[Forgot Password]
Login  Register Subscribe

25354

 
 

132812

 
 

149986

 
 

909

 
 

119359

 
 

158

 
 
Paid content will be excluded from the download.

Filter
Matches : 17690 Download | Alert*

The host is installed with Python and is prone to information disclosure vulnerability. A flaw is present in the CGIHTTPServer module, which fails to handle HTTP GET requests that lack a / (slash) character at the beginning of the URI. Successful exploitation could allow remote attackers to read script source code.

The host is installed with Python before before 2.6.8, 2.7.x before 2.7.3, 3.2.x before 3.2.3 or 3.x through 3.1.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle crafted XML-RPC POST. Successful exploitation could allow attackers to crash the service.

The host is installed with Python before 2.6.8, 2.7.x before 2.7.3, 3.2.x before 3.2.3 or 3.x through 3.1.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle crafted input to an application that maintains a hash table. Successful exploitation could allow attackers to crash the service.

The host is installed with Python 3.8.4 and is prone to an incorrect authorization vulnerability. A flaw is present in the application, which fails to properly check sys.path restrictions specified in a python38._pth file. Successful exploitation allows code to be loaded from arbitrary locations.

The host is installed with Python through 3.8.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle an issue in Lib/tarfile.py. Successful exploitation allows attackers to craft a TAR archive leading to an infinite loop when opened by tarfile.open, because _proc_pax lacks header validation.

The host is installed with Python 3.x through 3.8.3 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly compute hash values in the IPv4Interface and IPv6Interface classes. Successful exploitation allows remote attackers to cause a denial of service if an application is affected by the performance of a dictionary containing IPv4Interface ...

The host is installed with Python through 3.7.2 and is prone to an uncontrolled resource consumption vulnerability. The flaw is present in the application, which fails to properly handle Lib/zipfile.py. Successful exploitation allows remote attackers to cause a denial-of-service.

The host is installed with Python 2.7 through 2.7.17, 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1 and is prone to an unsafe dll loading vulnerability. A flaw is present in the application, which fails to properly handle verification of api-ms-win-core-path-l1-1-0.dll that can be loaded and used instead of the system's copy. Successful exploitation allows can cause unspecified impa ...

The host is installed with Python 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1 and is prone to an unsafe dll loading vulnerability. A flaw is present in the application, which fails to properly handle verification of api-ms-win-core-path-l1-1-0.dll that can be loaded and used instead of the system's copy. Successful exploitation allows can cause unspecified impact.

The host is installed with Python before 2.7.13, 3.3.x before 3.3.7, 3.4.x before 3.4.6 or 3.5.x before 3.5.3 or 3.6.0 and is prone to an open redirection vulnerability. The flaw is present in the application, which fails to properly handle an issue in CGIHandler class. Successful exploitation allows remote attackers to redirect HTTP requests.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   1768

© SecPod Technologies