7.8

CVE-2020-15523

In Python 3.6 through 3.6.10, 3.7 through 3.7.8, 3.8 through 3.8.4rc1, and 3.9 through 3.9.0b4 on Windows, a Trojan horse python3.dll might be used in cases where CPython is embedded in a native application. This occurs because python3X.dll may use an invalid search path for python3.dll loading (after Py_SetPath has been used). NOTE: this issue CANNOT occur when using python.exe from a standard (non-embedded) Python installation on Windows.

Data is provided by the National Vulnerability Database (NVD)
PythonPython Version >= 3.5.0 < 3.5.10
   MicrosoftWindows Version-
PythonPython Version >= 3.6.0 < 3.6.12
   MicrosoftWindows Version-
PythonPython Version >= 3.7.0 < 3.7.9
   MicrosoftWindows Version-
PythonPython Version >= 3.8.0 < 3.8.4
   MicrosoftWindows Version-
PythonPython Version3.8.4 Updaterc1
   MicrosoftWindows Version-
PythonPython Version3.9.0 Updatealpha1
   MicrosoftWindows Version-
PythonPython Version3.9.0 Updatealpha2
   MicrosoftWindows Version-
PythonPython Version3.9.0 Updatealpha3
   MicrosoftWindows Version-
PythonPython Version3.9.0 Updatealpha4
   MicrosoftWindows Version-
PythonPython Version3.9.0 Updatealpha5
   MicrosoftWindows Version-
PythonPython Version3.9.0 Updatealpha6
   MicrosoftWindows Version-
PythonPython Version3.9.0 Updatebeta1
   MicrosoftWindows Version-
PythonPython Version3.9.0 Updatebeta2
   MicrosoftWindows Version-
PythonPython Version3.9.0 Updatebeta3
   MicrosoftWindows Version-
PythonPython Version3.9.0 Updatebeta4
   MicrosoftWindows Version-
NetappSnapcenter Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.7% 0.711
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7.8 1.8 5.9
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
nvd@nist.gov 6.9 3.4 10
AV:L/AC:M/Au:N/C:C/I:C/A:C
CWE-427 Uncontrolled Search Path Element

The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors.

CWE-908 Use of Uninitialized Resource

The product uses or accesses a resource that has not been initialized.