Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2013-7440

Summary
Assigner-redhat
Assigner Org ID-53f830b8-0a3f-465b-8143-3b8a9948e749
Published At-07 Jun, 2016 | 18:00
Updated At-06 Aug, 2024 | 18:09
Rejected At-
Credits

The ssl.match_hostname function in CPython (aka Python) before 2.7.9 and 3.x before 3.3.3 does not properly handle wildcards in hostnames, which might allow man-in-the-middle attackers to spoof servers via a crafted certificate.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:redhat
Assigner Org ID:53f830b8-0a3f-465b-8143-3b8a9948e749
Published At:07 Jun, 2016 | 18:00
Updated At:06 Aug, 2024 | 18:09
Rejected At:
▼CVE Numbering Authority (CNA)

The ssl.match_hostname function in CPython (aka Python) before 2.7.9 and 3.x before 3.3.3 does not properly handle wildcards in hostnames, which might allow man-in-the-middle attackers to spoof servers via a crafted certificate.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://seclists.org/oss-sec/2015/q2/483
mailing-list
x_refsource_MLIST
https://access.redhat.com/errata/RHSA-2016:1166
vendor-advisory
x_refsource_REDHAT
https://bugzilla.redhat.com/show_bug.cgi?id=1224999
x_refsource_CONFIRM
https://hg.python.org/cpython/rev/10d0edadbcdd
x_refsource_CONFIRM
https://bugs.python.org/issue17997
x_refsource_CONFIRM
http://www.securityfocus.com/bid/74707
vdb-entry
x_refsource_BID
http://seclists.org/oss-sec/2015/q2/523
mailing-list
x_refsource_MLIST
Hyperlink: http://seclists.org/oss-sec/2015/q2/483
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: https://access.redhat.com/errata/RHSA-2016:1166
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=1224999
Resource:
x_refsource_CONFIRM
Hyperlink: https://hg.python.org/cpython/rev/10d0edadbcdd
Resource:
x_refsource_CONFIRM
Hyperlink: https://bugs.python.org/issue17997
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.securityfocus.com/bid/74707
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://seclists.org/oss-sec/2015/q2/523
Resource:
mailing-list
x_refsource_MLIST
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://seclists.org/oss-sec/2015/q2/483
mailing-list
x_refsource_MLIST
x_transferred
https://access.redhat.com/errata/RHSA-2016:1166
vendor-advisory
x_refsource_REDHAT
x_transferred
https://bugzilla.redhat.com/show_bug.cgi?id=1224999
x_refsource_CONFIRM
x_transferred
https://hg.python.org/cpython/rev/10d0edadbcdd
x_refsource_CONFIRM
x_transferred
https://bugs.python.org/issue17997
x_refsource_CONFIRM
x_transferred
http://www.securityfocus.com/bid/74707
vdb-entry
x_refsource_BID
x_transferred
http://seclists.org/oss-sec/2015/q2/523
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: http://seclists.org/oss-sec/2015/q2/483
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: https://access.redhat.com/errata/RHSA-2016:1166
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=1224999
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://hg.python.org/cpython/rev/10d0edadbcdd
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://bugs.python.org/issue17997
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.securityfocus.com/bid/74707
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://seclists.org/oss-sec/2015/q2/523
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secalert@redhat.com
Published At:07 Jun, 2016 | 18:59
Updated At:12 Apr, 2025 | 10:46

The ssl.match_hostname function in CPython (aka Python) before 2.7.9 and 3.x before 3.3.3 does not properly handle wildcards in hostnames, which might allow man-in-the-middle attackers to spoof servers via a crafted certificate.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.05.9MEDIUM
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
Primary2.04.3MEDIUM
AV:N/AC:M/Au:N/C:N/I:P/A:N
Type: Primary
Version: 3.0
Base score: 5.9
Base severity: MEDIUM
Vector:
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
Type: Primary
Version: 2.0
Base score: 4.3
Base severity: MEDIUM
Vector:
AV:N/AC:M/Au:N/C:N/I:P/A:N
CPE Matches

