[Forgot Password]
Login  Register Subscribe

25354

 
 

132805

 
 

137225

 
 

909

 
 

112105

 
 

156

 
 
Paid content will be excluded from the download.

Filter
Matches : 112067 Download | Alert*

python-urllib3: HTTP library with thread-safe connection pooling for Python Several security issues were fixed in urllib3.

Python HTTP module with connection pooling and file POST abilities.

Python HTTP module with connection pooling and file POST abilities.

The python-urllib3 package provides the Python HTTP module with connection pooling and file POST abilities. Security Fix: * python-urllib3: Cross-host redirect does not remove Authorization header allow for credential exposure * python-urllib3: CRLF injection due to not encoding the "\r\n" sequence leading to possible attack on internal service For more details about the security issue, includin ...

The python-urllib3 package provides the Python HTTP module with connection pooling and file POST abilities. Security Fix: * python-urllib3: CRLF injection due to not encoding the "\r\n" sequence leading to possible attack on internal service * python-urllib3: Certification mishandle when error should be thrown For more details about the security issue, including the impact, a CVSS score, acknowl ...

python-urllib3: HTTP library with thread-safe connection pooling for Python Several security issues were fixed in urllib3.

In the urllib3 library for Python, CRLF injection is possible if the attacker controls the request parameter

The urllib3 library before 1.24.2 for Python mishandles certain cases where the desired set of CA certificates is different from the OS store of CA certificates, which results in SSL connections succeeding in situations where a verification failure is the correct outcome. This is related to use of the ssl_context, ca_certs, or ca_certs_dir argument.

python-pip subpackages are installed

The host is installed with Wireshark 3.0.x before 3.0.8 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle issues in epan/dissectors/packet-btatt.c file. Successful exploitation allows attackers to crash the bluetooth attribute dissector.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   11206

© SecPod Technologies