All Systems Operational

CVE Hub

beta
CVE-2008-5985
MEDIUM [6.9]
Last Modified: 11/20/2024
Untrusted search path vulnerability in the Python interface in Epiphany 2.22.3, and possibly other versions, allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983).
bugs.debian.org logo
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=504363
bugs.debian.org logo
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=504363
bugzilla.redhat.com logo
https://bugzilla.redhat.com/show_bug.cgi?id=481548
+11
CVE-2008-5984
MEDIUM [6.9]
Last Modified: 11/20/2024
Untrusted search path vulnerability in the Python plugin in Dia 0.96.1, and possibly other versions, allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983).
bugs.debian.org logo
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=504251
bugs.debian.org logo
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=504251
bugzilla.redhat.com logo
https://bugzilla.redhat.com/show_bug.cgi?id=481551
+17
CVE-2008-5983
MEDIUM [6.9]
Last Modified: 11/20/2024
Untrusted search path vulnerability in the PySys_SetArgv API function in Python 2.6 and earlier, and possibly later versions, prepends an empty string to sys.path when the argv[0] argument does not contain a path separator, which might allow local users to execute arbitrary code via a Trojan horse Python file in the current working directory.
bugzilla.redhat.com logo
https://bugzilla.redhat.com/show_bug.cgi?id=482814
bugzilla.redhat.com logo
https://bugzilla.redhat.com/show_bug.cgi?id=482814
lists.fedoraproject.org logo
http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042751.html
+43
CVE-2008-5104
HIGH [7.2]
Last Modified: 11/20/2024
Ubuntu 6.06 LTS, 7.10, 8.04 LTS, and 8.10, when installed as a virtual machine by (1) python-vm-builder or (2) ubuntu-vm-builder in VMBuilder 0.9 in Ubuntu 8.10, have ! (exclamation point) as the default root password, which allows attackers to bypass intended login restrictions.
bugs.launchpad.net logo
https://bugs.launchpad.net/ubuntu/+source/vm-builder/+bug/296841
bugs.launchpad.net logo
https://bugs.launchpad.net/ubuntu/+source/vm-builder/+bug/296841
exchange.xforce.ibmcloud.com logo
https://exchange.xforce.ibmcloud.com/vulnerabilities/46881
+9
CVE-2008-5103
HIGH [7.2]
Last Modified: 11/20/2024
The (1) python-vm-builder and (2) ubuntu-vm-builder implementations in VMBuilder 0.9 in Ubuntu 8.10 omit the -e option when invoking chpasswd with a root:! argument, which configures the root account with a cleartext password of ! (exclamation point) and allows attackers to bypass intended login restrictions.
bugs.launchpad.net logo
https://bugs.launchpad.net/ubuntu/+source/vm-builder/+bug/296841
bugs.launchpad.net logo
https://bugs.launchpad.net/ubuntu/+source/vm-builder/+bug/296841
exchange.xforce.ibmcloud.com logo
https://exchange.xforce.ibmcloud.com/vulnerabilities/46603
+11
CVE-2008-5102
rce
MEDIUM [4.0]
Last Modified: 11/20/2024
PythonScripts in Zope 2 2.11.2 and earlier, as used in Conga and other products, allows remote authenticated users to cause a denial of service (resource consumption or application halt) via certain (1) raise or (2) import statements.
bugs.gentoo.org logo
http://bugs.gentoo.org/show_bug.cgi?id=246411
bugs.gentoo.org logo
http://bugs.gentoo.org/show_bug.cgi?id=246411
bugs.launchpad.net logo
https://bugs.launchpad.net/zope2/+bug/257269
+13
CVE-2008-5031
integer overflow
CRITICAL [10.0]
Last Modified: 11/20/2024
Multiple integer overflows in Python 2.2.3 through 2.5.1, and 2.6, allow context-dependent attackers to have an unknown impact via a large integer value in the tabsize argument to the expandtabs method, as implemented by (1) the string_expandtabs function in Objects/stringobject.c and (2) the unicode_expandtabs function in Objects/unicodeobject.c. NOTE: this vulnerability reportedly exists because of an incomplete fix for CVE-2008-2315.
