Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2006-4980

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-09 Oct, 2006 | 17:00
Updated At-07 Aug, 2024 | 19:32
Rejected At-
Credits

Buffer overflow in the repr function in Python 2.3 through 2.6 before 20060822 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via crafted wide character UTF-32/UCS-4 strings to certain scripts.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:09 Oct, 2006 | 17:00
Updated At:07 Aug, 2024 | 19:32
Rejected At:
▼CVE Numbering Authority (CNA)

Buffer overflow in the repr function in Python 2.3 through 2.6 before 20060822 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via crafted wide character UTF-32/UCS-4 strings to certain scripts.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://secunia.com/advisories/22303
third-party-advisory
x_refsource_SECUNIA
http://www.debian.org/security/2006/dsa-1197
vendor-advisory
x_refsource_DEBIAN
http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html
x_refsource_CONFIRM
http://secunia.com/advisories/22487
third-party-advisory
x_refsource_SECUNIA
http://www.securityfocus.com/archive/1/448244/100/100/threaded
mailing-list
x_refsource_BUGTRAQ
http://secunia.com/advisories/22639
third-party-advisory
x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDKSA-2006:181
vendor-advisory
x_refsource_MANDRIVA
https://exchange.xforce.ibmcloud.com/vulnerabilities/29408
vdb-entry
x_refsource_XF
http://secunia.com/advisories/23680
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/22512
third-party-advisory
x_refsource_SECUNIA
https://launchpad.net/distros/ubuntu/+source/python2.4/+bug/56633
x_refsource_CONFIRM
http://zoehep.xent.com/~bsittler/python2.4-2.4.3_unicodeobject.c.diff
x_refsource_CONFIRM
http://support.avaya.com/elmodocs2/security/ASA-2006-229.htm
x_refsource_CONFIRM
http://sourceforge.net/tracker/index.php?func=detail&aid=1541585&group_id=5470&atid=305470
x_refsource_CONFIRM
http://secunia.com/advisories/31492
third-party-advisory
x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2008-0629.html
vendor-advisory
x_refsource_REDHAT
http://www.redhat.com/support/errata/RHSA-2006-0713.html
vendor-advisory
x_refsource_REDHAT
http://www.vupen.com/english/advisories/2006/5131
vdb-entry
x_refsource_VUPEN
http://securitytracker.com/id?1017019
vdb-entry
x_refsource_SECTRACK
http://secunia.com/advisories/22357
third-party-advisory
x_refsource_SECUNIA
http://www.debian.org/security/2006/dsa-1198
vendor-advisory
x_refsource_DEBIAN
http://secunia.com/advisories/22379
third-party-advisory
x_refsource_SECUNIA
http://www.ubuntu.com/usn/usn-359-1
vendor-advisory
x_refsource_UBUNTU
http://secunia.com/advisories/22448
third-party-advisory
x_refsource_SECUNIA
http://www.novell.com/linux/security/advisories/2006_25_sr.html
vendor-advisory
x_refsource_SUSE
http://www.securityfocus.com/bid/20376
vdb-entry
x_refsource_BID
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=208162
x_refsource_CONFIRM
http://security.gentoo.org/glsa/glsa-200610-07.xml
vendor-advisory
x_refsource_GENTOO
http://www.vupen.com/english/advisories/2006/3940
vdb-entry
x_refsource_VUPEN
https://issues.rpath.com/browse/RPL-702
x_refsource_CONFIRM
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=391589
x_refsource_CONFIRM
http://www.securityfocus.com/archive/1/456546/100/200/threaded
mailing-list
x_refsource_BUGTRAQ
http://secunia.com/advisories/22358
third-party-advisory
x_refsource_SECUNIA
http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html
x_refsource_CONFIRM
ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc
vendor-advisory
x_refsource_SGI
http://secunia.com/advisories/22297
third-party-advisory
x_refsource_SECUNIA
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10789
vdb-entry
signature
x_refsource_OVAL
http://kb.vmware.com/KanisaPlatform/Publishing/882/5120103_f.SAL_Public.html
x_refsource_CONFIRM
http://secunia.com/advisories/22531
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/22276
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/22303
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.debian.org/security/2006/dsa-1197
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/22487
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.securityfocus.com/archive/1/448244/100/100/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://secunia.com/advisories/22639
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2006:181
Resource:
vendor-advisory
x_refsource_MANDRIVA
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/29408
Resource:
vdb-entry
x_refsource_XF
Hyperlink: http://secunia.com/advisories/23680
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/22512
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://launchpad.net/distros/ubuntu/+source/python2.4/+bug/56633
Resource:
x_refsource_CONFIRM
Hyperlink: http://zoehep.xent.com/~bsittler/python2.4-2.4.3_unicodeobject.c.diff
Resource:
x_refsource_CONFIRM
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2006-229.htm
Resource:
x_refsource_CONFIRM
Hyperlink: http://sourceforge.net/tracker/index.php?func=detail&aid=1541585&group_id=5470&atid=305470
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/31492
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0629.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://www.redhat.com/support/errata/RHSA-2006-0713.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://www.vupen.com/english/advisories/2006/5131
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: http://securitytracker.com/id?1017019
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://secunia.com/advisories/22357
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.debian.org/security/2006/dsa-1198
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: http://secunia.com/advisories/22379
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.ubuntu.com/usn/usn-359-1
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: http://secunia.com/advisories/22448
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.novell.com/linux/security/advisories/2006_25_sr.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://www.securityfocus.com/bid/20376
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=208162
Resource:
x_refsource_CONFIRM
Hyperlink: http://security.gentoo.org/glsa/glsa-200610-07.xml
Resource:
vendor-advisory
x_refsource_GENTOO
Hyperlink: http://www.vupen.com/english/advisories/2006/3940
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: https://issues.rpath.com/browse/RPL-702
Resource:
x_refsource_CONFIRM
Hyperlink: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=391589
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.securityfocus.com/archive/1/456546/100/200/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://secunia.com/advisories/22358
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html
Resource:
x_refsource_CONFIRM
Hyperlink: ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc
Resource:
vendor-advisory
x_refsource_SGI
Hyperlink: http://secunia.com/advisories/22297
