Python

Cpython

35 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.03%
  • Veröffentlicht 15.05.2025 13:29:20
  • Zuletzt bearbeitet 03.06.2025 14:15:49

There is an issue in CPython when using `bytes.decode("unicode_escape", error="ignore|replace")`. If you are not using the "unicode_escape" encoding or an error handler your usage is not affected. To work-around this issue you may stop using the erro...

  • EPSS 0.59%
  • Veröffentlicht 28.02.2025 19:15:36
  • Zuletzt bearbeitet 03.11.2025 21:18:53

During an address list folding when a separating comma ends up on a folded line and that line is to be unicode-encoded then the separator itself is also unicode-encoded. Expected behavior is that the separating comma remains a plan comma. This can re...

  • EPSS 0.26%
  • Veröffentlicht 14.02.2025 17:15:15
  • Zuletzt bearbeitet 14.03.2025 10:15:14

There is a defect in the CPython standard library module “mimetypes” where on Windows the default list of known file locations are writable meaning other users can create invalid files to cause MemoryError to be raised on Python runtime startup or ha...

Medienbericht
  • EPSS 1.24%
  • Veröffentlicht 31.01.2025 18:15:38
  • Zuletzt bearbeitet 03.11.2025 21:18:49

The Python standard library functions `urllib.parse.urlsplit` and `urlparse` accepted domain names that included square brackets which isn't valid according to RFC 3986. Square brackets are only meant to be used as delimiters for specifying IPv6 and ...

  • EPSS 0.25%
  • Veröffentlicht 06.12.2024 16:15:20
  • Zuletzt bearbeitet 03.02.2025 18:15:33

Starting in Python 3.12.0, the asyncio._SelectorSocketTransport.writelines() method would not "pause" writing and signal to the Protocol to drain the buffer to the wire once the write buffer reached the "high-water mark". Because of this, Protocol...

  • EPSS 0.6%
  • Veröffentlicht 12.11.2024 22:15:14
  • Zuletzt bearbeitet 03.11.2025 22:16:37

The urllib.parse.urlsplit() and urlparse() functions improperly validated bracketed hosts (`[]`), allowing hosts that weren't IPv6 or IPvFuture. This behavior was not conformant to RFC 3986 and potentially enabled SSRF if a URL is processed by more t...

  • EPSS 0.34%
  • Veröffentlicht 22.08.2024 19:15:09
  • Zuletzt bearbeitet 03.11.2025 23:17:32

There is a HIGH severity vulnerability affecting the CPython "zipfile" module affecting "zipfile.Path". Note that the more common API "zipfile.ZipFile" class is unaffected. When iterating over names of entries in a zip archive (for example, meth...

  • EPSS 0.25%
  • Veröffentlicht 01.08.2024 14:15:03
  • Zuletzt bearbeitet 03.11.2025 23:17:31

There is a MEDIUM severity vulnerability affecting CPython. The email module didn’t properly quote newlines for email headers when serializing an email message allowing for header injection when an email is serialized.

  • EPSS 0.06%
  • Veröffentlicht 29.07.2024 22:15:04
  • Zuletzt bearbeitet 02.05.2025 23:15:15

The “socket” module provides a pure-Python fallback to the socket.socketpair() function for platforms that don’t support AF_UNIX, such as Windows. This pure-Python implementation uses AF_INET or AF_INET6 to create a local connected pair of socket...

  • EPSS 0.19%
  • Veröffentlicht 27.06.2024 21:15:16
  • Zuletzt bearbeitet 07.10.2025 17:15:32

CPython 3.9 and earlier doesn't disallow configuring an empty list ("[]") for SSLContext.set_npn_protocols() which is an invalid value for the underlying OpenSSL API. This results in a buffer over-read when NPN is used (see CVE-2024-5535 for OpenSSL)...