exchange.xforce.ibmcloud.com logo
https://exchange.xforce.ibmcloud.com/vulnerabilities/46612
exchange.xforce.ibmcloud.com logo
https://exchange.xforce.ibmcloud.com/vulnerabilities/46612
lists.apple.com logo
http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
+33
CVE-2008-4864
buffer overflow
HIGH [7.5]
Last Modified: 11/20/2024
Multiple integer overflows in imageop.c in the imageop module in Python 1.5.2 through 2.5.1 allow context-dependent attackers to break out of the Python VM and execute arbitrary code via large integer values in certain arguments to the crop function, leading to a buffer overflow, a different vulnerability than CVE-2007-4965 and CVE-2008-1679.
exchange.xforce.ibmcloud.com logo
https://exchange.xforce.ibmcloud.com/vulnerabilities/46606
exchange.xforce.ibmcloud.com logo
https://exchange.xforce.ibmcloud.com/vulnerabilities/46606
lists.apple.com logo
http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
+31
CVE-2008-4863
MEDIUM [6.9]
Last Modified: 11/20/2024
Untrusted search path vulnerability in BPY_interface in Blender 2.46 allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to an erroneous setting of sys.path by the PySys_SetArgv function.
bugs.debian.org logo
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=503632
bugs.debian.org logo
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=503632
mandriva.com logo
http://www.mandriva.com/security/advisories?name=MDVSA-2009:038
+5
CVE-2008-4394
MEDIUM [6.9]
Last Modified: 11/20/2024
Multiple untrusted search path vulnerabilities in Portage before 2.1.4.5 include the current working directory in the Python search path, which allows local users to execute arbitrary code via a modified Python module that is loaded by the (1) ys-apps/portage, (2) net-mail/fetchmail, (3) app-editors/leo ebuilds, and other ebuilds.
exchange.xforce.ibmcloud.com logo
https://exchange.xforce.ibmcloud.com/vulnerabilities/45792
exchange.xforce.ibmcloud.com logo
https://exchange.xforce.ibmcloud.com/vulnerabilities/45792
secunia.com logo
http://secunia.com/advisories/32228
+5
CVE-2008-3949
HIGH [7.2]
Last Modified: 11/20/2024
emacs/lisp/progmodes/python.el in Emacs 22.1 and 22.2 imports Python script from the current working directory during editing of a Python file, which allows local users to execute arbitrary code via a Trojan horse Python file.
bugzilla.novell.com logo
https://bugzilla.novell.com/show_bug.cgi?id=424340
bugzilla.novell.com logo
https://bugzilla.novell.com/show_bug.cgi?id=424340
exchange.xforce.ibmcloud.com logo
https://exchange.xforce.ibmcloud.com/vulnerabilities/45021
+15
CVE-2008-4126
rce
MEDIUM [6.4]
Last Modified: 11/20/2024
PyDNS (aka python-dns) before 2.3.1-5 in Debian GNU/Linux does not use random source ports for DNS requests and does not use random transaction IDs for DNS retries, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447. NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-4099.
bugs.debian.org logo
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=490217
bugs.debian.org logo
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=490217
openwall.com logo
http://www.openwall.com/lists/oss-security/2008/09/11/1
+5
CVE-2008-4108
symlink attack
HIGH [7.2]
Last Modified: 11/20/2024
Tools/faqwiz/move-faqwiz.sh (aka the generic FAQ wizard moving tool) in Python 2.4.5 might allow local users to overwrite arbitrary files via a symlink attack on a tmp$RANDOM.tmp temporary file. NOTE: there may not be common usage scenarios in which tmp$RANDOM.tmp is located in an untrusted directory.
bugs.debian.org logo
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=498899
bugs.debian.org logo
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=498899
bugzilla.redhat.com logo
https://bugzilla.redhat.com/show_bug.cgi?id=462326
+15
CVE-2008-4099
rce
MEDIUM [6.4]
Last Modified: 11/20/2024
PyDNS (aka python-dns) before 2.3.1-4 in Debian GNU/Linux does not use random source ports or transaction IDs for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447.
