Show filters
304 Total Results
Displaying 121-130 of 304
Sort by:
Attacker Value
Unknown

CVE-2020-35654

Disclosure Date: January 12, 2021 (last updated February 22, 2025)
In Pillow before 8.1.0, TiffDecode has a heap-based buffer overflow when decoding crafted YCbCr files because of certain interpretation conflicts with LibTIFF in RGBA mode.
Attacker Value
Unknown

CVE-2020-35655

Disclosure Date: January 12, 2021 (last updated February 22, 2025)
In Pillow before 8.1.0, SGIRleDecode has a 4-byte buffer over-read when decoding crafted SGI RLE image files because offsets and length tables are mishandled.
Attacker Value
Unknown

CVE-2020-26244

Disclosure Date: December 02, 2020 (last updated February 22, 2025)
Python oic is a Python OpenID Connect implementation. In Python oic before version 1.2.1, there are several related cryptographic issues affecting client implementations that use the library. The issues are: 1) The IdToken signature algorithm was not checked automatically, but only if the expected algorithm was passed in as a kwarg. 2) JWA `none` algorithm was allowed in all flows. 3) oic.consumer.Consumer.parse_authz returns an unverified IdToken. The verification of the token was left to the discretion of the implementator. 4) iat claim was not checked for sanity (i.e. it could be in the future). These issues are patched in version 1.2.1.
Attacker Value
Unknown

CVE-2020-25658

Disclosure Date: November 12, 2020 (last updated February 22, 2025)
It was found that python-rsa is vulnerable to Bleichenbacher timing attacks. An attacker can use this flaw via the RSA decryption API to decrypt parts of the cipher text encrypted with RSA.
Attacker Value
Unknown

CVE-2020-26137

Disclosure Date: September 30, 2020 (last updated February 22, 2025)
urllib3 before 1.25.9 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of putrequest(). NOTE: this is similar to CVE-2020-26116.
Attacker Value
Unknown

CVE-2020-26116

Disclosure Date: September 27, 2020 (last updated February 22, 2025)
http.client in Python 3.x before 3.5.10, 3.6.x before 3.6.12, 3.7.x before 3.7.9, and 3.8.x before 3.8.5 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of HTTPConnection.request.
Attacker Value
Unknown

CVE-2020-15141

Disclosure Date: August 14, 2020 (last updated February 21, 2025)
In openapi-python-client before version 0.5.3, there is a path traversal vulnerability. If a user generated a client using a maliciously crafted OpenAPI document, it is possible for generated files to be placed in arbitrary locations on disk.
Attacker Value
Unknown

CVE-2020-15142

Disclosure Date: August 14, 2020 (last updated February 21, 2025)
In openapi-python-client before version 0.5.3, clients generated with a maliciously crafted OpenAPI Document can generate arbitrary Python code. Subsequent execution of this malicious client is arbitrary code execution.
Attacker Value
Unknown

CVE-2020-15801

Disclosure Date: July 17, 2020 (last updated February 21, 2025)
In Python 3.8.4, sys.path restrictions specified in a python38._pth file are ignored, allowing code to be loaded from arbitrary locations. The <executable-name>._pth file (e.g., the python._pth file) is not affected.
Attacker Value
Unknown

CVE-2019-20907

Disclosure Date: July 13, 2020 (last updated February 21, 2025)
In Lib/tarfile.py in Python through 3.8.3, an attacker is able to craft a TAR archive leading to an infinite loop when opened by tarfile.open, because _proc_pax lacks header validation.