rpm package
almalinux/python2-bson
pkg:rpm/almalinux/python2-bson
Vulnerabilities (22)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2024-22195 | — | < 3.7.0-1.module_el8.6.0+2781+fed64c13 | 3.7.0-1.module_el8.6.0+2781+fed64c13 | Jan 11, 2024 | Jinja is an extensible templating engine. Special placeholders in the template allow writing code similar to Python syntax. It is possible to inject arbitrary HTML attributes into the rendered HTML template, potentially leading to Cross-Site Scripting (XSS). The Jinja `xmlattr` f | ||
| CVE-2023-43804 | — | < 3.7.0-1.module_el8.6.0+2781+fed64c13 | 3.7.0-1.module_el8.6.0+2781+fed64c13 | Oct 4, 2023 | urllib3 is a user-friendly HTTP client library for Python. urllib3 doesn't treat the `Cookie` HTTP header special or provide any helpers for managing cookies over HTTP, that is the responsibility of the user. However, it is possible for a user to specify a `Cookie` header and unk | ||
| CVE-2023-40217 | — | < 3.7.0-1.module_el8.6.0+2781+fed64c13 | 3.7.0-1.module_el8.6.0+2781+fed64c13 | Aug 25, 2023 | An issue was discovered in Python before 3.8.18, 3.9.x before 3.9.18, 3.10.x before 3.10.13, and 3.11.x before 3.11.5. It primarily affects servers (such as HTTP servers) that use TLS client authentication. If a TLS server-side socket is created, receives data into the socket buf | ||
| CVE-2022-48565 | — | < 3.7.0-1.module_el8.6.0+2781+fed64c13 | 3.7.0-1.module_el8.6.0+2781+fed64c13 | Aug 22, 2023 | An XML External Entity (XXE) issue was discovered in Python through 3.9.1. The plistlib module no longer accepts entity declarations in XML plist files to avoid XML vulnerabilities. | ||
| CVE-2022-48560 | — | < 3.7.0-1.module_el8.6.0+2781+fed64c13 | 3.7.0-1.module_el8.6.0+2781+fed64c13 | Aug 22, 2023 | A use-after-free exists in Python through 3.9 via heappushpop in heapq. | ||
| CVE-2023-32681 | — | < 3.7.0-1.module_el8.6.0+2781+fed64c13 | 3.7.0-1.module_el8.6.0+2781+fed64c13 | May 26, 2023 | Requests is a HTTP library. Since Requests 2.3.0, Requests has been leaking Proxy-Authorization headers to destination servers when redirected to an HTTPS endpoint. This is a product of how we use `rebuild_proxies` to reattach the `Proxy-Authorization` header to requests. For HTT | ||
| CVE-2023-24329 | — | < 3.7.0-1.module_el8.6.0+2781+fed64c13 | 3.7.0-1.module_el8.6.0+2781+fed64c13 | Feb 17, 2023 | An issue in the urllib.parse component of Python before 3.11.4 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters. | ||
| CVE-2022-40897 | — | < 3.7.0-1.module_el8.6.0+2781+fed64c13 | 3.7.0-1.module_el8.6.0+2781+fed64c13 | Dec 22, 2022 | Python Packaging Authority (PyPA) setuptools before 65.5.1 allows remote attackers to cause a denial of service via HTML in a crafted package or custom PackageIndex page. There is a Regular Expression Denial of Service (ReDoS) in package_index.py. | ||
| CVE-2022-45061 | — | < 3.7.0-1.module_el8.6.0+2781+fed64c13 | 3.7.0-1.module_el8.6.0+2781+fed64c13 | Nov 9, 2022 | An issue was discovered in Python before 3.11.1. An unnecessary quadratic algorithm exists in one path when processing some inputs to the IDNA (RFC 3490) decoder, such that a crafted, unreasonably long name being presented to the decoder could lead to a CPU denial of service. Hos | ||
