Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely.
CVE Infomation | Exploits or more Infomation |
---|---|
mitre | EXPLOIT DATABASE |
NVD | 0day.today |
vulmon.com | github |
CVE Details | |
JVN ENG JPN | |
Reconshell |
Software Tag: Linux(1 tweets) PHP(1 tweets)
List of frequently cited URLs
User | URL | Info Source | Date |
---|---|---|---|
threatintelctr | https://nvd.nist.gov/vuln/detail/CVE-2021-3177 | Source threatintelctr 1600247923962437640 | 2022/12/07 |
solardiz | https://nvd.nist.gov/vuln/detail/CVE-2017-11362 | Source solardiz 1612821060159692802 | 2023/01/10 |
solardiz | https://nvd.nist.gov/vuln/detail/CVE-2021-3177 | Source solardiz 1612821060159692802 | 2023/01/10 |
List of frequently cited URLs
URL | Num of Times Referred to |
---|---|
alerts.vulmon.com | 289 |
patrowl.io | 249 |
twitter.com | 6 |
vulmon.com | 5 |
www.zdnet.com | 4 |
bugs.python.org | 3 |
User | URL | Info Source |
---|---|---|
threatintelctr | nvd.nist.gov | Show Tweet |
solardiz | nvd.nist.gov | Show Tweet |
solardiz | nvd.nist.gov | Show Tweet |
Name | URL |
---|---|
No Data |
Name | URL |
---|---|
No Data |