bugs.debian.org logo
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=490217
bugs.debian.org logo
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=490217
openwall.com logo
http://www.openwall.com/lists/oss-security/2008/09/11/1
+5
CVE-2008-2315
integer overflow
HIGH [7.5]
Last Modified: 11/20/2024
Multiple integer overflows in Python 2.5.2 and earlier allow context-dependent attackers to have an unknown impact via vectors related to the (1) stringobject, (2) unicodeobject, (3) bufferobject, (4) longobject, (5) tupleobject, (6) stropmodule, (7) gcmodule, and (8) mmapmodule modules. NOTE: The expandtabs integer overflows in stringobject and unicodeobject in 2.5.2 are covered by CVE-2008-5031.
bugs.gentoo.org logo
http://bugs.gentoo.org/attachment.cgi?id=159418&action=view
bugs.gentoo.org logo
http://bugs.gentoo.org/show_bug.cgi?id=230640
bugs.gentoo.org logo
http://bugs.gentoo.org/attachment.cgi?id=159418&action=view
+67
CVE-2008-3143
integer overflow
HIGH [7.5]
Last Modified: 11/20/2024
Multiple integer overflows in Python before 2.5.2 might allow context-dependent attackers to have an unknown impact via vectors related to (1) Include/pymem.h; (2) _csv.c, (3) _struct.c, (4) arraymodule.c, (5) audioop.c, (6) binascii.c, (7) cPickle.c, (8) cStringIO.c, (9) cjkcodecs/multibytecodec.c, (10) datetimemodule.c, (11) md5.c, (12) rgbimgmodule.c, and (13) stropmodule.c in Modules/; (14) bufferobject.c, (15) listobject.c, and (16) obmalloc.c in Objects/; (17) Parser/node.c; and (18) asdl.c, (19) ast.c, (20) bltinmodule.c, and (21) compile.c in Python/, as addressed by "checks for integer overflows, contributed by Google."
bugs.gentoo.org logo
http://bugs.gentoo.org/show_bug.cgi?id=232137
bugs.gentoo.org logo
http://bugs.gentoo.org/show_bug.cgi?id=232137
debian.org logo
http://www.debian.org/security/2008/dsa-1667
+51
CVE-2008-2316
integer overflow
HIGH [7.5]
Last Modified: 11/20/2024
Integer overflow in _hashopenssl.c in the hashlib module in Python 2.5.2 and earlier might allow context-dependent attackers to defeat cryptographic digests, related to "partial hashlib hashing of data exceeding 4GB."
bugs.gentoo.org logo
http://bugs.gentoo.org/attachment.cgi?id=159422&action=view
bugs.gentoo.org logo
http://bugs.gentoo.org/show_bug.cgi?id=230640
bugs.gentoo.org logo
http://bugs.gentoo.org/attachment.cgi?id=159422&action=view
+45
CVE-2008-3142
buffer overflow
HIGH [7.5]
Last Modified: 11/20/2024
Multiple buffer overflows in Python 2.5.2 and earlier on 32bit platforms allow context-dependent attackers to cause a denial of service (crash) or have unspecified other impact via a long string that leads to incorrect memory allocation during Unicode string processing, related to the unicode_resize function and the PyMem_RESIZE macro.
bugs.gentoo.org logo
http://bugs.gentoo.org/show_bug.cgi?id=232137
bugs.gentoo.org logo
http://bugs.gentoo.org/show_bug.cgi?id=232137
bugs.python.org logo
http://bugs.python.org/file10825/issue2620-gps02-patch.txt
+65
CVE-2008-3144
denial of service
MEDIUM [5.0]
Last Modified: 11/20/2024
Multiple integer overflows in the PyOS_vsnprintf function in Python/mysnprintf.c in Python 2.5.2 and earlier allow context-dependent attackers to cause a denial of service (memory corruption) or have unspecified other impact via crafted input to string formatting operations. NOTE: the handling of certain integer values is also affected by related integer underflows and an off-by-one error.
bugs.gentoo.org logo
http://bugs.gentoo.org/show_bug.cgi?id=232137
bugs.gentoo.org logo
http://bugs.gentoo.org/show_bug.cgi?id=232137
bugs.python.org logo
http://bugs.python.org/issue2588
+71
CVE-2008-3294
LOW [3.7]
Last Modified: 11/20/2024
src/configure.in in Vim 5.0 through 7.1, when used for a build with Python support, does not ensure that the Makefile-conf temporary file has the intended ownership and permissions, which allows local users to execute arbitrary code by modifying this file during a time window, or by creating it ahead of time with permissions that prevent its modification by configure.
