Количество 44
Количество 44

SUSE-SU-2019:2798-1
Security update for python3
ELSA-2020-1764
ELSA-2020-1764: python3 security and bug fix update (MODERATE)
ELSA-2020-1132
ELSA-2020-1132: python3 security update (MODERATE)
ELSA-2020-1131
ELSA-2020-1131: python security update (MODERATE)
ELSA-2020-1605
ELSA-2020-1605: python27:2.7 security, bug fix, and enhancement update (MODERATE)

SUSE-SU-2020:2699-1
Security update for python3

RLSA-2020:1605
Moderate: python27:2.7 security, bug fix, and enhancement update

SUSE-SU-2020:0302-1
Security update for python36

CVE-2018-20852
http.cookiejar.DefaultPolicy.domain_return_ok in Lib/http/cookiejar.py in Python before 3.7.3 does not correctly validate the domain: it can be tricked into sending existing cookies to the wrong server. An attacker may abuse this flaw by using a server with a hostname that has another valid hostname as a suffix (e.g., pythonicexample.com to steal cookies for example.com). When a program uses http.cookiejar.DefaultPolicy and tries to do an HTTP connection to an attacker-controlled server, existing cookies can be leaked to the attacker. This affects 2.x through 2.7.16, 3.x before 3.4.10, 3.5.x before 3.5.7, 3.6.x before 3.6.9, and 3.7.x before 3.7.3.

CVE-2018-20852
http.cookiejar.DefaultPolicy.domain_return_ok in Lib/http/cookiejar.py in Python before 3.7.3 does not correctly validate the domain: it can be tricked into sending existing cookies to the wrong server. An attacker may abuse this flaw by using a server with a hostname that has another valid hostname as a suffix (e.g., pythonicexample.com to steal cookies for example.com). When a program uses http.cookiejar.DefaultPolicy and tries to do an HTTP connection to an attacker-controlled server, existing cookies can be leaked to the attacker. This affects 2.x through 2.7.16, 3.x before 3.4.10, 3.5.x before 3.5.7, 3.6.x before 3.6.9, and 3.7.x before 3.7.3.

CVE-2018-20852
http.cookiejar.DefaultPolicy.domain_return_ok in Lib/http/cookiejar.py in Python before 3.7.3 does not correctly validate the domain: it can be tricked into sending existing cookies to the wrong server. An attacker may abuse this flaw by using a server with a hostname that has another valid hostname as a suffix (e.g., pythonicexample.com to steal cookies for example.com). When a program uses http.cookiejar.DefaultPolicy and tries to do an HTTP connection to an attacker-controlled server, existing cookies can be leaked to the attacker. This affects 2.x through 2.7.16, 3.x before 3.4.10, 3.5.x before 3.5.7, 3.6.x before 3.6.9, and 3.7.x before 3.7.3.
CVE-2018-20852
http.cookiejar.DefaultPolicy.domain_return_ok in Lib/http/cookiejar.py ...

CVE-2019-16056
An issue was discovered in Python through 2.7.16, 3.x through 3.5.7, 3.6.x through 3.6.9, and 3.7.x through 3.7.4. The email module wrongly parses email addresses that contain multiple @ characters. An application that uses the email module and implements some kind of checks on the From/To headers of a message could be tricked into accepting an email address that should be denied. An attack may be the same as in CVE-2019-11340; however, this CVE applies to Python more generally.

CVE-2019-16056
An issue was discovered in Python through 2.7.16, 3.x through 3.5.7, 3.6.x through 3.6.9, and 3.7.x through 3.7.4. The email module wrongly parses email addresses that contain multiple @ characters. An application that uses the email module and implements some kind of checks on the From/To headers of a message could be tricked into accepting an email address that should be denied. An attack may be the same as in CVE-2019-11340; however, this CVE applies to Python more generally.

CVE-2019-16056
An issue was discovered in Python through 2.7.16, 3.x through 3.5.7, 3.6.x through 3.6.9, and 3.7.x through 3.7.4. The email module wrongly parses email addresses that contain multiple @ characters. An application that uses the email module and implements some kind of checks on the From/To headers of a message could be tricked into accepting an email address that should be denied. An attack may be the same as in CVE-2019-11340; however, this CVE applies to Python more generally.
CVE-2019-16056
An issue was discovered in Python through 2.7.16, 3.x through 3.5.7, 3 ...

