[Forgot Password]
Login  Register Subscribe

25354

 
 

132805

 
 

140669

 
 

909

 
 

113959

 
 

156

 
 
Paid content will be excluded from the download.

Filter
Matches : 113901 Download | Alert*

The host is installed with Python 2.x through 2.7.16, 3.x through 3.5.7, 3.6.x through 3.6.9 or 3.7.x through 3.7.4 and is prone to a security bypass vulnerability. The flaw is present in the application, which fails to properly handle an issue in parsing email addresses. Successful exploitation allows attackers to trick the application into accepting an email address that should be denied.

The host is installed with Python 2.x through 2.7.16, 3.x through 3.6.9 or 3.7.x through 3.7.4 and is prone to a cross-site scripting vulnerability. A flaw is present in the application, which fails to properly handle untrusted input with set_server_title. Successful exploitation allows attackers to execute arbitrary JavaScript.

The host is installed with Python before 2.7.13, 3.3.x before 3.3.7, 3.4.x before 3.4.6 or 3.5.x before 3.5.3 or 3.6.0 and is prone to an open redirection vulnerability. The flaw is present in the application, which fails to properly handle an issue in CGIHandler class. Successful exploitation allows remote attackers to redirect HTTP requests.

The host is installed with Python 2.7 through 2.7.17, 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1 and is prone to an unsafe dll loading vulnerability. A flaw is present in the application, which fails to properly handle verification of api-ms-win-core-path-l1-1-0.dll that can be loaded and used instead of the system's copy. Successful exploitation allows can cause unspecified impa ...

The host is installed with Python 2.7.0 before 2.7.12, 3.x before 3.4.5, and 3.5.x before 3.5.2 and is prone to a StartTLS stripping attack vulnerability. A flaw is present in the application, which does not return an error when StartTLS fails. Successful exploitation could allow attackers to bypass the TLS protections by leveraging a network position between the client and the registry.

The asyncore module in Python 2.x before 2.7.0 or 3.x before 3.2 does not properly handle unsuccessful calls to the accept function, and does not have accompanying documentation describing how daemon applications should handle unsuccessful calls to the accept function, which makes it easier for remote attackers to conduct denial of service attacks that terminate these applications via network conn ...

The host is installed with Python 2.6 before 2.7.4 or 3.x through 3.2 and is prone to information disclosure vulnerability. The flaw is present in the application, which creates ~/.pypirc with world-readable permissions before changing them after data has been written. Successful exploitation introduces a race condition that allows local users to obtain a username and password by reading this file ...

The host is installed with Python 2.6 through 3.4 and is prone to a man-in-the-middle attack vulnerability. A flaw is present in the application, which fails to properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate. Successful exploitation could allow attackers to spoof arbitrary SSL servers.

The host is installed with Python 2.7 before 2.7.8 or 3.x before 3.4 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted input. Successful exploitation could allow attackers to crash the service.

Python 2.x (64 bit) is installed


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   11390

© SecPod Technologies