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10789
Resource:
vdb-entry
signature
x_refsource_OVAL
Hyperlink: http://kb.vmware.com/KanisaPlatform/Publishing/882/5120103_f.SAL_Public.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/22531
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/22276
Resource:
third-party-advisory
x_refsource_SECUNIA
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://secunia.com/advisories/22303
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.debian.org/security/2006/dsa-1197
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/22487
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.securityfocus.com/archive/1/448244/100/100/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://secunia.com/advisories/22639
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.mandriva.com/security/advisories?name=MDKSA-2006:181
vendor-advisory
x_refsource_MANDRIVA
x_transferred
https://exchange.xforce.ibmcloud.com/vulnerabilities/29408
vdb-entry
x_refsource_XF
x_transferred
http://secunia.com/advisories/23680
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/22512
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://launchpad.net/distros/ubuntu/+source/python2.4/+bug/56633
x_refsource_CONFIRM
x_transferred
http://zoehep.xent.com/~bsittler/python2.4-2.4.3_unicodeobject.c.diff
x_refsource_CONFIRM
x_transferred
http://support.avaya.com/elmodocs2/security/ASA-2006-229.htm
x_refsource_CONFIRM
x_transferred
http://sourceforge.net/tracker/index.php?func=detail&aid=1541585&group_id=5470&atid=305470
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/31492
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.redhat.com/support/errata/RHSA-2008-0629.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://www.redhat.com/support/errata/RHSA-2006-0713.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://www.vupen.com/english/advisories/2006/5131
vdb-entry
x_refsource_VUPEN
x_transferred
http://securitytracker.com/id?1017019
vdb-entry
x_refsource_SECTRACK
x_transferred
http://secunia.com/advisories/22357
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.debian.org/security/2006/dsa-1198
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://secunia.com/advisories/22379
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.ubuntu.com/usn/usn-359-1
vendor-advisory
x_refsource_UBUNTU
x_transferred
http://secunia.com/advisories/22448
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.novell.com/linux/security/advisories/2006_25_sr.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://www.securityfocus.com/bid/20376
vdb-entry
x_refsource_BID
x_transferred
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=208162
x_refsource_CONFIRM
x_transferred
http://security.gentoo.org/glsa/glsa-200610-07.xml
vendor-advisory
x_refsource_GENTOO
x_transferred
http://www.vupen.com/english/advisories/2006/3940
vdb-entry
x_refsource_VUPEN
x_transferred
https://issues.rpath.com/browse/RPL-702
x_refsource_CONFIRM
x_transferred
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=391589
x_refsource_CONFIRM
x_transferred
http://www.securityfocus.com/archive/1/456546/100/200/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://secunia.com/advisories/22358
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html
x_refsource_CONFIRM
x_transferred
ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc
vendor-advisory
x_refsource_SGI
x_transferred
http://secunia.com/advisories/22297
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10789
vdb-entry
signature
x_refsource_OVAL
x_transferred
http://kb.vmware.com/KanisaPlatform/Publishing/882/5120103_f.SAL_Public.html
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/22531
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/22276
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/22303
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.debian.org/security/2006/dsa-1197
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/22487
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/448244/100/100/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://secunia.com/advisories/22639
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2006:181
Resource:
vendor-advisory
x_refsource_MANDRIVA
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/29408
Resource:
vdb-entry
x_refsource_XF
x_transferred
Hyperlink: http://secunia.com/advisories/23680
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/22512
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://launchpad.net/distros/ubuntu/+source/python2.4/+bug/56633
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://zoehep.xent.com/~bsittler/python2.4-2.4.3_unicodeobject.c.diff
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2006-229.htm
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://sourceforge.net/tracker/index.php?func=detail&aid=1541585&group_id=5470&atid=305470
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/31492
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0629.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2006-0713.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2006/5131
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: http://securitytracker.com/id?1017019
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://secunia.com/advisories/22357
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.debian.org/security/2006/dsa-1198
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: http://secunia.com/advisories/22379
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.ubuntu.com/usn/usn-359-1
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: http://secunia.com/advisories/22448
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.novell.com/linux/security/advisories/2006_25_sr.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://www.securityfocus.com/bid/20376
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=208162
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://security.gentoo.org/glsa/glsa-200610-07.xml
Resource:
vendor-advisory
x_refsource_GENTOO
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2006/3940
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: https://issues.rpath.com/browse/RPL-702
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=391589
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/456546/100/200/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://secunia.com/advisories/22358
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc
Resource:
vendor-advisory
x_refsource_SGI
x_transferred
Hyperlink: http://secunia.com/advisories/22297
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10789
Resource:
vdb-entry
signature
x_refsource_OVAL
x_transferred
Hyperlink: http://kb.vmware.com/KanisaPlatform/Publishing/882/5120103_f.SAL_Public.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/22531
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/22276
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:10 Oct, 2006 | 04:06
Updated At:02 Aug, 2023 | 18:04