lists.apple.com logo
http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html
lists.apple.com logo
http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html
seclists.org logo
http://seclists.org/fulldisclosure/2008/Jul/0312.html
+19
CVE-2008-1679
buffer overflow
MEDIUM [6.8]
Last Modified: 11/20/2024
Multiple integer overflows in imageop.c in Python before 2.5.3 allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted images that trigger heap-based buffer overflows. NOTE: this issue is due to an incomplete fix for CVE-2007-4965.
bugs.python.org logo
http://bugs.python.org/issue1179
bugs.python.org logo
http://bugs.python.org/msg64682
bugs.python.org logo
http://bugs.python.org/issue1179
+55
CVE-2008-1887
buffer overflow
CRITICAL [9.3]
Last Modified: 11/20/2024
Python 2.5.2 and earlier allows context-dependent attackers to execute arbitrary code via multiple vectors that cause a negative size value to be provided to the PyString_FromStringAndSize function, which allocates less memory than expected when assert() is disabled and triggers a buffer overflow.
bugs.python.org logo
http://bugs.python.org/issue2587
bugs.python.org logo
http://bugs.python.org/issue2587
debian.org logo
http://www.debian.org/security/2008/dsa-1551
+51
CVE-2008-1721
buffer overflow
HIGH [7.5]
Last Modified: 11/20/2024
Integer signedness error in the zlib extension module in Python 2.5.2 and earlier allows remote attackers to execute arbitrary code via a negative signed integer, which triggers insufficient memory allocation and a buffer overflow.
bugs.python.org logo
http://bugs.python.org/issue2586
bugs.python.org logo
http://bugs.python.org/issue2586
debian.org logo
http://www.debian.org/security/2008/dsa-1551
+63
CVE-2008-0981
open redirect
MEDIUM [6.4]
Last Modified: 11/20/2024
Open redirect vulnerability in spyce/examples/redirect.spy in Spyce - Python Server Pages (PSP) 2.1.3 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the url parameter.
procheckup.com logo
http://www.procheckup.com/Vulnerability_PR08-01.php
procheckup.com logo
http://www.procheckup.com/Vulnerability_PR08-01.php
securityfocus.com logo
http://www.securityfocus.com/archive/1/488336/100/0/threaded
+5
CVE-2008-0982
sensitive information
MEDIUM [5.8]
Last Modified: 11/20/2024
Spyce - Python Server Pages (PSP) 2.1.3 allows remote attackers to obtain sensitive information via a direct request for spyce/examples/automaton.spy, which reveals the path in an error message.
procheckup.com logo
http://www.procheckup.com/Vulnerability_PR08-01.php
procheckup.com logo
http://www.procheckup.com/Vulnerability_PR08-01.php
securityfocus.com logo
http://www.securityfocus.com/archive/1/488336/100/0/threaded
+5
CVE-2008-0980
cross-site scripting
MEDIUM [4.3]
Last Modified: 11/20/2024
Multiple cross-site scripting (XSS) vulnerabilities in Spyce - Python Server Pages (PSP) 2.1.3 allow remote attackers to inject arbitrary web script or HTML via (1) the url or type parameter to docs/examples/redirect.spy; (2) the x parameter to docs/examples/handlervalidate.spy; (3) the name parameter to spyce/examples/request.spy; (4) the Name parameter to spyce/examples/getpost.spy; (5) the mytextarea parameter, the mypass parameter, or an empty parameter to spyce/examples/formtag.spy; (6) the newline parameter to the default URI under demos/chat/; (7) the text1 parameter to docs/examples/formintro.spy; or (8) the mytext or mydate parameter to docs/examples/formtag.spy.
procheckup.com logo
http://www.procheckup.com/Vulnerability_PR08-01.php
procheckup.com logo
http://www.procheckup.com/Vulnerability_PR08-01.php
securityfocus.com logo
http://www.securityfocus.com/archive/1/488336/100/0/threaded
+5
CVE-2007-5741
HIGH [7.5]
Last Modified: 11/20/2024
Plone 2.5 through 2.5.4 and 3.0 through 3.0.2 allows remote attackers to execute arbitrary Python code via network data containing pickled objects for the (1) statusmessages or (2) linkintegrity module, which the module unpickles and executes.
