Show filters
304 Total Results
Displaying 81-90 of 304
Sort by:
Attacker Value
Unknown

CVE-2022-24902

Disclosure Date: May 06, 2022 (last updated October 07, 2023)
TkVideoplayer is a simple library to play video files in tkinter. Uncontrolled memory consumption in versions of TKVideoplayer prior to 2.0.0 can theoretically lead to performance degradation. There are no known workarounds. This issue has been patched and users are advised to upgrade to version 2.0.0 or later.
Attacker Value
Unknown

CVE-2022-30284

Disclosure Date: May 04, 2022 (last updated November 08, 2023)
In the python-libnmap package through 0.7.2 for Python, remote command execution can occur (if used in a client application that does not validate arguments). NOTE: the vendor believes it would be unrealistic for an application to call NmapProcess with arguments taken from input data that arrived over an untrusted network, and thus the CVSS score corresponds to an unrealistic use case. None of the NmapProcess documentation implies that this is an expected use case
Attacker Value
Unknown

CVE-2015-20107

Disclosure Date: April 13, 2022 (last updated February 23, 2025)
In Python (aka CPython) up to 3.10.8, the mailcap module does not add escape characters into commands discovered in the system mailcap file. This may allow attackers to inject shell commands into applications that call mailcap.findmatch with untrusted input (if they lack validation of user-provided filenames or arguments). The fix is also back-ported to 3.7, 3.8, 3.9
Attacker Value
Unknown

CVE-2022-24303

Disclosure Date: March 28, 2022 (last updated November 08, 2023)
Pillow before 9.0.1 allows attackers to delete files because spaces in temporary pathnames are mishandled.
Attacker Value
Unknown

CVE-2018-25032

Disclosure Date: March 25, 2022 (last updated February 23, 2025)
zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.
Attacker Value
Unknown

CVE-2022-26184

Disclosure Date: March 21, 2022 (last updated February 23, 2025)
Poetry v1.1.9 and below was discovered to contain an untrusted search path which causes the application to behave in unexpected ways when users execute Poetry commands in a directory containing malicious content. This vulnerability occurs when the application is ran on Windows OS.
Attacker Value
Unknown

CVE-2022-26488

Disclosure Date: March 10, 2022 (last updated February 23, 2025)
In Python before 3.10.3 on Windows, local users can gain privileges because the search path is inadequately secured. The installer may allow a local attacker to add user-writable directories to the system search path. To exploit, an administrator must have installed Python for all users and enabled PATH entries. A non-administrative user can trigger a repair that incorrectly adds user-writable paths into PATH, enabling search-path hijacking of other users and system services. This affects Python (CPython) through 3.7.12, 3.8.x through 3.8.12, 3.9.x through 3.9.10, and 3.10.x through 3.10.2.
Attacker Value
Unknown

CVE-2021-3733

Disclosure Date: March 10, 2022 (last updated February 23, 2025)
There's a flaw in urllib's AbstractBasicAuthHandler class. An attacker who controls a malicious HTTP server that an HTTP client (such as web browser) connects to, could trigger a Regular Expression Denial of Service (ReDOS) during an authentication request with a specially crafted payload that is sent by the server to the client. The greatest threat that this flaw poses is to application availability.
Attacker Value
Unknown

CVE-2021-3737

Disclosure Date: March 04, 2022 (last updated February 23, 2025)
A flaw was found in python. An improperly handled HTTP response in the HTTP client code of python may allow a remote attacker, who controls the HTTP server, to make the client script enter an infinite loop, consuming CPU time. The highest threat from this vulnerability is to system availability.
Attacker Value
Unknown

CVE-2022-0391

Disclosure Date: February 09, 2022 (last updated February 23, 2025)
A flaw was found in Python, specifically within the urllib.parse module. This module helps break Uniform Resource Locator (URL) strings into components. The issue involves how the urlparse method does not sanitize input and allows characters like '\r' and '\n' in the URL path. This flaw allows an attacker to input a crafted URL, leading to injection attacks. This flaw affects Python versions prior to 3.10.0b1, 3.9.5, 3.8.11, 3.7.11 and 3.6.14.