Количество 8
Количество 8
CVE-2021-21330
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. In aiohttp before version 3.7.4 there is an open redirect vulnerability. A maliciously crafted link to an aiohttp-based web-server could redirect the browser to a different website. It is caused by a bug in the `aiohttp.web_middlewares.normalize_path_middleware` middleware. This security problem has been fixed in 3.7.4. Upgrade your dependency using pip as follows "pip install aiohttp >= 3.7.4". If upgrading is not an option for you, a workaround can be to avoid using `aiohttp.web_middlewares.normalize_path_middleware` in your applications.
CVE-2021-21330
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. In aiohttp before version 3.7.4 there is an open redirect vulnerability. A maliciously crafted link to an aiohttp-based web-server could redirect the browser to a different website. It is caused by a bug in the `aiohttp.web_middlewares.normalize_path_middleware` middleware. This security problem has been fixed in 3.7.4. Upgrade your dependency using pip as follows "pip install aiohttp >= 3.7.4". If upgrading is not an option for you, a workaround can be to avoid using `aiohttp.web_middlewares.normalize_path_middleware` in your applications.
CVE-2021-21330
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. In aiohttp before version 3.7.4 there is an open redirect vulnerability. A maliciously crafted link to an aiohttp-based web-server could redirect the browser to a different website. It is caused by a bug in the `aiohttp.web_middlewares.normalize_path_middleware` middleware. This security problem has been fixed in 3.7.4. Upgrade your dependency using pip as follows "pip install aiohttp >= 3.7.4". If upgrading is not an option for you, a workaround can be to avoid using `aiohttp.web_middlewares.normalize_path_middleware` in your applications.
CVE-2021-21330
aiohttp is an asynchronous HTTP client/server framework for asyncio an ...
SUSE-SU-2021:1313-1
Security update for python-aiohttp
SUSE-RU-2022:3275-1
Recommended update for python-aiohttp, python-typing_extensions
GHSA-v6wp-4m6f-gcjg
`aiohttp` Open Redirect vulnerability (`normalize_path_middleware` middleware)
BDU:2021-01528
Уязвимость HTTP-клиента aiohttp, связанная с переадресацией URL на ненадежный сайт, позволяющая нарушителю проводить фишинг-атаки
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2021-21330 aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. In aiohttp before version 3.7.4 there is an open redirect vulnerability. A maliciously crafted link to an aiohttp-based web-server could redirect the browser to a different website. It is caused by a bug in the `aiohttp.web_middlewares.normalize_path_middleware` middleware. This security problem has been fixed in 3.7.4. Upgrade your dependency using pip as follows "pip install aiohttp >= 3.7.4". If upgrading is not an option for you, a workaround can be to avoid using `aiohttp.web_middlewares.normalize_path_middleware` in your applications. | CVSS3: 3.1 | 0% Низкий | почти 5 лет назад | |
CVE-2021-21330 aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. In aiohttp before version 3.7.4 there is an open redirect vulnerability. A maliciously crafted link to an aiohttp-based web-server could redirect the browser to a different website. It is caused by a bug in the `aiohttp.web_middlewares.normalize_path_middleware` middleware. This security problem has been fixed in 3.7.4. Upgrade your dependency using pip as follows "pip install aiohttp >= 3.7.4". If upgrading is not an option for you, a workaround can be to avoid using `aiohttp.web_middlewares.normalize_path_middleware` in your applications. | CVSS3: 8.2 | 0% Низкий | почти 5 лет назад | |
CVE-2021-21330 aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. In aiohttp before version 3.7.4 there is an open redirect vulnerability. A maliciously crafted link to an aiohttp-based web-server could redirect the browser to a different website. It is caused by a bug in the `aiohttp.web_middlewares.normalize_path_middleware` middleware. This security problem has been fixed in 3.7.4. Upgrade your dependency using pip as follows "pip install aiohttp >= 3.7.4". If upgrading is not an option for you, a workaround can be to avoid using `aiohttp.web_middlewares.normalize_path_middleware` in your applications. | CVSS3: 3.1 | 0% Низкий | почти 5 лет назад | |
CVE-2021-21330 aiohttp is an asynchronous HTTP client/server framework for asyncio an ... | CVSS3: 3.1 | 0% Низкий | почти 5 лет назад | |
SUSE-SU-2021:1313-1 Security update for python-aiohttp | 0% Низкий | почти 5 лет назад | ||
SUSE-RU-2022:3275-1 Recommended update for python-aiohttp, python-typing_extensions | 0% Низкий | больше 3 лет назад | ||
GHSA-v6wp-4m6f-gcjg `aiohttp` Open Redirect vulnerability (`normalize_path_middleware` middleware) | CVSS3: 3.1 | 0% Низкий | почти 5 лет назад | |
BDU:2021-01528 Уязвимость HTTP-клиента aiohttp, связанная с переадресацией URL на ненадежный сайт, позволяющая нарушителю проводить фишинг-атаки | CVSS3: 4.7 | 0% Низкий | почти 5 лет назад |
Уязвимостей на страницу