Buffer overflow in the repr function in Python 2.3 through 2.6 before 20060822 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via crafted wide character UTF-32/UCS-4 strings to certain scripts.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.07.5HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
Type: Primary
Version: 2.0
Base score: 7.5
Base severity: HIGH
Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P
CPE Matches

Python Software Foundation
python
>>python>>Versions before 2.3.6(exclusive)
cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
Python Software Foundation
python
>>python>>Versions from 2.4.0(inclusive) to 2.4.4(exclusive)
cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
NVD-CWE-OtherPrimarynvd@nist.gov
CWE ID: NVD-CWE-Other
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

Organization : Red Hat
Last Modified : 2007-03-14T00:00:00

Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.

References
HyperlinkSourceResource
ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asccve@mitre.org
Patch
Third Party Advisory
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=391589cve@mitre.org
Third Party Advisory
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=208162cve@mitre.org
Issue Tracking
http://kb.vmware.com/KanisaPlatform/Publishing/882/5120103_f.SAL_Public.htmlcve@mitre.org
Third Party Advisory
http://secunia.com/advisories/22276cve@mitre.org
Broken Link
Patch
Vendor Advisory
http://secunia.com/advisories/22297cve@mitre.org
Broken Link
http://secunia.com/advisories/22303cve@mitre.org
Broken Link
Patch
Vendor Advisory
http://secunia.com/advisories/22357cve@mitre.org
Broken Link
http://secunia.com/advisories/22358cve@mitre.org
Broken Link
http://secunia.com/advisories/22379cve@mitre.org
Broken Link
http://secunia.com/advisories/22448cve@mitre.org
Broken Link
http://secunia.com/advisories/22487cve@mitre.org
Broken Link
http://secunia.com/advisories/22512cve@mitre.org
Broken Link
http://secunia.com/advisories/22531cve@mitre.org
Broken Link
http://secunia.com/advisories/22639cve@mitre.org
Broken Link
http://secunia.com/advisories/23680cve@mitre.org
Broken Link
http://secunia.com/advisories/31492cve@mitre.org
Broken Link
http://security.gentoo.org/glsa/glsa-200610-07.xmlcve@mitre.org
Third Party Advisory
http://securitytracker.com/id?1017019cve@mitre.org
Third Party Advisory
VDB Entry
http://sourceforge.net/tracker/index.php?func=detail&aid=1541585&group_id=5470&atid=305470cve@mitre.org
Third Party Advisory
http://support.avaya.com/elmodocs2/security/ASA-2006-229.htmcve@mitre.org
Third Party Advisory
http://www.debian.org/security/2006/dsa-1197cve@mitre.org
Third Party Advisory
http://www.debian.org/security/2006/dsa-1198cve@mitre.org
Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2006:181cve@mitre.org
Broken Link
Third Party Advisory
http://www.novell.com/linux/security/advisories/2006_25_sr.htmlcve@mitre.org
Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2006-0713.htmlcve@mitre.org
Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2008-0629.htmlcve@mitre.org
Third Party Advisory
http://www.securityfocus.com/archive/1/448244/100/100/threadedcve@mitre.org
Third Party Advisory
VDB Entry
http://www.securityfocus.com/archive/1/456546/100/200/threadedcve@mitre.org
Third Party Advisory
VDB Entry
http://www.securityfocus.com/bid/20376cve@mitre.org
Third Party Advisory
VDB Entry
http://www.ubuntu.com/usn/usn-359-1cve@mitre.org
Third Party Advisory
http://www.vmware.com/support/vi3/doc/esx-3069097-patch.htmlcve@mitre.org
Third Party Advisory
http://www.vmware.com/support/vi3/doc/esx-9986131-patch.htmlcve@mitre.org
Third Party Advisory
http://www.vupen.com/english/advisories/2006/3940cve@mitre.org
Broken Link
http://www.vupen.com/english/advisories/2006/5131cve@mitre.org
Broken Link
http://zoehep.xent.com/~bsittler/python2.4-2.4.3_unicodeobject.c.diffcve@mitre.org
Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/29408cve@mitre.org
Broken Link
VDB Entry
https://issues.rpath.com/browse/RPL-702cve@mitre.org
Third Party Advisory
https://launchpad.net/distros/ubuntu/+source/python2.4/+bug/56633cve@mitre.org
Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10789cve@mitre.org
Broken Link
