Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
python python 2.0.1 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2012-2417
PyCrypto prior to 2.6 does not produce appropriate prime numbers when using an ElGamal scheme to generate a key, which reduces the signature space or public key space and makes it easier for malicious users to conduct brute force attacks to obtain the private key.
Dlitz Pycrypto 2.4
Dlitz Pycrypto 2.3
Dlitz Pycrypto 1.9
Dlitz Pycrypto 1.0.1
Dlitz Pycrypto 1.0.0
Dlitz Pycrypto
Dlitz Pycrypto 2.4.1
Dlitz Pycrypto 2.0.1
Dlitz Pycrypto 2.0
Dlitz Pycrypto 1.1
Dlitz Pycrypto 1.0.2
Dlitz Pycrypto 2.1.0
Dlitz Pycrypto 2.2
NA
CVE-2009-3720
The updatePosition function in lib/xmltok_impl.c in libexpat in Expat 2.0.1, as used in Python, PyXML, w3c-libwww, and other software, allows context-dependent malicious users to cause a denial of service (application crash) via an XML document with crafted UTF-8 sequences that t...
Libexpat Project Libexpat 2.0.1
Apache Http Server
NA
CVE-2005-2483
Eval injection vulnerability in Karrigell prior to 2.1.8 allows remote malicious users to execute arbitrary Python code via modified arguments to a Karrigell services (.ks) script, which can reference functions from libraries that are used by that script.
Karrigell Karrigell 2.0.3
Karrigell Karrigell 2.0.4
Karrigell Karrigell 2.1.4
Karrigell Karrigell 2.1.5
Karrigell Karrigell 2.0.5
Karrigell Karrigell 2.0 Beta
Karrigell Karrigell 2.0.1
Karrigell Karrigell 2.0.2
Karrigell Karrigell 2.1.2
Karrigell Karrigell 2.1.3
Karrigell Karrigell 2.0
Karrigell Karrigell 2.1
Karrigell Karrigell 2.1.1
1 EDB exploit
NA
CVE-2009-3560
The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1, as used in the XML-Twig module for Perl, allows context-dependent malicious users to cause a denial of service (application crash) via an XML document with malformed UTF-8 sequences that trigger a buffer over-re...
Libexpat Project Libexpat 2.0.1
Apache Http Server
9
CVSSv3
CVE-2015-8557
The FontManager._get_nix_font_path function in formatters/img.py in Pygments 1.2.2 up to and including 2.0.2 allows remote malicious users to execute arbitrary commands via shell metacharacters in a font name.
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 15.10
Canonical Ubuntu Linux 15.04
Pygments Pygments 1.4
Pygments Pygments 1.5
Pygments Pygments 1.6
Pygments Pygments 2.0.1
Pygments Pygments 1.3.1
Pygments Pygments 1.3
Pygments Pygments 2.0
Pygments Pygments 1.2.2
5.3
CVSSv3
CVE-2023-40587
Pyramid is an open source Python web framework. A path traversal vulnerability in Pyramid versions 2.0.0 and 2.0.1 impacts users of Python 3.11 that are using a Pyramid static view with a full filesystem path and have a `index.html` file that is located exactly one directory abov...
Agendaless Pyramid
Fedoraproject Fedora 38
Fedoraproject Fedora 39
NA
CVE-2012-5659
Untrusted search path vulnerability in plugins/abrt-action-install-debuginfo-to-abrt-cache.c in Automatic Bug Reporting Tool (ABRT) 2.0.9 and previous versions allows local users to load and execute arbitrary Python modules by modifying the PYTHONPATH environment variable to refe...
