CVE-2026-4519
- EPSS 0.01%
- Veröffentlicht 20.03.2026 15:08:32
- Zuletzt bearbeitet 16.04.2026 14:53:22
The webbrowser.open() API would accept leading dashes in the URL which could be handled as command line options for certain web browsers. New behavior rejects leading dashes. Users are recommended to sanitize URLs prior to passing to webbrowser.op...
- EPSS 0.02%
- Veröffentlicht 18.03.2026 18:13:42
- Zuletzt bearbeitet 07.04.2026 18:16:46
DISPUTED: The project has clarified that the documentation was incorrect, and that pkgutil.get_data() has the same security model as open(). The documentation has been updated to clarify this point. There is no vulnerability in the function if follow...
- EPSS 0.04%
- Veröffentlicht 16.03.2026 18:16:10
- Zuletzt bearbeitet 08.04.2026 13:16:41
When an Expat parser with a registered ElementDeclHandler parses an inline document type definition containing a deeply nested content model a C stack overflow occurs.
- EPSS 0.04%
- Veröffentlicht 16.03.2026 17:37:31
- Zuletzt bearbeitet 17.03.2026 14:20:01
The fix for CVE-2026-0672, which rejected control characters in http.cookies.Morsel, was incomplete. The Morsel.update(), |= operator, and unpickling paths were not patched, allowing control characters to bypass input validation. Additionally, BaseCo...
- EPSS 0.01%
- Veröffentlicht 12.03.2026 18:16:21
- Zuletzt bearbeitet 01.05.2026 16:16:28
The "tarfile" module would still apply normalization of AREGTYPE (\x00) blocks to DIRTYPE, even while processing a multi-block member such as GNUTYPE_LONGNAME or GNUTYPE_LONGLINK. This could result in a crafted tar archive being misinterpreted by the...
CVE-2026-2297
- EPSS 0.02%
- Veröffentlicht 04.03.2026 22:10:43
- Zuletzt bearbeitet 01.05.2026 16:16:30
The import hook in CPython that handles legacy *.pyc files (SourcelessFileLoader) is incorrectly handled in FileLoader (a base class) and so does not use io.open_code() to read the .pyc files. sys.audit handlers for this audit event therefore do not ...
- EPSS 0.04%
- Veröffentlicht 23.01.2026 16:27:13
- Zuletzt bearbeitet 15.04.2026 00:35:42
The email module, specifically the "BytesGenerator" class, didn’t properly quote newlines for email headers when serializing an email message allowing for header injection when an email is serialized. This is only applicable if using "LiteralHeade...
CVE-2025-12781
- EPSS 0.04%
- Veröffentlicht 21.01.2026 19:34:47
- Zuletzt bearbeitet 02.02.2026 17:25:23
When passing data to the b64decode(), standard_b64decode(), and urlsafe_b64decode() functions in the "base64" module the characters "+/" will always be accepted, regardless of the value of "altchars" parameter, typically used to establish an "alterna...
- EPSS 0.16%
- Veröffentlicht 20.01.2026 21:52:33
- Zuletzt bearbeitet 15.04.2026 00:35:42
When using http.cookies.Morsel, user-controlled cookie values and parameters can allow injecting HTTP headers into messages. Patch rejects all control characters within cookie names, values, and parameters.
CVE-2025-15367
- EPSS 0.08%
- Veröffentlicht 20.01.2026 21:47:09
- Zuletzt bearbeitet 15.04.2026 00:35:42
The poplib module, when passed a user-controlled command, can have additional commands injected using newlines. Mitigation rejects commands containing control characters.