Hyperlink: ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc
Source: cve@mitre.org
Resource:
Patch
Third Party Advisory
Hyperlink: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=391589
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=208162
Source: cve@mitre.org
Resource:
Issue Tracking
Hyperlink: http://kb.vmware.com/KanisaPlatform/Publishing/882/5120103_f.SAL_Public.html
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/22276
Source: cve@mitre.org
Resource:
Broken Link
Patch
Vendor Advisory
Hyperlink: http://secunia.com/advisories/22297
Source: cve@mitre.org
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/22303
Source: cve@mitre.org
Resource:
Broken Link
Patch
Vendor Advisory
Hyperlink: http://secunia.com/advisories/22357
Source: cve@mitre.org
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/22358
Source: cve@mitre.org
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/22379
Source: cve@mitre.org
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/22448
Source: cve@mitre.org
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/22487
Source: cve@mitre.org
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/22512
Source: cve@mitre.org
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/22531
Source: cve@mitre.org
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/22639
Source: cve@mitre.org
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/23680
Source: cve@mitre.org
Resource:
Broken Link
Hyperlink: http://secunia.com/advisories/31492
Source: cve@mitre.org
Resource:
Broken Link
Hyperlink: http://security.gentoo.org/glsa/glsa-200610-07.xml
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://securitytracker.com/id?1017019
Source: cve@mitre.org
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://sourceforge.net/tracker/index.php?func=detail&aid=1541585&group_id=5470&atid=305470
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2006-229.htm
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://www.debian.org/security/2006/dsa-1197
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://www.debian.org/security/2006/dsa-1198
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://www.mandriva.com/security/advisories?name=MDKSA-2006:181
Source: cve@mitre.org
Resource:
Broken Link
Third Party Advisory
Hyperlink: http://www.novell.com/linux/security/advisories/2006_25_sr.html
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://www.redhat.com/support/errata/RHSA-2006-0713.html
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://www.redhat.com/support/errata/RHSA-2008-0629.html
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://www.securityfocus.com/archive/1/448244/100/100/threaded
Source: cve@mitre.org
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securityfocus.com/archive/1/456546/100/200/threaded
Source: cve@mitre.org
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securityfocus.com/bid/20376
Source: cve@mitre.org
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.ubuntu.com/usn/usn-359-1
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://www.vupen.com/english/advisories/2006/3940
Source: cve@mitre.org
Resource:
Broken Link
Hyperlink: http://www.vupen.com/english/advisories/2006/5131
Source: cve@mitre.org
Resource:
Broken Link
Hyperlink: http://zoehep.xent.com/~bsittler/python2.4-2.4.3_unicodeobject.c.diff
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/29408
Source: cve@mitre.org
Resource:
Broken Link
VDB Entry
Hyperlink: https://issues.rpath.com/browse/RPL-702
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: https://launchpad.net/distros/ubuntu/+source/python2.4/+bug/56633
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10789
Source: cve@mitre.org
Resource:
Broken Link

Change History

0
Information is not available yet

Similar CVEs

32Records found

CVE-2010-1449
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-3.79% / 87.61%
||
7 Day CHG~0.00%
Published-27 May, 2010 | 19:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Integer overflow in rgbimgmodule.c in the rgbimg module in Python 2.5 allows remote attackers to have an unspecified impact via a large image that triggers a buffer overflow. NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-3143.12.

