[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.mitre.oval:def:8152
Several vulnerabilities have been discovered in the interpreter for the Python language. The Common Vulnerabilities and Exposures project identifies the following problems: Piotr Engelking discovered that the strxfrm() function of the locale module miscalculates the length of an internal buffer, whi ...

oval:org.secpod.oval:def:202194
Python is an interpreted, interactive, object-oriented programming language. When the assert system call was disabled, an input sanitization flaw was revealed in the Python string object implementation that led to a buffer overflow. The missing check for negative size values meant the Python memory ...

oval:org.mitre.oval:def:7981
Several vulnerabilities have been discovered in the interpreter for the Python language. The Common Vulnerabilities and Exposures project identifies the following problems: Piotr Engelking discovered that the strxfrm() function of the locale module miscalculates the length of an internal buffer, whi ...

oval:org.secpod.oval:def:202139
Python is an interpreted, interactive, object-oriented programming language. When the assert system call was disabled, an input sanitization flaw was revealed in the Python string object implementation that led to a buffer overflow. The missing check for negative size values meant the Python memory ...

oval:org.secpod.oval:def:200633
Python is an interpreted, interactive, object-oriented programming language. When the assert system call was disabled, an input sanitization flaw was revealed in the Python string object implementation that led to a buffer overflow. The missing check for negative size values meant the Python memory ...

oval:org.secpod.oval:def:301646
Integer signedness error in the zlib extension module in Python 2.5.2 and earlier allows remote attackers to execute arbitrary code via a negative signed integer, which triggers insufficient memory allocation and a buffer overflow. The updated packages have been patched to prevent this issue.

oval:org.secpod.oval:def:500692
Python is an interpreted, interactive, object-oriented programming language. When the assert system call was disabled, an input sanitization flaw was revealed in the Python string object implementation that led to a buffer overflow. The missing check for negative size values meant the Python memory ...

oval:org.secpod.oval:def:200462
Python is an interpreted, interactive, object-oriented programming language. When the assert system call was disabled, an input sanitization flaw was revealed in the Python string object implementation that led to a buffer overflow. The missing check for negative size values meant the Python memory ...

oval:org.secpod.oval:def:500551
Python is an interpreted, interactive, object-oriented programming language. When the assert system call was disabled, an input sanitization flaw was revealed in the Python string object implementation that led to a buffer overflow. The missing check for negative size values meant the Python memory ...

oval:org.secpod.oval:def:500535
Python is an interpreted, interactive, object-oriented programming language. When the assert system call was disabled, an input sanitization flaw was revealed in the Python string object implementation that led to a buffer overflow. The missing check for negative size values meant the Python memory ...

oval:org.secpod.oval:def:94120
The host is installed with Python through 2.5.2 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to allocate sufficient memory when assert() is disabled. Successful exploitation allows attackers to execute arbitrary code and trigger a buffer overflow ...

CPE    5
cpe:/o:debian:debian_linux:4.0
cpe:/o:canonical:ubuntu_linux:7.04
cpe:/o:canonical:ubuntu_linux:6.06
cpe:/o:canonical:ubuntu_linux:7.10
...
CWE    1
CWE-120
*CVE
CVE-2008-1887

© SecPod Technologies