Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
python python 3.2 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2010-3493
Multiple race conditions in smtpd.py in the smtpd module in Python 2.6, 2.7, 3.1, and 3.2 alpha allow remote malicious users to cause a denial of service (daemon outage) by establishing and then immediately closing a TCP connection, leading to the accept function having an unexpe...
Python Python 3.1
Python Python 3.2
NA
CVE-2011-4944
Python 2.6 up to and including 3.2 creates ~/.pypirc with world-readable permissions before changing them after data has been written, which introduces a race condition that allows local users to obtain a username and password by reading this file.
Python Python 2.6.2
Python Python 2.6.5
Python Python 2.7.2
Python Python 2.7.1
Python Python 3.2
Python Python 2.6.2150
Python Python 2.6.6
Python Python 2.6.4
Python Python 2.7.2150
Python Python 3.0.1
Python Python 3.0
Python Python 2.6.7
Python Python 2.6.8
Python Python 2.6.1
Python Python 2.6.3
Python Python 2.7.1150
Python Python 3.1.2
Python Python 3.1.1
Python Python 3.1.4
Python Python 3.1.3
Python Python 2.6.6150
Python Python 3.1.2150
NA
CVE-2013-7040
Python 2.7 prior to 3.4 only uses the last eight bits of the prefix to randomize hash values, which causes it to compute hash values without restricting the ability to trigger hash collisions predictably and makes it easier for context-dependent malicious users to cause a denial ...
Apple Mac Os X
Python Python 3.3.2
Python Python 3.3.3
Python Python 3.2
Python Python 3.2.5
Python Python 3.1
Python Python 3.0.1
Python Python 2.7.1
Python Python 2.7.5
Python Python 2.7.6
Python Python 3.3
Python Python 3.3.4
Python Python 3.2.0
Python Python 3.2.1
Python Python 3.1.1
Python Python 3.1.2
Python Python 2.7.1150
Python Python 2.7.7
Python Python 3.3.0
Python Python 3.3.5
Python Python 3.2.2
Python Python 3.2.2150
1 Github repository
NA
CVE-2011-1521
The urllib and urllib2 modules in Python 2.x prior to 2.7.2 and 3.x prior to 3.2.1 process Location headers that specify redirection to file: URLs, which makes it easier for remote malicious users to obtain sensitive information or cause a denial of service (resource consumption)...
Python Python 2.5.2
Python Python 2.1.2
Python Python 2.3.3
Python Python 2.4.4
Python Python 2.4.2
Python Python 2.5.4
Python Python 2.4.6
Python Python 2.6.7
Python Python 2.3.2
Python Python 2.3.1
Python Python 2.4.3
Python Python 2.3.5
Python Python 2.5.1
Python Python 2.3.7
Python Python 2.1.3
Python Python 2.1
Python Python 2.2.1
Python Python 2.2.2
Python Python 2.2.3
Python Python 2.4.1
Python Python 2.0.1
Python Python 2.6.6
NA
CVE-2012-0845
SimpleXMLRPCServer.py in SimpleXMLRPCServer in Python prior to 2.6.8, 2.7.x prior to 2.7.3, 3.x prior to 3.1.5, and 3.2.x prior to 3.2.3 allows remote malicious users to cause a denial of service (infinite loop and CPU consumption) via an XML-RPC POST request that contains a smal...
Python Python 2.6.4
Python Python 2.6.3
Python Python 2.6.2150
Python Python 2.5.2
Python Python 2.5.1
Python Python 2.4.6
Python Python 2.6.6
Python Python 2.6.5
Python Python 2.5.3
Python Python 2.5.6
Python Python 2.4.4
Python Python 2.4.2
Python Python 2.3.2
Python Python 2.3.1
Python Python 2.3.7
Python Python 2.1.3
Python Python 2.1
Python Python 1.3
Python Python 0.9.1
Python Python
Python Python 2.6.6150
Python Python 2.5.150
NA
CVE-2012-1150
Python prior to 2.6.8, 2.7.x prior to 2.7.3, 3.x prior to 3.1.5, and 3.2.x prior to 3.2.3 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent malicious users to cause a denial of service (CPU consumption) via...
Python Python 2.6.6
Python Python 2.6.5
Python Python 2.5.3
Python Python 2.5.6
Python Python 2.4.4
Python Python 2.4.2
Python Python 2.3.2
Python Python 2.3.1
Python Python
Python Python 2.6.6150
Python Python 2.5.150
Python Python 2.4.3
Python Python 2.3.3
Python Python 2.1.1
Python Python 2.1.2
Python Python 1.5.2
Python Python 1.2
Python Python 2.6.4
Python Python 2.6.3
Python Python 2.5.2
Python Python 2.5.1
Python Python 2.4.6
2 Github repositories
NA
CVE-2014-2667
Race condition in the _get_masked_mode function in Lib/os.py in Python 3.2 up to and including 3.5, when exist_ok is set to true and multiple threads are used, might allow local users to bypass intended file permissions by leveraging a separate application vulnerability before th...
Python Python 3.2.6
Python Python 3.3.0
Python Python 3.4.0
Python Python 3.4.1
Python Python 3.2.0
Python Python 3.2.1
Python Python 3.3.1
Python Python 3.3.2
Python Python 3.4.2
Python Python 3.2.4
Python Python 3.2.5
Python Python 3.3.5
Python Python 3.3.6
Python Python 3.2.2
Python Python 3.2.3
Python Python 3.3.3
Python Python 3.3.4
NA
CVE-2010-2089
The audioop module in Python 2.7 and 3.2 does not verify the relationships between size arguments and byte string lengths, which allows context-dependent malicious users to cause a denial of service (memory corruption and application crash) via crafted arguments, as demonstrated ...
Python Python
1 EDB exploit
6.7
CVSSv3
CVE-2018-1000117
Python Software Foundation CPython version From 3.2 until 3.6.4 on Windows contains a Buffer Overflow vulnerability in os.symlink() function on Windows that can result in Arbitrary code execution, likely escalation of privilege. This attack appears to be exploitable via a python ...
Python Python 3.7.0
Python Python
1 Github repository
5.9
CVSSv3
CVE-2020-25659
python-cryptography 3.2 is vulnerable to Bleichenbacher timing attacks in the RSA decryption API, via timed processing of valid PKCS#1 v1.5 ciphertext.
Python-cryptography Project Python-cryptography 3.2
Oracle Communications Cloud Native Core Network Function Cloud Native Environment 1.10.0
1 Github repository
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33228
CVE-2024-20361
log injection
bypass
CVE-2024-4985
CVE-2024-35223
CVE-2024-29849
CVE-2024-31893
IMAP
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »