Логотип exploitDog
bind:"CVE-2021-3737" OR bind:"CVE-2021-4189"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2021-3737" OR bind:"CVE-2021-4189"

Количество 37

Количество 37

rocky логотип

RLSA-2022:1986

больше 3 лет назад

Moderate: python3 security update

EPSS: Низкий
oracle-oval логотип

ELSA-2022-1986

больше 3 лет назад

ELSA-2022-1986: python3 security update (MODERATE)

EPSS: Низкий
rocky логотип

RLSA-2022:1821

больше 3 лет назад

Moderate: python27:2.7 security update

EPSS: Низкий
oracle-oval логотип

ELSA-2022-1821

больше 3 лет назад

ELSA-2022-1821: python27:2.7 security update (MODERATE)

EPSS: Низкий
ubuntu логотип

CVE-2021-4189

больше 3 лет назад

A flaw was found in Python, specifically in the FTP (File Transfer Protocol) client library in PASV (passive) mode. The issue is how the FTP client trusts the host from the PASV response by default. This flaw allows an attacker to set up a malicious FTP server that can trick FTP clients into connecting back to a given IP address and port. This vulnerability could lead to FTP client scanning ports, which otherwise would not have been possible.

CVSS3: 5.3
EPSS: Низкий
redhat логотип

CVE-2021-4189

почти 4 года назад

A flaw was found in Python, specifically in the FTP (File Transfer Protocol) client library in PASV (passive) mode. The issue is how the FTP client trusts the host from the PASV response by default. This flaw allows an attacker to set up a malicious FTP server that can trick FTP clients into connecting back to a given IP address and port. This vulnerability could lead to FTP client scanning ports, which otherwise would not have been possible.

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2021-4189

больше 3 лет назад

A flaw was found in Python, specifically in the FTP (File Transfer Protocol) client library in PASV (passive) mode. The issue is how the FTP client trusts the host from the PASV response by default. This flaw allows an attacker to set up a malicious FTP server that can trick FTP clients into connecting back to a given IP address and port. This vulnerability could lead to FTP client scanning ports, which otherwise would not have been possible.

CVSS3: 5.3
EPSS: Низкий
debian логотип

CVE-2021-4189

больше 3 лет назад

A flaw was found in Python, specifically in the FTP (File Transfer Pro ...

CVSS3: 5.3
EPSS: Низкий
ubuntu логотип

CVE-2021-3737

больше 3 лет назад

A flaw was found in python. An improperly handled HTTP response in the HTTP client code of python may allow a remote attacker, who controls the HTTP server, to make the client script enter an infinite loop, consuming CPU time. The highest threat from this vulnerability is to system availability.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2021-3737

больше 4 лет назад

A flaw was found in python. An improperly handled HTTP response in the HTTP client code of python may allow a remote attacker, who controls the HTTP server, to make the client script enter an infinite loop, consuming CPU time. The highest threat from this vulnerability is to system availability.

CVSS3: 6.5
EPSS: Низкий
nvd логотип

CVE-2021-3737

больше 3 лет назад

A flaw was found in python. An improperly handled HTTP response in the HTTP client code of python may allow a remote attacker, who controls the HTTP server, to make the client script enter an infinite loop, consuming CPU time. The highest threat from this vulnerability is to system availability.

CVSS3: 7.5
EPSS: Низкий
msrc логотип

CVE-2021-3737

больше 3 лет назад

A flaw was found in python. An improperly handled HTTP response in the HTTP client code of python may allow a remote attacker who controls the HTTP server to make the client script enter an infinite loop consuming CPU time. The highest threat from this vulnerability is to system availability.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2021-3737

больше 3 лет назад

A flaw was found in python. An improperly handled HTTP response in the ...

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-67xf-xphq-9mcc

больше 3 лет назад

A flaw was found in Python, specifically in the FTP (File Transfer Protocol) client library in PASV (passive) mode. The issue is how the FTP client trusts the host from the PASV response by default. This flaw allows an attacker to set up a malicious FTP server that can trick FTP clients into connecting back to a given IP address and port. This vulnerability could lead to FTP client scanning ports, which otherwise would not have been possible.

CVSS3: 5.3
EPSS: Низкий
fstec логотип

BDU:2022-02303

почти 4 года назад

Уязвимость клиентской библиотеки FTP (File Transfer Protocol) интерпретатора языка программирования Python, позволяющая нарушителю выполнять SSRF-атаки

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-hr7v-m862-8hh8

больше 3 лет назад

A flaw was found in python. An improperly handled HTTP response in the HTTP client code of python may allow a remote attacker, who controls the HTTP server, to make the client script enter an infinite loop, consuming CPU time. The highest threat from this vulnerability is to system availability.

