Show filters
304 Total Results
Displaying 41-50 of 304
Sort by:
Attacker Value
Unknown
CVE-2022-48564
Disclosure Date: August 22, 2023 (last updated December 16, 2023)
read_ints in plistlib.py in Python through 3.9.1 is vulnerable to a potential DoS attack via CPU and RAM exhaustion when processing malformed Apple Property List files in binary format.
0
Attacker Value
Unknown
CVE-2022-48560
Disclosure Date: August 22, 2023 (last updated October 08, 2023)
A use-after-free exists in Python through 3.9 via heappushpop in heapq.
0
Attacker Value
Unknown
CVE-2023-38898
Disclosure Date: August 15, 2023 (last updated November 08, 2023)
An issue in Python cpython v.3.7 allows an attacker to obtain sensitive information via the _asyncio._swap_current_task component. NOTE: this is disputed by the vendor because (1) neither 3.7 nor any other release is affected (it is a bug in some 3.12 pre-releases); (2) there are no common scenarios in which an adversary can call _asyncio._swap_current_task but does not already have the ability to call arbitrary functions; and (3) there are no common scenarios in which sensitive information, which is not already accessible to an adversary, becomes accessible through this bug.
0
Attacker Value
Unknown
CVE-2023-40267
Disclosure Date: August 11, 2023 (last updated October 08, 2023)
GitPython before 3.1.32 does not block insecure non-multi options in clone and clone_from. NOTE: this issue exists because of an incomplete fix for CVE-2022-24439.
0
Attacker Value
Unknown
CVE-2023-36632
Disclosure Date: June 25, 2023 (last updated November 08, 2023)
The legacy email.utils.parseaddr function in Python through 3.11.4 allows attackers to trigger "RecursionError: maximum recursion depth exceeded while calling a Python object" via a crafted argument. This argument is plausibly an untrusted value from an application's input data that was supposed to contain a name and an e-mail address. NOTE: email.utils.parseaddr is categorized as a Legacy API in the documentation of the Python email package. Applications should instead use the email.parser.BytesParser or email.parser.Parser class. NOTE: the vendor's perspective is that this is neither a vulnerability nor a bug. The email package is intended to have size limits and to throw an exception when limits are exceeded; they were exceeded by the example demonstration code.
0
Attacker Value
Unknown
CVE-2023-33595
Disclosure Date: June 07, 2023 (last updated December 09, 2023)
CPython v3.12.0 alpha 7 was discovered to contain a heap use-after-free via the function ascii_decode at /Objects/unicodeobject.c.
0
Attacker Value
Unknown
CVE-2023-32681
Disclosure Date: May 26, 2023 (last updated February 14, 2025)
Requests is a HTTP library. Since Requests 2.3.0, Requests has been leaking Proxy-Authorization headers to destination servers when redirected to an HTTPS endpoint. This is a product of how we use `rebuild_proxies` to reattach the `Proxy-Authorization` header to requests. For HTTP connections sent through the tunnel, the proxy will identify the header in the request itself and remove it prior to forwarding to the destination server. However when sent over HTTPS, the `Proxy-Authorization` header must be sent in the CONNECT request as the proxy has no visibility into the tunneled request. This results in Requests forwarding proxy credentials to the destination server unintentionally, allowing a malicious actor to potentially exfiltrate sensitive information. This issue has been patched in version 2.31.0.
0
Attacker Value
Unknown
CVE-2023-27043
Disclosure Date: April 19, 2023 (last updated October 08, 2023)
The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 header is identified as the value of the addr-spec. In some applications, an attacker can bypass a protection mechanism in which application access is granted only after verifying receipt of e-mail to a specific domain (e.g., only @company.example.com addresses may be used for signup). This occurs in email/_parseaddr.py in recent versions of Python.
0
Attacker Value
Unknown
CVE-2018-25082
Disclosure Date: March 21, 2023 (last updated October 20, 2023)
A vulnerability was found in zwczou WeChat SDK Python 0.3.0 and classified as critical. This issue affects the function validate/to_xml. The manipulation leads to xml external entity reference. The attack may be initiated remotely. Upgrading to version 0.5.5 is able to address this issue. The patch is named e54abadc777715b6dcb545c13214d1dea63df6c9. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-223403.
0
Attacker Value
Unknown
CVE-2023-24107
Disclosure Date: February 22, 2023 (last updated October 08, 2023)
hour_of_code_python_2015 commit 520929797b9ca43bb818b2e8f963fb2025459fa3 was discovered to contain a code execution backdoor via the request package (requirements.txt). This vulnerability allows attackers to access sensitive user information and execute arbitrary code.
0