rpm package
suse/python-PyYAML&distro=SUSE Linux Enterprise Module for Public Cloud 12
pkg:rpm/suse/python-PyYAML&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2012
Vulnerabilities (5)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2021-33503 | — | < 5.3.1-28.4.3 | 5.3.1-28.4.3 | Jun 29, 2021 | An issue was discovered in urllib3 before 1.26.5. When provided with a URL containing many @ characters in the authority component, the authority regular expression exhibits catastrophic backtracking, causing a denial of service if a URL were passed as a parameter or redirected t | ||
| CVE-2020-14343 | — | < 5.3.1-28.6.1 | 5.3.1-28.6.1 | Feb 9, 2021 | A vulnerability was discovered in the PyYAML library in versions before 5.4, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrust | ||
| CVE-2020-1747 | — | < 5.1.2-26.12.1 | 5.1.2-26.12.1 | Mar 24, 2020 | A vulnerability was discovered in the PyYAML library in versions before 5.3.1, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untru | ||
| CVE-2018-18074 | — | < 5.1.2-26.9.4 | 5.1.2-26.9.4 | Oct 9, 2018 | The Requests package before 2.20.0 for Python sends an HTTP Authorization header to an http URI upon receiving a same-hostname https-to-http redirect, which makes it easier for remote attackers to discover credentials by sniffing the network. | ||
| CVE-2014-9130 | — | < 3.10-15.1 | 3.10-15.1 | Dec 8, 2014 | scanner.c in LibYAML 0.1.5 and 0.1.6, as used in the YAML-LibYAML (aka YAML-XS) module for Perl, allows context-dependent attackers to cause a denial of service (assertion failure and crash) via vectors involving line-wrapping. |
- CVE-2021-33503Jun 29, 2021affected < 5.3.1-28.4.3fixed 5.3.1-28.4.3
An issue was discovered in urllib3 before 1.26.5. When provided with a URL containing many @ characters in the authority component, the authority regular expression exhibits catastrophic backtracking, causing a denial of service if a URL were passed as a parameter or redirected t
- CVE-2020-14343Feb 9, 2021affected < 5.3.1-28.6.1fixed 5.3.1-28.6.1
A vulnerability was discovered in the PyYAML library in versions before 5.4, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrust
- CVE-2020-1747Mar 24, 2020affected < 5.1.2-26.12.1fixed 5.1.2-26.12.1
A vulnerability was discovered in the PyYAML library in versions before 5.3.1, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untru
- CVE-2018-18074Oct 9, 2018affected < 5.1.2-26.9.4fixed 5.1.2-26.9.4
The Requests package before 2.20.0 for Python sends an HTTP Authorization header to an http URI upon receiving a same-hostname https-to-http redirect, which makes it easier for remote attackers to discover credentials by sniffing the network.
- CVE-2014-9130Dec 8, 2014affected < 3.10-15.1fixed 3.10-15.1
scanner.c in LibYAML 0.1.5 and 0.1.6, as used in the YAML-LibYAML (aka YAML-XS) module for Perl, allows context-dependent attackers to cause a denial of service (assertion failure and crash) via vectors involving line-wrapping.