You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Path to dependency file: /asynql/docs/requirements.txt
Path to vulnerable library: /teSource-ArchiveExtractor_c7182848-0dc6-4a0a-8209-5c716eca17c9/20190619005844_75866/20190619005751_depth_0/12/dparse-0.4.1-py2-none-any/dparse
dparse is a parser for Python dependency files. dparse in versions before 0.5.2 contain a regular expression that is vulnerable to a Regular Expression Denial of Service. All the users parsing index server URLs with dparse are impacted by this vulnerability. A patch has been applied in version 0.5.2, all the users are advised to upgrade to 0.5.2 as soon as possible. Users unable to upgrade should avoid passing index server URLs in the source file to be parsed.
CVE-2022-39280 - High Severity Vulnerability
A parser for Python dependency files
Library home page: https://files.pythonhosted.org/packages/8b/47/15ed57610527be03bd9a3f0853bc5a22f87f6e80cbe59a2608b30f19ed78/dparse-0.4.1-py2-none-any.whl
Path to dependency file: /asynql/docs/requirements.txt
Path to vulnerable library: /teSource-ArchiveExtractor_c7182848-0dc6-4a0a-8209-5c716eca17c9/20190619005844_75866/20190619005751_depth_0/12/dparse-0.4.1-py2-none-any/dparse
Dependency Hierarchy:
Found in base branch: master
dparse is a parser for Python dependency files. dparse in versions before 0.5.2 contain a regular expression that is vulnerable to a Regular Expression Denial of Service. All the users parsing index server URLs with dparse are impacted by this vulnerability. A patch has been applied in version
0.5.2
, all the users are advised to upgrade to0.5.2
as soon as possible. Users unable to upgrade should avoid passing index server URLs in the source file to be parsed.Publish Date: 2022-10-06
URL: CVE-2022-39280
Base Score Metrics:
Type: Upgrade version
Origin: GHSA-8fg9-p83m-x5pq
Release Date: 2022-10-06
Fix Resolution: 0.5.2
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: