Git Repository

    1. 2021-03-09T15:04:19.005+0200 INFO Detecting pipenv vulnerabilities...
    2. Cargo.lock
    3. ==========
    4. Total: 7 (UNKNOWN: 7, LOW: 0, MEDIUM: 0, HIGH: 0, CRITICAL: 0)
    5. +----------+-------------------+----------+-------------------+------------------------------+---------------------------------------------+
    6. | LIBRARY | VULNERABILITY ID | SEVERITY | INSTALLED VERSION | FIXED VERSION | TITLE |
    7. +----------+-------------------+----------+-------------------+------------------------------+---------------------------------------------+
    8. | ammonia | RUSTSEC-2019-0001 | UNKNOWN | 1.9.0 | >= 2.1.0 | Uncontrolled recursion leads |
    9. | | | | | | to abort in HTML serialization |
    10. | | | | | | -->rustsec.org/advisories/RUSTSEC-2019-0001 |
    11. +----------+-------------------+ +-------------------+------------------------------+---------------------------------------------+
    12. | openssl | RUSTSEC-2016-0001 | | 0.8.3 | >= 0.9.0 | SSL/TLS MitM vulnerability |
    13. | | | | | | due to insecure defaults |
    14. | | | | | | -->rustsec.org/advisories/RUSTSEC-2016-0001 |
    15. +----------+-------------------+ +-------------------+------------------------------+---------------------------------------------+
    16. | smallvec | RUSTSEC-2018-0018 | | 0.6.9 | >= 0.6.13 | smallvec creates uninitialized |
    17. | | | | | | value of any type |
    18. | | | | | | -->rustsec.org/advisories/RUSTSEC-2018-0018 |
    19. + +-------------------+ + +------------------------------+---------------------------------------------+
    20. | | RUSTSEC-2019-0009 | | | >= 0.6.10 | Double-free and use-after-free |
    21. | | | | | | in SmallVec::grow() |
    22. | | | | | | -->rustsec.org/advisories/RUSTSEC-2019-0009 |
    23. + +-------------------+ + + +---------------------------------------------+
    24. | | RUSTSEC-2019-0012 | | | | Memory corruption in SmallVec::grow() |
    25. | | | | | | -->rustsec.org/advisories/RUSTSEC-2019-0012 |
    26. + +-------------------+ + +------------------------------+---------------------------------------------+
    27. | | RUSTSEC-2021-0003 | | | >= 0.6.14, < 1.0.0, >= 1.6.1 | Buffer overflow in SmallVec::insert_many |
    28. | | | | | | -->rustsec.org/advisories/RUSTSEC-2021-0003 |
    29. +----------+-------------------+ +-------------------+------------------------------+---------------------------------------------+
    30. | tempdir | RUSTSEC-2018-0017 | | 0.3.7 | | `tempdir` crate has been |
    31. | | | | | | deprecated; use `tempfile` instead |
    32. | | | | | | -->rustsec.org/advisories/RUSTSEC-2018-0017 |
    33. +----------+-------------------+----------+-------------------+------------------------------+---------------------------------------------+
    34. Pipfile.lock
    35. ============
    36. Total: 20 (UNKNOWN: 3, LOW: 0, MEDIUM: 7, HIGH: 5, CRITICAL: 5)
    37. +---------------------+------------------+----------+-------------------+------------------------+---------------------------------------+
    38. | LIBRARY | VULNERABILITY ID | SEVERITY | INSTALLED VERSION | FIXED VERSION | TITLE |
    39. | | | | | | allows account takeover |
    40. | | | | | | -->avd.aquasec.com/nvd/cve-2019-19844 |
    41. + +------------------+ + +------------------------+---------------------------------------+
    42. | | CVE-2020-7471 | | | 3.0.3, 2.2.10, 1.11.28 | django: potential SQL injection |
    43. | | | | | | via StringAgg(delimiter) |
    44. | | | | | | -->avd.aquasec.com/nvd/cve-2020-7471 |
    45. + +------------------+----------+ +------------------------+---------------------------------------+
    46. | | CVE-2019-6975 | HIGH | | 2.1.6, 2.0.11, 1.11.19 | python-django: memory exhaustion in |
    47. | | | | | | django.utils.numberformat.format() |
    48. | | | | | | -->avd.aquasec.com/nvd/cve-2019-6975 |
    49. + +------------------+ + +------------------------+---------------------------------------+
    50. | | CVE-2020-9402 | | | 3.0.4, 2.2.11, 1.11.29 | django: potential SQL injection |
    51. | | | | | | via "tolerance" parameter in |
    52. | | | | | | GIS functions and aggregates... |
    53. | | | | | | -->avd.aquasec.com/nvd/cve-2020-9402 |
    54. + +------------------+----------+ +------------------------+---------------------------------------+