Python Software Foundation
python
>>python>>Versions up to 2.7.8(inclusive)
cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
Python Software Foundation
python
>>python>>3.0
cpe:2.3:a:python:python:3.0:*:*:*:*:*:*:*
Python Software Foundation
python
>>python>>3.0.1
cpe:2.3:a:python:python:3.0.1:*:*:*:*:*:*:*
Python Software Foundation
python
>>python>>3.1
cpe:2.3:a:python:python:3.1:*:*:*:*:*:*:*
Python Software Foundation
python
>>python>>3.1.1
cpe:2.3:a:python:python:3.1.1:*:*:*:*:*:*:*
Python Software Foundation
python
>>python>>3.1.2
cpe:2.3:a:python:python:3.1.2:*:*:*:*:*:*:*
Python Software Foundation
python
>>python>>3.1.3
cpe:2.3:a:python:python:3.1.3:*:*:*:*:*:*:*
Python Software Foundation
python
>>python>>3.1.4
cpe:2.3:a:python:python:3.1.4:*:*:*:*:*:*:*
Python Software Foundation
python
>>python>>3.1.5
cpe:2.3:a:python:python:3.1.5:*:*:*:*:*:*:*
Python Software Foundation
python
>>python>>3.1.2150
cpe:2.3:a:python:python:3.1.2150:*:*:*:*:*:x64:*
Python Software Foundation
python
>>python>>3.2
cpe:2.3:a:python:python:3.2:*:*:*:*:*:*:*
Python Software Foundation
python
>>python>>3.2
cpe:2.3:a:python:python:3.2:alpha:*:*:*:*:*:*
Python Software Foundation
python
>>python>>3.2.0
cpe:2.3:a:python:python:3.2.0:*:*:*:*:*:*:*
Python Software Foundation
python
>>python>>3.2.1
cpe:2.3:a:python:python:3.2.1:*:*:*:*:*:*:*
Python Software Foundation
python
>>python>>3.2.2
cpe:2.3:a:python:python:3.2.2:*:*:*:*:*:*:*
Python Software Foundation
python
>>python>>3.2.3
cpe:2.3:a:python:python:3.2.3:*:*:*:*:*:*:*
Python Software Foundation
python
>>python>>3.2.4
cpe:2.3:a:python:python:3.2.4:*:*:*:*:*:*:*
Python Software Foundation
python
>>python>>3.2.5
cpe:2.3:a:python:python:3.2.5:*:*:*:*:*:*:*
Python Software Foundation
python
>>python>>3.2.6
cpe:2.3:a:python:python:3.2.6:*:*:*:*:*:*:*
Python Software Foundation
python
>>python>>3.2.2150
cpe:2.3:a:python:python:3.2.2150:*:*:*:*:*:*:*
Python Software Foundation
python
>>python>>3.3
cpe:2.3:a:python:python:3.3:*:*:*:*:*:*:*
Python Software Foundation
python
>>python>>3.3
cpe:2.3:a:python:python:3.3:beta2:*:*:*:*:*:*
Python Software Foundation
python
>>python>>3.3.0
cpe:2.3:a:python:python:3.3.0:*:*:*:*:*:*:*
Python Software Foundation
python
>>python>>3.3.1
cpe:2.3:a:python:python:3.3.1:*:*:*:*:*:*:*
Python Software Foundation
python
>>python>>3.3.1
cpe:2.3:a:python:python:3.3.1:rc1:*:*:*:*:*:*
Python Software Foundation
python
>>python>>3.3.2
cpe:2.3:a:python:python:3.3.2:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-19Primarynvd@nist.gov
CWE ID: CWE-19
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://seclists.org/oss-sec/2015/q2/483secalert@redhat.com
N/A
http://seclists.org/oss-sec/2015/q2/523secalert@redhat.com
N/A
http://www.securityfocus.com/bid/74707secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2016:1166secalert@redhat.com
N/A
https://bugs.python.org/issue17997secalert@redhat.com
N/A
https://bugzilla.redhat.com/show_bug.cgi?id=1224999secalert@redhat.com
N/A
https://hg.python.org/cpython/rev/10d0edadbcddsecalert@redhat.com
N/A
http://seclists.org/oss-sec/2015/q2/483af854a3a-2127-422b-91ae-364da2661108
N/A
http://seclists.org/oss-sec/2015/q2/523af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securityfocus.com/bid/74707af854a3a-2127-422b-91ae-364da2661108
N/A
https://access.redhat.com/errata/RHSA-2016:1166af854a3a-2127-422b-91ae-364da2661108
N/A
https://bugs.python.org/issue17997af854a3a-2127-422b-91ae-364da2661108
N/A
https://bugzilla.redhat.com/show_bug.cgi?id=1224999af854a3a-2127-422b-91ae-364da2661108
N/A
https://hg.python.org/cpython/rev/10d0edadbcddaf854a3a-2127-422b-91ae-364da2661108
N/A
Hyperlink: http://seclists.org/oss-sec/2015/q2/483
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://seclists.org/oss-sec/2015/q2/523
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/74707
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2016:1166
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://bugs.python.org/issue17997
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=1224999
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://hg.python.org/cpython/rev/10d0edadbcdd
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://seclists.org/oss-sec/2015/q2/483
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://seclists.org/oss-sec/2015/q2/523
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/74707
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2016:1166
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://bugs.python.org/issue17997
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=1224999
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://hg.python.org/cpython/rev/10d0edadbcdd
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

