python3.11 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the python3.11 package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Unquoted Search Path or Element

<0:3.11.7-1.el9_4.7
  • M
Unquoted Search Path or Element

<0:3.11.9-7.el9_5.2
  • M
Inefficient Regular Expression Complexity

<0:3.11.7-1.el9_4.6
  • M
CVE-2024-6923

<0:3.11.2-2.el9_2.6
  • M
Inefficient Regular Expression Complexity

<0:3.11.2-2.el9_2.6
  • M
CVE-2024-6923

<0:3.11.2-2.el9_2.6
  • M
Inefficient Regular Expression Complexity

<0:3.11.2-2.el9_2.6
  • M
CVE-2024-6923

<0:3.11.2-2.el9_2.6
  • M
Inefficient Regular Expression Complexity

<0:3.11.2-2.el9_2.6
  • L
Resource Exhaustion

*
  • M
Inefficient Regular Expression Complexity

<0:3.11.9-7.el9_5.1
  • M
CVE-2024-6923

<0:3.11.7-1.el9_4.5
  • M
Improper Input Validation

<0:3.11.7-1.el9
  • H
Symlink Following

<0:3.11.7-1.el9_4.1
  • M
Improper Neutralization of Null Byte or NUL Character

<0:3.11.5-1.el9_3
  • M
Directory Traversal

<0:3.11.5-1.el9_3
  • H
Authentication Bypass by Primary Weakness

<0:3.11.2-2.el9_2.2
  • H
Improper Input Validation

<0:3.11.2-2.el9_2.1
  • L
Expected Behavior Violation

<0:3.11.7-1.el9_4.3
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:3.11.9-7.el9
  • M
CVE-2024-6923

<0:3.11.7-1.el9_4.5
  • L
Race Condition

*
  • H
Symlink Following

<0:3.11.2-2.el9_2.4
  • H
Symlink Following

<0:3.11.2-2.el9_2.4
  • H
Symlink Following

<0:3.11.2-2.el9_2.4
  • L
Expected Behavior Violation

<0:3.11.7-1.el9_4.3
  • M
Multiple Interpretations of UI Input

<0:3.11.9-7.el9
  • H
Symlink Following

<0:3.11.7-1.el9_4.1
  • M
Improper Neutralization of Null Byte or NUL Character

<0:3.11.5-1.el9_3
  • H
Authentication Bypass by Primary Weakness

<0:3.11.2-2.el9_2.2
  • H
Authentication Bypass by Primary Weakness

<0:3.11.2-2.el9_2.2
  • H
Authentication Bypass by Primary Weakness

<0:3.11.2-2.el9_2.2
  • H
Authentication Bypass by Primary Weakness

<0:3.11.2-2.el9_2.2
  • M
Uncontrolled Recursion

*
  • M
Improper Input Validation

<0:3.11.7-1.el9
  • H
Improper Input Validation

<0:3.11.2-2.el9_2.1
  • H
Improper Input Validation

<0:3.11.2-2.el9_2.1
  • H
Improper Input Validation

<0:3.11.2-2.el9_2.1
  • H
Improper Input Validation

<0:3.11.2-2.el9_2.1
  • M
Directory Traversal

<0:3.11.5-1.el9_3