Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3575-1 | python2.7 security update |
Debian DLA |
DLA-3948-1 | pypy3 security update |
Debian DLA |
DLA-3980-1 | python3.9 security update |
EUVD |
EUVD-2023-28385 | An issue in the urllib.parse component of Python before 3.11.4 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters. |
Ubuntu USN |
USN-5888-1 | Python vulnerabilities |
Ubuntu USN |
USN-5960-1 | Python vulnerability |
Ubuntu USN |
USN-6139-1 | Python vulnerability |
Ubuntu USN |
USN-6891-1 | Python vulnerabilities |
Ubuntu USN |
USN-7180-1 | Python vulnerabilities |
Mon, 03 Nov 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 18 Mar 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Subscriptions
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-11-03T21:47:22.781Z
Reserved: 2023-01-23T00:00:00.000Z
Link: CVE-2023-24329
Updated: 2025-11-03T21:47:22.781Z
Status : Modified
Published: 2023-02-17T15:15:12.243
Modified: 2025-11-03T22:16:05.300
Link: CVE-2023-24329
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN