Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
bottlepy bottle vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2022-31799
Bottle prior to 0.12.20 mishandles errors during early request binding.
Bottlepy Bottle
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Debian Debian Linux 11.0
Fedoraproject Fedora 35
Fedoraproject Fedora 36
6.8
CVSSv2
CVE-2014-3137
Bottle 0.10.x prior to 0.10.12, 0.11.x prior to 0.11.7, and 0.12.x prior to 0.12.6 does not properly limit content types, which allows remote malicious users to bypass intended access restrictions via an accepted Content-Type followed by a ; (semi-colon) and a Content-Type that w...
Bottlepy Bottle 0.10.6
Bottlepy Bottle 0.10.4
Bottlepy Bottle 0.11.5
Bottlepy Bottle 0.11.3
Bottlepy Bottle 0.12.4
Bottlepy Bottle 0.12.2
Bottlepy Bottle 0.12.0
Bottlepy Bottle 0.10.2
Bottlepy Bottle 0.10.1
Bottlepy Bottle 0.10.0
Bottlepy Bottle 0.11.7
Bottlepy Bottle 0.10.11
Bottlepy Bottle 0.10.10
Bottlepy Bottle 0.10.9
Bottlepy Bottle 0.10.8
Bottlepy Bottle 0.10.7
Bottlepy Bottle 0.11.2
Bottlepy Bottle 0.11.1
Bottlepy Bottle 0.11.0
Bottlepy Bottle 0.12.5
Bottlepy Bottle 0.10.5
Bottlepy Bottle 0.10.3
5.8
CVSSv2
CVE-2020-28473
The package bottle from 0 and prior to 0.12.19 are vulnerable to Web Cache Poisoning by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the pr...
Bottlepy Bottle
Debian Debian Linux 9.0
4.3
CVSSv2
CVE-2016-9964
redirect() in bottle.py in bottle 0.12.10 doesn't filter a "\r\n" sequence, which leads to a CRLF attack, as demonstrated by a redirect("233\r\nSet-Cookie: name=salt") call.
Bottlepy Bottle 0.12.10
Debian Debian Linux 8.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-22120
CVE-2024-35921
CVE-2024-35874
brute force
CVE-2024-36080
unprivileged
CVE-2024-35917
IDOR
CVE-2024-4947
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started