debian.org logo
http://www.debian.org/security/2007/dsa-1405
debian.org logo
http://www.debian.org/security/2007/dsa-1405
exchange.xforce.ibmcloud.com logo
https://exchange.xforce.ibmcloud.com/vulnerabilities/38288
+17
CVE-2007-4965
buffer overflow
MEDIUM [5.8]
Last Modified: 11/20/2024
Multiple integer overflows in the imageop module in Python 2.5.1 and earlier allow context-dependent attackers to cause a denial of service (application crash) and possibly obtain sensitive information (memory contents) via crafted arguments to (1) the tovideo method, and unspecified other vectors related to (2) imageop.c, (3) rbgimgmodule.c, and other files, which trigger heap-based buffer overflows.
bugs.gentoo.org logo
http://bugs.gentoo.org/show_bug.cgi?id=192876
bugs.gentoo.org logo
http://bugs.gentoo.org/show_bug.cgi?id=192876
debian.org logo
http://www.debian.org/security/2008/dsa-1551
+95
CVE-2007-4559
directory traversal
MEDIUM [6.8]
Last Modified: 11/20/2024
Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.
bugzilla.redhat.com logo
https://bugzilla.redhat.com/show_bug.cgi?id=263261
bugzilla.redhat.com logo
https://bugzilla.redhat.com/show_bug.cgi?id=263261
lists.fedoraproject.org logo
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CVBB7NU3YIRRDOKLYVN647WPRR3IAKR6/
+18
CVE-2007-2052
MEDIUM [5.0]
Last Modified: 11/20/2024
Off-by-one error in the PyLocale_strxfrm function in Modules/_localemodule.c for Python 2.4 and 2.5 causes an incorrect buffer size to be used for the strxfrm function, which allows context-dependent attackers to read portions of memory via unknown manipulations that trigger a buffer over-read due to missing null termination.
bugs.debian.org logo
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=416934
bugs.debian.org logo
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=416934
bugzilla.redhat.com logo
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=235093
+73
CVE-2007-1657
buffer overflow
HIGH [7.5]
Last Modified: 11/20/2024
Stack-based buffer overflow in the file_compress function in minigzip (Modules/zlib) in Python 2.5 allows context-dependent attackers to execute arbitrary code via a long file argument.
attrition.org logo
http://attrition.org/pipermail/vim/2007-March/001430.html
attrition.org logo
http://attrition.org/pipermail/vim/2007-March/001430.html
osvdb.org logo
http://osvdb.org/43550
+5
CVE-2007-1359
MEDIUM [6.8]
Last Modified: 11/20/2024
Interpretation conflict in ModSecurity (mod_security) 2.1.0 and earlier allows remote attackers to bypass request rules via application/x-www-form-urlencoded POST data that contains an ASCIIZ (0x00) byte, which mod_security treats as a terminator even though it is still processed as normal data by some HTTP parsers including PHP 5.2.0, and possibly parsers in Perl, and Python.
exchange.xforce.ibmcloud.com logo
https://exchange.xforce.ibmcloud.com/vulnerabilities/32872
exchange.xforce.ibmcloud.com logo
https://exchange.xforce.ibmcloud.com/vulnerabilities/32872
gentoo.org logo
http://www.gentoo.org/security/en/glsa/glsa-200705-17.xml
+29
CVE-2007-1253
CRITICAL [9.3]
Last Modified: 11/20/2024
Eval injection vulnerability in the (a) kmz_ImportWithMesh.py Script for Blender 0.1.9h, as used in (b) Blender before 2.43, allows user-assisted remote attackers to execute arbitrary Python code by importing a crafted (1) KML or (2) KMZ file.
exchange.xforce.ibmcloud.com logo
https://exchange.xforce.ibmcloud.com/vulnerabilities/32778
exchange.xforce.ibmcloud.com logo
https://exchange.xforce.ibmcloud.com/vulnerabilities/32778
osvdb.org logo
http://osvdb.org/33836
+19
CVE-2006-4980
buffer overflow
HIGH [7.5]
Last Modified: 11/20/2024
Buffer overflow in the repr function in Python 2.3 through 2.6 before 20060822 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via crafted wide character UTF-32/UCS-4 strings to certain scripts.
