VYPR

rpm package

suse/python-Twisted&distro=SUSE Linux Enterprise Module for Package Hub 15 SP3

pkg:rpm/suse/python-Twisted&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Package%20Hub%2015%20SP3

Vulnerabilities (5)

  • CVE-2022-39348Oct 26, 2022
    affected < 19.10.0-150200.3.18.1fixed 19.10.0-150200.3.18.1

    Twisted is an event-based framework for internet applications. Started with version 0.9.4, when the host header does not match a configured host `twisted.web.vhost.NameVirtualHost` will return a `NoResource` resource which renders the Host header unescaped into the 404 response a

  • CVE-2022-24801Apr 4, 2022
    affected < 19.10.0-150200.3.9.1fixed 19.10.0-150200.3.9.1

    Twisted is an event-based framework for internet applications, supporting Python 3.6+. Prior to version 22.4.0rc1, the Twisted Web HTTP 1.1 server, located in the `twisted.web.http` module, parsed several HTTP request constructs more leniently than permitted by RFC 7230. This non

  • CVE-2022-21716Mar 3, 2022
    affected < 19.10.0-150200.3.12.1fixed 19.10.0-150200.3.12.1

    Twisted is an event-based framework for internet applications, supporting Python 3.6+. Prior to 22.2.0, Twisted SSH client and server implement is able to accept an infinite amount of data for the peer's SSH version identifier. This ends up with a buffer using all the available m

  • CVE-2022-21712Feb 7, 2022
    affected < 19.10.0-3.6.1fixed 19.10.0-3.6.1

    twisted is an event-driven networking engine written in Python. In affected versions twisted exposes cookies and authorization headers when following cross-origin redirects. This issue is present in the `twited.web.RedirectAgent` and `twisted.web. BrowserLikeRedirectAgent` functi

  • CVE-2020-10109Mar 12, 2020
    affected < 19.10.0-150200.3.15.1fixed 19.10.0-150200.3.15.1

    In Twisted Web through 19.10.0, there was an HTTP request splitting vulnerability. When presented with a content-length and a chunked encoding header, the content-length took precedence and the remainder of the request body was interpreted as a pipelined request.