python39-cffi vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the python39-cffi package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
CVE-2025-8291

<0:1.14.3-2.module+el8.9.0+90016+9c2d6573
  • H
CVE-2025-6075

<0:1.14.3-2.module+el8.9.0+90016+9c2d6573
  • H
CVE-2025-4435

<0:1.14.3-2.module+el8.9.0+90016+9c2d6573
  • H
CVE-2025-0938

<0:1.14.3-2.module+el8.9.0+90016+9c2d6573
  • H
CVE-2025-4516

<0:1.14.3-2.module+el8.9.0+90016+9c2d6573
  • H
Arbitrary Command Injection

<0:1.14.3-2.module+el8.9.0+90016+9c2d6573
  • H
CVE-2024-5642

<0:1.14.3-2.module+el8.9.0+90016+9c2d6573
  • H
CVE-2024-11168

<0:1.14.3-2.module+el8.9.0+90016+9c2d6573
  • H
CVE-2025-6069

<0:1.14.3-2.module+el8.9.0+90016+9c2d6573
  • H
CVE-2025-4517

<0:1.14.3-2.module+el8.9.0+90016+9c2d6573
  • H
CVE-2025-4330

<0:1.14.3-2.module+el8.9.0+90016+9c2d6573
  • H
CVE-2025-4138

<0:1.14.3-2.module+el8.9.0+90016+9c2d6573
  • M
Directory Traversal

<0:1.14.3-2.module+el8.9.0+90016+9c2d6573
  • M
CVE-2025-8194

<0:1.14.3-2.module+el8.9.0+90016+9c2d6573
  • M
Insufficient Verification of Data Authenticity

<0:1.14.3-2.module+el8.9.0+90016+9c2d6573
  • M
Inefficient Regular Expression Complexity

<0:1.14.3-2.module+el8.9.0+90016+9c2d6573
  • M
CVE-2024-4032

<0:1.14.3-2.module+el8.9.0+90016+9c2d6573
  • M
Arbitrary Code Injection

<0:1.14.3-2.module+el8.9.0+90016+9c2d6573
  • M
CVE-2024-8088

<0:1.14.3-2.module+el8.9.0+90016+9c2d6573
  • M
CVE-2024-6923

<0:1.14.3-2.module+el8.9.0+90016+9c2d6573
  • H
CVE-2023-6597

<0:1.14.3-2.module+el8.9.0+90016+9c2d6573
  • H
CVE-2024-0450

<0:1.14.3-2.module+el8.9.0+90016+9c2d6573
  • H
Inefficient Regular Expression Complexity

<0:1.14.3-2.module+el8.9.0+90016+9c2d6573
  • M
Improper Check for Unusual or Exceptional Conditions

<0:1.14.3-2.module+el8.9.0+90016+9c2d6573
  • M
CVE-2023-43804

<0:1.14.3-2.module+el8.9.0+90016+9c2d6573
  • M
Inefficient Regular Expression Complexity

<0:1.14.3-2.module+el8.9.0+90016+9c2d6573
  • M
Improper Input Validation

<0:1.14.3-2.module+el8.9.0+90016+9c2d6573
  • M
CVE-2023-32681

<0:1.14.3-2.module+el8.9.0+90016+9c2d6573
  • M
Directory Traversal

<0:1.14.3-2.module+el8.9.0+90016+9c2d6573
  • H
CVE-2023-40217

<0:1.14.3-2.module+el8.4.0+20109+b7b1db01
  • H
Improper Input Validation

<0:1.14.3-2.module+el8.4.0+20109+b7b1db01
  • M
Algorithmic Complexity

<0:1.14.3-2.module+el8.4.0+20109+b7b1db01
  • M
Open Redirect

<0:1.14.3-2.module+el8.4.0+20109+b7b1db01
  • H
CVE-2022-42919

<0:1.14.3-2.module+el8.4.0+20109+b7b1db01
  • M
Incorrect Type Conversion or Cast

<0:1.14.3-2.module+el8.4.0+20109+b7b1db01
  • M
Arbitrary Command Injection

<0:1.14.3-2.module+el8.4.0+20109+b7b1db01
  • M
Arbitrary Code Injection

<0:1.14.3-2.module+el8.4.0+20109+b7b1db01
  • M
Directory Traversal

<0:1.14.3-2.module+el8.4.0+20109+b7b1db01
  • M
CVE-2021-29921

<0:1.14.3-2.module+el8.4.0+20109+b7b1db01
  • M
CVE-2021-3572

<0:1.14.3-2.module+el8.4.0+20109+b7b1db01
  • M
Resource Exhaustion

<0:1.14.3-2.module+el8.4.0+20109+b7b1db01
  • M
Resource Exhaustion

<0:1.14.3-2.module+el8.4.0+20109+b7b1db01
  • M
Cross-site Scripting (XSS)

<0:1.14.3-2.module+el8.4.0+20109+b7b1db01
  • M
Resource Exhaustion

<0:1.14.3-2.module+el8.4.0+20109+b7b1db01