Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
python python 2.2.3 vulnerabilities and exploits
(subscribe to this query)
4.6
CVSSv2
CVE-2021-29614
TensorFlow is an end-to-end open source platform for machine learning. The implementation of `tf.io.decode_raw` produces incorrect results and crashes the Python interpreter when combining `fixed_length` and wider datatypes. The implementation of the padded version(https://github...
Google Tensorflow
4.6
CVSSv2
CVE-2021-29513
TensorFlow is an end-to-end open source platform for machine learning. Calling TF operations with tensors of non-numeric types when the operations expect numeric tensors result in null pointer dereferences. The conversion from Python array to C++ array(https://github.com/tensorfl...
Google Tensorflow
4.3
CVSSv2
CVE-2014-3146
Incomplete blacklist vulnerability in the lxml.html.clean module in lxml prior to 3.3.5 allows remote malicious users to conduct cross-site scripting (XSS) attacks via control characters in the link scheme to the clean_html function.
Lxml Lxml
Lxml Lxml 3.3.0
Lxml Lxml 3.2.0
Lxml Lxml 3.1.2
Lxml Lxml 3.0
Lxml Lxml 2.3
Lxml Lxml 2.2.4
Lxml Lxml 2.2.3
Lxml Lxml 2.2.2
Lxml Lxml 2.1.4
Lxml Lxml 2.0.11
Lxml Lxml 2.0.8
Lxml Lxml 2.1
Lxml Lxml 2.0.2
Lxml Lxml 2.0.1
Lxml Lxml 1.3.2
Lxml Lxml 1.3.1
Lxml Lxml 1.0.4
Lxml Lxml 1.0.3
Lxml Lxml 0.7
Lxml Lxml 0.6
Lxml Lxml 3.3.1
1 EDB exploit
2.6
CVSSv2
CVE-2011-4940
The list_directory function in Lib/SimpleHTTPServer.py in SimpleHTTPServer in Python prior to 2.5.6c1, 2.6.x prior to 2.6.7 rc2, and 2.7.x prior to 2.7.2 does not place a charset parameter in the Content-Type HTTP header, which makes it easier for remote malicious users to conduc...
Python Python 2.4.2
Python Python 2.5.1
Python Python 2.3.4
Python Python 2.0.1
Python Python 2.3.1
Python Python 0.9.1
Python Python 2.1.2
Python Python 0.9.0
Python Python 1.6.1
Python Python 2.2.1
Python Python 2.5.4
Python Python 1.3
Python Python 2.2.2
Python Python 2.1.1
Python Python 1.5.2
Python Python 2.3.3
Python Python 2.3.2
Python Python 1.6
Python Python 1.2
Python Python 2.4.6
Python Python 2.2.3
Python Python 2.5.2
2.1
CVSSv2
CVE-2021-29572
TensorFlow is an end-to-end open source platform for machine learning. The implementation of `tf.raw_ops.SdcaOptimizer` triggers undefined behavior due to dereferencing a null pointer. The implementation(https://github.com/tensorflow/tensorflow/blob/60a45c8b6192a4699f2e2709a2645a...
2.1
CVSSv2
CVE-2021-29548
TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a runtime division by zero error and denial of service in `tf.raw_ops.QuantizedBatchNormWithGlobalNormalization`. This is because the implementation(https://github.com/tensorflow/tensorfl...
2.1
CVSSv2
CVE-2021-29567
TensorFlow is an end-to-end open source platform for machine learning. Due to lack of validation in `tf.raw_ops.SparseDenseCwiseMul`, an attacker can trigger denial of service via `CHECK`-fails or accesses to outside the bounds of heap allocated data. Since the implementation(htt...
NA
CVE-2024-32979
Nautobot is a Network Source of Truth and Network Automation Platform built as a web application atop the Django Python framework with a PostgreSQL or MySQL database. It exists that due to improper handling and escaping of user-provided query parameters, a maliciously crafted Nau...
NA
CVE-2023-25577
Werkzeug is a comprehensive WSGI web application library. Prior to version 2.2.3, Werkzeug's multipart form data parser will parse an unlimited number of parts, including file parts. Parts can be a small amount of bytes, but each requires CPU time to parse and may use more m...
Palletsprojects Werkzeug
NA
CVE-2023-23934
Werkzeug is a comprehensive WSGI web application library. Browsers may allow "nameless" cookies that look like `=value` instead of `key=value`. A vulnerable browser may allow a compromised application on an adjacent subdomain to exploit this to set a cookie like `=__Hos...
Palletsprojects Werkzeug
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
privilege escalation
CVE-2024-20696
CVE-2024-29829
CVE-2024-33999
CVE-2024-35646
physical
CVE-2024-24919
CVE-2024-31030
local users
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2