| CVE-2021-4189 | — | < 3.7.0-1.module_el8.6.0+2781+fed64c13 | 3.7.0-1.module_el8.6.0+2781+fed64c13 | Aug 24, 2022 | A flaw was found in Python, specifically in the FTP (File Transfer Protocol) client library in PASV (passive) mode. The issue is how the FTP client trusts the host from the PASV response by default. This flaw allows an attacker to set up a malicious FTP server that can trick FTP | ||
| CVE-2015-20107 | — | < 3.7.0-1.module_el8.6.0+2781+fed64c13 | 3.7.0-1.module_el8.6.0+2781+fed64c13 | Apr 13, 2022 | In Python (aka CPython) up to 3.10.8, the mailcap module does not add escape characters into commands discovered in the system mailcap file. This may allow attackers to inject shell commands into applications that call mailcap.findmatch with untrusted input (if they lack validati | ||
| CVE-2021-3733 | — | < 3.7.0-1.module_el8.6.0+2781+fed64c13 | 3.7.0-1.module_el8.6.0+2781+fed64c13 | Mar 7, 2022 | There's a flaw in urllib's AbstractBasicAuthHandler class. An attacker who controls a malicious HTTP server that an HTTP client (such as web browser) connects to, could trigger a Regular Expression Denial of Service (ReDOS) during an authentication request with a specially crafte | ||
| CVE-2021-3737 | — | < 3.7.0-1.module_el8.6.0+2781+fed64c13 | 3.7.0-1.module_el8.6.0+2781+fed64c13 | Mar 4, 2022 | A flaw was found in python. An improperly handled HTTP response in the HTTP client code of python may allow a remote attacker, who controls the HTTP server, to make the client script enter an infinite loop, consuming CPU time. The highest threat from this vulnerability is to syst | ||
| CVE-2022-0391 | — | < 3.7.0-1.module_el8.6.0+2781+fed64c13 | 3.7.0-1.module_el8.6.0+2781+fed64c13 | Feb 9, 2022 | A flaw was found in Python, specifically within the urllib.parse module. This module helps break Uniform Resource Locator (URL) strings into components. The issue involves how the urlparse method does not sanitize input and allows characters like '\r' and '\n' in the URL path. Th | ||
| CVE-2021-43818 | — | < 3.7.0-1.module_el8.6.0+2781+fed64c13 | 3.7.0-1.module_el8.6.0+2781+fed64c13 | Dec 13, 2021 | lxml is a library for processing XML and HTML in the Python language. Prior to version 4.6.5, the HTML Cleaner in lxml.html lets certain crafted script content pass through, as well as script content in SVG files embedded using data URIs. Users that employ the HTML cleaner in a s | ||
| CVE-2021-42771 | — | < 3.7.0-1.module_el8.6.0+2781+fed64c13 | 3.7.0-1.module_el8.6.0+2781+fed64c13 | Oct 20, 2021 | Babel.Locale in Babel before 2.9.1 allows attackers to load arbitrary locale .dat files (containing serialized Python objects) via directory traversal, leading to code execution. | ||
| CVE-2021-20270 | — | < 3.7.0-1.module_el8.6.0+2781+fed64c13 | 3.7.0-1.module_el8.6.0+2781+fed64c13 | Mar 23, 2021 | An infinite loop in SMLLexer in Pygments versions 1.5 to 2.7.3 may lead to denial of service when performing syntax highlighting of a Standard ML (SML) source file, as demonstrated by input that only contains the "exception" keyword. | ||
| CVE-2021-28957 | — | < 3.7.0-1.module_el8.6.0+2781+fed64c13 | 3.7.0-1.module_el8.6.0+2781+fed64c13 | Mar 21, 2021 | An XSS vulnerability was discovered in python-lxml's clean module versions before 4.6.3. When disabling the safe_attrs_only and forms arguments, the Cleaner class does not remove the formaction attribute allowing for JS to bypass the sanitizer. A remote attacker could exploit thi | ||