openSUSE-SU-2020:0086-1
Security update for python3

SUSE-SU-2020:0114-1
Security update for python3

openSUSE-SU-2019:1989-1
Security update for python

openSUSE-SU-2019:1988-1
Security update for python
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | SUSE-SU-2019:2798-1 Security update for python3 | больше 5 лет назад | ||
ELSA-2020-1764 ELSA-2020-1764: python3 security and bug fix update (MODERATE) | около 5 лет назад | |||
ELSA-2020-1132 ELSA-2020-1132: python3 security update (MODERATE) | около 5 лет назад | |||
ELSA-2020-1131 ELSA-2020-1131: python security update (MODERATE) | около 5 лет назад | |||
ELSA-2020-1605 ELSA-2020-1605: python27:2.7 security, bug fix, and enhancement update (MODERATE) | около 5 лет назад | |||
![]() | SUSE-SU-2020:2699-1 Security update for python3 | больше 4 лет назад | ||
![]() | RLSA-2020:1605 Moderate: python27:2.7 security, bug fix, and enhancement update | около 5 лет назад | ||
![]() | SUSE-SU-2020:0302-1 Security update for python36 | больше 5 лет назад | ||
![]() | CVE-2018-20852 http.cookiejar.DefaultPolicy.domain_return_ok in Lib/http/cookiejar.py in Python before 3.7.3 does not correctly validate the domain: it can be tricked into sending existing cookies to the wrong server. An attacker may abuse this flaw by using a server with a hostname that has another valid hostname as a suffix (e.g., pythonicexample.com to steal cookies for example.com). When a program uses http.cookiejar.DefaultPolicy and tries to do an HTTP connection to an attacker-controlled server, existing cookies can be leaked to the attacker. This affects 2.x through 2.7.16, 3.x before 3.4.10, 3.5.x before 3.5.7, 3.6.x before 3.6.9, and 3.7.x before 3.7.3. | CVSS3: 5.3 | 1% Низкий | почти 6 лет назад |
![]() | CVE-2018-20852 http.cookiejar.DefaultPolicy.domain_return_ok in Lib/http/cookiejar.py in Python before 3.7.3 does not correctly validate the domain: it can be tricked into sending existing cookies to the wrong server. An attacker may abuse this flaw by using a server with a hostname that has another valid hostname as a suffix (e.g., pythonicexample.com to steal cookies for example.com). When a program uses http.cookiejar.DefaultPolicy and tries to do an HTTP connection to an attacker-controlled server, existing cookies can be leaked to the attacker. This affects 2.x through 2.7.16, 3.x before 3.4.10, 3.5.x before 3.5.7, 3.6.x before 3.6.9, and 3.7.x before 3.7.3. | CVSS3: 5.3 | 1% Низкий | больше 6 лет назад |
![]() | CVE-2018-20852 http.cookiejar.DefaultPolicy.domain_return_ok in Lib/http/cookiejar.py in Python before 3.7.3 does not correctly validate the domain: it can be tricked into sending existing cookies to the wrong server. An attacker may abuse this flaw by using a server with a hostname that has another valid hostname as a suffix (e.g., pythonicexample.com to steal cookies for example.com). When a program uses http.cookiejar.DefaultPolicy and tries to do an HTTP connection to an attacker-controlled server, existing cookies can be leaked to the attacker. This affects 2.x through 2.7.16, 3.x before 3.4.10, 3.5.x before 3.5.7, 3.6.x before 3.6.9, and 3.7.x before 3.7.3. | CVSS3: 5.3 | 1% Низкий | почти 6 лет назад |
CVE-2018-20852 http.cookiejar.DefaultPolicy.domain_return_ok in Lib/http/cookiejar.py ... | CVSS3: 5.3 | 1% Низкий | почти 6 лет назад | |
![]() | CVE-2019-16056 An issue was discovered in Python through 2.7.16, 3.x through 3.5.7, 3.6.x through 3.6.9, and 3.7.x through 3.7.4. The email module wrongly parses email addresses that contain multiple @ characters. An application that uses the email module and implements some kind of checks on the From/To headers of a message could be tricked into accepting an email address that should be denied. An attack may be the same as in CVE-2019-11340; however, this CVE applies to Python more generally. | CVSS3: 7.5 | 1% Низкий | почти 6 лет назад |
![]() | CVE-2019-16056 An issue was discovered in Python through 2.7.16, 3.x through 3.5.7, 3.6.x through 3.6.9, and 3.7.x through 3.7.4. The email module wrongly parses email addresses that contain multiple @ characters. An application that uses the email module and implements some kind of checks on the From/To headers of a message could be tricked into accepting an email address that should be denied. An attack may be the same as in CVE-2019-11340; however, this CVE applies to Python more generally. | CVSS3: 7.3 | 1% Низкий | почти 7 лет назад |
![]() | CVE-2019-16056 An issue was discovered in Python through 2.7.16, 3.x through 3.5.7, 3.6.x through 3.6.9, and 3.7.x through 3.7.4. The email module wrongly parses email addresses that contain multiple @ characters. An application that uses the email module and implements some kind of checks on the From/To headers of a message could be tricked into accepting an email address that should be denied. An attack may be the same as in CVE-2019-11340; however, this CVE applies to Python more generally. | CVSS3: 7.5 | 1% Низкий | почти 6 лет назад |
CVE-2019-16056 An issue was discovered in Python through 2.7.16, 3.x through 3.5.7, 3 ... | CVSS3: 7.5 | 1% Низкий | почти 6 лет назад | |
![]() | openSUSE-SU-2020:0086-1 Security update for python3 | больше 5 лет назад | ||
![]() | SUSE-SU-2020:0114-1 Security update for python3 | больше 5 лет назад | ||
![]() | openSUSE-SU-2019:1989-1 Security update for python | 1% Низкий | почти 6 лет назад | |
![]() | openSUSE-SU-2019:1988-1 Security update for python | 1% Низкий | почти 6 лет назад |
Уязвимостей на страницу