Action-Not Available
Vendor-n/aPython Software Foundation
Product-pythonn/a
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2010-1450
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-2.82% / 85.60%
||
7 Day CHG~0.00%
Published-27 May, 2010 | 19:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple buffer overflows in the RLE decoder in the rgbimg module in Python 2.5 allow remote attackers to have an unspecified impact via an image file containing crafted data that triggers improper processing within the (1) longimagedata or (2) expandrow function.

Action-Not Available
Vendor-n/aPython Software Foundation
Product-pythonn/a
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2020-15801
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.60% / 68.37%
||
7 Day CHG~0.00%
Published-17 Jul, 2020 | 02:15
Updated-04 Aug, 2024 | 13:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Python 3.8.4, sys.path restrictions specified in a python38._pth file are ignored, allowing code to be loaded from arbitrary locations. The <executable-name>._pth file (e.g., the python._pth file) is not affected.

Action-Not Available
Vendor-n/aNetApp, Inc.Microsoft CorporationPython Software Foundation
Product-max_datawindowspythonn/a
CWE ID-CWE-426
Untrusted Search Path
CVE-2008-4864
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-21.88% / 95.55%
||
7 Day CHG~0.00%
Published-31 Oct, 2008 | 22:00
Updated-07 Aug, 2024 | 10:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple integer overflows in imageop.c in the imageop module in Python 1.5.2 through 2.5.1 allow context-dependent attackers to break out of the Python VM and execute arbitrary code via large integer values in certain arguments to the crop function, leading to a buffer overflow, a different vulnerability than CVE-2007-4965 and CVE-2008-1679.

Action-Not Available
Vendor-n/aPython Software Foundation
Product-pythonn/a
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2017-1000158
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-3.07% / 86.21%
||
7 Day CHG~0.00%
Published-17 Nov, 2017 | 00:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

CPython (aka Python) up to 2.7.13 is vulnerable to an integer overflow in the PyString_DecodeEscape function in stringobject.c, resulting in heap-based buffer overflow (and possible arbitrary code execution)

Action-Not Available
Vendor-n/aDebian GNU/LinuxPython Software Foundation
Product-debian_linuxpythonn/a
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2016-9063
Matching Score-8
Assigner-Mozilla Corporation
ShareView Details
Matching Score-8
Assigner-Mozilla Corporation
CVSS Score-9.8||CRITICAL
EPSS-1.91% / 82.51%
||
7 Day CHG~0.00%
Published-11 Jun, 2018 | 21:00
Updated-06 Aug, 2024 | 02:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An integer overflow during the parsing of XML using the Expat library. This vulnerability affects Firefox < 50.

Action-Not Available
Vendor-Python Software FoundationDebian GNU/LinuxMozilla Corporation
Product-firefoxdebian_linuxpythonFirefox
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2008-3143
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-1.56% / 80.73%
||
7 Day CHG~0.00%
Published-01 Aug, 2008 | 14:00
Updated-07 Aug, 2024 | 09:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple integer overflows in Python before 2.5.2 might allow context-dependent attackers to have an unknown impact via vectors related to (1) Include/pymem.h; (2) _csv.c, (3) _struct.c, (4) arraymodule.c, (5) audioop.c, (6) binascii.c, (7) cPickle.c, (8) cStringIO.c, (9) cjkcodecs/multibytecodec.c, (10) datetimemodule.c, (11) md5.c, (12) rgbimgmodule.c, and (13) stropmodule.c in Modules/; (14) bufferobject.c, (15) listobject.c, and (16) obmalloc.c in Objects/; (17) Parser/node.c; and (18) asdl.c, (19) ast.c, (20) bltinmodule.c, and (21) compile.c in Python/, as addressed by "checks for integer overflows, contributed by Google."

