Page 10 of 47 results (0.003 seconds)

CVSS: 7.5EPSS: 12%CPEs: 2EXPL: 0

The SimpleXMLRPCServer library module in Python 2.2, 2.3 before 2.3.5, and 2.4, when used by XML-RPC servers that use the register_instance method to register an object without a _dispatch method, allows remote attackers to read or modify globals of the associated module, and possibly execute arbitrary code, via dotted attributes. • http://marc.info/?l=bugtraq&m=110746469728728&w=2 http://python.org/security/PSF-2005-001/patch-2.2.txt http://secunia.com/advisories/14128 http://securitytracker.com/id?1013083 http://www.debian.org/security/2005/dsa-666 http://www.mandriva.com/security/advisories?name=MDKSA-2005:035 http://www.python.org/security/PSF-2005-001 http://www.redhat.com/support/errata/RHSA-2005-108.html http://www.securityfocus.com/bid/12437 http://www.trustix.org/errata/2005/00 •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 0

os._execvpe from os.py in Python 2.2.1 and earlier creates temporary files with predictable names, which could allow local users to execute arbitrary code via a symlink attack. • ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-045.0.txt http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000527 http://mail.python.org/pipermail/python-dev/2002-August/027229.html http://marc.info/?l=bugtraq&m=104333092200589&w=2 http://www.debian.org/security/2002/dsa-159 http://www.iss.net/security_center/static/10009.php http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-082.php http://www.redhat.com/support/errata/RHSA-2002-202.html •