Package | Installed | Affected | Info |
---|---|---|---|
py | 1.11.0 | <=1.11.0 |
show Py throughout 1.11.0 allows remote attackers to conduct a ReDoS (Regular expression Denial of Service) attack via a Subversion repository with crafted info data, because the InfoSvnCommand argument is mishandled. https://github.com/pytest-dev/py/issues/287 |
pyOpenSSL | 24.1.0 | >=22.0.0 |
show CVE-2023-6129 affects PyOpenSSL versions starting from 22.0.0 due to a vulnerability in the POLY1305 MAC algorithm on PowerPC CPUs. This issue could lead to state corruption in applications, causing inaccurate outcomes or service disruptions. Attackers need specific conditions to exploit this flaw, including the ability to manipulate the algorithm's use and reliance on certain system registers by the application. |
Package | Installed | Affected | Info |
---|---|---|---|
py | 1.11.0 | <=1.11.0 |
show Py throughout 1.11.0 allows remote attackers to conduct a ReDoS (Regular expression Denial of Service) attack via a Subversion repository with crafted info data, because the InfoSvnCommand argument is mishandled. https://github.com/pytest-dev/py/issues/287 |
Package | Installed | Affected | Info |
---|---|---|---|
py | 1.11.0 | <=1.11.0 |
show Py throughout 1.11.0 allows remote attackers to conduct a ReDoS (Regular expression Denial of Service) attack via a Subversion repository with crafted info data, because the InfoSvnCommand argument is mishandled. https://github.com/pytest-dev/py/issues/287 |
Package | Installed | Affected | Info |
---|---|---|---|
py | 1.11.0 | <=1.11.0 |
show Py throughout 1.11.0 allows remote attackers to conduct a ReDoS (Regular expression Denial of Service) attack via a Subversion repository with crafted info data, because the InfoSvnCommand argument is mishandled. https://github.com/pytest-dev/py/issues/287 |
Package | Installed | Affected | Info |
---|---|---|---|
py | 1.11.0 | <=1.11.0 |
show Py throughout 1.11.0 allows remote attackers to conduct a ReDoS (Regular expression Denial of Service) attack via a Subversion repository with crafted info data, because the InfoSvnCommand argument is mishandled. https://github.com/pytest-dev/py/issues/287 |
Package | Installed | Affected | Info |
---|---|---|---|
py | 1.10.0 | <=1.11.0 |
show Py throughout 1.11.0 allows remote attackers to conduct a ReDoS (Regular expression Denial of Service) attack via a Subversion repository with crafted info data, because the InfoSvnCommand argument is mishandled. https://github.com/pytest-dev/py/issues/287 |
Package | Installed | Affected | Info |
---|---|---|---|
py | 1.10.0 | <=1.11.0 |
show Py throughout 1.11.0 allows remote attackers to conduct a ReDoS (Regular expression Denial of Service) attack via a Subversion repository with crafted info data, because the InfoSvnCommand argument is mishandled. https://github.com/pytest-dev/py/issues/287 |
Package | Installed | Affected | Info |
---|---|---|---|
py | 1.10.0 | <=1.11.0 |
show Py throughout 1.11.0 allows remote attackers to conduct a ReDoS (Regular expression Denial of Service) attack via a Subversion repository with crafted info data, because the InfoSvnCommand argument is mishandled. https://github.com/pytest-dev/py/issues/287 |
Package | Installed | Affected | Info |
---|---|---|---|
py | 1.10.0 | <=1.11.0 |
show Py throughout 1.11.0 allows remote attackers to conduct a ReDoS (Regular expression Denial of Service) attack via a Subversion repository with crafted info data, because the InfoSvnCommand argument is mishandled. https://github.com/pytest-dev/py/issues/287 |
Package | Installed | Affected | Info |
---|---|---|---|
py | 1.10.0 | <=1.11.0 |
show Py throughout 1.11.0 allows remote attackers to conduct a ReDoS (Regular expression Denial of Service) attack via a Subversion repository with crafted info data, because the InfoSvnCommand argument is mishandled. https://github.com/pytest-dev/py/issues/287 |
