Python <= 2.7.18, 3.x <= 3.12.3 Security Bypass Vulnerability - Windows CVE-2023-27043
- Severity
- Vulnerability description
- Not available
- Risk description
- Not available
- Recommendation
- Not available
- References
- https://github.com/psf/advisory-database/blob/main/advisories/python/PSF-2023-2.jsonhttps://osv.dev/list?ecosystem=&q=CVE-2023-27043https://github.com/python/cpython/issues/102988https://github.com/python/cpython/issues/102988#issuecomment-1983087271https://peps.python.org/pep-0719https://python-security.readthedocs.io/vuln/email-parseaddr-realname.html
- Codename
- Not available
- Detectable with
- Network Scanner
- Scan engine
- OpenVAS
- Exploitable with Sniper
- No
- CVE Published
- Not available
- Detection added at
- Software Type
- Not available
- Vendor
- Not available
- Product
- Not available
Detect this vulnerability now!
Check your clients' targets (or your own) for this vulnerability and thousands more! Get proof for validation with our ethical hacking toolkit.