python-libs

Direct Vulnerabilities

Known vulnerabilities in the python-libs package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
Directory Traversal

<0:2.7.18-1.amzn2.0.18
  • H
Arbitrary Argument Injection

<0:2.7.18-1.amzn2.0.18
  • H
Improper Handling of Structural Elements

<0:2.7.18-1.amzn2.0.18
  • M
Buffer Access with Incorrect Length Value

<0:2.7.18-1.amzn2.0.17
  • M
Incomplete Filtering of Special Elements

<0:2.7.18-1.amzn2.0.17
  • M
Allocation of Resources Without Limits or Throttling

<0:2.7.18-1.amzn2.0.16
  • M
Arbitrary Code Injection

<0:2.7.18-1.amzn2.0.16
  • M
CRLF Injection

<0:2.7.18-1.amzn2.0.16
  • M
CRLF Injection

<0:2.7.18-1.amzn2.0.16
  • M
Improper Neutralization

<0:2.7.18-1.amzn2.0.16
  • M
Allocation of Resources Without Limits or Throttling

<0:2.7.18-1.amzn2.0.15
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.7.18-1.amzn2.0.14
  • M
Inefficient Regular Expression Complexity

<0:2.7.18-1.amzn2.0.13
  • M
Authentication Bypass by Primary Weakness

<0:2.7.18-1.amzn2.0.12
  • M
Directory Traversal

<0:2.7.18-1.amzn2.0.12
  • M
Resource Exhaustion

<0:2.7.18-1.amzn2.0.11
  • M
CVE-2024-6923

<0:2.7.18-1.amzn2.0.11
  • M
Improper Input Validation

<0:2.7.18-1.amzn2.0.11
  • M
Improper Validation of Specified Type of Input

<0:2.7.18-1.amzn2.0.11
  • M
Multiple Interpretations of UI Input

<0:2.7.18-1.amzn2.0.11
  • M
Improper Input Validation

<0:2.7.18-1.amzn2.0.10
  • M
Improper Input Validation

<0:2.7.18-1.amzn2.0.9
  • M
Race Condition

<0:2.7.18-1.amzn2.0.8
  • H
XML External Entity (XXE) Injection

<0:2.7.18-1.amzn2.0.7
  • M
Use After Free

<0:2.7.18-1.amzn2.0.1
  • H
Improper Input Validation

<0:2.7.18-1.amzn2.0.6
  • H
Resource Exhaustion

<0:2.7.18-1.amzn2.0.6
  • M
Arbitrary Code Injection

<0:2.7.18-1.amzn2.0.5
  • M
Resource Exhaustion

<0:2.7.18-1.amzn2.0.5
  • M
HTTP Request Smuggling

<0:2.7.18-1.amzn2.0.5
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:2.7.18-1.amzn2.0.5
  • M
Unchecked Return Value

<0:2.7.18-1.amzn2.0.5
  • M
Eval Injection

<0:2.7.18-1.amzn2.0.5
  • M
Improper Encoding or Escaping of Output

<0:2.7.18-1.amzn2.0.4
  • M
Buffer Overflow

<0:2.7.18-1.amzn2.0.3
  • M
Improper Input Validation

<0:2.7.18-1.amzn2.0.2
  • M
Resource Exhaustion

<0:2.7.18-1.amzn2.0.1
  • M
Resource Exhaustion

<0:2.7.18-1.amzn2
  • M
Improper Input Validation

<0:2.7.18-1.amzn2
  • M
CVE-2019-16056

<0:2.7.16-4.amzn2
  • M
Directory Traversal

<0:2.7.16-3.amzn2.0.1
  • H
Credentials Management

<0:2.7.16-2.amzn2.0.1
  • H
CVE-2019-9636

<0:2.7.16-1.amzn2.0.1
  • H
CVE-2018-1060

<0:2.7.16-1.amzn2.0.1
  • H
CVE-2018-1061

<0:2.7.16-1.amzn2.0.1
  • H
Integer Overflow or Wraparound

<0:2.7.16-1.amzn2.0.1
  • H
NULL Pointer Dereference

<0:2.7.16-1.amzn2.0.1