Package | Installed | Affected | Info |
---|---|---|---|
py | 1.10.0 | <=1.11.0 |
show Py throughout 1.11.0 allows remote attackers to conduct a ReDoS (Regular expression Denial of Service) attack via a Subversion repository with crafted info data, because the InfoSvnCommand argument is mishandled. https://github.com/pytest-dev/py/issues/287 |
Package | Installed | Affected | Info |
---|---|---|---|
py | 1.11.0 | <=1.11.0 |
show Py throughout 1.11.0 allows remote attackers to conduct a ReDoS (Regular expression Denial of Service) attack via a Subversion repository with crafted info data, because the InfoSvnCommand argument is mishandled. https://github.com/pytest-dev/py/issues/287 |
pyOpenSSL | 24.1.0 | >=22.0.0 |
show CVE-2023-6129 affects PyOpenSSL versions starting from 22.0.0 due to a vulnerability in the POLY1305 MAC algorithm on PowerPC CPUs. This issue could lead to state corruption in applications, causing inaccurate outcomes or service disruptions. Attackers need specific conditions to exploit this flaw, including the ability to manipulate the algorithm's use and reliance on certain system registers by the application. |
Package | Installed | Affected | Info |
---|---|---|---|
py | 1.11.0 | <=1.11.0 |
show Py throughout 1.11.0 allows remote attackers to conduct a ReDoS (Regular expression Denial of Service) attack via a Subversion repository with crafted info data, because the InfoSvnCommand argument is mishandled. https://github.com/pytest-dev/py/issues/287 |
Package | Installed | Affected | Info |
---|---|---|---|
py | 1.11.0 | <=1.11.0 |
show Py throughout 1.11.0 allows remote attackers to conduct a ReDoS (Regular expression Denial of Service) attack via a Subversion repository with crafted info data, because the InfoSvnCommand argument is mishandled. https://github.com/pytest-dev/py/issues/287 |
Package | Installed | Affected | Info |
---|---|---|---|
py | 1.11.0 | <=1.11.0 |
show Py throughout 1.11.0 allows remote attackers to conduct a ReDoS (Regular expression Denial of Service) attack via a Subversion repository with crafted info data, because the InfoSvnCommand argument is mishandled. https://github.com/pytest-dev/py/issues/287 |
https://pyup.io/repos/github/guykisel/inline-plz/python-3-shield.svg
[![Python 3](https://pyup.io/repos/github/guykisel/inline-plz/python-3-shield.svg)](https://pyup.io/repos/github/guykisel/inline-plz/)
.. image:: https://pyup.io/repos/github/guykisel/inline-plz/python-3-shield.svg :target: https://pyup.io/repos/github/guykisel/inline-plz/ :alt: Python 3
<a href="https://pyup.io/repos/github/guykisel/inline-plz/"><img src="https://pyup.io/repos/github/guykisel/inline-plz/shield.svg" alt="Python 3" /></a>
!https://pyup.io/repos/github/guykisel/inline-plz/python-3-shield.svg(Python 3)!:https://pyup.io/repos/github/guykisel/inline-plz/
{<img src="https://pyup.io/repos/github/guykisel/inline-plz/python-3-shield.svg" alt="Python 3" />}[https://pyup.io/repos/github/guykisel/inline-plz/]
https://pyup.io/repos/github/guykisel/inline-plz/shield.svg
[![Updates](https://pyup.io/repos/github/guykisel/inline-plz/shield.svg)](https://pyup.io/repos/github/guykisel/inline-plz/)
.. image:: https://pyup.io/repos/github/guykisel/inline-plz/shield.svg :target: https://pyup.io/repos/github/guykisel/inline-plz/ :alt: Updates
<a href="https://pyup.io/repos/github/guykisel/inline-plz/"><img src="https://pyup.io/repos/github/guykisel/inline-plz/shield.svg" alt="Updates" /></a>
!https://pyup.io/repos/github/guykisel/inline-plz/shield.svg(Updates)!:https://pyup.io/repos/github/guykisel/inline-plz/
{<img src="https://pyup.io/repos/github/guykisel/inline-plz/shield.svg" alt="Updates" />}[https://pyup.io/repos/github/guykisel/inline-plz/]