Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 17 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Python
Python cpython |
|
| Vendors & Products |
Python
Python cpython |
Tue, 17 Mar 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-791 | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Mon, 16 Mar 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-116 CWE-20 |
|
| Metrics |
ssvc
|
Mon, 16 Mar 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 16 Mar 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The fix for CVE-2026-0672, which rejected control characters in http.cookies.Morsel, was incomplete. The Morsel.update(), |= operator, and unpickling paths were not patched, allowing control characters to bypass input validation. Additionally, BaseCookie.js_output() lacked the output validation applied to BaseCookie.output(). | |
| Title | Incomplete control character validation in http.cookies | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: PSF
Published:
Updated: 2026-03-16T18:25:55.021Z
Reserved: 2026-03-06T16:13:09.289Z
Link: CVE-2026-3644
Updated: 2026-03-16T18:24:32.300Z
Status : Awaiting Analysis
Published: 2026-03-16T18:16:09.907
Modified: 2026-03-17T14:20:01.670
Link: CVE-2026-3644
OpenCVE Enrichment
Updated: 2026-03-17T09:52:25Z