Search for packages
| purl | pkg:alpm/archlinux/python-aiohttp@3.7.3-1 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-88cm-cxp9-ekgn
Aliases: CVE-2021-21330 GHSA-v6wp-4m6f-gcjg PYSEC-2021-76 |
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. In aiohttp before version 3.7.4 there is an open redirect vulnerability. A maliciously crafted link to an aiohttp-based web-server could redirect the browser to a different website. It is caused by a bug in the `aiohttp.web_middlewares.normalize_path_middleware` middleware. This security problem has been fixed in 3.7.4. Upgrade your dependency using pip as follows "pip install aiohttp >= 3.7.4". If upgrading is not an option for you, a workaround can be to avoid using `aiohttp.web_middlewares.normalize_path_middleware` in your applications. |
Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-01T18:27:18.714451+00:00 | Arch Linux Importer | Affected by | VCID-88cm-cxp9-ekgn | https://security.archlinux.org/AVG-1623 | 38.0.0 |