python39 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the python39 package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
CVE-2025-4516

<0:3.9.25-2.module+el8.10.0+90733+27f37730
  • H
CVE-2025-4435

<0:3.9.25-2.module+el8.10.0+90733+27f37730
  • H
CVE-2025-0938

<0:3.9.25-2.module+el8.10.0+90733+27f37730
  • H
Arbitrary Command Injection

<0:3.9.25-2.module+el8.10.0+90733+27f37730
  • H
CVE-2025-4330

<0:3.9.25-2.module+el8.10.0+90733+27f37730
  • H
CVE-2025-4138

<0:3.9.25-2.module+el8.10.0+90733+27f37730
  • H
CVE-2025-6069

<0:3.9.25-2.module+el8.10.0+90733+27f37730
  • H
CVE-2025-4517

<0:3.9.25-2.module+el8.10.0+90733+27f37730
  • H
CVE-2024-5642

<0:3.9.25-2.module+el8.10.0+90733+27f37730
  • H
CVE-2024-11168

<0:3.9.25-2.module+el8.10.0+90733+27f37730
  • H
CVE-2025-8291

<0:3.9.25-2.module+el8.10.0+90733+27f37730
  • H
CVE-2025-6075

<0:3.9.25-2.module+el8.10.0+90733+27f37730
  • M
Directory Traversal

<0:3.9.20-2.module+el8.10.0+90647+49247197
  • M
CVE-2025-8194

<0:3.9.20-2.module+el8.10.0+90647+49247197
  • M
Insufficient Verification of Data Authenticity

<0:3.9.20-1.module+el8.10.0+90419+54594e05
  • M
Inefficient Regular Expression Complexity

<0:3.9.20-1.module+el8.10.0+90419+54594e05
  • M
CVE-2024-6923

<0:3.9.19-7.module+el8.10.0+90395+b6c4aad1
  • M
Arbitrary Code Injection

<0:3.9.19-7.module+el8.10.0+90395+b6c4aad1
  • M
CVE-2024-8088

<0:3.9.19-7.module+el8.10.0+90395+b6c4aad1
  • M
CVE-2024-4032

<0:3.9.19-7.module+el8.10.0+90395+b6c4aad1
  • H
CVE-2024-0450

<0:3.9.19-1.module+el8.10.0+90341+71ca88f4
  • H
CVE-2023-6597

<0:3.9.19-1.module+el8.10.0+90341+71ca88f4
  • H
Inefficient Regular Expression Complexity

<0:3.9.19-1.module+el8.10.0+90341+71ca88f4
  • M
Improper Input Validation

<0:3.9.18-3.module+el8.10.0+90269+2fa22b99
  • M
CVE-2023-43804

<0:3.9.18-3.module+el8.10.0+90269+2fa22b99
  • M
Improper Check for Unusual or Exceptional Conditions

<0:3.9.18-3.module+el8.10.0+90269+2fa22b99
  • M
Inefficient Regular Expression Complexity

<0:3.9.18-3.module+el8.10.0+90269+2fa22b99
  • M
Directory Traversal

<0:3.9.18-1.module+el8.9.0+90071+8dc52a4f
  • M
CVE-2023-32681

<0:3.9.18-1.module+el8.9.0+90071+8dc52a4f
  • H
CVE-2023-40217

<0:3.9.16-1.module+el8.8.0+90007+d415a2d2.2
  • H
Improper Input Validation

<0:3.9.16-1.module+el8.8.0+21116+ee8c18cf.1
  • M
Algorithmic Complexity

<0:3.9.16-1.module+el8.8.0+21002+9d0e08bf
  • M
Open Redirect

<0:3.9.16-1.module+el8.8.0+21002+9d0e08bf
  • H
CVE-2022-42919

<0:3.9.13-2.module+el8.7.0+20879+a85b87b0
  • M
Incorrect Type Conversion or Cast

<0:3.9.16-1.module+el8.8.0+21002+9d0e08bf
  • M
Arbitrary Command Injection

<0:3.9.13-1.module+el8.7.0+20798+772c6867
  • M
Arbitrary Code Injection

<0:3.9.7-1.module+el8.6.0+20625+ee813db2
  • M
Directory Traversal

<0:3.9.6-2.module+el8.5.0+20364+c7fe1181
  • M
CVE-2021-29921

<0:3.9.6-2.module+el8.5.0+20364+c7fe1181
  • M
CVE-2021-3572

<0:3.9.6-2.module+el8.5.0+20364+c7fe1181
  • M
Resource Exhaustion

<0:3.9.6-2.module+el8.5.0+20364+c7fe1181
  • M
Resource Exhaustion

<0:3.9.6-2.module+el8.5.0+20364+c7fe1181
  • M
Cross-site Scripting (XSS)

<0:3.9.6-2.module+el8.5.0+20364+c7fe1181
  • M
Resource Exhaustion

<0:3.9.6-2.module+el8.5.0+20364+c7fe1181