu логотип
CVE-2021-3177

Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely.

CVSS3: 9.8
0%
Низкий
больше 4 лет назад
redhat логотип
CVE-2021-3177

Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely.

CVSS3: 5.9
0%
Низкий
больше 4 лет назад
nvd логотип
CVE-2021-3177

Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely.

CVSS3: 9.8
0%
Низкий
больше 4 лет назад
debian логотип
CVE-2021-3177

Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctyp ...

CVSS3: 9.8
0%
Низкий
больше 4 лет назад
ubuntu логотип
CVE-2016-2183

The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a "Sweet32" attack.

CVSS3: 7.5
41%
Средний
почти 9 лет назад
redhat логотип
CVE-2016-2183

The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a "Sweet32" attack.

CVSS3: 7.5
41%
Средний
почти 9 лет назад
nvd логотип
CVE-2016-2183

The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a "Sweet32" attack.

CVSS3: 7.5
41%
Средний
почти 9 лет назад
debian логотип
CVE-2016-2183

The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec pro ...

CVSS3: 7.5
41%
Средний
почти 9 лет назад
fstec логотип
BDU:2024-08618

Уязвимость библиотеки http.cookies интерпретатора языка программирования Python, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
0%
Низкий
10 месяцев назад
fstec логотип
BDU:2022-05599

Уязвимость интерпретатора языка программирования Python, связанная с ошибками при преобразовании типов данных int и str, позволяющая нарушителю вызвать отказ в обслуживании из-за алгоритмической сложности

CVSS3: 7.1
почти 3 года назад
fstec логотип
BDU:2019-04237

Уязвимость метода pop3lib apop() интерпретатора языка программирования Python, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
1%
Низкий
почти 7 лет назад
suse-cvrf логотип
openSUSE-SU-2021:0435-1

Security update for python

0%
Низкий
больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:0947-1

Security update for python3

0%
Низкий
около 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:0887-1

Security update for python36

0%
Низкий
около 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:0886-1

Security update for python3

0%
Низкий
около 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:0768-1

Security update for python

0%
Низкий
больше 4 лет назад
github логотип
GHSA-84gm-v5wh-659w

OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the "CCS Injection" vulnerability.

CVSS3: 7.4
93%
Критический
около 3 лет назад

Уязвимостей на страницу