CVE-2026-3087
- EPSS 0.05%
- Veröffentlicht 27.04.2026 21:16:42
- Zuletzt bearbeitet 13.05.2026 16:27:11
If `shutil.unpack_archive()` is given a ZIP archive with an absolute Windows path containing a drive (`C:\\...`) then the archive will be extracted outside the target directory which is different than other operating systems. Only Windows is affected...
CVE-2026-41140
- EPSS 0.08%
- Veröffentlicht 24.04.2026 17:10:33
- Zuletzt bearbeitet 27.04.2026 18:53:00
Poetry is a dependency manager for Python. Prior to 2.3.4, the extractall() function in src/poetry/utils/helpers.py:410-426 extracts sdist tarballs without path traversal protection on Python versions where tarfile.data_filter is unavailable. Conside...
CVE-2026-4519
- EPSS 0.01%
- Veröffentlicht 20.03.2026 15:08:32
- Zuletzt bearbeitet 16.04.2026 14:53:22
The webbrowser.open() API would accept leading dashes in the URL which could be handled as command line options for certain web browsers. New behavior rejects leading dashes. Users are recommended to sanitize URLs prior to passing to webbrowser.op...
CVE-2025-12781
- EPSS 0.04%
- Veröffentlicht 21.01.2026 19:34:47
- Zuletzt bearbeitet 02.02.2026 17:25:23
When passing data to the b64decode(), standard_b64decode(), and urlsafe_b64decode() functions in the "base64" module the characters "+/" will always be accepted, regardless of the value of "altchars" parameter, typically used to establish an "alterna...
CVE-2025-12084
- EPSS 0.13%
- Veröffentlicht 03.12.2025 18:55:32
- Zuletzt bearbeitet 26.01.2026 15:16:05
When building nested elements using xml.dom.minidom methods such as appendChild() that have a dependency on _clear_id_cache() the algorithm is quadratic. Availability can be impacted when building excessively nested documents.
CVE-2025-13836
- EPSS 0.22%
- Veröffentlicht 01.12.2025 18:16:04
- Zuletzt bearbeitet 10.02.2026 19:58:12
When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amounts of data into memory, potentially causing OOM or ...
CVE-2025-13837
- EPSS 0.03%
- Veröffentlicht 01.12.2025 18:16:04
- Zuletzt bearbeitet 03.03.2026 15:16:14
When loading a plist file, the plistlib module reads data in size specified by the file itself, meaning a malicious file can cause OOM and DoS issues
CVE-2025-6075
- EPSS 0.03%
- Veröffentlicht 31.10.2025 16:41:34
- Zuletzt bearbeitet 04.02.2026 19:05:15
If the value passed to os.path.expandvars() is user-controlled a performance degradation is possible when expanding environment variables.
CVE-2025-12060
- EPSS 0.1%
- Veröffentlicht 30.10.2025 17:15:37
- Zuletzt bearbeitet 15.04.2026 00:35:42
The keras.utils.get_file API in Keras, when used with the extract=True option for tar archives, is vulnerable to a path traversal attack. The utility uses Python's tarfile.extractall function without the filter="data" feature. A remote attacker can c...
CVE-2025-8869
- EPSS 0.02%
- Veröffentlicht 24.09.2025 15:15:41
- Zuletzt bearbeitet 15.04.2026 00:35:42
When extracting a tar archive pip may not check symbolic links point into the extraction directory if the tarfile module doesn't implement PEP 706. Note that upgrading pip to a "fixed" version for this vulnerability doesn't fix all known vulnerabilit...