VYPR

rpm package

suse/python&distro=SUSE Linux Enterprise Server 12 SP4-LTSS

pkg:rpm/suse/python&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP4-LTSS

Vulnerabilities (10)

  • CVE-2023-24329Feb 17, 2023
    affected < 2.7.18-33.20.2fixed 2.7.18-33.20.2

    An issue in the urllib.parse component of Python before 3.11.4 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.

  • CVE-2022-45061Nov 9, 2022
    affected < 2.7.18-33.17.1fixed 2.7.18-33.17.1

    An issue was discovered in Python before 3.11.1. An unnecessary quadratic algorithm exists in one path when processing some inputs to the IDNA (RFC 3490) decoder, such that a crafted, unreasonably long name being presented to the decoder could lead to a CPU denial of service. Hos

  • CVE-2021-4189Aug 24, 2022
    affected < 2.7.18-33.8.1fixed 2.7.18-33.8.1

    A flaw was found in Python, specifically in the FTP (File Transfer Protocol) client library in PASV (passive) mode. The issue is how the FTP client trusts the host from the PASV response by default. This flaw allows an attacker to set up a malicious FTP server that can trick FTP

  • CVE-2021-28861Aug 23, 2022
    affected < 2.7.18-33.14.2fixed 2.7.18-33.14.2

    Python 3.x through 3.10 has an open redirection vulnerability in lib/http/server.py due to no protection against multiple (/) at the beginning of URI path which may leads to information disclosure. NOTE: this is disputed by a third party because the http.server.html documentation

  • CVE-2015-20107Apr 13, 2022
    affected < 2.7.18-33.11.1fixed 2.7.18-33.11.1

    In Python (aka CPython) up to 3.10.8, the mailcap module does not add escape characters into commands discovered in the system mailcap file. This may allow attackers to inject shell commands into applications that call mailcap.findmatch with untrusted input (if they lack validati

  • CVE-2022-0391Feb 9, 2022
    affected < 2.7.18-33.8.1fixed 2.7.18-33.8.1

    A flaw was found in Python, specifically within the urllib.parse module. This module helps break Uniform Resource Locator (URL) strings into components. The issue involves how the urlparse method does not sanitize input and allows characters like '\r' and '\n' in the URL path. Th

  • CVE-2021-23336Feb 15, 2021
    affected < 2.7.18-28.67.1fixed 2.7.18-28.67.1

    The package python/cpython from 0 and before 3.6.13, from 3.7.0 and before 3.7.10, from 3.8.0 and before 3.8.8, from 3.9.0 and before 3.9.2 are vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a vector called parameter cloaking. When

  • CVE-2021-3177Jan 19, 2021
    affected < 2.7.17-28.64.1fixed 2.7.17-28.64.1

    Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occu

  • CVE-2019-20916Sep 4, 2020
    affected < 2.7.17-28.59.1fixed 2.7.17-28.59.1

    The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _

  • CVE-2019-18348Oct 23, 2019
    affected < 2.7.18-28.67.1fixed 2.7.18-28.67.1

    An issue was discovered in urllib2 in Python 2.x through 2.7.17 and urllib in Python 3.x through 3.8.0. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the host compone