Action-Not Available
Vendor-n/aPython Software Foundation
Product-pythonn/a
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2008-3142
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-1.82% / 82.13%
||
7 Day CHG~0.00%
Published-01 Aug, 2008 | 14:00
Updated-07 Aug, 2024 | 09:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple buffer overflows in Python 2.5.2 and earlier on 32bit platforms allow context-dependent attackers to cause a denial of service (crash) or have unspecified other impact via a long string that leads to incorrect memory allocation during Unicode string processing, related to the unicode_resize function and the PyMem_RESIZE macro.

Action-Not Available
Vendor-n/aDebian GNU/LinuxCanonical Ltd.Python Software Foundation
Product-ubuntu_linuxdebian_linuxpythonn/a
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2008-2315
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-1.21% / 78.17%
||
7 Day CHG~0.00%
Published-01 Aug, 2008 | 14:00
Updated-07 Aug, 2024 | 08:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple integer overflows in Python 2.5.2 and earlier allow context-dependent attackers to have an unknown impact via vectors related to the (1) stringobject, (2) unicodeobject, (3) bufferobject, (4) longobject, (5) tupleobject, (6) stropmodule, (7) gcmodule, and (8) mmapmodule modules. NOTE: The expandtabs integer overflows in stringobject and unicodeobject in 2.5.2 are covered by CVE-2008-5031.

Action-Not Available
Vendor-n/aPython Software Foundation
Product-pythonn/a
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2008-2316
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-2.21% / 83.79%
||
7 Day CHG~0.00%
Published-01 Aug, 2008 | 14:00
Updated-07 Aug, 2024 | 08:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Integer overflow in _hashopenssl.c in the hashlib module in Python 2.5.2 and earlier might allow context-dependent attackers to defeat cryptographic digests, related to "partial hashlib hashing of data exceeding 4GB."

Action-Not Available
Vendor-n/aPython Software Foundation
Product-pythonn/a
CWE ID-CWE-189
Not Available
CVE-2008-1721
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-34.75% / 96.88%
||
7 Day CHG~0.00%
Published-10 Apr, 2008 | 19:00
Updated-07 Aug, 2024 | 08:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Integer signedness error in the zlib extension module in Python 2.5.2 and earlier allows remote attackers to execute arbitrary code via a negative signed integer, which triggers insufficient memory allocation and a buffer overflow.

Action-Not Available
Vendor-n/aDebian GNU/LinuxCanonical Ltd.Python Software Foundation
Product-ubuntu_linuxdebian_linuxpythonn/a
CWE ID-CWE-681
Incorrect Conversion between Numeric Types
CVE-2016-0718
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-9.8||CRITICAL
EPSS-1.77% / 81.91%
||
7 Day CHG-0.05%
Published-26 May, 2016 | 16:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow.

Action-Not Available
Vendor-libexpat_projectn/aMozilla CorporationopenSUSESUSEApple Inc.McAfee, LLCDebian GNU/LinuxPython Software FoundationCanonical Ltd.
Product-pythonstudio_onsitelibexpatpolicy_auditorfirefoxmac_os_xleapubuntu_linuxopensuselinux_enterprise_software_development_kitlinux_enterprise_desktopdebian_linuxlinux_enterprise_serverlinux_enterprise_debuginfon/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2021-3177
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.04% / 9.51%
||
7 Day CHG~0.00%
Published-19 Jan, 2021 | 00:00
Updated-03 Aug, 2024 | 16:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely.

Action-Not Available
Vendor-n/aNetApp, Inc.Python Software FoundationOracle CorporationDebian GNU/LinuxFedora Project
Product-debian_linuxcommunications_pricing_design_centercommunications_cloud_native_core_network_function_cloud_native_environmentontap_select_deploy_administration_utilitycommunications_offline_mediation_controllerfedoraactive_iq_unified_managerzfs_storage_appliance_kitenterprise_manager_ops_centerpythonn/a
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2019-12900
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-1.37% / 79.45%
||
7 Day CHG~0.00%
Published-19 Jun, 2019 | 22:07
Updated-09 Jun, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.

Action-Not Available
Vendor-bzipn/aCanonical Ltd.Python Software FoundationFreeBSD FoundationDebian GNU/LinuxopenSUSE
Product-debian_linuxleapubuntu_linuxpythonfreebsdbzip2n/a
CWE ID-CWE-787
Out-of-bounds Write
CVE-2014-4650
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-14.86% / 94.27%
||
7 Day CHG~0.00%
Published-20 Feb, 2020 | 16:01
Updated-06 Aug, 2024 | 11:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The CGIHTTPServer module in Python 2.7.5 and 3.3.4 does not properly handle URLs in which URL encoding is used for path separators, which allows remote attackers to read script source code or conduct directory traversal attacks and execute unintended code via a crafted character sequence, as demonstrated by a %2f separator.

