Search for packages
purl | pkg:deb/ubuntu/python3.7@3.7.5~rc1-1 |
Next non-vulnerable version | 3.7.5-2~18.04.4 |
Latest non-vulnerable version | 3.7.5-2~19.10ubuntu1 |
Risk | 4.4 |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-5mx7-64wn-aaar
Aliases: CVE-2020-8492 |
Python 2.7 through 2.7.17, 3.5 through 3.5.9, 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1 allows an HTTP server to conduct Regular Expression Denial of Service (ReDoS) attacks against a client because of urllib.request.AbstractBasicAuthHandler catastrophic backtracking. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-ae3q-mde6-aaab
Aliases: CVE-2019-20907 |
In Lib/tarfile.py in Python through 3.8.3, an attacker is able to craft a TAR archive leading to an infinite loop when opened by tarfile.open, because _proc_pax lacks header validation. |
Affected by 0 other vulnerabilities. |
VCID-aer8-np52-aaan
Aliases: CVE-2020-27619 |
In Python 3 through 3.9.0, the Lib/test/multibytecodec_support.py CJK codec tests call eval() on content retrieved via HTTP. |
Affected by 0 other vulnerabilities. |
VCID-gk4y-9r2y-aaar
Aliases: CVE-2021-3177 |
Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely. |
Affected by 0 other vulnerabilities. |
VCID-j7vm-npyj-aaaq
Aliases: CVE-2019-9674 |
Lib/zipfile.py in Python through 3.7.2 allows remote attackers to cause a denial of service (resource consumption) via a ZIP bomb. |
Affected by 0 other vulnerabilities. |
VCID-kdx7-ds63-aaab
Aliases: CVE-2019-17514 |
CVE-2019-17514 python: potentially misleading information about whether sorting in library/glob.html |
Affected by 0 other vulnerabilities. |
VCID-pxj5-pax2-aaag
Aliases: CVE-2019-18348 |
An issue was discovered in urllib2 in Python 2.x through 2.7.17 and urllib in Python 3.x through 3.8.0. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the host component of a URL) followed by an HTTP header. This is similar to the CVE-2019-9740 query string issue and the CVE-2019-9947 path string issue. (This is not exploitable when glibc has CVE-2016-10739 fixed.). This is fixed in: v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1; v3.6.11, v3.6.11rc1, v3.6.12; v3.7.8, v3.7.8rc1, v3.7.9; v3.8.3, v3.8.3rc1, v3.8.4, v3.8.4rc1, v3.8.5, v3.8.6, v3.8.6rc1. |
Affected by 0 other vulnerabilities. |
VCID-s4tj-c35n-aaad
Aliases: CVE-2020-26116 |
http.client in Python 3.x before 3.5.10, 3.6.x before 3.6.12, 3.7.x before 3.7.9, and 3.8.x before 3.8.5 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of HTTPConnection.request. |
Affected by 0 other vulnerabilities. |
VCID-y2w8-eze9-aaar
Aliases: CVE-2021-29921 |
In Python before 3,9,5, the ipaddress library mishandles leading zero characters in the octets of an IP address string. This (in some situations) allows attackers to bypass access control that is based on IP addresses. |
Affected by 0 other vulnerabilities. |
Vulnerability | Summary | Aliases |
---|---|---|
VCID-g2ay-gsja-aaaj | The documentation XML-RPC server in Python through 2.7.16, 3.x through 3.6.9, and 3.7.x through 3.7.4 has XSS via the server_title field. This occurs in Lib/DocXMLRPCServer.py in Python 2.x, and in Lib/xmlrpc/server.py in Python 3.x. If set_server_title is called with untrusted input, arbitrary JavaScript can be delivered to clients that visit the http URL for this server. |
CVE-2019-16935
|
Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
---|