| CVE-2021-27291 | — | < 3.7.0-1.module_el8.6.0+2781+fed64c13 | 3.7.0-1.module_el8.6.0+2781+fed64c13 | Mar 17, 2021 | In pygments 1.1+, fixed in 2.7.4, the lexers used to parse programming languages rely heavily on regular expressions. Some of the regular expressions have exponential or cubic worst-case complexity and are vulnerable to ReDoS. By crafting malicious input, an attacker can cause a | ||
| CVE-2021-23336 | — | < 3.7.0-1.module_el8.6.0+2781+fed64c13 | 3.7.0-1.module_el8.6.0+2781+fed64c13 | Feb 15, 2021 | The package python/cpython from 0 and before 3.6.13, from 3.7.0 and before 3.7.10, from 3.8.0 and before 3.8.8, from 3.9.0 and before 3.9.2 are vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a vector called parameter cloaking. When |
- CVE-2024-22195Jan 11, 2024affected < 3.7.0-1.module_el8.6.0+2781+fed64c13fixed 3.7.0-1.module_el8.6.0+2781+fed64c13
Jinja is an extensible templating engine. Special placeholders in the template allow writing code similar to Python syntax. It is possible to inject arbitrary HTML attributes into the rendered HTML template, potentially leading to Cross-Site Scripting (XSS). The Jinja `xmlattr` f
- CVE-2023-43804Oct 4, 2023affected < 3.7.0-1.module_el8.6.0+2781+fed64c13fixed 3.7.0-1.module_el8.6.0+2781+fed64c13
urllib3 is a user-friendly HTTP client library for Python. urllib3 doesn't treat the `Cookie` HTTP header special or provide any helpers for managing cookies over HTTP, that is the responsibility of the user. However, it is possible for a user to specify a `Cookie` header and unk
- CVE-2023-40217Aug 25, 2023affected < 3.7.0-1.module_el8.6.0+2781+fed64c13fixed 3.7.0-1.module_el8.6.0+2781+fed64c13
An issue was discovered in Python before 3.8.18, 3.9.x before 3.9.18, 3.10.x before 3.10.13, and 3.11.x before 3.11.5. It primarily affects servers (such as HTTP servers) that use TLS client authentication. If a TLS server-side socket is created, receives data into the socket buf
- CVE-2022-48565Aug 22, 2023affected < 3.7.0-1.module_el8.6.0+2781+fed64c13fixed 3.7.0-1.module_el8.6.0+2781+fed64c13
An XML External Entity (XXE) issue was discovered in Python through 3.9.1. The plistlib module no longer accepts entity declarations in XML plist files to avoid XML vulnerabilities.
- CVE-2022-48560Aug 22, 2023affected < 3.7.0-1.module_el8.6.0+2781+fed64c13fixed 3.7.0-1.module_el8.6.0+2781+fed64c13
A use-after-free exists in Python through 3.9 via heappushpop in heapq.
- CVE-2023-32681May 26, 2023affected < 3.7.0-1.module_el8.6.0+2781+fed64c13fixed 3.7.0-1.module_el8.6.0+2781+fed64c13
Requests is a HTTP library. Since Requests 2.3.0, Requests has been leaking Proxy-Authorization headers to destination servers when redirected to an HTTPS endpoint. This is a product of how we use `rebuild_proxies` to reattach the `Proxy-Authorization` header to requests. For HTT
- CVE-2023-24329Feb 17, 2023affected < 3.7.0-1.module_el8.6.0+2781+fed64c13fixed 3.7.0-1.module_el8.6.0+2781+fed64c13
An issue in the urllib.parse component of Python before 3.11.4 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.
- CVE-2022-40897Dec 22, 2022affected < 3.7.0-1.module_el8.6.0+2781+fed64c13fixed 3.7.0-1.module_el8.6.0+2781+fed64c13
Python Packaging Authority (PyPA) setuptools before 65.5.1 allows remote attackers to cause a denial of service via HTML in a crafted package or custom PackageIndex page. There is a Regular Expression Denial of Service (ReDoS) in package_index.py.