Action-Not Available
Vendor-n/aRed Hat, Inc.Python Software Foundation
Product-pythonsoftware_collectionsenterprise_linuxn/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2005-0089
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-9.83% / 92.67%
||
7 Day CHG~0.00%
Published-06 Feb, 2005 | 05:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The SimpleXMLRPCServer library module in Python 2.2, 2.3 before 2.3.5, and 2.4, when used by XML-RPC servers that use the register_instance method to register an object without a _dispatch method, allows remote attackers to read or modify globals of the associated module, and possibly execute arbitrary code, via dotted attributes.

Action-Not Available
Vendor-n/aPython Software Foundation
Product-pythonn/a
CVE-2020-13388
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-1.56% / 80.75%
||
7 Day CHG~0.00%
Published-22 May, 2020 | 16:07
Updated-04 Aug, 2024 | 12:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An exploitable vulnerability exists in the configuration-loading functionality of the jw.util package before 2.3 for Python. When loading a configuration with FromString or FromStream with YAML, one can execute arbitrary Python code, resulting in OS command execution, because safe_load is not used.

Action-Not Available
Vendor-n/aPython Software Foundation
Product-jw.utiln/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2004-0150
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-8.89% / 92.20%
||
7 Day CHG~0.00%
Published-01 Sep, 2004 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in the getaddrinfo function in Python 2.2 before 2.2.2, when IPv6 support is disabled, allows remote attackers to execute arbitrary code via an IPv6 address that is obtained using DNS.

Action-Not Available
Vendor-n/aPython Software Foundation
Product-pythonn/a
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2020-5312
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-1.00% / 76.08%
||
7 Day CHG~0.00%
Published-03 Jan, 2020 | 00:52
Updated-04 Aug, 2024 | 08:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

libImaging/PcxDecode.c in Pillow before 6.2.2 has a PCX P mode buffer overflow.

Action-Not Available
Vendor-n/aDebian GNU/LinuxCanonical Ltd.Fedora ProjectPython Software Foundation
Product-pillowubuntu_linuxdebian_linuxfedoran/a
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2020-27619
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.90% / 74.67%
||
7 Day CHG~0.00%
Published-22 Oct, 2020 | 00:00
Updated-04 Aug, 2024 | 16:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Python 3 through 3.9.0, the Lib/test/multibytecodec_support.py CJK codec tests call eval() on content retrieved via HTTP.

Action-Not Available
Vendor-n/aOracle CorporationFedora ProjectPython Software Foundation
Product-communications_cloud_native_core_network_function_cloud_native_environmentpythonfedoran/a
CVE-2022-30595
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-3.57% / 87.26%
||
7 Day CHG~0.00%
Published-25 May, 2022 | 11:46
Updated-03 Aug, 2024 | 06:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

libImaging/TgaRleDecode.c in Pillow 9.1.0 has a heap buffer overflow in the processing of invalid TGA image files.

Action-Not Available
Vendor-n/aPython Software Foundation
Product-pillown/a
CWE ID-CWE-787
Out-of-bounds Write
CVE-2022-28470
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.88% / 74.48%
||
7 Day CHG~0.00%
Published-08 May, 2022 | 19:55
Updated-03 Aug, 2024 | 05:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

marcador package in PyPI 0.1 through 0.13 included a code-execution backdoor.

Action-Not Available
Vendor-n/aPython Software Foundation
Product-pypin/a
CVE-2009-2940
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.69% / 70.79%
||
7 Day CHG~0.00%
Published-22 Oct, 2009 | 16:00
Updated-07 Aug, 2024 | 06:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The pygresql module 3.8.1 and 4.0 for Python does not properly support the PQescapeStringConn function, which might allow remote attackers to leverage escaping issues involving multibyte character encodings.

Action-Not Available
Vendor-pygresqln/aPython Software Foundation
Product-pythonpygresqln/a
CVE-2022-22817
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-2.55% / 84.90%
||
7 Day CHG~0.00%
Published-07 Jan, 2022 | 00:00
Updated-15 Oct, 2024 | 21:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

PIL.ImageMath.eval in Pillow before 9.0.0 allows evaluation of arbitrary expressions, such as ones that use the Python exec method. A lambda expression could also be used.

