https://www.cisa.gov/news-events/ics-advisories/icsa-25-105-08
http://www.nessus.org/u?310ae51a
https://github.com/python/cpython/issues/102153
https://github.com/python/cpython/pull/99421
https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html
http://www.nessus.org/u?e82eb440
http://www.nessus.org/u?bc1d9732
http://www.nessus.org/u?e2741e80
http://www.nessus.org/u?ee3a28d8
http://www.nessus.org/u?ec244ad9
http://www.nessus.org/u?ca3945ed
http://www.nessus.org/u?aab3175e
http://www.nessus.org/u?251cbe42
http://www.nessus.org/u?9c22dee5
http://www.nessus.org/u?a79e1149
http://www.nessus.org/u?2217e625
http://www.nessus.org/u?b745b917
http://www.nessus.org/u?3eb89119
http://www.nessus.org/u?0ebf99a8
http://www.nessus.org/u?f12ee905
http://www.nessus.org/u?59e332e3
http://www.nessus.org/u?0d536030
http://www.nessus.org/u?e6726e8d
http://www.nessus.org/u?e5d72c56
http://www.nessus.org/u?71f75744
http://www.nessus.org/u?05ef6b00
https://pointernull.com/security/python-url-parse-problem.html
Severity: High
ID: 503227
Version: 1.1
Type: remote
Family: Tenable.ot
Published: 5/27/2025
Updated: 5/27/2025
Supported Sensors: Tenable OT Security
Risk Factor: Medium
Score: 4.4
Risk Factor: High
Base Score: 7.5
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CPE: cpe:/o:abb:sw_firmware, cpe:/o:abb:arm600_firmware
Required KB Items: Tenable.ot/ABB
Exploit Ease: No known exploits are available
Patch Publication Date: 2/17/2023
Vulnerability Publication Date: 2/17/2023
CVE: CVE-2023-24329
CWE: 20
ICSA: 25-105-08