Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

CVE ID:CVE-2023-24329
Description:An issue in the urllib.parse component of Python before 3.11.4 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.
Test IDs: 1.3.6.1.4.1.25623.1.0.827787   1.3.6.1.4.1.25623.1.1.9.2023.638299223975   1.3.6.1.4.1.25623.1.0.827758   1.3.6.1.4.1.25623.1.1.13.2023.159.03   1.3.6.1.4.1.25623.1.0.827759   1.3.6.1.4.1.25623.1.1.9.2023.410218649859998   1.3.6.1.4.1.25623.1.1.9.2023.1001991009880702   1.3.6.1.4.1.25623.1.0.827821   1.3.6.1.4.1.25623.1.0.827764   1.3.6.1.4.1.25623.1.1.4.2023.2957.1   1.3.6.1.4.1.25623.1.0.833819   1.3.6.1.4.1.25623.1.1.2.2023.2465   1.3.6.1.4.1.25623.1.0.833214   1.3.6.1.4.1.25623.1.1.4.2023.0662.1   1.3.6.1.4.1.25623.1.0.827816   1.3.6.1.4.1.25623.1.0.827751   1.3.6.1.4.1.25623.1.1.9.2023.2415999721974   1.3.6.1.4.1.25623.1.0.827814   1.3.6.1.4.1.25623.1.1.4.2023.2639.1   1.3.6.1.4.1.25623.1.0.827829   1.3.6.1.4.1.25623.1.1.2.2023.2517   1.3.6.1.4.1.25623.1.0.827790   1.3.6.1.4.1.25623.1.1.2.2023.3150   1.3.6.1.4.1.25623.1.0.827824   1.3.6.1.4.1.25623.1.1.9.2023.10010010010119110104   1.3.6.1.4.1.25623.1.1.9.2023.75994102998710299   1.3.6.1.4.1.25623.1.0.124284   1.3.6.1.4.1.25623.1.1.12.2023.6139.1   1.3.6.1.4.1.25623.1.0.827371   1.3.6.1.4.1.25623.1.0.827752   1.3.6.1.4.1.25623.1.1.2.2023.3449   1.3.6.1.4.1.25623.1.0.884288   1.3.6.1.4.1.25623.1.1.9.2023.3198242979810297   1.3.6.1.4.1.25623.1.1.2.2023.2490   1.3.6.1.4.1.25623.1.1.9.2023.7110099071847   1.3.6.1.4.1.25623.1.0.827840   1.3.6.1.4.1.25623.1.1.2.2023.1826   1.3.6.1.4.1.25623.1.1.4.2023.0736.1   1.3.6.1.4.1.25623.1.1.9.2023.997291009798101981   1.3.6.1.4.1.25623.1.0.827800   1.3.6.1.4.1.25623.1.1.2.2023.1808   1.3.6.1.4.1.25623.1.1.2.2023.3412   1.3.6.1.4.1.25623.1.0.827373   1.3.6.1.4.1.25623.1.0.827827   1.3.6.1.4.1.25623.1.1.1.2.2023.3575   1.3.6.1.4.1.25623.1.1.2.2024.2292   1.3.6.1.4.1.25623.1.1.2.2023.2530   1.3.6.1.4.1.25623.1.1.12.2023.5960.1   1.3.6.1.4.1.25623.1.0.827858   1.3.6.1.4.1.25623.1.1.4.2023.0868.1   1.3.6.1.4.1.25623.1.1.9.2023.79910098398481021   1.3.6.1.4.1.25623.1.0.827770  
Cross References: Common Vulnerability Exposure (CVE) ID: CVE-2023-24329
CERT/CC vulnerability note: VU#127587
https://www.kb.cert.org/vuls/id/127587
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DSL6NSOAXWBJJ67XPLSSC74MNKZF3BBO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O5SP4RT3RRS434ZS2HQKQJ3VZW7YPKYR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LWC4WGXER5P6Q75RFGL7QUTPP3N5JR7T/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QRQHN7RWJQJHYP6E5EKESOYP5VDSHZG4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H23OSKC6UG6IWOQAUPW74YUHWRWVXJP7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTLGV2HYFF4AMYJL25VDIGAIHCU7UPA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PURM5CFDABEWAIWZFD2MQ7ZJGCPYSQ44/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTOAUJNDWZDRWVSXJ354AYZYKRMT56HU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UONZWLB4QVLQIY5CPDLEUEKH6WX4VQMC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PEVICI7YNGGMSL3UCMWGE66QFLATH72/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OHHJHJRLEF3TDT2K3676CAUVRDD4CCMR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U2MZOJYGFCB5PPT6AKMAU72N7QOYWLBP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EM2XLZSTXG44TMFXF4E6VTGKR2MQCW3G/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F2NY75GFDZ5T6YPN44D3VMFT5SUVTOTG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q3J5N24ECS4B6MJDRO6UAYU6GPLYBDCL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TZH26JGNZ5XYPZ5SAU3NKSBSPRE5OHTG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T4IDB5OAR5Y4UK3HLMZBW4WEL2B7YFMJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RA2MBEEES6L46OD64OBSVUUMGKNGMOWW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MZEHSXSCMA4WWQKXT6QV7AAR6SWNZ2VP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PEUN6T22UJFXR7J5F6UUHCXXPKJ2DVHI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GR5US3BYILYJ4SKBV6YBNPRUBAL5P2CN/
https://github.com/python/cpython/pull/99421
https://pointernull.com/security/python-url-parse-problem.html
https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html




© 1998-2025 E-Soft Inc. All rights reserved.