Action-Not Available
Vendor-n/aDebian GNU/LinuxPython Software Foundation
Product-pillowdebian_linuxn/a
CVE-2018-1000802
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-23.98% / 95.81%
||
7 Day CHG~0.00%
Published-18 Sep, 2018 | 00:00
Updated-05 Aug, 2024 | 12:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Python Software Foundation Python (CPython) version 2.7 contains a CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in shutil module (make_archive function) that can result in Denial of service, Information gain via injection of arbitrary files on the system or entire drive. This attack appear to be exploitable via Passage of unfiltered user input to the function. This vulnerability appears to have been fixed in after commit add531a1e55b0a739b0f42582f1c9747e5649ace.

Action-Not Available
Vendor-n/aDebian GNU/LinuxCanonical Ltd.openSUSEPython Software Foundation
Product-ubuntu_linuxdebian_linuxleappythonn/a
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CVE-2021-42576
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.45% / 62.62%
||
7 Day CHG~0.00%
Published-18 Oct, 2021 | 14:36
Updated-04 Aug, 2024 | 03:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The bluemonday sanitizer before 1.0.16 for Go, and before 0.0.8 for Python (in pybluemonday), does not properly enforce policies associated with the SELECT, STYLE, and OPTION elements.

Action-Not Available
Vendor-microcon/aPython Software Foundation
Product-bluemondaypybluemondayn/a
CVE-2017-2810
Matching Score-8
Assigner-Talos
ShareView Details
Matching Score-8
Assigner-Talos
CVSS Score-7.5||HIGH
EPSS-4.39% / 88.55%
||
7 Day CHG~0.00%
Published-14 Jun, 2017 | 13:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An exploitable vulnerability exists in the Databook loading functionality of Tablib 0.11.4. A yaml loaded Databook can execute arbitrary python commands resulting in command execution. An attacker can insert python into loaded yaml to trigger this vulnerability.

Action-Not Available
Vendor-Kenneth ReitzPython Software Foundation
Product-tablibTablib
CVE-2021-34552
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.32% / 54.44%
||
7 Day CHG~0.00%
Published-13 Jul, 2021 | 00:00
Updated-04 Aug, 2024 | 00:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Pillow through 8.2.0 and PIL (aka Python Imaging Library) through 1.1.7 allow an attacker to pass controlled parameters directly into a convert function to trigger a buffer overflow in Convert.c.

Action-Not Available
Vendor-n/aDebian GNU/LinuxFedora ProjectPython Software Foundation
Product-pillowdebian_linuxfedoran/a
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-29921
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-2.76% / 85.45%
||
7 Day CHG~0.00%
Published-06 May, 2021 | 00:00
Updated-03 Aug, 2024 | 22:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Python before 3,9,5, the ipaddress library mishandles leading zero characters in the octets of an IP address string. This (in some situations) allows attackers to bypass access control that is based on IP addresses.

Action-Not Available
Vendor-n/aOracle CorporationPython Software Foundation
Product-communications_cloud_native_core_automated_test_suitecommunications_cloud_native_core_network_slice_selection_functiongraalvmzfs_storage_appliance_kitcommunications_cloud_native_core_binding_support_functionpythonn/a
CVE-2021-25289
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.21% / 43.06%
||
7 Day CHG~0.00%
Published-19 Mar, 2021 | 03:29
Updated-03 Aug, 2024 | 19:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Pillow before 8.1.1. TiffDecode has a heap-based buffer overflow when decoding crafted YCbCr files because of certain interpretation conflicts with LibTIFF in RGBA mode. NOTE: this issue exists because of an incomplete fix for CVE-2020-35654.

Action-Not Available
Vendor-n/aPython Software Foundation
Product-pillown/a
CWE ID-CWE-787
Out-of-bounds Write
CVE-2014-1912
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-24.97% / 95.95%
||
7 Day CHG~0.00%
Published-28 Feb, 2014 | 18:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in the socket.recvfrom_into function in Modules/socketmodule.c in Python 2.5 before 2.7.7, 3.x before 3.3.4, and 3.4.x before 3.4rc1 allows remote attackers to execute arbitrary code via a crafted string.

Action-Not Available
Vendor-n/aApple Inc.Python Software Foundation
Product-pythonmac_os_xn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2020-5311
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-1.21% / 78.16%
||
7 Day CHG~0.00%
Published-03 Jan, 2020 | 00:52
Updated-04 Aug, 2024 | 08:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

libImaging/SgiRleDecode.c in Pillow before 6.2.2 has an SGI buffer overflow.

Action-Not Available
Vendor-n/aDebian GNU/LinuxCanonical Ltd.Fedora ProjectPython Software Foundation
Product-pillowubuntu_linuxdebian_linuxfedoran/a
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Details not found