Vulnerability Database

With exploit

python / python

Title Severity Exploit Date Affected Version
CVE-2014-7185 Medium Oct 8, 2014 == 2.7.6
<= 2.7.7
== 2.7.1150
== 2.7.4
== 2.7.1
== 2.7.3
== 2.7.1-rc1
== 2.7.2-rc1
== 2.7.5
== 2.7.2150
CVE-2012-0845 Medium Oct 5, 2012 == 2.4.2
== 2.5.1
== 2.3.4
== 2.6.6
== 2.1
== 2.0.1
== 2.6.1
== 2.3.1
== 0.9.1
== 2.1.2
== 0.9.0
== 1.6.1
== 2.2.1
== 2.5.4
== 1.3
== 2.6.3
== 2.2.2
== 2.1.1
== 1.5.2
== 2.6.2150
== 2.3.3
== 2.3.2
== 1.6
== 1.2
== 2.4.6
== 2.0
== 2.2.3
<= 2.6.7
== 2.5.2
== 2.3.7
== 2.6.4
== 2.6.6150
== 2.5.3
== 2.4.4
== 2.5.150
== 2.2
== 2.6.2
== 2.5.6
== 2.3.5
== 2.1.3
== 2.4.1
== 2.4.3
== 2.6.5
== 2.7.1
== 2.7.1150
== 2.7.1-rc1
== 2.7.2-rc1
== 2.7.2150
== 3.1
== 3.1.1
== 3.0
== 3.0.1
== 3.1.2
== 3.1.3
== 3.1.4
== 3.2.2150
== 3.2
== 3.2-alpha
CVE-2012-1150 Medium Oct 5, 2012 == 2.4.2
== 2.5.1
== 2.3.4
== 2.6.6
== 2.1
== 2.0.1
== 2.6.1
== 2.3.1
== 0.9.1
== 2.1.2
== 0.9.0
== 1.6.1
== 2.2.1
== 2.5.4
== 1.3
== 2.6.3
== 2.2.2
== 2.1.1
== 1.5.2
== 2.6.2150
== 2.3.3
== 2.3.2
== 1.6
== 1.2
== 2.4.6
== 2.0
== 2.2.3
<= 2.6.7
== 2.5.2
== 2.3.7
== 2.6.4
== 2.6.6150
== 2.5.3
== 2.4.4
== 2.5.150
== 2.2
== 2.6.2
== 2.5.6
== 2.3.5
== 2.1.3
== 2.4.1
== 2.4.3
== 2.6.5
== 2.7.1
== 2.7.1150
== 2.7.1-rc1
== 2.7.2-rc1
== 2.7.2150
== 3.1
== 3.1.1
== 3.0
== 3.0.1
== 3.1.2
== 3.1.3
== 3.1.4
== 3.2.2150
== 3.2
== 3.2-alpha
CVE-2011-4940 Low Jun 27, 2012 == 2.4.2
== 2.5.1
== 2.3.4
== 2.0.1
== 2.3.1
== 0.9.1
== 2.1.2
== 0.9.0
== 1.6.1
== 2.2.1
== 2.5.4
== 1.3
== 2.2.2
== 2.1.1
== 1.5.2
== 2.3.3
== 2.3.2
== 1.6
== 1.2
== 2.4.6
== 2.2.3
== 2.5.2
== 2.3.7
<= 2.5.6
== 2.5.3
== 2.4.4
== 2.3.5
== 2.1.3
== 2.4.1
== 2.4.3
== 2.6.6
== 2.6.1
== 2.6.3
== 2.6.4
== 2.6.2
== 2.6.5
== 2.7.1
== 2.7.1-rc1
== 2.7.2-rc1
CVE-2010-3492 Medium Oct 19, 2010 <= 2.7
>= 3.0 < 3.1.2
CVE-2008-5983 Medium Jan 28, 2009 < 2.6.6
>= 3.1.0 < 3.1.3
CVE-2008-2315 High Aug 1, 2008 <= 2.5.2
CVE-2008-2316 High Aug 1, 2008 <= 2.5.2
CVE-2008-3142 High Aug 1, 2008 < 2.4.6
>= 2.5.0 < 2.5.3
CVE-2008-3143 High Aug 1, 2008 < 2.5.12