Логотип exploitDog
bind:"CVE-2021-3737" OR bind:"CVE-2021-4189"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2021-3737" OR bind:"CVE-2021-4189"

Количество 37

Количество 37

rocky логотип

RLSA-2022:1986

около 3 лет назад

Moderate: python3 security update

EPSS: Низкий
oracle-oval логотип

ELSA-2022-1986

около 3 лет назад

ELSA-2022-1986: python3 security update (MODERATE)

EPSS: Низкий
rocky логотип

RLSA-2022:1821

около 3 лет назад

Moderate: python27:2.7 security update

EPSS: Низкий
oracle-oval логотип

ELSA-2022-1821

около 3 лет назад

ELSA-2022-1821: python27:2.7 security update (MODERATE)

EPSS: Низкий
ubuntu логотип

CVE-2021-4189

почти 3 года назад

A flaw was found in Python, specifically in the FTP (File Transfer Protocol) client library in PASV (passive) mode. The issue is how the FTP client trusts the host from the PASV response by default. This flaw allows an attacker to set up a malicious FTP server that can trick FTP clients into connecting back to a given IP address and port. This vulnerability could lead to FTP client scanning ports, which otherwise would not have been possible.

CVSS3: 5.3
EPSS: Низкий
redhat логотип

CVE-2021-4189

больше 3 лет назад

A flaw was found in Python, specifically in the FTP (File Transfer Protocol) client library in PASV (passive) mode. The issue is how the FTP client trusts the host from the PASV response by default. This flaw allows an attacker to set up a malicious FTP server that can trick FTP clients into connecting back to a given IP address and port. This vulnerability could lead to FTP client scanning ports, which otherwise would not have been possible.

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2021-4189

почти 3 года назад

A flaw was found in Python, specifically in the FTP (File Transfer Protocol) client library in PASV (passive) mode. The issue is how the FTP client trusts the host from the PASV response by default. This flaw allows an attacker to set up a malicious FTP server that can trick FTP clients into connecting back to a given IP address and port. This vulnerability could lead to FTP client scanning ports, which otherwise would not have been possible.

CVSS3: 5.3
EPSS: Низкий
debian логотип

CVE-2021-4189

почти 3 года назад

A flaw was found in Python, specifically in the FTP (File Transfer Pro ...

CVSS3: 5.3
EPSS: Низкий
ubuntu логотип

CVE-2021-3737

больше 3 лет назад

A flaw was found in python. An improperly handled HTTP response in the HTTP client code of python may allow a remote attacker, who controls the HTTP server, to make the client script enter an infinite loop, consuming CPU time. The highest threat from this vulnerability is to system availability.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2021-3737

почти 4 года назад

A flaw was found in python. An improperly handled HTTP response in the HTTP client code of python may allow a remote attacker, who controls the HTTP server, to make the client script enter an infinite loop, consuming CPU time. The highest threat from this vulnerability is to system availability.

CVSS3: 6.5
EPSS: Низкий
nvd логотип

CVE-2021-3737

больше 3 лет назад

A flaw was found in python. An improperly handled HTTP response in the HTTP client code of python may allow a remote attacker, who controls the HTTP server, to make the client script enter an infinite loop, consuming CPU time. The highest threat from this vulnerability is to system availability.

CVSS3: 7.5
EPSS: Низкий
msrc логотип

CVE-2021-3737

больше 3 лет назад

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2021-3737

больше 3 лет назад

A flaw was found in python. An improperly handled HTTP response in the ...

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-67xf-xphq-9mcc

почти 3 года назад

A flaw was found in Python, specifically in the FTP (File Transfer Protocol) client library in PASV (passive) mode. The issue is how the FTP client trusts the host from the PASV response by default. This flaw allows an attacker to set up a malicious FTP server that can trick FTP clients into connecting back to a given IP address and port. This vulnerability could lead to FTP client scanning ports, which otherwise would not have been possible.

CVSS3: 5.3
EPSS: Низкий
fstec логотип

BDU:2022-02303

больше 3 лет назад

Уязвимость клиентской библиотеки FTP (File Transfer Protocol) интерпретатора языка программирования Python, позволяющая нарушителю выполнять SSRF-атаки

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-hr7v-m862-8hh8

около 3 лет назад

A flaw was found in python. An improperly handled HTTP response in the HTTP client code of python may allow a remote attacker, who controls the HTTP server, to make the client script enter an infinite loop, consuming CPU time. The highest threat from this vulnerability is to system availability.

