A denial of service via regular expression in the py.path.svnwc component of py (aka python-py) through 1.9.0 could be used by attackers to cause a compute-time denial of service attack by supplying malicious input to the blame functionality.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-3966-1 | pypy3 security update |
![]() |
EUVD-2020-0152 | A denial of service via regular expression in the py.path.svnwc component of py (aka python-py) through 1.9.0 could be used by attackers to cause a compute-time denial of service attack by supplying malicious input to the blame functionality. |
![]() |
GHSA-hj5v-574p-mj7c | py vulnerable to Regular Expression Denial of Service |
![]() |
USN-5138-1 | python-py vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 14 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T16:55:10.822Z
Reserved: 2020-12-09T00:00:00
Link: CVE-2020-29651

No data.

Status : Modified
Published: 2020-12-09T07:15:12.533
Modified: 2024-11-21T05:24:21.253
Link: CVE-2020-29651


No data.