Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
python python 2.2.1 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2008-0252
Directory traversal vulnerability in the _get_file_path function in (1) lib/sessions.py in CherryPy 3.0.x up to 3.0.2, (2) filter/sessionfilter.py in CherryPy 2.1, and (3) filter/sessionfilter.py in CherryPy 2.x allows remote malicious users to create or delete arbitrary files, a...
Cherrypy Cherrypy
7.5
CVSSv2
CVE-2005-2491
Integer overflow in pcre_compile.c in Perl Compatible Regular Expressions (PCRE) prior to 6.2, as used in multiple products such as Python, Ethereal, and PHP, allows malicious users to execute arbitrary code via quantifier values in regular expressions, which leads to a heap-base...
Pcre Pcre 5.0
Pcre Pcre 6.0
Pcre Pcre 6.1
7.5
CVSSv2
CVE-2005-0089
The SimpleXMLRPCServer library module in Python 2.2, 2.3 prior to 2.3.5, and 2.4, when used by XML-RPC servers that use the register_instance method to register an object without a _dispatch method, allows remote malicious users to read or modify globals of the associated module,...
Python Python 2.4.0
Python Python
6.8
CVSSv2
CVE-2015-2296
The resolve_redirects function in sessions.py in requests 2.1.0 up to and including 2.5.3 allows remote malicious users to conduct session fixation attacks via a cookie without a host value in a redirect.
Mageia Project Mageia 4.0
Python Requests 2.4.2
Python Requests 2.4.3
Python Requests 2.5.0
Python Requests 2.5.1
Python Requests 2.1.0
Python Requests 2.3.0
Python Requests 2.4.0
Python Requests 2.4.1
Python Requests 2.5.2
Python Requests 2.5.3
Python Requests 2.2.1
Canonical Ubuntu Linux 14.10
Canonical Ubuntu Linux 14.04
6.4
CVSSv2
CVE-2011-1521
The urllib and urllib2 modules in Python 2.x prior to 2.7.2 and 3.x prior to 3.2.1 process Location headers that specify redirection to file: URLs, which makes it easier for remote malicious users to obtain sensitive information or cause a denial of service (resource consumption)...
Python Python 2.4.2
Python Python 2.5.1
Python Python 2.3.4
Python Python 2.6.6
Python Python 2.1
Python Python 2.0.1
Python Python 2.6.1
Python Python 2.3.1
Python Python 2.1.2
Python Python 2.2.1
Python Python 2.5.4
Python Python 2.2.2
Python Python 2.1.1
Python Python 2.3.3
Python Python 2.7.1
Python Python 2.3.2
Python Python 2.6.7
Python Python 2.4.6
Python Python 2.0
Python Python 2.2.3
Python Python 2.5.2
Python Python 2.3.7
5.5
CVSSv2
CVE-2020-15193
In Tensorflow prior to 2.2.1 and 2.3.1, the implementation of `dlpack.to_dlpack` can be made to use uninitialized memory resulting in further memory corruption. This is because the pybind11 glue code assumes that the argument is a tensor. However, there is nothing stopping users ...
Google Tensorflow 2.2.0
Google Tensorflow 2.3.0
Opensuse Leap 15.2
5
CVSSv2
CVE-2017-9233
XML External Entity vulnerability in libexpat 2.2.0 and previous versions (Expat XML Parser Library) allows malicious users to put the parser in an infinite loop using a malformed external entity definition from an external DTD.
Libexpat Project Libexpat
Python Python
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Debian Debian Linux 10.0
5
CVSSv2
CVE-2012-0845
SimpleXMLRPCServer.py in SimpleXMLRPCServer in Python prior to 2.6.8, 2.7.x prior to 2.7.3, 3.x prior to 3.1.5, and 3.2.x prior to 3.2.3 allows remote malicious users to cause a denial of service (infinite loop and CPU consumption) via an XML-RPC POST request that contains a smal...
Python Python 2.4.2
Python Python 2.5.1
Python Python 2.3.4
Python Python 2.6.6
Python Python 2.1
Python Python 2.0.1
Python Python 2.6.1
Python Python 2.3.1
Python Python 0.9.1
Python Python 2.1.2
Python Python 0.9.0
Python Python 1.6.1
Python Python 2.2.1
Python Python 2.5.4
Python Python 1.3
Python Python 2.6.3
Python Python 2.2.2
Python Python 2.1.1
Python Python 1.5.2
Python Python 2.6.2150
Python Python 2.3.3
Python Python 2.3.2
5
CVSSv2
CVE-2012-1150
Python prior to 2.6.8, 2.7.x prior to 2.7.3, 3.x prior to 3.1.5, and 3.2.x prior to 3.2.3 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent malicious users to cause a denial of service (CPU consumption) via...
Python Python 2.4.2
Python Python 2.5.1
Python Python 2.3.4
Python Python 2.6.6
Python Python 2.1
Python Python 2.0.1
Python Python 2.6.1
Python Python 2.3.1
Python Python 0.9.1
Python Python 2.1.2
Python Python 0.9.0
Python Python 1.6.1
Python Python 2.2.1
Python Python 2.5.4
Python Python 1.3
Python Python 2.6.3
Python Python 2.2.2
Python Python 2.1.1
Python Python 1.5.2
Python Python 2.6.2150
Python Python 2.3.3
Python Python 2.3.2
2 Github repositories
4.6
CVSSv2
CVE-2002-1119
os._execvpe from os.py in Python 2.2.1 and previous versions creates temporary files with predictable names, which could allow local users to execute arbitrary code via a symlink attack.
Python Python
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-6267
XML injection
CVE-2024-37673
CVE-2024-6266
CVE-2024-30078
arbitrary
CVE-2024-36886
CVE-2024-5346
template injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »