You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Denial of service could be caused to the command line interface of markdown-it-py, before v2.2.0, if an attacker was allowed to use invalid UTF-8 characters as input.
mend-bolt-for-githubbot
changed the title
ansible_lint-5.4.0-py3-none-any.whl: 2 vulnerabilities (highest severity is: 3.3)
ansible_lint-5.4.0-py3-none-any.whl: 2 vulnerabilities (highest severity is: 5.5)
Jul 15, 2023
mend-bolt-for-githubbot
changed the title
ansible_lint-5.4.0-py3-none-any.whl: 2 vulnerabilities (highest severity is: 5.5)
ansible_lint-5.4.0-py3-none-any.whl: 3 vulnerabilities (highest severity is: 5.5)
Dec 15, 2023
Vulnerable Library - ansible_lint-5.4.0-py3-none-any.whl
Path to dependency file: /requirements.txt
Path to vulnerable library: /requirements.txt
Vulnerabilities
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2022-40896
Vulnerable Library - Pygments-2.14.0-py3-none-any.whl
Pygments is a syntax highlighting package written in Python.
Library home page: https://files.pythonhosted.org/packages/0b/42/d9d95cc461f098f204cd20c85642ae40fbff81f74c300341b8d0e0df14e0/Pygments-2.14.0-py3-none-any.whl
Path to dependency file: /requirements.txt
Path to vulnerable library: /requirements.txt
Dependency Hierarchy:
Found in base branch: main
Vulnerability Details
A ReDoS issue was discovered in pygments/lexers/smithy.py in pygments through 2.15.0 via SmithyLexer.
Publish Date: 2023-07-19
URL: CVE-2022-40896
CVSS 3 Score Details (5.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://pyup.io/vulnerabilities/CVE-2022-40896/58910/
Release Date: 2023-07-19
Fix Resolution (Pygments): 2.15.0
Direct dependency fix Resolution (ansible-lint): 6.0.0
Step up your Open Source Security Game with Mend here
CVE-2023-26303
Vulnerable Library - markdown_it_py-2.1.0-py3-none-any.whl
Python port of markdown-it. Markdown parsing, done right!
Library home page: https://files.pythonhosted.org/packages/f9/3f/ecd1b708973b9a3e4574b43cffc1ce8eb98696da34f1a1c44a68c3c0d737/markdown_it_py-2.1.0-py3-none-any.whl
Path to dependency file: /requirements.txt
Path to vulnerable library: /requirements.txt
Dependency Hierarchy:
Found in base branch: main
Vulnerability Details
Denial of service could be caused to markdown-it-py, before v2.2.0, if an attacker was allowed to force null assertions with specially crafted input.
Publish Date: 2023-02-22
URL: CVE-2023-26303
CVSS 3 Score Details (3.3)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://www.cve.org/CVERecord?id=CVE-2023-26303
Release Date: 2023-02-22
Fix Resolution (markdown-it-py): 2.2.0
Direct dependency fix Resolution (ansible-lint): 6.0.0
Step up your Open Source Security Game with Mend here
CVE-2023-26302
Vulnerable Library - markdown_it_py-2.1.0-py3-none-any.whl
Python port of markdown-it. Markdown parsing, done right!
Library home page: https://files.pythonhosted.org/packages/f9/3f/ecd1b708973b9a3e4574b43cffc1ce8eb98696da34f1a1c44a68c3c0d737/markdown_it_py-2.1.0-py3-none-any.whl
Path to dependency file: /requirements.txt
Path to vulnerable library: /requirements.txt
Dependency Hierarchy:
Found in base branch: main
Vulnerability Details
Denial of service could be caused to the command line interface of markdown-it-py, before v2.2.0, if an attacker was allowed to use invalid UTF-8 characters as input.
Publish Date: 2023-02-22
URL: CVE-2023-26302
CVSS 3 Score Details (3.3)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://www.cve.org/CVERecord?id=CVE-2023-26302
Release Date: 2023-02-22
Fix Resolution (markdown-it-py): 2.2.0
Direct dependency fix Resolution (ansible-lint): 6.0.0
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: