| Package | Installed | Affected | Info |
|---|---|---|---|
| pyOpenSSL | 24.1.0 | >=22.0.0,<26.0.0 |
show Affected versions of the pyOpenSSL package are vulnerable to Classic Buffer Overflow due to missing length validation on DTLS cookie values returned by a user-provided callback. The vulnerability is in the DTLS cookie generation path that uses set_cookie_generate_callback, where pyOpenSSL passes the callback’s return value into an OpenSSL-provided buffer without rejecting values longer than 256 bytes. |
| pyOpenSSL | 24.1.0 | >=0.14.0,<26.0.0 |
show Affected versions of the pyOpenSSL package are vulnerable to Improper Input Validation due to a failure to securely handle exceptions in a user-supplied callback. The set_tlsext_servername_callback API accepts a callback that, in affected versions, allows an unhandled exception to cause the TLS connection to be accepted instead of rejected, creating a fail-open condition in any security-sensitive logic implemented in that callback. |
| Package | Installed | Affected | Info |
|---|---|---|---|
| pyOpenSSL | 24.1.0 | >=22.0.0,<26.0.0 |
show Affected versions of the pyOpenSSL package are vulnerable to Classic Buffer Overflow due to missing length validation on DTLS cookie values returned by a user-provided callback. The vulnerability is in the DTLS cookie generation path that uses set_cookie_generate_callback, where pyOpenSSL passes the callback’s return value into an OpenSSL-provided buffer without rejecting values longer than 256 bytes. |
| pyOpenSSL | 24.1.0 | >=0.14.0,<26.0.0 |
show Affected versions of the pyOpenSSL package are vulnerable to Improper Input Validation due to a failure to securely handle exceptions in a user-supplied callback. The set_tlsext_servername_callback API accepts a callback that, in affected versions, allows an unhandled exception to cause the TLS connection to be accepted instead of rejected, creating a fail-open condition in any security-sensitive logic implemented in that callback. |
| Package | Installed | Affected | Info |
|---|---|---|---|
| pyOpenSSL | 24.1.0 | >=22.0.0,<26.0.0 |
show Affected versions of the pyOpenSSL package are vulnerable to Classic Buffer Overflow due to missing length validation on DTLS cookie values returned by a user-provided callback. The vulnerability is in the DTLS cookie generation path that uses set_cookie_generate_callback, where pyOpenSSL passes the callback’s return value into an OpenSSL-provided buffer without rejecting values longer than 256 bytes. |
| pyOpenSSL | 24.1.0 | >=0.14.0,<26.0.0 |
show Affected versions of the pyOpenSSL package are vulnerable to Improper Input Validation due to a failure to securely handle exceptions in a user-supplied callback. The set_tlsext_servername_callback API accepts a callback that, in affected versions, allows an unhandled exception to cause the TLS connection to be accepted instead of rejected, creating a fail-open condition in any security-sensitive logic implemented in that callback. |
| Package | Installed | Affected | Info |
|---|---|---|---|
| pyOpenSSL | 24.1.0 | >=22.0.0,<26.0.0 |
show Affected versions of the pyOpenSSL package are vulnerable to Classic Buffer Overflow due to missing length validation on DTLS cookie values returned by a user-provided callback. The vulnerability is in the DTLS cookie generation path that uses set_cookie_generate_callback, where pyOpenSSL passes the callback’s return value into an OpenSSL-provided buffer without rejecting values longer than 256 bytes. |
| pyOpenSSL | 24.1.0 | >=0.14.0,<26.0.0 |
show Affected versions of the pyOpenSSL package are vulnerable to Improper Input Validation due to a failure to securely handle exceptions in a user-supplied callback. The set_tlsext_servername_callback API accepts a callback that, in affected versions, allows an unhandled exception to cause the TLS connection to be accepted instead of rejected, creating a fail-open condition in any security-sensitive logic implemented in that callback. |
| Package | Installed | Affected | Info |
|---|---|---|---|
| pyOpenSSL | 24.1.0 | >=22.0.0,<26.0.0 |
show Affected versions of the pyOpenSSL package are vulnerable to Classic Buffer Overflow due to missing length validation on DTLS cookie values returned by a user-provided callback. The vulnerability is in the DTLS cookie generation path that uses set_cookie_generate_callback, where pyOpenSSL passes the callback’s return value into an OpenSSL-provided buffer without rejecting values longer than 256 bytes. |
| pyOpenSSL | 24.1.0 | >=0.14.0,<26.0.0 |
show Affected versions of the pyOpenSSL package are vulnerable to Improper Input Validation due to a failure to securely handle exceptions in a user-supplied callback. The set_tlsext_servername_callback API accepts a callback that, in affected versions, allows an unhandled exception to cause the TLS connection to be accepted instead of rejected, creating a fail-open condition in any security-sensitive logic implemented in that callback. |
| Package | Installed | Affected | Info |
|---|---|---|---|
| pyOpenSSL | 24.1.0 | >=22.0.0,<26.0.0 |
show Affected versions of the pyOpenSSL package are vulnerable to Classic Buffer Overflow due to missing length validation on DTLS cookie values returned by a user-provided callback. The vulnerability is in the DTLS cookie generation path that uses set_cookie_generate_callback, where pyOpenSSL passes the callback’s return value into an OpenSSL-provided buffer without rejecting values longer than 256 bytes. |
| pyOpenSSL | 24.1.0 | >=0.14.0,<26.0.0 |
show Affected versions of the pyOpenSSL package are vulnerable to Improper Input Validation due to a failure to securely handle exceptions in a user-supplied callback. The set_tlsext_servername_callback API accepts a callback that, in affected versions, allows an unhandled exception to cause the TLS connection to be accepted instead of rejected, creating a fail-open condition in any security-sensitive logic implemented in that callback. |
| Package | Installed | Affected | Info |
|---|---|---|---|
| pyOpenSSL | 24.1.0 | >=22.0.0,<26.0.0 |
show Affected versions of the pyOpenSSL package are vulnerable to Classic Buffer Overflow due to missing length validation on DTLS cookie values returned by a user-provided callback. The vulnerability is in the DTLS cookie generation path that uses set_cookie_generate_callback, where pyOpenSSL passes the callback’s return value into an OpenSSL-provided buffer without rejecting values longer than 256 bytes. |
| pyOpenSSL | 24.1.0 | >=0.14.0,<26.0.0 |
show Affected versions of the pyOpenSSL package are vulnerable to Improper Input Validation due to a failure to securely handle exceptions in a user-supplied callback. The set_tlsext_servername_callback API accepts a callback that, in affected versions, allows an unhandled exception to cause the TLS connection to be accepted instead of rejected, creating a fail-open condition in any security-sensitive logic implemented in that callback. |
| Package | Installed | Affected | Info |
|---|---|---|---|
| pyOpenSSL | 24.1.0 | >=22.0.0,<26.0.0 |
show Affected versions of the pyOpenSSL package are vulnerable to Classic Buffer Overflow due to missing length validation on DTLS cookie values returned by a user-provided callback. The vulnerability is in the DTLS cookie generation path that uses set_cookie_generate_callback, where pyOpenSSL passes the callback’s return value into an OpenSSL-provided buffer without rejecting values longer than 256 bytes. |
| pyOpenSSL | 24.1.0 | >=0.14.0,<26.0.0 |
show Affected versions of the pyOpenSSL package are vulnerable to Improper Input Validation due to a failure to securely handle exceptions in a user-supplied callback. The set_tlsext_servername_callback API accepts a callback that, in affected versions, allows an unhandled exception to cause the TLS connection to be accepted instead of rejected, creating a fail-open condition in any security-sensitive logic implemented in that callback. |
| Package | Installed | Affected | Info |
|---|---|---|---|
| pyOpenSSL | 24.1.0 | >=22.0.0,<26.0.0 |
show Affected versions of the pyOpenSSL package are vulnerable to Classic Buffer Overflow due to missing length validation on DTLS cookie values returned by a user-provided callback. The vulnerability is in the DTLS cookie generation path that uses set_cookie_generate_callback, where pyOpenSSL passes the callback’s return value into an OpenSSL-provided buffer without rejecting values longer than 256 bytes. |
| pyOpenSSL | 24.1.0 | >=0.14.0,<26.0.0 |
show Affected versions of the pyOpenSSL package are vulnerable to Improper Input Validation due to a failure to securely handle exceptions in a user-supplied callback. The set_tlsext_servername_callback API accepts a callback that, in affected versions, allows an unhandled exception to cause the TLS connection to be accepted instead of rejected, creating a fail-open condition in any security-sensitive logic implemented in that callback. |
| Package | Installed | Affected | Info |
|---|---|---|---|
| pyOpenSSL | 24.1.0 | >=22.0.0,<26.0.0 |
show Affected versions of the pyOpenSSL package are vulnerable to Classic Buffer Overflow due to missing length validation on DTLS cookie values returned by a user-provided callback. The vulnerability is in the DTLS cookie generation path that uses set_cookie_generate_callback, where pyOpenSSL passes the callback’s return value into an OpenSSL-provided buffer without rejecting values longer than 256 bytes. |
| pyOpenSSL | 24.1.0 | >=0.14.0,<26.0.0 |
show Affected versions of the pyOpenSSL package are vulnerable to Improper Input Validation due to a failure to securely handle exceptions in a user-supplied callback. The set_tlsext_servername_callback API accepts a callback that, in affected versions, allows an unhandled exception to cause the TLS connection to be accepted instead of rejected, creating a fail-open condition in any security-sensitive logic implemented in that callback. |
https://pyup.io/repos/github/oz123/pytest-localftpserver/python-3-shield.svg
[](https://pyup.io/repos/github/oz123/pytest-localftpserver/)
.. image:: https://pyup.io/repos/github/oz123/pytest-localftpserver/python-3-shield.svg
:target: https://pyup.io/repos/github/oz123/pytest-localftpserver/
:alt: Python 3
<a href="https://pyup.io/repos/github/oz123/pytest-localftpserver/"><img src="https://pyup.io/repos/github/oz123/pytest-localftpserver/shield.svg" alt="Python 3" /></a>
!https://pyup.io/repos/github/oz123/pytest-localftpserver/python-3-shield.svg(Python 3)!:https://pyup.io/repos/github/oz123/pytest-localftpserver/
{<img src="https://pyup.io/repos/github/oz123/pytest-localftpserver/python-3-shield.svg" alt="Python 3" />}[https://pyup.io/repos/github/oz123/pytest-localftpserver/]
https://pyup.io/repos/github/oz123/pytest-localftpserver/shield.svg
[](https://pyup.io/repos/github/oz123/pytest-localftpserver/)
.. image:: https://pyup.io/repos/github/oz123/pytest-localftpserver/shield.svg
:target: https://pyup.io/repos/github/oz123/pytest-localftpserver/
:alt: Updates
<a href="https://pyup.io/repos/github/oz123/pytest-localftpserver/"><img src="https://pyup.io/repos/github/oz123/pytest-localftpserver/shield.svg" alt="Updates" /></a>
!https://pyup.io/repos/github/oz123/pytest-localftpserver/shield.svg(Updates)!:https://pyup.io/repos/github/oz123/pytest-localftpserver/
{<img src="https://pyup.io/repos/github/oz123/pytest-localftpserver/shield.svg" alt="Updates" />}[https://pyup.io/repos/github/oz123/pytest-localftpserver/]