CVSS3: 7.5
EPSS: Низкий
fstec логотип

BDU:2022-05830

около 4 лет назад

Уязвимость компонента urllib интерпретатора языка программирования Python, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:1140-1

около 3 лет назад

Security update for python

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:0882-1

больше 3 лет назад

Security update for python3

EPSS: Низкий
redos логотип

ROS-20220407-03

около 3 лет назад

Множественные уязвимости Python

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
rocky логотип
RLSA-2022:1986

Moderate: python3 security update

около 3 лет назад
oracle-oval логотип
ELSA-2022-1986

ELSA-2022-1986: python3 security update (MODERATE)

около 3 лет назад
rocky логотип
RLSA-2022:1821

Moderate: python27:2.7 security update

около 3 лет назад
oracle-oval логотип
ELSA-2022-1821

ELSA-2022-1821: python27:2.7 security update (MODERATE)

около 3 лет назад
ubuntu логотип
CVE-2021-4189

A flaw was found in Python, specifically in the FTP (File Transfer Protocol) client library in PASV (passive) mode. The issue is how the FTP client trusts the host from the PASV response by default. This flaw allows an attacker to set up a malicious FTP server that can trick FTP clients into connecting back to a given IP address and port. This vulnerability could lead to FTP client scanning ports, which otherwise would not have been possible.

CVSS3: 5.3
0%
Низкий
почти 3 года назад
redhat логотип
CVE-2021-4189

A flaw was found in Python, specifically in the FTP (File Transfer Protocol) client library in PASV (passive) mode. The issue is how the FTP client trusts the host from the PASV response by default. This flaw allows an attacker to set up a malicious FTP server that can trick FTP clients into connecting back to a given IP address and port. This vulnerability could lead to FTP client scanning ports, which otherwise would not have been possible.

CVSS3: 5.3
0%
Низкий
больше 3 лет назад
nvd логотип
CVE-2021-4189

A flaw was found in Python, specifically in the FTP (File Transfer Protocol) client library in PASV (passive) mode. The issue is how the FTP client trusts the host from the PASV response by default. This flaw allows an attacker to set up a malicious FTP server that can trick FTP clients into connecting back to a given IP address and port. This vulnerability could lead to FTP client scanning ports, which otherwise would not have been possible.

CVSS3: 5.3
0%
Низкий
почти 3 года назад
debian логотип
CVE-2021-4189

A flaw was found in Python, specifically in the FTP (File Transfer Pro ...

CVSS3: 5.3
0%
Низкий
почти 3 года назад
ubuntu логотип
CVE-2021-3737

A flaw was found in python. An improperly handled HTTP response in the HTTP client code of python may allow a remote attacker, who controls the HTTP server, to make the client script enter an infinite loop, consuming CPU time. The highest threat from this vulnerability is to system availability.

CVSS3: 7.5
0%
Низкий
больше 3 лет назад
redhat логотип
CVE-2021-3737

A flaw was found in python. An improperly handled HTTP response in the HTTP client code of python may allow a remote attacker, who controls the HTTP server, to make the client script enter an infinite loop, consuming CPU time. The highest threat from this vulnerability is to system availability.

CVSS3: 6.5
0%
Низкий
почти 4 года назад
nvd логотип
CVE-2021-3737

A flaw was found in python. An improperly handled HTTP response in the HTTP client code of python may allow a remote attacker, who controls the HTTP server, to make the client script enter an infinite loop, consuming CPU time. The highest threat from this vulnerability is to system availability.

CVSS3: 7.5
0%
Низкий
больше 3 лет назад
msrc логотип
CVSS3: 7.5
0%
Низкий
больше 3 лет назад
debian логотип
CVE-2021-3737

A flaw was found in python. An improperly handled HTTP response in the ...

CVSS3: 7.5
0%
Низкий
больше 3 лет назад
github логотип
GHSA-67xf-xphq-9mcc

A flaw was found in Python, specifically in the FTP (File Transfer Protocol) client library in PASV (passive) mode. The issue is how the FTP client trusts the host from the PASV response by default. This flaw allows an attacker to set up a malicious FTP server that can trick FTP clients into connecting back to a given IP address and port. This vulnerability could lead to FTP client scanning ports, which otherwise would not have been possible.

CVSS3: 5.3
0%
Низкий
почти 3 года назад
fstec логотип
BDU:2022-02303

Уязвимость клиентской библиотеки FTP (File Transfer Protocol) интерпретатора языка программирования Python, позволяющая нарушителю выполнять SSRF-атаки

CVSS3: 6.1
0%
Низкий
больше 3 лет назад
github логотип
GHSA-hr7v-m862-8hh8

A flaw was found in python. An improperly handled HTTP response in the HTTP client code of python may allow a remote attacker, who controls the HTTP server, to make the client script enter an infinite loop, consuming CPU time. The highest threat from this vulnerability is to system availability.

CVSS3: 7.5
0%
Низкий
около 3 лет назад
fstec логотип
BDU:2022-05830

Уязвимость компонента urllib интерпретатора языка программирования Python, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
0%
Низкий
около 4 лет назад
suse-cvrf логотип
SUSE-SU-2022:1140-1

Security update for python

около 3 лет назад
suse-cvrf логотип
SUSE-SU-2022:0882-1

Security update for python3

больше 3 лет назад
redos логотип
ROS-20220407-03

Множественные уязвимости Python

около 3 лет назад

Уязвимостей на страницу