Количество 60
Количество 60
ELSA-2022-5235
ELSA-2022-5235: python security update (MODERATE)

RLSA-2021:1761
Moderate: python27:2.7 security and bug fix update
ELSA-2021-1761
ELSA-2021-1761: python27:2.7 security and bug fix update (MODERATE)

RLSA-2021:1879
Moderate: python38:3.8 security update
ELSA-2021-1879
ELSA-2021-1879: python38:3.8 security update (MODERATE)
ELSA-2021-1633
ELSA-2021-1633: python3 security update (MODERATE)

CVE-2021-3177
Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely.

CVE-2021-3177
Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely.

CVE-2021-3177
Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely.

CVE-2021-3177
CVE-2021-3177
Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctyp ...
GHSA-hc96-xw56-vfwh
Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely.
ELSA-2021-9130
ELSA-2021-9130: python38:3.8 security update (IMPORTANT)
ELSA-2021-9129
ELSA-2021-9129: python36:3.6 security update (IMPORTANT)
ELSA-2021-9128
ELSA-2021-9128: python27:2.7 security update (IMPORTANT)
ELSA-2021-9107
ELSA-2021-9107: python security update (IMPORTANT)
ELSA-2021-9101
ELSA-2021-9101: python3 security update (IMPORTANT)
ELSA-2021-9100
ELSA-2021-9100: python3 security update (IMPORTANT)

BDU:2021-01781
Уязвимость функции PyCArg_repr (ctypes/callproc.c) интерпретатора языка программирования Python, позволяющая нарушителю выполнить произвольный код

openSUSE-SU-2021:0331-1
Security update for python3
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
ELSA-2022-5235 ELSA-2022-5235: python security update (MODERATE) | почти 3 года назад | |||
![]() | RLSA-2021:1761 Moderate: python27:2.7 security and bug fix update | около 4 лет назад | ||
ELSA-2021-1761 ELSA-2021-1761: python27:2.7 security and bug fix update (MODERATE) | около 4 лет назад | |||
![]() | RLSA-2021:1879 Moderate: python38:3.8 security update | около 4 лет назад | ||
ELSA-2021-1879 ELSA-2021-1879: python38:3.8 security update (MODERATE) | около 4 лет назад | |||
ELSA-2021-1633 ELSA-2021-1633: python3 security update (MODERATE) | около 4 лет назад | |||
![]() | CVE-2021-3177 Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely. | CVSS3: 9.8 | 0% Низкий | больше 4 лет назад |
![]() | CVE-2021-3177 Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely. | CVSS3: 5.9 | 0% Низкий | больше 4 лет назад |
![]() | CVE-2021-3177 Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely. | CVSS3: 9.8 | 0% Низкий | больше 4 лет назад |
![]() | CVSS3: 9.8 | 0% Низкий | больше 4 лет назад | |
CVE-2021-3177 Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctyp ... | CVSS3: 9.8 | 0% Низкий | больше 4 лет назад | |
GHSA-hc96-xw56-vfwh Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely. | CVSS3: 9.8 | 0% Низкий | около 3 лет назад | |
ELSA-2021-9130 ELSA-2021-9130: python38:3.8 security update (IMPORTANT) | около 4 лет назад | |||
ELSA-2021-9129 ELSA-2021-9129: python36:3.6 security update (IMPORTANT) | около 4 лет назад | |||
ELSA-2021-9128 ELSA-2021-9128: python27:2.7 security update (IMPORTANT) | около 4 лет назад | |||
ELSA-2021-9107 ELSA-2021-9107: python security update (IMPORTANT) | больше 4 лет назад | |||
ELSA-2021-9101 ELSA-2021-9101: python3 security update (IMPORTANT) | больше 4 лет назад | |||
ELSA-2021-9100 ELSA-2021-9100: python3 security update (IMPORTANT) | больше 4 лет назад | |||
![]() | BDU:2021-01781 Уязвимость функции PyCArg_repr (ctypes/callproc.c) интерпретатора языка программирования Python, позволяющая нарушителю выполнить произвольный код | CVSS3: 9.8 | 0% Низкий | больше 4 лет назад |
![]() | openSUSE-SU-2021:0331-1 Security update for python3 | больше 4 лет назад |
Уязвимостей на страницу