Search for packages
purl | pkg:deb/ubuntu/python3.6@3.6.9-1~18.04ubuntu1.3 |
Next non-vulnerable version | 3.6.9-1~18.04ubuntu1.4 |
Latest non-vulnerable version | 3.6.9-1~18.04ubuntu1.4 |
Risk | 4.4 |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-aer8-np52-aaan
Aliases: CVE-2020-27619 |
In Python 3 through 3.9.0, the Lib/test/multibytecodec_support.py CJK codec tests call eval() on content retrieved via HTTP. |
Affected by 0 other vulnerabilities. |
VCID-gk4y-9r2y-aaar
Aliases: CVE-2021-3177 |
Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely. |
Affected by 0 other vulnerabilities. |
VCID-y2w8-eze9-aaar
Aliases: CVE-2021-29921 |
In Python before 3,9,5, the ipaddress library mishandles leading zero characters in the octets of an IP address string. This (in some situations) allows attackers to bypass access control that is based on IP addresses. |
Affected by 0 other vulnerabilities. |
Vulnerability | Summary | Aliases |
---|---|---|
VCID-s4tj-c35n-aaad | http.client in Python 3.x before 3.5.10, 3.6.x before 3.6.12, 3.7.x before 3.7.9, and 3.8.x before 3.8.5 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of HTTPConnection.request. |
CVE-2020-26116
|
Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
---|