11Records found

CVE-2020-8315
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.32% / 54.82%
||
7 Day CHG~0.00%
Published-28 Jan, 2020 | 18:35
Updated-04 Aug, 2024 | 09:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Python (CPython) 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1, an insecure dependency load upon launch on Windows 7 may result in an attacker's copy of api-ms-win-core-path-l1-1-0.dll being loaded and used instead of the system's copy. Windows 8 and later are unaffected.

Action-Not Available
Vendor-n/aPython Software Foundation
Product-pythonn/a
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2013-4238
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-4.27% / 88.58%
||
7 Day CHG~0.00%
Published-18 Aug, 2013 | 01:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The ssl.match_hostname function in the SSL module in Python 2.6 through 3.4 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.

Action-Not Available
Vendor-n/aPython Software FoundationopenSUSECanonical Ltd.
Product-opensusepythonubuntu_linuxn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2019-9947
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-1.16% / 78.26%
||
7 Day CHG~0.00%
Published-23 Mar, 2019 | 17:06
Updated-04 Aug, 2024 | 22:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the path component of a URL that lacks a ? character) followed by an HTTP header or a Redis command. This is similar to the CVE-2019-9740 query string issue. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.

Action-Not Available
Vendor-n/aPython Software Foundation
Product-pythonn/a
CWE ID-CWE-93
Improper Neutralization of CRLF Sequences ('CRLF Injection')
CVE-2019-9740
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-9.91% / 92.84%
||
7 Day CHG~0.00%
Published-13 Mar, 2019 | 03:00
Updated-04 Aug, 2024 | 22:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the query string after a ? character) followed by an HTTP header or a Redis command. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.

Action-Not Available
Vendor-n/aPython Software Foundation
Product-pythonn/a
CWE ID-CWE-93
Improper Neutralization of CRLF Sequences ('CRLF Injection')
CVE-2019-6802
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-1.05% / 77.19%
||
7 Day CHG~0.00%
Published-25 Jan, 2019 | 04:00
Updated-04 Aug, 2024 | 20:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

CRLF Injection in pypiserver 1.2.5 and below allows attackers to set arbitrary HTTP headers and possibly conduct XSS attacks via a %0d%0a in a URI.

