Show filters
22 Total Results
Displaying 1-10 of 22
Sort by:
Attacker Value
High

CVE-2016-2183

Disclosure Date: September 01, 2016 (last updated November 25, 2024)
The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a "Sweet32" attack.
Attacker Value
Unknown

CVE-2020-10735

Disclosure Date: September 09, 2022 (last updated December 22, 2024)
A flaw was found in python. In algorithms with quadratic time complexity using non-binary bases, when using int("text"), a system could take 50ms to parse an int string with 100,000 digits and 5s for 1,000,000 digits (float, decimal, int.from_bytes(), and int() for binary bases 2, 4, 8, 16, and 32 are not affected). The highest threat from this vulnerability is to system availability.
Attacker Value
Unknown

CVE-2019-14859

Disclosure Date: January 02, 2020 (last updated February 21, 2025)
A flaw was found in all python-ecdsa versions before 0.13.3, where it did not correctly verify whether signatures used DER encoding. Without this verification, a malformed signature could be accepted, making the signature malleable. Without proper verification, an attacker could use a malleable signature to create false transactions.
Attacker Value
Unknown

CVE-2013-2166

Disclosure Date: December 10, 2019 (last updated November 27, 2024)
python-keystoneclient version 0.2.3 to 0.2.5 has middleware memcache encryption bypass
Attacker Value
Unknown

CVE-2013-2167

Disclosure Date: December 10, 2019 (last updated November 27, 2024)
python-keystoneclient version 0.2.3 to 0.2.5 has middleware memcache signing bypass
Attacker Value
Unknown

CVE-2015-4706

Disclosure Date: September 21, 2017 (last updated November 26, 2024)
Cross-site scripting (XSS) vulnerability in IPython 3.x before 3.2 allows remote attackers to inject arbitrary web script or HTML via vectors involving JSON error messages and the /api/contents path.
0
Attacker Value
Unknown

CVE-2015-5607

Disclosure Date: September 20, 2017 (last updated November 26, 2024)
Cross-site request forgery in the REST API in IPython 2 and 3.
0
Attacker Value
Unknown

CVE-2016-0772

Disclosure Date: September 02, 2016 (last updated November 25, 2024)
The smtplib library in CPython (aka Python) before 2.7.12, 3.x before 3.4.5, and 3.5.x before 3.5.2 does not return an error when StartTLS fails, which might allow man-in-the-middle attackers to bypass the TLS protections by leveraging a network position between the client and the registry to block the StartTLS command, aka a "StartTLS stripping attack."
0
Attacker Value
Unknown

CVE-2016-5636

Disclosure Date: September 02, 2016 (last updated November 25, 2024)
Integer overflow in the get_data function in zipimport.c in CPython (aka Python) before 2.7.12, 3.x before 3.4.5, and 3.5.x before 3.5.2 allows remote attackers to have unspecified impact via a negative data size value, which triggers a heap-based buffer overflow.
0
Attacker Value
Unknown

CVE-2016-5699

Disclosure Date: September 02, 2016 (last updated November 25, 2024)
CRLF injection vulnerability in the HTTPConnection.putheader function in urllib2 and urllib in CPython (aka Python) before 2.7.10 and 3.x before 3.4.4 allows remote attackers to inject arbitrary HTTP headers via CRLF sequences in a URL.
0