Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
python python 3.2.4 vulnerabilities and exploits
(subscribe to this query)
801
VMScore
CVE-2022-32552
Pure Storage FlashArray products running Purity//FA 6.2.0 - 6.2.3, 6.1.0 - 6.1.12, 6.0.0 - 6.0.8, 5.3.0 - 5.3.17, 5.2.x and prior Purity//FA releases, and Pure Storage FlashBlade products running Purity//FB 3.3.0, 3.2.0 - 3.2.4, 3.1.0 - 3.1.12, 3.0.x and prior Purity//FB releases...
Purestorage Purity//fa
Purestorage Purity//fb
445
VMScore
CVE-2021-33571
In Django 2.2 prior to 2.2.24, 3.x prior to 3.1.12, and 3.2 prior to 3.2.4, URLValidator, validate_ipv4_address, and validate_ipv46_address do not prohibit leading zero characters in octal literals. This may allow a bypass of access control that is based on IP addresses. (validat...
Djangoproject Django
Fedoraproject Fedora 35
356
VMScore
CVE-2021-33203
Django prior to 2.2.24, 3.x prior to 3.1.12, and 3.2.x prior to 3.2.4 has a potential directory traversal via django.contrib.admindocs. Staff members could use the TemplateDetailView view to check the existence of arbitrary files. Additionally, if (and only if) the default admind...
Djangoproject Django
Fedoraproject Fedora 35
384
VMScore
CVE-2016-5699
CRLF injection vulnerability in the HTTPConnection.putheader function in urllib2 and urllib in CPython (aka Python) prior to 2.7.10 and 3.x prior to 3.4.4 allows remote malicious users to inject arbitrary HTTP headers via CRLF sequences in a URL.
Python Python
Python Python 3.1.1
Python Python 3.3.2
Python Python 3.0
Python Python 3.0.1
Python Python 3.2.2
Python Python 3.1.0
Python Python 3.2.5
Python Python 3.1.5
Python Python 3.3.6
Python Python 3.4.0
Python Python 3.2.1
Python Python 3.2.0
Python Python 3.3.1
Python Python 3.4.3
Python Python 3.1.2
Python Python 3.3.4
Python Python 3.3.5
Python Python 3.2.3
Python Python 3.2.6
Python Python 3.3.0
Python Python 3.4.2
3 Github repositories
295
VMScore
CVE-2014-2667
Race condition in the _get_masked_mode function in Lib/os.py in Python 3.2 up to and including 3.5, when exist_ok is set to true and multiple threads are used, might allow local users to bypass intended file permissions by leveraging a separate application vulnerability before th...
Python Python 3.3.2
Python Python 3.2.2
Python Python 3.2.5
Python Python 3.3.6
Python Python 3.4.0
Python Python 3.2.1
Python Python 3.2.0
Python Python 3.3.1
Python Python 3.3.4
Python Python 3.3.5
Python Python 3.2.3
Python Python 3.2.6
Python Python 3.3.0
Python Python 3.4.2
Python Python 3.3.3
Python Python 3.2.4
Python Python 3.4.1
383
VMScore
CVE-2013-7040
Python 2.7 prior to 3.4 only uses the last eight bits of the prefix to randomize hash values, which causes it to compute hash values without restricting the ability to trigger hash collisions predictably and makes it easier for context-dependent malicious users to cause a denial ...
Apple Mac Os X
Python Python 2.7.6
Python Python 3.3.5
Python Python 3.1
Python Python 3.3.3
Python Python 3.1.1
Python Python 3.3.2
Python Python 3.0
Python Python 3.3.1
Python Python 3.0.1
Python Python 3.2.2
Python Python 3.3
Python Python 3.2.5
Python Python 3.1.5
Python Python 3.2.2150
Python Python 3.3.4
Python Python 2.7.4
Python Python 3.2.1
Python Python 3.2.0
Python Python 2.7.1
Python Python 3.1.2
Python Python 2.7.1150
1 Github repository
435
VMScore
CVE-2014-3146
Incomplete blacklist vulnerability in the lxml.html.clean module in lxml prior to 3.3.5 allows remote malicious users to conduct cross-site scripting (XSS) attacks via control characters in the link scheme to the clean_html function.
Lxml Lxml 2.1.4
Lxml Lxml 2.0.8
Lxml Lxml 2.1.1
Lxml Lxml 1.1.2
Lxml Lxml 3.1.2
Lxml Lxml 3.2.1
Lxml Lxml 2.0.1
Lxml Lxml 3.3.0
Lxml Lxml 3.1
Lxml Lxml 3.3.3
Lxml Lxml 2.1
Lxml Lxml 3.3.1
Lxml Lxml 3.2.3
Lxml Lxml 1.0
Lxml Lxml 2.0.10
Lxml Lxml 3.0
Lxml Lxml 1.3.2
Lxml Lxml 2.3.4
Lxml Lxml 2.2
Lxml Lxml 2.3.6
Lxml Lxml 1.2
Lxml Lxml 2.2.8
1 EDB exploit
578
VMScore
CVE-2009-0668
Unspecified vulnerability in Zope Object Database (ZODB) prior to 3.8.2, when certain Zope Enterprise Objects (ZEO) database sharing is enabled, allows remote malicious users to execute arbitrary Python code via vectors involving the ZEO network protocol.
Zope Zodb
Zope Zodb 3.2
Zope Zodb 2.11.4
Zope Zodb 2.9.11
Zope Zodb 3.8.0
Zope Zodb 3.5
Zope Zodb 3.4
Zope Zodb 3.1.1
Zope Zodb 3.3
Zope Zodb 3.7
Zope Zodb 2.10.9
Zope Zodb 3.1
Zope Zodb 3.6
Zope Zodb 3.2.4
Zope Zodb 3.4.1
Zope Zodb 3.3.3
Zope Zodb 2.8.11
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-37316
firmware
CVE-2024-30078
CVE-2024-5995
remote code execution
logic flaw
CVE-2024-20693
CVE-2024-37315
CVE-2024-5464
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started