Show filters
10 Total Results
Displaying 1-10 of 10
Sort by:
Attacker Value
Unknown

CVE-2015-5607

Disclosure Date: September 20, 2017 (last updated November 26, 2024)
Cross-site request forgery in the REST API in IPython 2 and 3.
0
Attacker Value
Unknown

CVE-2016-0772

Disclosure Date: September 02, 2016 (last updated November 25, 2024)
The smtplib library in CPython (aka Python) before 2.7.12, 3.x before 3.4.5, and 3.5.x before 3.5.2 does not return an error when StartTLS fails, which might allow man-in-the-middle attackers to bypass the TLS protections by leveraging a network position between the client and the registry to block the StartTLS command, aka a "StartTLS stripping attack."
0
Attacker Value
Unknown

CVE-2016-5636

Disclosure Date: September 02, 2016 (last updated November 25, 2024)
Integer overflow in the get_data function in zipimport.c in CPython (aka Python) before 2.7.12, 3.x before 3.4.5, and 3.5.x before 3.5.2 allows remote attackers to have unspecified impact via a negative data size value, which triggers a heap-based buffer overflow.
0
Attacker Value
Unknown

CVE-2016-5699

Disclosure Date: September 02, 2016 (last updated November 25, 2024)
CRLF injection vulnerability in the HTTPConnection.putheader function in urllib2 and urllib in CPython (aka Python) before 2.7.10 and 3.x before 3.4.4 allows remote attackers to inject arbitrary HTTP headers via CRLF sequences in a URL.
0
Attacker Value
Unknown

CVE-2013-7440

Disclosure Date: June 07, 2016 (last updated November 25, 2024)
The ssl.match_hostname function in CPython (aka Python) before 2.7.9 and 3.x before 3.3.3 does not properly handle wildcards in hostnames, which might allow man-in-the-middle attackers to spoof servers via a crafted certificate.
0
Attacker Value
Unknown

CVE-2014-9365

Disclosure Date: December 12, 2014 (last updated October 05, 2023)
The HTTP clients in the (1) httplib, (2) urllib, (3) urllib2, and (4) xmlrpclib libraries in CPython (aka Python) 2.x before 2.7.9 and 3.x before 3.4.3, when accessing an HTTPS URL, do not (a) check the certificate against a trust store or verify that the server hostname matches a domain name in the subject's (b) Common Name or (c) subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
0
Attacker Value
Unknown

CVE-2014-2667

Disclosure Date: November 16, 2014 (last updated October 05, 2023)
Race condition in the _get_masked_mode function in Lib/os.py in Python 3.2 through 3.5, when exist_ok is set to true and multiple threads are used, might allow local users to bypass intended file permissions by leveraging a separate application vulnerability before the umask has been set to the expected value.
0
Attacker Value
Unknown

CVE-2013-7040

Disclosure Date: May 19, 2014 (last updated October 05, 2023)
Python 2.7 before 3.4 only uses the last eight bits of the prefix to randomize hash values, which causes it to compute hash values without restricting the ability to trigger hash collisions predictably and makes it easier for context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-1150.
0
Attacker Value
Unknown

CVE-2014-1912

Disclosure Date: March 01, 2014 (last updated October 05, 2023)
Buffer overflow in the socket.recvfrom_into function in Modules/socketmodule.c in Python 2.5 before 2.7.7, 3.x before 3.3.4, and 3.4.x before 3.4rc1 allows remote attackers to execute arbitrary code via a crafted string.
0
Attacker Value
Unknown

CVE-2013-2099

Disclosure Date: October 09, 2013 (last updated October 05, 2023)
Algorithmic complexity vulnerability in the ssl.match_hostname function in Python 3.2.x, 3.3.x, and earlier, and unspecified versions of python-backports-ssl_match_hostname as used for older Python versions, allows remote attackers to cause a denial of service (CPU consumption) via multiple wildcard characters in the common name in a certificate.
0