fkie_cve-2014-9365
Vulnerability from fkie_nvd
Published
2014-12-12 11:59
Modified
2025-04-12 10:46
Severity ?
Summary
The HTTP clients in the (1) httplib, (2) urllib, (3) urllib2, and (4) xmlrpclib libraries in CPython (aka Python) 2.x before 2.7.9 and 3.x before 3.4.3, when accessing an HTTPS URL, do not (a) check the certificate against a trust store or verify that the server hostname matches a domain name in the subject's (b) Common Name or (c) subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:python:python:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "BD5A27DB-0113-4DE3-9CA0-0792CC7795AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "AEB6ED07-C176-496D-B9CA-F24933D71999", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "3870A704-5D26-4999-9C49-19AE9E88AAE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "1A223BB3-DD5A-48C9-9C82-5D1C4F122828", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "C14973EE-5A2E-4935-8D29-594761502D72", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:2.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "3E502388-0A87-4503-8EC9-8A43E8BF43E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "1E9C3C11-0D4F-44AB-BCA0-4963F1BF67DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "A3CD168A-2180-44C8-8784-3B32589904BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "EB30EAAD-5CF0-41DD-909B-C6AD94D88ABB", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "569FAD3A-17DF-424A-AF93-B0720D48D6B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "0BD8ED56-5568-4461-B94A-0B5C1EF8C01A", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:2.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "396FFF60-8F61-43E5-BF0C-A0C319714247", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "75872F94-A537-4E57-8325-3426DB5D6C75", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "6A038A64-E659-47BB-B2C6-8FD151684CBB", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:2.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "A82F7C03-C9D3-4B83-AF74-30981EC25431", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:2.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "02839080-EFB1-4F63-9D4E-45E26D82ECF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:2.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "00C353D0-C579-4C0B-AD7D-9E56353F2BF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:2.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "7FB87E45-DBC2-4D0F-B4E9-38585D2F92A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:2.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "976E5CD0-3A1E-43E6-9C34-B8F1EE1AB863", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:2.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "179EDC23-2328-4BB6-98D5-7C1A975A0C46", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:2.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "87B6E723-EC9D-44EF-9DB8-8A229E0ABBB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:2.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "12D3CD4F-0C58-46F4-939D-FDF19BC98729", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:2.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "6D13FC75-3979-40A8-A1FE-EF86EB15C8A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:2.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "78AE8C3C-53A1-408A-BA23-1EBA1E6A0E4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:2.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "DA59C66F-E469-42C1-9745-330E35AE5A26", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:2.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "FA7CD02C-A1C7-4480-935F-BAED940FE845", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:2.5.150:*:*:*:*:*:*:*", "matchCriteriaId": "591E29B2-3547-46FF-9B02-E748F4861567", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:2.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "244740D0-CACA-4607-964C-F0F46153653D", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:2.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "BA3487C5-05AD-4553-B123-45F0A51BBA3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:2.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "486AB201-5BE7-4947-B18B-DA8F86E5D626", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:2.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "E852D2C6-D744-4311-97B3-CAEF073D6585", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:2.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "845FBD14-4175-49F1-B762-4F550CEF5B0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:2.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "84E7646B-BC7C-4ED6-925B-268291F31610", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:2.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "6CD6B328-E333-48C3-B2CC-41EC95321B7C", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:2.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "9C22EAA6-B771-46C3-A0B8-E342493E1F77", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:2.6.2150:*:*:*:*:*:*:*", "matchCriteriaId": "3BAEB1E3-E3E6-4807-A2FF-ACD2F4356E39", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:2.6.6150:*:*:*:*:*:*:*", "matchCriteriaId": "92FF153A-69D5-444F-8FB3-78BF1C33F209", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:2.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "8CE2063E-5B74-4731-885F-80D2D7B15604", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:2.7.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "FC647F82-9679-4B26-AFF1-1B43B0AF18B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:2.7.2:rc1:*:*:*:*:*:*", "matchCriteriaId": "046BCC55-F166-4C31-AB2B-815A0DFA2BEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:2.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "6A3CABCB-9FA8-4B13-8CF1-AA89B9E9B7E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:2.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "41925551-AC82-4EEA-836F-56E280114765", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:2.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "A213A57A-85BB-4B12-B394-3FF5459797EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:2.7.6:*:*:*:*:*:*:*", "matchCriteriaId": "76D82E41-8B87-4D6E-9E59-C12E37E30965", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:2.7.7:*:*:*:*:*:*:*", "matchCriteriaId": "0778B0B9-4918-49A9-944F-08FC337EE090", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:2.7.8:*:*:*:*:*:*:*", "matchCriteriaId": "C24FCA68-69B6-4D71-AE04-2895CC19CF51", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:2.7.1150:*:*:*:*:*:*:*", "matchCriteriaId": "0D00809F-8D47-428E-9347-2BF36A61901A", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:2.7.1150:*:*:*:*:*:x64:*", "matchCriteriaId": "14EF3E9D-8F0D-40C4-A171-866D091CB531", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:2.7.2150:*:*:*:*:*:*:*", "matchCriteriaId": "CC94B908-E405-4BD2-BE36-2BB90238F7EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "FC0C702F-59E0-40AB-BA95-8F0803AB0550", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "3190C547-7230-476C-A43F-641FE7B891EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "74AC7EE5-F01D-4F28-80D1-4076B7B24BA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "2B547525-E0DB-4D64-8ED1-AF3F1B6FF65F", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "19064C18-1CD7-4F10-8065-4B900BB31F83", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "B1997CB6-FD72-4B13-915A-7500AA06F4B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "06A1811C-4E97-4226-8335-ADF0827A03B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "BF2C50D1-187B-4E98-BA02-008D0ED4C220", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.1.2150:*:*:*:*:*:x64:*", "matchCriteriaId": "9EB9683A-EE1C-4EB6-BF27-39A274B37D3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "87845E79-F4A3-4390-9ACF-A14E86BCDB10", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "E2C8F3C4-91AB-4AE3-A2FB-A093F97742FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "B511BDFA-D1DC-4E50-9A08-66DA05947A43", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "0708E98D-5C84-47DC-89E5-8BB7CFFB12A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "6595C4F3-5683-4889-AD30-83840F6A58D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "027FD902-9B08-4EDF-9F83-314FBF0583ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "89FB9D30-8559-4F57-9D20-DC603765B346", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "957FCB4A-32D0-4449-8995-80144CC713B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "C17A0E8D-7611-42F7-896E-F2B3BC25643D", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.2.2150:*:*:*:*:*:*:*", "matchCriteriaId": "F236E583-D23D-4769-8A25-EBFC930E4798", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.3:*:*:*:*:*:*:*", "matchCriteriaId": "6DF7665B-3A10-46D1-B486-AFC9ED6C0B8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.3:beta2:*:*:*:*:*:*", "matchCriteriaId": "0E2DAB9D-5D7D-40ED-8110-E3FDF7AE0729", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "875ABC97-2783-41DA-AB9F-9E6F0870B74C", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "5262D28D-204C-41E8-BC4D-27372E366295", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.3.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "0D553F40-92C2-4537-AF74-5F9307E20AE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "121225D0-C5DA-4F26-93B8-3D56BC1D38B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "52DD66F7-FE7B-4C1C-B07B-F9E4CEEA7AFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.3.3:rc1:*:*:*:*:*:*", "matchCriteriaId": "5D540913-0EEF-413B-8AFD-82E858844FD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.3.3:rc2:*:*:*:*:*:*", "matchCriteriaId": "BFD75566-C783-4B16-9FF1-4AC2670310F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "6C2C18A1-F202-4E48-8E29-F250AD1A6737", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.3.4:rc1:*:*:*:*:*:*", "matchCriteriaId": "C146E248-4A45-42DD-A09A-66C47A40282D", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.3.5:-:*:*:*:*:*:*", "matchCriteriaId": "40A22D40-A174-4C5E-9E68-6D0E2D816916", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.3.5:rc1:*:*:*:*:*:*", "matchCriteriaId": "A64A4D69-5526-4EDC-A759-F06A80DE582D", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.3.5:rc2:*:*:*:*:*:*", "matchCriteriaId": "182C8567-8F04-440F-8B3F-4F6018AAAFC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.3.6:rc1:*:*:*:*:*:*", "matchCriteriaId": "7A302C2A-35F7-4ABC-AF54-C00E066C2DF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.4:alpha1:*:*:*:*:*:*", "matchCriteriaId": "B567FD3B-10F2-45DF-BC50-04316DF15113", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "6D6658A8-E57E-4743-95D5-074F990D0D1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "F6C65BBA-4DC7-4F2F-90B1-75C6F3C68FBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:python:python:3.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "0D0DBAEE-599A-44EB-A1E4-94CEBB406CAE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "7883E465-932D-4C11-AA54-97E44181F906", "versionEndIncluding": "10.10.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The HTTP clients in the (1) httplib, (2) urllib, (3) urllib2, and (4) xmlrpclib libraries in CPython (aka Python) 2.x before 2.7.9 and 3.x before 3.4.3, when accessing an HTTPS URL, do not (a) check the certificate against a trust store or verify that the server hostname matches a domain name in the subject\u0027s (b) Common Name or (c) subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate." }, { "lang": "es", "value": "Los clientes HTTP en las librarias (1) httplib, (2) urllib, (3) urllib2, and (4) xmlrpclib en CPython (tambi\u00e9n conocido como Python) 2.x anterior a 2.7.9 y 3.x anterior a 3.4.3, cuando accede a una URL HTTPS, not (a) comprueba el certificado contra un almacen trust o verifica que elnombre del servidor coincide con un nombre de dominio en el campo del tema (b) Common Name o (c) subjectAltName del certificado X.509, lo que permite a atacantes man-in-the-middle falsificar servidores SSL a trav\u00e9s de un certificado v\u00e1lido arbitrario." } ], "evaluatorComment": "\u003ca href=\"http://cwe.mitre.org/data/definitions/295.html\"\u003eCWE-295: Improper Certificate Validation\u003c/a\u003e", "id": "CVE-2014-9365", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2014-12-12T11:59:07.063", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://bugs.python.org/issue22417" }, { "source": "cve@mitre.org", "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html" }, { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2014/12/11/1" }, { "source": "cve@mitre.org", "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html" }, { "source": "cve@mitre.org", "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/71639" }, { "source": "cve@mitre.org", "url": "https://access.redhat.com/errata/RHSA-2016:1166" }, { "source": "cve@mitre.org", "url": "https://access.redhat.com/errata/RHSA-2017:1162" }, { "source": "cve@mitre.org", "url": "https://access.redhat.com/errata/RHSA-2017:1868" }, { "source": "cve@mitre.org", "url": "https://security.gentoo.org/glsa/201503-10" }, { "source": "cve@mitre.org", "url": "https://support.apple.com/kb/HT205031" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://www.python.org/dev/peps/pep-0476/" }, { "source": "cve@mitre.org", "url": "https://www.python.org/downloads/release/python-279/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://bugs.python.org/issue22417" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2014/12/11/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/71639" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2016:1166" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2017:1162" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2017:1868" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201503-10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.apple.com/kb/HT205031" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://www.python.org/dev/peps/pep-0476/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.python.org/downloads/release/python-279/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…