Total vulnerabilities in the database
Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely.
Software | From | Fixed in |
---|---|---|
python / python | 3.7.0 | 3.7.9.x |
python / python | 3.9.0 | 3.9.1.x |
python / python | 3.8.0 | 3.8.7.x |
python / python | 3.6.0 | 3.6.12.x |
fedoraproject / fedora | 32 | 32.x |
fedoraproject / fedora | 33 | 33.x |
debian / debian_linux | 9.0 | 9.0.x |
oracle / enterprise_manager_ops_center | 12.4.0.0 | 12.4.0.0.x |
oracle / communications_offline_mediation_controller | 12.0.0.3.0 | 12.0.0.3.0.x |
oracle / zfs_storage_appliance_kit | 8.8 | 8.8.x |
oracle / communications_pricing_design_center | 12.0.0.3.0 | 12.0.0.3.0.x |
oracle / communications_cloud_native_core_network_function_cloud_native_environment | 22.2.0 | 22.2.0.x |