CVSS3: 7.5
EPSS: Низкий
fstec логотип

BDU:2022-05830

больше 4 лет назад

Уязвимость компонента urllib интерпретатора языка программирования Python, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:1140-1

больше 3 лет назад

Security update for python

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:0882-1

больше 3 лет назад

Security update for python3

EPSS: Низкий
redos логотип

ROS-20220407-03

больше 3 лет назад

Множественные уязвимости Python

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
rocky логотип
RLSA-2022:1986

Moderate: python3 security update

больше 3 лет назад
oracle-oval логотип
ELSA-2022-1986

ELSA-2022-1986: python3 security update (MODERATE)

больше 3 лет назад
rocky логотип
RLSA-2022:1821

Moderate: python27:2.7 security update

больше 3 лет назад
oracle-oval логотип
ELSA-2022-1821

ELSA-2022-1821: python27:2.7 security update (MODERATE)

больше 3 лет назад
ubuntu логотип
CVE-2021-4189

A flaw was found in Python, specifically in the FTP (File Transfer Protocol) client library in PASV (passive) mode. The issue is how the FTP client trusts the host from the PASV response by default. This flaw allows an attacker to set up a malicious FTP server that can trick FTP clients into connecting back to a given IP address and port. This vulnerability could lead to FTP client scanning ports, which otherwise would not have been possible.

CVSS3: 5.3
0%
Низкий
больше 3 лет назад
redhat логотип
CVE-2021-4189

A flaw was found in Python, specifically in the FTP (File Transfer Protocol) client library in PASV (passive) mode. The issue is how the FTP client trusts the host from the PASV response by default. This flaw allows an attacker to set up a malicious FTP server that can trick FTP clients into connecting back to a given IP address and port. This vulnerability could lead to FTP client scanning ports, which otherwise would not have been possible.

CVSS3: 5.3
0%
Низкий
почти 4 года назад
nvd логотип
CVE-2021-4189

A flaw was found in Python, specifically in the FTP (File Transfer Protocol) client library in PASV (passive) mode. The issue is how the FTP client trusts the host from the PASV response by default. This flaw allows an attacker to set up a malicious FTP server that can trick FTP clients into connecting back to a given IP address and port. This vulnerability could lead to FTP client scanning ports, which otherwise would not have been possible.

CVSS3: 5.3
0%
Низкий
больше 3 лет назад
debian логотип
CVE-2021-4189

A flaw was found in Python, specifically in the FTP (File Transfer Pro ...

CVSS3: 5.3
0%
Низкий
больше 3 лет назад
ubuntu логотип
CVE-2021-3737

A flaw was found in python. An improperly handled HTTP response in the HTTP client code of python may allow a remote attacker, who controls the HTTP server, to make the client script enter an infinite loop, consuming CPU time. The highest threat from this vulnerability is to system availability.

CVSS3: 7.5
0%
Низкий
больше 3 лет назад
redhat логотип
CVE-2021-3737

A flaw was found in python. An improperly handled HTTP response in the HTTP client code of python may allow a remote attacker, who controls the HTTP server, to make the client script enter an infinite loop, consuming CPU time. The highest threat from this vulnerability is to system availability.

CVSS3: 6.5
0%
Низкий
больше 4 лет назад
nvd логотип
CVE-2021-3737

A flaw was found in python. An improperly handled HTTP response in the HTTP client code of python may allow a remote attacker, who controls the HTTP server, to make the client script enter an infinite loop, consuming CPU time. The highest threat from this vulnerability is to system availability.

CVSS3: 7.5
0%
Низкий
больше 3 лет назад
msrc логотип
CVE-2021-3737

A flaw was found in python. An improperly handled HTTP response in the HTTP client code of python may allow a remote attacker who controls the HTTP server to make the client script enter an infinite loop consuming CPU time. The highest threat from this vulnerability is to system availability.

CVSS3: 7.5
0%
Низкий
больше 3 лет назад
debian логотип
CVE-2021-3737

A flaw was found in python. An improperly handled HTTP response in the ...

CVSS3: 7.5
0%
Низкий
больше 3 лет назад
github логотип
GHSA-67xf-xphq-9mcc

A flaw was found in Python, specifically in the FTP (File Transfer Protocol) client library in PASV (passive) mode. The issue is how the FTP client trusts the host from the PASV response by default. This flaw allows an attacker to set up a malicious FTP server that can trick FTP clients into connecting back to a given IP address and port. This vulnerability could lead to FTP client scanning ports, which otherwise would not have been possible.

CVSS3: 5.3
0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2022-02303

Уязвимость клиентской библиотеки FTP (File Transfer Protocol) интерпретатора языка программирования Python, позволяющая нарушителю выполнять SSRF-атаки

CVSS3: 6.1
0%
Низкий
почти 4 года назад
github логотип
GHSA-hr7v-m862-8hh8

A flaw was found in python. An improperly handled HTTP response in the HTTP client code of python may allow a remote attacker, who controls the HTTP server, to make the client script enter an infinite loop, consuming CPU time. The highest threat from this vulnerability is to system availability.

CVSS3: 7.5
0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2022-05830

Уязвимость компонента urllib интерпретатора языка программирования Python, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
0%
Низкий
больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2022:1140-1

Security update for python

больше 3 лет назад
suse-cvrf логотип
SUSE-SU-2022:0882-1

Security update for python3

больше 3 лет назад
redos логотип
ROS-20220407-03

Множественные уязвимости Python

больше 3 лет назад

Уязвимостей на страницу