Safety vulnerability ID: 45693
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Algorithmic complexity vulnerability in the ssl.match_hostname function in Python 3.2.x, 3.3.x, and earlier, and unspecified versions of python-backports-ssl_match_hostname as used for older Python versions, allows remote attackers to cause a denial of service (CPU consumption) via multiple wildcard characters in the common name in a certificate.
Latest version: 0.9.8
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application