Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
python python 2.5.2 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2014-3589
PIL/IcnsImagePlugin.py in Python Imaging Library (PIL) and Pillow prior to 2.3.2 and 2.5.x prior to 2.5.2 allows remote malicious users to cause a denial of service via a crafted block size.
Python Pillow 2.5.2
Python Pillow 2.5.1
Python Pillow
Python Pillow 2.3.0
Debian Python-imaging -
Python Pillow 2.5.0
Opensuse Opensuse 13.2
5.5
CVSSv3
CVE-2016-3076
Heap-based buffer overflow in the j2k_encode_entry function in Pillow 2.5.0 up to and including 3.1.1 allows remote malicious users to cause a denial of service (memory corruption) via a crafted Jpeg2000 file.
Python Pillow 2.9.0
Python Pillow 2.5.1
Python Pillow 2.5.2
Python Pillow 3.0.0
Python Pillow 2.5.3
Python Pillow 2.6.2
Python Pillow 2.6.0
Python Pillow 2.5.0
Python Pillow 2.7.0
Python Pillow 3.1.0
Python Pillow 2.6.1
Python Pillow 2.8.2
Python Pillow 2.8.1
Python Pillow 2.8.0
2 Github repositories
NA
CVE-2011-1521
The urllib and urllib2 modules in Python 2.x prior to 2.7.2 and 3.x prior to 3.2.1 process Location headers that specify redirection to file: URLs, which makes it easier for remote malicious users to obtain sensitive information or cause a denial of service (resource consumption)...
Python Python 2.5.2
Python Python 2.1.2
Python Python 2.3.3
Python Python 2.4.4
Python Python 2.4.2
Python Python 2.5.4
Python Python 2.4.6
Python Python 2.6.7
Python Python 2.3.2
Python Python 2.3.1
Python Python 2.4.3
Python Python 2.3.5
Python Python 2.5.1
Python Python 2.3.7
Python Python 2.1.3
Python Python 2.1
Python Python 2.2.1
Python Python 2.2.2
Python Python 2.2.3
Python Python 2.4.1
Python Python 2.0.1
Python Python 2.6.6
NA
CVE-2011-4940
The list_directory function in Lib/SimpleHTTPServer.py in SimpleHTTPServer in Python prior to 2.5.6c1, 2.6.x prior to 2.6.7 rc2, and 2.7.x prior to 2.7.2 does not place a charset parameter in the Content-Type HTTP header, which makes it easier for remote malicious users to conduc...
Python Python 2.4.2
Python Python 2.5.1
Python Python 2.3.4
Python Python 2.0.1
Python Python 2.3.1
Python Python 0.9.1
Python Python 2.1.2
Python Python 0.9.0
Python Python 1.6.1
Python Python 2.2.1
Python Python 2.5.4
Python Python 1.3
Python Python 2.2.2
Python Python 2.1.1
Python Python 1.5.2
Python Python 2.3.3
Python Python 2.3.2
Python Python 1.6
Python Python 1.2
Python Python 2.4.6
Python Python 2.2.3
Python Python 2.5.2
NA
CVE-2015-2296
The resolve_redirects function in sessions.py in requests 2.1.0 up to and including 2.5.3 allows remote malicious users to conduct session fixation attacks via a cookie without a host value in a redirect.
Mageia Project Mageia 4.0
Python Requests 2.1.0
Python Requests 2.2.1
Python Requests 2.3.0
Python Requests 2.4.1
Python Requests 2.4.3
Python Requests 2.5.0
Python Requests 2.5.1
Python Requests 2.5.2
Python Requests 2.4.0
Python Requests 2.4.2
Python Requests 2.5.3
Canonical Ubuntu Linux 14.10
Canonical Ubuntu Linux 14.04
NA
CVE-2012-0845
SimpleXMLRPCServer.py in SimpleXMLRPCServer in Python prior to 2.6.8, 2.7.x prior to 2.7.3, 3.x prior to 3.1.5, and 3.2.x prior to 3.2.3 allows remote malicious users to cause a denial of service (infinite loop and CPU consumption) via an XML-RPC POST request that contains a smal...
Python Python 2.6.4
Python Python 2.6.3
Python Python 2.6.2150
Python Python 2.5.2
Python Python 2.5.1
Python Python 2.4.6
Python Python 2.6.6
Python Python 2.6.5
Python Python 2.5.3
Python Python 2.5.6
Python Python 2.4.4
Python Python 2.4.2
Python Python 2.3.2
Python Python 2.3.1
Python Python 2.3.7
Python Python 2.1.3
Python Python 2.1
Python Python 1.3
Python Python 0.9.1
Python Python
Python Python 2.6.6150
Python Python 2.5.150
NA
CVE-2012-1150
Python prior to 2.6.8, 2.7.x prior to 2.7.3, 3.x prior to 3.1.5, and 3.2.x prior to 3.2.3 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent malicious users to cause a denial of service (CPU consumption) via...
Python Python 2.6.6
Python Python 2.6.5
Python Python 2.5.3
Python Python 2.5.6
Python Python 2.4.4
Python Python 2.4.2
Python Python 2.3.2
Python Python 2.3.1
Python Python
Python Python 2.6.6150
Python Python 2.5.150
Python Python 2.4.3
Python Python 2.3.3
Python Python 2.1.1
Python Python 2.1.2
Python Python 1.5.2
Python Python 1.2
Python Python 2.6.4
Python Python 2.6.3
Python Python 2.5.2
Python Python 2.5.1
Python Python 2.4.6
2 Github repositories
NA
CVE-2008-4864
Multiple integer overflows in imageop.c in the imageop module in Python 1.5.2 up to and including 2.5.1 allow context-dependent malicious users to break out of the Python VM and execute arbitrary code via large integer values in certain arguments to the crop function, leading to ...
Python Python
2 EDB exploits
NA
CVE-2007-2052
Off-by-one error in the PyLocale_strxfrm function in Modules/_localemodule.c for Python 2.4 and 2.5 causes an incorrect buffer size to be used for the strxfrm function, which allows context-dependent malicious users to read portions of memory via unknown manipulations that trigge...
Python Python 2.4.0
Python Python 2.5.0
1 EDB exploit
NA
CVE-2008-2315
Multiple integer overflows in Python 2.5.2 and previous versions allow context-dependent malicious users to have an unknown impact via vectors related to the (1) stringobject, (2) unicodeobject, (3) bufferobject, (4) longobject, (5) tupleobject, (6) stropmodule, (7) gcmodule, and...
Python Python
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33228
CVE-2024-20361
log injection
bypass
CVE-2024-4985
CVE-2024-35223
CVE-2024-29849
CVE-2024-31893
IMAP
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »