Логотип exploitDog
bind:"CVE-2021-4189"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2021-4189"

Количество 15

Количество 15

ubuntu логотип

CVE-2021-4189

почти 3 года назад

A flaw was found in Python, specifically in the FTP (File Transfer Protocol) client library in PASV (passive) mode. The issue is how the FTP client trusts the host from the PASV response by default. This flaw allows an attacker to set up a malicious FTP server that can trick FTP clients into connecting back to a given IP address and port. This vulnerability could lead to FTP client scanning ports, which otherwise would not have been possible.

CVSS3: 5.3
EPSS: Низкий
redhat логотип

CVE-2021-4189

больше 3 лет назад

A flaw was found in Python, specifically in the FTP (File Transfer Protocol) client library in PASV (passive) mode. The issue is how the FTP client trusts the host from the PASV response by default. This flaw allows an attacker to set up a malicious FTP server that can trick FTP clients into connecting back to a given IP address and port. This vulnerability could lead to FTP client scanning ports, which otherwise would not have been possible.

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2021-4189

почти 3 года назад

A flaw was found in Python, specifically in the FTP (File Transfer Protocol) client library in PASV (passive) mode. The issue is how the FTP client trusts the host from the PASV response by default. This flaw allows an attacker to set up a malicious FTP server that can trick FTP clients into connecting back to a given IP address and port. This vulnerability could lead to FTP client scanning ports, which otherwise would not have been possible.

CVSS3: 5.3
EPSS: Низкий
debian логотип

CVE-2021-4189

почти 3 года назад

A flaw was found in Python, specifically in the FTP (File Transfer Pro ...

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-67xf-xphq-9mcc

почти 3 года назад

A flaw was found in Python, specifically in the FTP (File Transfer Protocol) client library in PASV (passive) mode. The issue is how the FTP client trusts the host from the PASV response by default. This flaw allows an attacker to set up a malicious FTP server that can trick FTP clients into connecting back to a given IP address and port. This vulnerability could lead to FTP client scanning ports, which otherwise would not have been possible.

CVSS3: 5.3
EPSS: Низкий
fstec логотип

BDU:2022-02303

больше 3 лет назад

Уязвимость клиентской библиотеки FTP (File Transfer Protocol) интерпретатора языка программирования Python, позволяющая нарушителю выполнять SSRF-атаки

CVSS3: 6.1
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:1140-1

около 3 лет назад

Security update for python

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:0882-1

больше 3 лет назад

Security update for python3

EPSS: Низкий
redos логотип

ROS-20220407-03

около 3 лет назад

Множественные уязвимости Python

EPSS: Низкий
rocky логотип

RLSA-2022:1986

около 3 лет назад

Moderate: python3 security update

EPSS: Низкий
oracle-oval логотип

ELSA-2022-1986

около 3 лет назад

ELSA-2022-1986: python3 security update (MODERATE)

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2022:1091-1

около 3 лет назад

Security update for python

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:1091-1

около 3 лет назад

Security update for python

EPSS: Низкий
rocky логотип

RLSA-2022:1821

около 3 лет назад

Moderate: python27:2.7 security update

EPSS: Низкий
oracle-oval логотип

ELSA-2022-1821

около 3 лет назад

ELSA-2022-1821: python27:2.7 security update (MODERATE)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2021-4189

A flaw was found in Python, specifically in the FTP (File Transfer Protocol) client library in PASV (passive) mode. The issue is how the FTP client trusts the host from the PASV response by default. This flaw allows an attacker to set up a malicious FTP server that can trick FTP clients into connecting back to a given IP address and port. This vulnerability could lead to FTP client scanning ports, which otherwise would not have been possible.

CVSS3: 5.3
0%
Низкий
почти 3 года назад
redhat логотип
CVE-2021-4189

A flaw was found in Python, specifically in the FTP (File Transfer Protocol) client library in PASV (passive) mode. The issue is how the FTP client trusts the host from the PASV response by default. This flaw allows an attacker to set up a malicious FTP server that can trick FTP clients into connecting back to a given IP address and port. This vulnerability could lead to FTP client scanning ports, which otherwise would not have been possible.

CVSS3: 5.3
0%
Низкий
больше 3 лет назад
nvd логотип
CVE-2021-4189

A flaw was found in Python, specifically in the FTP (File Transfer Protocol) client library in PASV (passive) mode. The issue is how the FTP client trusts the host from the PASV response by default. This flaw allows an attacker to set up a malicious FTP server that can trick FTP clients into connecting back to a given IP address and port. This vulnerability could lead to FTP client scanning ports, which otherwise would not have been possible.

CVSS3: 5.3
0%
Низкий
почти 3 года назад
debian логотип
CVE-2021-4189

A flaw was found in Python, specifically in the FTP (File Transfer Pro ...

CVSS3: 5.3
0%
Низкий
почти 3 года назад
github логотип
GHSA-67xf-xphq-9mcc

A flaw was found in Python, specifically in the FTP (File Transfer Protocol) client library in PASV (passive) mode. The issue is how the FTP client trusts the host from the PASV response by default. This flaw allows an attacker to set up a malicious FTP server that can trick FTP clients into connecting back to a given IP address and port. This vulnerability could lead to FTP client scanning ports, which otherwise would not have been possible.

CVSS3: 5.3
0%
Низкий
почти 3 года назад
fstec логотип
BDU:2022-02303

Уязвимость клиентской библиотеки FTP (File Transfer Protocol) интерпретатора языка программирования Python, позволяющая нарушителю выполнять SSRF-атаки

CVSS3: 6.1
0%
Низкий
больше 3 лет назад
suse-cvrf логотип
SUSE-SU-2022:1140-1

Security update for python

около 3 лет назад
suse-cvrf логотип
SUSE-SU-2022:0882-1

Security update for python3

больше 3 лет назад
redos логотип
ROS-20220407-03

Множественные уязвимости Python

около 3 лет назад
rocky логотип
RLSA-2022:1986

Moderate: python3 security update

около 3 лет назад
oracle-oval логотип
ELSA-2022-1986

ELSA-2022-1986: python3 security update (MODERATE)

около 3 лет назад
suse-cvrf логотип
openSUSE-SU-2022:1091-1

Security update for python

около 3 лет назад
suse-cvrf логотип
SUSE-SU-2022:1091-1

Security update for python

около 3 лет назад
rocky логотип
RLSA-2022:1821

Moderate: python27:2.7 security update

около 3 лет назад
oracle-oval логотип
ELSA-2022-1821

ELSA-2022-1821: python27:2.7 security update (MODERATE)

около 3 лет назад

Уязвимостей на страницу