Action-Not Available
Vendor-n/aPython Software Foundation
Product-pypiservern/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CWE ID-CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
CVE-2019-16935
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-1.72% / 82.05%
||
7 Day CHG~0.00%
Published-28 Sep, 2019 | 01:33
Updated-05 Aug, 2024 | 01:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The documentation XML-RPC server in Python through 2.7.16, 3.x through 3.6.9, and 3.7.x through 3.7.4 has XSS via the server_title field. This occurs in Lib/DocXMLRPCServer.py in Python 2.x, and in Lib/xmlrpc/server.py in Python 3.x. If set_server_title is called with untrusted input, arbitrary JavaScript can be delivered to clients that visit the http URL for this server.

Action-Not Available
Vendor-n/aDebian GNU/LinuxCanonical Ltd.Python Software Foundation
Product-ubuntu_linuxdebian_linuxpythonn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2019-18348
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-3.16% / 86.62%
||
7 Day CHG~0.00%
Published-23 Oct, 2019 | 16:31
Updated-05 Aug, 2024 | 01:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in urllib2 in Python 2.x through 2.7.17 and urllib in Python 3.x through 3.8.0. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the host component of a URL) followed by an HTTP header. This is similar to the CVE-2019-9740 query string issue and the CVE-2019-9947 path string issue. (This is not exploitable when glibc has CVE-2016-10739 fixed.). This is fixed in: v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1; v3.6.11, v3.6.11rc1, v3.6.12; v3.7.8, v3.7.8rc1, v3.7.9; v3.8.3, v3.8.3rc1, v3.8.4, v3.8.4rc1, v3.8.5, v3.8.6, v3.8.6rc1.

Action-Not Available
Vendor-n/aPython Software Foundation
Product-pythonn/a
CWE ID-CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
CVE-2016-5699
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-6.1||MEDIUM
EPSS-41.71% / 97.32%
||
7 Day CHG~0.00%
Published-02 Sep, 2016 | 14:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

CRLF injection vulnerability in the HTTPConnection.putheader function in urllib2 and urllib in CPython (aka Python) before 2.7.10 and 3.x before 3.4.4 allows remote attackers to inject arbitrary HTTP headers via CRLF sequences in a URL.

Action-Not Available
Vendor-n/aPython Software Foundation
Product-pythonn/a
CWE ID-CWE-113
Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting')
CVE-2021-32052
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-2.57% / 85.22%
||
7 Day CHG+0.66%
Published-06 May, 2021 | 15:49
Updated-03 Aug, 2024 | 23:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Django 2.2 before 2.2.22, 3.1 before 3.1.10, and 3.2 before 3.2.2 (with Python 3.9.5+), URLValidator does not prohibit newlines and tabs (unless the URLField form field is used). If an application uses values with newlines in an HTTP response, header injection can occur. Django itself is unaffected because HttpResponse prohibits newlines in HTTP headers.

Action-Not Available
Vendor-n/aDjangoPython Software FoundationFedora Project
Product-djangofedorapythonn/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2019-11236
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.62% / 69.66%
||
7 Day CHG~0.00%
Published-15 Apr, 2019 | 00:00
Updated-04 Aug, 2024 | 22:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In the urllib3 library through 1.24.1 for Python, CRLF injection is possible if the attacker controls the request parameter.

Action-Not Available
Vendor-n/aPython Software Foundation
Product-urllib3n/a
CWE ID-CWE-93
Improper Neutralization of CRLF Sequences ('CRLF Injection')
CVE-2016-0740
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.15% / 35.31%
||
7 Day CHG~0.00%
Published-13 Apr, 2016 | 16:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in the ImagingLibTiffDecode function in libImaging/TiffDecode.c in Pillow before 3.1.1 allows remote attackers to overwrite memory via a crafted TIFF file.

Action-Not Available
Vendor-n/aDebian GNU/LinuxPython Software Foundation
Product-debian_linuxpillown/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
Details not found