python3.14

Direct Vulnerabilities

Known vulnerabilities in the python3.14 package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Allocation of Resources Without Limits or Throttling

<0:3.14.4-1.hum1
  • M
Improper Handling of Length Parameter Inconsistency

<0:3.14.4-1.hum1
  • H
Arbitrary Argument Injection

<0:3.14.4-2.hum1
  • M
Untrusted Pointer Dereference

<0:3.14.4-2.hum1
  • M
Untrusted Pointer Dereference

*
  • H
Arbitrary Argument Injection

*
  • M
Arbitrary Command Injection

<0:3.14.4-2.hum1
  • M
Arbitrary Command Injection

<0:3.14.3-2.hum1
  • M
Arbitrary Code Injection

<0:3.14.4-1.hum1
  • M
Allocation of Resources Without Limits or Throttling

<0:3.14.4-1.hum1
  • M
Allocation of Resources Without Limits or Throttling

<0:3.14.4-1.hum1
  • M
Incomplete Filtering of Special Elements

<0:3.14.4-1.hum1
  • M
Improper Neutralization

<0:3.14.4-1.hum1
  • M
CRLF Injection

<0:3.14.4-1.hum1
  • L
Allocation of Resources Without Limits or Throttling

<0:3.14.4-1.hum1
  • M
Buffer Access with Incorrect Length Value

<0:3.14.4-1.hum1
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • L
Improper Handling of Structural Elements

<0:3.14.4-1.hum1
  • H
Expired Pointer Dereference

<0:3.14.4-2.hum1
  • H
Expired Pointer Dereference

*
  • M
CRLF Injection

<0:3.14.4-2.hum1
  • M
CRLF Injection

*
  • M
Improper Validation of Syntactic Correctness of Input

<0:3.14.4-1.hum1
  • M
Improper Validation of Syntactic Correctness of Input

*
  • H
Arbitrary Argument Injection

<0:3.14.4-1.hum1
  • L
Directory Traversal

<0:3.14.4-1.hum1
  • L
Insufficient Logging

<0:3.14.4-1.hum1
  • H
Arbitrary Argument Injection

*
  • M
CRLF Injection

<0:3.14.4-1.hum1
  • L
Directory Traversal

*
  • M
Buffer Access with Incorrect Length Value

*
  • M
Incomplete Filtering of Special Elements

*
  • M
CRLF Injection

*
  • M
CRLF Injection

*
  • M
Improper Neutralization

*
  • M
CRLF Injection

*
  • M
Arbitrary Command Injection

*
  • M
Arbitrary Code Injection

*
  • M
Arbitrary Command Injection

*
  • L
Insufficient Logging

*