Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
python python 2.6.1 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2023-41329
WireMock is a tool for mocking HTTP services. The proxy mode of WireMock, can be protected by the network restrictions configuration, as documented in Preventing proxying to and recording from specific target addresses. These restrictions can be configured using the domain names,...
Wiremock Studio
Wiremock Wiremock
Wiremock Python Wiremock
Wiremock Wiremock Docker
383
VMScore
CVE-2016-0775
Buffer overflow in the ImagingFliDecode function in libImaging/FliDecode.c in Pillow prior to 3.1.1 allows remote malicious users to cause a denial of service (crash) via a crafted FLI file.
Python Pillow
Debian Debian Linux 8.0
Debian Debian Linux 7.0
446
VMScore
CVE-2018-6594
lib/Crypto/PublicKey/ElGamal.py in PyCrypto up to and including 2.6.1 generates weak ElGamal key parameters, which allows malicious users to obtain sensitive information by reading ciphertext data (i.e., it does not have semantic security in face of a ciphertext-only attack). The...
Dlitz Pycrypto
Debian Debian Linux 7.0
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 17.10
3 Github repositories
695
VMScore
CVE-2008-6825
Directory traversal vulnerability in user/index.php in Fonality trixbox CE 2.6.1 and previous versions allows remote malicious users to include and execute arbitrary files via a .. (dot dot) in the langChoice parameter.
Trixbox Trixbox 2.0
Trixbox Trixbox 2.4.2.0
Trixbox Trixbox
3 EDB exploits
356
VMScore
CVE-2022-0577
Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository scrapy/scrapy before 2.6.1.
Scrapy Scrapy
Debian Debian Linux 9.0
383
VMScore
CVE-2021-41213
TensorFlow is an open source platform for machine learning. In affected versions the code behind `tf.function` API can be made to deadlock when two `tf.function` decorated Python functions are mutually recursive. This occurs due to using a non-reentrant `Lock` Python object. Load...
Google Tensorflow
Google Tensorflow 2.7.0
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33228
CVE-2024-20361
log injection
bypass
CVE-2024-4985
CVE-2024-35223
CVE-2024-29849
CVE-2024-31893
IMAP
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2