Логотип exploitDog
bind:"GHSA-89ff-5r66-wr8j" OR bind:"CVE-2019-9947"
Консоль
Логотип exploitDog

exploitDog

bind:"GHSA-89ff-5r66-wr8j" OR bind:"CVE-2019-9947"

Количество 22

Количество 22

github логотип

GHSA-89ff-5r66-wr8j

около 3 лет назад

An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the path component of a URL that lacks a ? character) followed by an HTTP header or a Redis command. This is similar to the CVE-2019-9740 query string issue. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.

CVSS3: 6.1
EPSS: Низкий
ubuntu логотип

CVE-2019-9947

около 6 лет назад

An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the path component of a URL that lacks a ? character) followed by an HTTP header or a Redis command. This is similar to the CVE-2019-9740 query string issue. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.

CVSS3: 6.1
EPSS: Низкий
redhat логотип

CVE-2019-9947

около 6 лет назад

An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the path component of a URL that lacks a ? character) followed by an HTTP header or a Redis command. This is similar to the CVE-2019-9740 query string issue. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.

CVSS3: 6.5
EPSS: Низкий
nvd логотип

CVE-2019-9947

около 6 лет назад

An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the path component of a URL that lacks a ? character) followed by an HTTP header or a Redis command. This is similar to the CVE-2019-9740 query string issue. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.

CVSS3: 6.1
EPSS: Низкий
debian логотип

CVE-2019-9947

около 6 лет назад

An issue was discovered in urllib2 in Python 2.x through 2.7.16 and ur ...

CVSS3: 6.1
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:1352-2

почти 6 лет назад

Security update for python3

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:1352-1

около 6 лет назад

Security update for python3

EPSS: Низкий
suse-cvrf логотип

SUSE-RU-2020:0775-1

около 5 лет назад

Recommended update for python-botocore

EPSS: Низкий
fstec логотип

BDU:2020-01057

около 6 лет назад

Уязвимость модуля urllib2 интерпретатора языка программирования Python, позволяющая нарушителю оказать воздействие на конфиденциальность и целостность защищаемой информации

CVSS3: 6.1
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2019:2393-1

больше 5 лет назад

Security update for python

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2019:2389-1

больше 5 лет назад

Security update for python

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:2743-1

больше 5 лет назад

Security update for python

EPSS: Низкий
oracle-oval логотип

ELSA-2019-3520

больше 5 лет назад

ELSA-2019-3520: python3 security and bug fix update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2019-2030

почти 6 лет назад

ELSA-2019-2030: python security and bug fix update (MODERATE)

EPSS: Низкий
rocky логотип

RLSA-2019:3335

больше 5 лет назад

Moderate: python27:2.7 security and bug fix update

EPSS: Низкий
oracle-oval логотип

ELSA-2019-3335

больше 5 лет назад

ELSA-2019-3335: python27:2.7 security and bug fix update (MODERATE)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:2699-1

больше 4 лет назад

Security update for python3

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:0302-1

больше 5 лет назад

Security update for python36

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:0086-1

больше 5 лет назад

Security update for python3

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:0114-1

больше 5 лет назад

Security update for python3

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-89ff-5r66-wr8j

An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the path component of a URL that lacks a ? character) followed by an HTTP header or a Redis command. This is similar to the CVE-2019-9740 query string issue. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.

CVSS3: 6.1
1%
Низкий
около 3 лет назад
ubuntu логотип
CVE-2019-9947

An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the path component of a URL that lacks a ? character) followed by an HTTP header or a Redis command. This is similar to the CVE-2019-9740 query string issue. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.

CVSS3: 6.1
1%
Низкий
около 6 лет назад
redhat логотип
CVE-2019-9947

An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the path component of a URL that lacks a ? character) followed by an HTTP header or a Redis command. This is similar to the CVE-2019-9740 query string issue. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.

CVSS3: 6.5
1%
Низкий
около 6 лет назад
nvd логотип
CVE-2019-9947

An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the path component of a URL that lacks a ? character) followed by an HTTP header or a Redis command. This is similar to the CVE-2019-9740 query string issue. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.

CVSS3: 6.1
1%
Низкий
около 6 лет назад
debian логотип
CVE-2019-9947

An issue was discovered in urllib2 in Python 2.x through 2.7.16 and ur ...

CVSS3: 6.1
1%
Низкий
около 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:1352-2

Security update for python3

1%
Низкий
почти 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:1352-1

Security update for python3

1%
Низкий
около 6 лет назад
suse-cvrf логотип
SUSE-RU-2020:0775-1

Recommended update for python-botocore

1%
Низкий
около 5 лет назад
fstec логотип
BDU:2020-01057

Уязвимость модуля urllib2 интерпретатора языка программирования Python, позволяющая нарушителю оказать воздействие на конфиденциальность и целостность защищаемой информации

CVSS3: 6.1
1%
Низкий
около 6 лет назад
suse-cvrf логотип
openSUSE-SU-2019:2393-1

Security update for python

больше 5 лет назад
suse-cvrf логотип
openSUSE-SU-2019:2389-1

Security update for python

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2019:2743-1

Security update for python

больше 5 лет назад
oracle-oval логотип
ELSA-2019-3520

ELSA-2019-3520: python3 security and bug fix update (MODERATE)

больше 5 лет назад
oracle-oval логотип
ELSA-2019-2030

ELSA-2019-2030: python security and bug fix update (MODERATE)

почти 6 лет назад
rocky логотип
RLSA-2019:3335

Moderate: python27:2.7 security and bug fix update

больше 5 лет назад
oracle-oval логотип
ELSA-2019-3335

ELSA-2019-3335: python27:2.7 security and bug fix update (MODERATE)

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:2699-1

Security update for python3

больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2020:0302-1

Security update for python36

больше 5 лет назад
suse-cvrf логотип
openSUSE-SU-2020:0086-1

Security update for python3

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:0114-1

Security update for python3

больше 5 лет назад

Уязвимостей на страницу