cpython vulnerabilities

  • licenses detected

    • [2.7.18]; [3.10.0]; [3.7.12]; [3.8.12]; [3.9.7]
    • [3.10.14]; [3.11.9]; [3.12.2]; [3.12.7]; [3.8.19]; [3.9.19]
  • Direct Vulnerabilities

    Known vulnerabilities in the cpython package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • H
    Directory Traversal

    [0,)
    • H
    Directory Traversal

    [0,)
    • M
    Use of Incorrectly-Resolved Name or Reference

    [0,)
    • C
    Directory Traversal

    [0,)
    • M
    Use After Free

    [0,)
    • L
    Untrusted Search Path

    [0,)
    • L
    Improper Handling of Inconsistent Special Elements

    [,3.11.9)[3.12.2,3.12.7)
    • M
    Server-side Request Forgery (SSRF)

    [0,)
    • H
    Untrusted Search Path

    [,3.8.19)[3.9.7,3.9.19)[3.10.0,3.10.14)
    • M
    Improper Validation of Specified Type of Input

    [,3.11.9)
    • M
    Unquoted Search Path or Element

    [0,)
    • M
    Asymmetric Resource Consumption (Zip Bomb)

    [3.8.12,3.8.19)[3.9.7,3.9.19)[3.10.0,3.10.14)[3.12.2,3.12.7)
    • M
    Improper Link Resolution Before File Access ('Link Following')

    [3.8.12,3.8.19)[3.9.7,3.9.19)[3.10.0,3.10.14)[3.12.2,3.12.7)
    • M
    Buffer Over-read

    [,3.10.0)
    • H
    Improper Authentication

    [3.7.12,3.12.2)
    • H
    Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

    [3.8.12,3.12.7)
    • H
    Uncontrolled Resource Consumption ('Resource Exhaustion')

    [3.8.12,3.12.7)
    • M
    Loop with Unreachable Exit Condition ('Infinite Loop')

    [3.10.0,3.12.7)
    • M
    Regular Expression Denial of Service (ReDoS)

    [,3.11.9)
    • M
    Race Condition

    [,3.10.14)[3.12.2,3.12.7)
    • M
    Expected Behavior Violation

    [,3.12.7)
    • M
    Improper Access Control

    [,3.12.7)
    • H
    Denial of Service (DoS)

    [,3.10.0)
    • H
    Timing Attack

    [,3.10.0)
    • C
    XML External Entity (XXE) Injection

    [,3.7.12)
    • H
    Use After Free

    [,3.9.7)
    • H
    Access Restriction Bypass

    [3.8.12,3.8.19)[3.9.7,3.9.19)[3.10.0,3.10.14)
    • M
    Improper Validation of Syntactic Correctness of Input

    [3.8.12,3.12.2)
    • H
    Improper Input Validation

    [,3.11.9)
    • H
    Denial of Service (DoS)

    [,3.8.19)[3.9.7,3.9.19)[3.10.0,3.10.14)
    • C
    Privilege Escalation

    [0,)
    • M
    Arbitrary File Write via Archive Extraction (Zip Slip)

    [,3.8.19)[3.9.7,3.9.19)[3.10.0,3.10.14)
    • H
    Denial of Service (DoS)

    [3.7.12,3.8.19)[3.9.7,3.9.19)[3.10.0,3.10.14)
    • H
    Directory Traversal

    [,3.10.14)
    • M
    Open Redirect

    [,3.8.19)[3.9.7,3.9.19)[3.10.0,3.10.14)
    • M
    Denial of Service (DoS)

    [,3.11.9)
    • H
    Information Exposure

    [0,)
    • L
    Access Restriction Bypass

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Race Condition

    [0,)
    • M
    Improper Input Validation

    [0,)
    • M
    Race Condition

    [0,)
    • M
    Resource Management Errors

    [0,)
    • M
    Out-of-Bounds

    [0,)
    • M
    Denial of Service (DoS)

    [0,)
    • H
    Buffer Overflow

    [0,)
    • M
    Out-of-bounds Write

    [0,)
    • C
    Denial of Service (DoS)

    [0,)
    • M
    HTTP Request Smuggling

    [,3.7.12)
    • C
    Insufficiently Protected Credentials

    [,3.8.12)
    • M
    Denial of Service (DoS)

    [0,)
    • C
    Integer Overflow or Wraparound

    [,3.7.12)
    • M
    Denial of Service (DoS)

    [0,)
    • M
    Divide By Zero

    [,3.7.12)
    • H
    Arbitrary Code Execution

    [0,)
    • H
    Symlink Attack

    [0,)
    • H
    CVE-2015-5652

    [,3.7.12)
    • M
    Information Exposure

    [0,)
    • H
    Integer Overflow or Wraparound

    [0,)
    • M
    Cryptographic Issues

    [0,)
    • C
    Improper Input Validation

    [3.8.12,3.9.7)
    • H
    Denial of Service (DoS)

    [0,)
    • M
    Improper Input Validation

    [,3.7.12)
    • H
    Denial of Service (DoS)

    [0,)