python3-test

Direct Vulnerabilities

Known vulnerabilities in the python3-test package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • L
Insufficient Logging

<0:3.12.13-2.el10_2
  • H
Allocation of Resources Without Limits or Throttling

<0:3.12.13-2.el10_2
  • H
Arbitrary Argument Injection

<0:3.12.13-2.el10_2
  • M
CRLF Injection

<0:3.12.13-2.el10_2
  • M
CRLF Injection

<0:3.12.13-2.el10_2
  • H
Arbitrary Argument Injection

<0:3.12.13-2.el10_2
  • L
Allocation of Resources Without Limits or Throttling

<0:3.12.13-2.el10_2
  • H
Expired Pointer Dereference

<0:3.12.13-2.el10_2
  • M
Incomplete Filtering of Special Elements

<0:3.12.13-2.el10_2
  • M
CRLF Injection

<0:3.12.13-2.el10_2
  • M
Allocation of Resources Without Limits or Throttling

<0:3.12.13-2.el10_2
  • M
Buffer Access with Incorrect Length Value

<0:3.12.13-2.el10_2
  • M
Integer Overflow or Wraparound

*
  • H
Expired Pointer Dereference

<0:3.12.9-2.el10_0.9
  • H
Arbitrary Argument Injection

<0:3.12.9-2.el10_0.9
  • H
Expired Pointer Dereference

<0:3.12.12-3.el10_1.3
  • H
Arbitrary Argument Injection

<0:3.12.12-3.el10_1.3
  • M
Cross-site Scripting (XSS)

*
  • M
Untrusted Pointer Dereference

*
  • H
Arbitrary Argument Injection

<0:3.12.9-2.el10_0.8
  • H
Arbitrary Argument Injection

<0:3.12.12-3.el10_1.2
  • M
CRLF Injection

<0:3.12.9-2.el10_0.7
  • M
Arbitrary Command Injection

<0:3.12.9-2.el10_0.7
  • M
Arbitrary Command Injection

<0:3.12.9-2.el10_0.7
  • L
Directory Traversal

*
  • M
Arbitrary Command Injection

<0:3.12.12-3.el10_1.1
  • M
Arbitrary Command Injection

<0:3.12.12-3.el10_1.1
  • M
CRLF Injection

<0:3.12.12-3.el10_1.1
  • M
Arbitrary Code Injection

<0:3.12.12-3.el10_1.1
  • M
Allocation of Resources Without Limits or Throttling

<0:3.12.9-2.el10_0.6
  • M
Allocation of Resources Without Limits or Throttling

<0:3.12.9-2.el10_0.6
  • M
Allocation of Resources Without Limits or Throttling

<0:3.12.12-3.el10_1
  • M
Allocation of Resources Without Limits or Throttling

<0:3.12.12-3.el10_1
  • M
Improper Input Validation

*
  • M
Improper Neutralization

*
  • M
Improper Handling of Length Parameter Inconsistency

<0:3.12.9-2.el10_0.4
  • M
Improper Handling of Length Parameter Inconsistency

<0:3.12.12-1.el10_1
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:3.12.9-2.el10_0.3
  • L
Improper Handling of Inconsistent Special Elements

*
  • L
Resource Exhaustion

*
  • H
Allocation of Resources Without Limits or Throttling

*
  • M
Use After Free

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Use of Incorrectly-Resolved Name or Reference

<0:3.12.9-2.el10_0.2
  • H
Directory Traversal

<0:3.12.9-2.el10_0.2
  • H
Directory Traversal

<0:3.12.9-2.el10_0.2
  • M
Directory Traversal

<0:3.12.9-2.el10_0.2
  • H
Directory Traversal

<0:3.12.9-2.el10_0.2