bugs.debian.org logo
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=391589
bugs.debian.org logo
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=391589
bugzilla.redhat.com logo
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=208162
+77
CVE-2006-0052
denial of service
MEDIUM [5.0]
Last Modified: 11/20/2024
The attachment scrubber (Scrubber.py) in Mailman 2.1.5 and earlier, when using Python's library email module 2.5, allows remote attackers to cause a denial of service (mailing list delivery failure) via a multipart MIME message with a single part that has two blank lines between the first boundary and the end boundary.
bugs.debian.org logo
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=358892
bugs.debian.org logo
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=358892
debian.org logo
http://www.debian.org/security/2006/dsa-1027
+29
CVE-2006-1542
buffer overflow
LOW [3.7]
Last Modified: 11/20/2024
Stack-based buffer overflow in Python 2.4.2 and earlier, running on Linux 2.6.12.5 under gcc 4.0.3 with libc 2.3.5, allows local users to cause a "stack overflow," and possibly gain privileges, by running a script from a current working directory that has a long name, related to the realpath function. NOTE: this might not be a vulnerability. However, the fact that it appears in a programming language interpreter could mean that some applications are affected, although attack scenarios might be limited because the attacker might already need to cross privilege boundaries to cause an exploitable program to be placed in a directory with a long name; or, depending on the method that Python uses to determine the current working directory, setuid applications might be affected.
exploit-db.com logo
https://www.exploit-db.com/exploits/1591
exploit-db.com logo
https://www.exploit-db.com/exploits/1591
gotfault.net logo
http://www.gotfault.net/research/exploit/gexp-python.py
+5
CVE-2006-0151
HIGH [7.2]
Last Modified: 11/20/2024
sudo 1.6.8 and other versions does not clear the PYTHONINSPECT environment variable, which allows limited local users to gain privileges via a Python script, a variant of CVE-2005-4158.
debian.org logo
http://www.debian.org/security/2006/dsa-946
debian.org logo
http://www.debian.org/security/2006/dsa-946
mandriva.com logo
http://www.mandriva.com/security/advisories?name=MDKSA-2006:159
+25
CVE-2005-3302
HIGH [7.5]
Last Modified: 11/20/2024
Eval injection vulnerability in bvh_import.py in Blender 2.36 allows attackers to execute arbitrary Python code via a hierarchy element in a .bvh file, which is supplied to an eval function call.
bugs.debian.org logo
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=330895
bugs.debian.org logo
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=330895
debian.org logo
http://www.debian.org/security/2006/dsa-1039
+5
CVE-2005-3291
MEDIUM [4.6]
Last Modified: 11/20/2024
Stani's Python Editor (SPE) 0.7.5 is installed with world-writable permissions, which allows local users to gain privileges by modifying executable files.
gentoo.org logo
http://www.gentoo.org/security/en/glsa/glsa-200510-13.xml
gentoo.org logo
http://www.gentoo.org/security/en/glsa/glsa-200510-13.xml
secunia.com logo
http://secunia.com/advisories/17224
+5
CVE-2005-2966
MEDIUM [5.1]
Last Modified: 11/20/2024
The Python SVG import plugin (diasvg_import.py) for DIA 0.94 and earlier allows user-assisted attackers to execute arbitrary commands via a crafted SVG file.
debian.org logo
http://www.debian.org/security/2005/dsa-847
debian.org logo
http://www.debian.org/security/2006/dsa-1025
debian.org logo
http://www.debian.org/security/2005/dsa-847
+23
CVE-2005-3008
HIGH [7.5]
Last Modified: 11/20/2024
Tofu 0.2 allows remote attackers to execute arbitrary Python code via crafted pickled objects, which Tofu unpickles and executes.
osvdb.org logo
http://www.osvdb.org/19570
osvdb.org logo
http://www.osvdb.org/19570
secunia.com logo
http://secunia.com/advisories/16876
+5
CVE-2005-2875
HIGH [7.5]
Last Modified: 11/20/2024
Py2Play allows remote attackers to execute arbitrary Python code via pickled objects, which Py2Play unpickles and executes.