Redhat Automatic Bug Reporting Tool 2.0.4.980
Redhat Automatic Bug Reporting Tool 2.0.4
Redhat Automatic Bug Reporting Tool 2.0.3
Redhat Automatic Bug Reporting Tool 2.0.2
Redhat Automatic Bug Reporting Tool
Redhat Automatic Bug Reporting Tool 2.0.8
Redhat Automatic Bug Reporting Tool 2.0.7
Redhat Automatic Bug Reporting Tool 2.0.5
Redhat Automatic Bug Reporting Tool 2.0.0
Redhat Automatic Bug Reporting Tool 2.0.6
Redhat Automatic Bug Reporting Tool 2.0.4.981
Redhat Automatic Bug Reporting Tool 2.0.1
NA
CVE-2014-3146
Incomplete blacklist vulnerability in the lxml.html.clean module in lxml prior to 3.3.5 allows remote malicious users to conduct cross-site scripting (XSS) attacks via control characters in the link scheme to the clean_html function.
Lxml Lxml
Lxml Lxml 3.3.0
Lxml Lxml 3.2.0
Lxml Lxml 3.1.2
Lxml Lxml 3.0
Lxml Lxml 2.3
Lxml Lxml 2.2.4
Lxml Lxml 2.2.3
Lxml Lxml 2.2.2
Lxml Lxml 2.1.4
Lxml Lxml 2.0.11
Lxml Lxml 2.0.8
Lxml Lxml 2.1
Lxml Lxml 2.0.2
Lxml Lxml 2.0.1
Lxml Lxml 1.3.2
Lxml Lxml 1.3.1
Lxml Lxml 1.0.4
Lxml Lxml 1.0.3
Lxml Lxml 0.7
Lxml Lxml 0.6
Lxml Lxml 3.3.1
1 EDB exploit
NA
CVE-2008-5913
The Math.random function in the JavaScript implementation in Mozilla Firefox 3.5.x prior to 3.5.10 and 3.6.x prior to 3.6.4, and SeaMonkey prior to 2.0.5, uses a random number generator that is seeded only once per browser session, which makes it easier for remote malicious users...
Mozilla Firefox 3.5.5
Mozilla Firefox 3.5.6
Mozilla Firefox 3.5.3
Mozilla Firefox 3.5.4
Mozilla Firefox 3.5.1
Mozilla Firefox 3.5.2
Mozilla Firefox 3.5.9
Mozilla Firefox 3.5
Mozilla Firefox 3.5.7
Mozilla Firefox 3.5.8
Mozilla Firefox 3.6.4
Mozilla Firefox 3.6.2
Mozilla Firefox 3.6.3
Mozilla Firefox 3.6
Mozilla Seamonkey 2.0
Mozilla Seamonkey 1.0.2
Mozilla Seamonkey 1.0.3
Mozilla Seamonkey 1.0
Mozilla Seamonkey 1.1
Mozilla Seamonkey 1.1.15
Mozilla Seamonkey 1.1.16
Mozilla Seamonkey 1.1.7
NA
CVE-2010-1198
Use-after-free vulnerability in Mozilla Firefox 3.5.x prior to 3.5.10 and 3.6.x prior to 3.6.4, and SeaMonkey prior to 2.0.5, allows remote malicious users to execute arbitrary code via vectors involving multiple plugin instances.
Mozilla Firefox 3.5
Mozilla Firefox 3.5.1
Mozilla Firefox 3.5.7
Mozilla Firefox 3.5.9
Mozilla Firefox 3.5.2
Mozilla Firefox 3.5.3
Mozilla Firefox 3.5.4
Mozilla Firefox 3.5.5
Mozilla Firefox 3.5.6
Mozilla Seamonkey 2.0.1
Mozilla Seamonkey 2.0
Mozilla Seamonkey 1.1.19
Mozilla Seamonkey 1.1.18
Mozilla Seamonkey 1.1.11
Mozilla Seamonkey 1.1.10
Mozilla Seamonkey 1.1.3
Mozilla Seamonkey 1.1.2
Mozilla Seamonkey 1.1.1
Mozilla Seamonkey 1.0.6
Mozilla Seamonkey 1.0.5
Mozilla Seamonkey 1.0
Mozilla Seamonkey 1.1.17
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-32976
CVE-2024-33557
CVE-2024-36801
CVE-2024-35654
authentication bypass
CVE-2024-24919
CSRF
code execution
CVE-2024-27348
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
NEXT »