- CVE-2022-45061Nov 9, 2022affected < 3.7.0-1.module_el8.6.0+2781+fed64c13fixed 3.7.0-1.module_el8.6.0+2781+fed64c13
An issue was discovered in Python before 3.11.1. An unnecessary quadratic algorithm exists in one path when processing some inputs to the IDNA (RFC 3490) decoder, such that a crafted, unreasonably long name being presented to the decoder could lead to a CPU denial of service. Hos
- CVE-2021-4189Aug 24, 2022affected < 3.7.0-1.module_el8.6.0+2781+fed64c13fixed 3.7.0-1.module_el8.6.0+2781+fed64c13
A flaw was found in Python, specifically in the FTP (File Transfer Protocol) client library in PASV (passive) mode. The issue is how the FTP client trusts the host from the PASV response by default. This flaw allows an attacker to set up a malicious FTP server that can trick FTP
- CVE-2015-20107Apr 13, 2022affected < 3.7.0-1.module_el8.6.0+2781+fed64c13fixed 3.7.0-1.module_el8.6.0+2781+fed64c13
In Python (aka CPython) up to 3.10.8, the mailcap module does not add escape characters into commands discovered in the system mailcap file. This may allow attackers to inject shell commands into applications that call mailcap.findmatch with untrusted input (if they lack validati
- CVE-2021-3733Mar 7, 2022affected < 3.7.0-1.module_el8.6.0+2781+fed64c13fixed 3.7.0-1.module_el8.6.0+2781+fed64c13
There's a flaw in urllib's AbstractBasicAuthHandler class. An attacker who controls a malicious HTTP server that an HTTP client (such as web browser) connects to, could trigger a Regular Expression Denial of Service (ReDOS) during an authentication request with a specially crafte
- CVE-2021-3737Mar 4, 2022affected < 3.7.0-1.module_el8.6.0+2781+fed64c13fixed 3.7.0-1.module_el8.6.0+2781+fed64c13
A flaw was found in python. An improperly handled HTTP response in the HTTP client code of python may allow a remote attacker, who controls the HTTP server, to make the client script enter an infinite loop, consuming CPU time. The highest threat from this vulnerability is to syst
- CVE-2022-0391Feb 9, 2022affected < 3.7.0-1.module_el8.6.0+2781+fed64c13fixed 3.7.0-1.module_el8.6.0+2781+fed64c13
A flaw was found in Python, specifically within the urllib.parse module. This module helps break Uniform Resource Locator (URL) strings into components. The issue involves how the urlparse method does not sanitize input and allows characters like '\r' and '\n' in the URL path. Th
- CVE-2021-43818Dec 13, 2021affected < 3.7.0-1.module_el8.6.0+2781+fed64c13fixed 3.7.0-1.module_el8.6.0+2781+fed64c13
lxml is a library for processing XML and HTML in the Python language. Prior to version 4.6.5, the HTML Cleaner in lxml.html lets certain crafted script content pass through, as well as script content in SVG files embedded using data URIs. Users that employ the HTML cleaner in a s
- CVE-2021-42771Oct 20, 2021affected < 3.7.0-1.module_el8.6.0+2781+fed64c13fixed 3.7.0-1.module_el8.6.0+2781+fed64c13
Babel.Locale in Babel before 2.9.1 allows attackers to load arbitrary locale .dat files (containing serialized Python objects) via directory traversal, leading to code execution.
- CVE-2021-20270Mar 23, 2021affected < 3.7.0-1.module_el8.6.0+2781+fed64c13fixed 3.7.0-1.module_el8.6.0+2781+fed64c13
An infinite loop in SMLLexer in Pygments versions 1.5 to 2.7.3 may lead to denial of service when performing syntax highlighting of a Standard ML (SML) source file, as demonstrated by input that only contains the "exception" keyword.
- CVE-2021-28957Mar 21, 2021affected < 3.7.0-1.module_el8.6.0+2781+fed64c13fixed 3.7.0-1.module_el8.6.0+2781+fed64c13
An XSS vulnerability was discovered in python-lxml's clean module versions before 4.6.3. When disabling the safe_attrs_only and forms arguments, the Cleaner class does not remove the formaction attribute allowing for JS to bypass the sanitizer. A remote attacker could exploit thi
- CVE-2021-27291Mar 17, 2021affected < 3.7.0-1.module_el8.6.0+2781+fed64c13fixed 3.7.0-1.module_el8.6.0+2781+fed64c13
In pygments 1.1+, fixed in 2.7.4, the lexers used to parse programming languages rely heavily on regular expressions. Some of the regular expressions have exponential or cubic worst-case complexity and are vulnerable to ReDoS. By crafting malicious input, an attacker can cause a
- CVE-2021-23336Feb 15, 2021affected < 3.7.0-1.module_el8.6.0+2781+fed64c13fixed 3.7.0-1.module_el8.6.0+2781+fed64c13
The package python/cpython from 0 and before 3.6.13, from 3.7.0 and before 3.7.10, from 3.8.0 and before 3.8.8, from 3.9.0 and before 3.9.2 are vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a vector called parameter cloaking. When
Page 1 of 2