bugs.debian.org logo
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=326976
bugs.debian.org logo
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=326976
bugs.gentoo.org logo
https://bugs.gentoo.org/show_bug.cgi?id=103524
+13
CVE-2005-2491
buffer overflow
HIGH [7.5]
Last Modified: 11/20/2024
Integer overflow in pcre_compile.c in Perl Compatible Regular Expressions (PCRE) before 6.2, as used in multiple products such as Python, Ethereal, and PHP, allows attackers to execute arbitrary code via quantifier values in regular expressions, which leads to a heap-based buffer overflow.
debian.org logo
http://www.debian.org/security/2005/dsa-800
debian.org logo
http://www.debian.org/security/2005/dsa-817
debian.org logo
http://www.debian.org/security/2005/dsa-819
+137
CVE-2005-2483
HIGH [7.5]
Last Modified: 11/20/2024
Eval injection vulnerability in Karrigell before 2.1.8 allows remote attackers to execute arbitrary Python code via modified arguments to a Karrigell services (.ks) script, which can reference functions from libraries that are used by that script.
exchange.xforce.ibmcloud.com logo
https://exchange.xforce.ibmcloud.com/vulnerabilities/21668
exchange.xforce.ibmcloud.com logo
https://exchange.xforce.ibmcloud.com/vulnerabilities/21668
osvdb.org logo
http://www.osvdb.org/18506
+9
CVE-2005-1632
HIGH [7.2]
Last Modified: 11/20/2024
Cheetah 0.9.15 and 0.9.16 searches the /tmp directory for modules before using the paths in the PYTHONPATH variable, which allows local users to execute arbitrary code via a malicious module in /tmp/.
osvdb.org logo
http://www.osvdb.org/16622
osvdb.org logo
http://www.osvdb.org/16622
secunia.com logo
http://secunia.com/advisories/15386
+3
CVE-2005-0089
HIGH [7.5]
Last Modified: 11/20/2024
The SimpleXMLRPCServer library module in Python 2.2, 2.3 before 2.3.5, and 2.4, when used by XML-RPC servers that use the register_instance method to register an object without a _dispatch method, allows remote attackers to read or modify globals of the associated module, and possibly execute arbitrary code, via dotted attributes.
debian.org logo
http://www.debian.org/security/2005/dsa-666
debian.org logo
http://www.debian.org/security/2005/dsa-666
exchange.xforce.ibmcloud.com logo
https://exchange.xforce.ibmcloud.com/vulnerabilities/19217
+21
CVE-2005-0852
denial of service
LOW [2.1]
Last Modified: 11/20/2024
Microsoft Windows XP SP1 allows local users to cause a denial of service (system crash) via an empty datagram to a raw IP over IP socket (IP protocol 4), as originally demonstrated using code in Python 2.3.
securityfocus.com logo
http://www.securityfocus.com/archive/1/393956
securityfocus.com logo
http://www.securityfocus.com/bid/12870
securityfocus.com logo
http://www.securityfocus.com/archive/1/393956
+1
CVE-2004-0150
buffer overflow
HIGH [7.5]
Last Modified: 11/20/2024
Buffer overflow in the getaddrinfo function in Python 2.2 before 2.2.2, when IPv6 support is disabled, allows remote attackers to execute arbitrary code via an IPv6 address that is obtained using DNS.
debian.org logo
http://www.debian.org/security/2004/dsa-458
debian.org logo
http://www.debian.org/security/2004/dsa-458
exchange.xforce.ibmcloud.com logo
https://exchange.xforce.ibmcloud.com/vulnerabilities/15409
+9
CVE-2002-1119
symlink attack
MEDIUM [4.6]
Last Modified: 11/20/2024
os._execvpe from os.py in Python 2.2.1 and earlier creates temporary files with predictable names, which could allow local users to execute arbitrary code via a symlink attack.
debian.org logo
http://www.debian.org/security/2002/dsa-159
debian.org logo
http://www.debian.org/security/2002/dsa-159
distro.conectiva.com.br logo
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000527
+17
CVE-2002-0131
MEDIUM [5.0]
Last Modified: 11/20/2024
ActivePython ActiveX control for Python in the AXScript package, when used in Internet Explorer, does not prevent a script from reading files from the client's filesystem, which allows remote attackers to read arbitrary files via a malicious web page containing Python script.
iss.net logo
http://www.iss.net/security_center/static/7910.php
iss.net logo
http://www.iss.net/security_center/static/7910.php
marc.info logo
http://marc.info/?t=101113015900001&r=1&w=2
+5