    55. | | CVE-2019-3498 | MEDIUM | | 2.1.5, 2.0.10, 1.11.18 | python-django: Content spoofing |
    56. | | | | | | via URL path in default 404 page |
    57. | | | | | | -->avd.aquasec.com/nvd/cve-2019-3498 |
    58. + +------------------+ + +------------------------+---------------------------------------+
    59. | | CVE-2020-13254 | | | 3.0.7, 2.2.13 | django: potential data leakage |
    60. | | | | | | via malformed memcached keys |
    61. | | | | | | -->avd.aquasec.com/nvd/cve-2020-13254 |
    62. + +------------------+ + + +---------------------------------------+
    63. | | CVE-2020-13596 | | | | django: possible XSS via |
    64. | | | | | | admin ForeignKeyRawIdWidget |
    65. | | | | | | -->avd.aquasec.com/nvd/cve-2020-13596 |
    66. +---------------------+------------------+----------+-------------------+------------------------+---------------------------------------+
    67. | django-cors-headers | pyup.io-37132 | UNKNOWN | 2.5.2 | 3.0.0 | In django-cors-headers |
    68. | | | | | | version 3.0.0, |
    69. | | | | | | ``CORS_ORIGIN_WHITELIST`` |
    70. | | | | | | requires URI schemes, and |
    71. | | | | | | optionally ports. This... |
    72. +---------------------+------------------+----------+-------------------+------------------------+---------------------------------------+
    73. | djangorestframework | CVE-2020-25626 | MEDIUM | 3.9.2 | 3.11.2 | django-rest-framework: XSS |
    74. | | | | | | Vulnerability in API viewer |
    75. | | | | | | -->avd.aquasec.com/nvd/cve-2020-25626 |
    76. +---------------------+------------------+----------+-------------------+------------------------+---------------------------------------+
    77. | httplib2 | CVE-2021-21240 | HIGH | 0.12.1 | 0.19.0 | python-httplib2: Regular |
    78. | | | | | | expression denial of |
    79. | | | | | | service via malicious header |
    80. | | | | | | -->avd.aquasec.com/nvd/cve-2021-21240 |
    81. | | | | | | via an attacker controlled |
    82. | | | | | | unescaped part of uri for... |
    83. | | | | | | -->avd.aquasec.com/nvd/cve-2020-11078 |
    84. + +------------------+----------+ + +---------------------------------------+
    85. | | pyup.io-38303 | UNKNOWN | | | Httplib2 0.18.0 is an |
    86. | | | | | | important security update to |
    87. | | | | | | patch a CWE-93 CRLF... |
    88. +---------------------+------------------+ +-------------------+------------------------+---------------------------------------+
    89. | jinja2 | pyup.io-39525 | | 2.10.1 | 2.11.3 | This affects the package |
    90. | | | | | | jinja2 from 0.0.0 and before |
    91. | | | | | | 2.11.3. The ReDOS... |
    92. +---------------------+------------------+----------+-------------------+------------------------+---------------------------------------+
    93. | py | CVE-2020-29651 | HIGH | 1.8.0 | | python-py: ReDoS in the py.path.svnwc |
    94. | | | | | | component via mailicious input |
    95. | | | | | | to blame functionality... |
    96. | | | | | | -->avd.aquasec.com/nvd/cve-2020-29651 |
    97. +---------------------+------------------+----------+-------------------+------------------------+---------------------------------------+
    98. | pyyaml | CVE-2019-20477 | CRITICAL | 5.1 | | PyYAML: command execution |
    99. | | | | | | through python/object/apply |
    100. | | | | | | constructor in FullLoader |
    101. | | | | | | -->avd.aquasec.com/nvd/cve-2019-20477 |
    102. + +------------------+ + +------------------------+---------------------------------------+
    103. | | CVE-2020-14343 | | | 5.4 | PyYAML: incomplete |
    104. | | | | | | fix for CVE-2020-1747 |
    105. | | | | | | -->avd.aquasec.com/nvd/cve-2020-14343 |
    106. + +------------------+ + +------------------------+---------------------------------------+
    107. | | CVE-2020-1747 | | | 5.3.1 | PyYAML: arbitrary command |
    108. | | | | | | execution through python/object/new |
    109. | | | | | | when FullLoader is used |
    110. | | | | | | -->avd.aquasec.com/nvd/cve-2020-1747 |
    111. +---------------------+------------------+----------+-------------------+------------------------+---------------------------------------+
    112. | urllib3 | CVE-2019-11324 | HIGH | 1.24.1 | 1.24.2 | python-urllib3: Certification |
    113. | | | | | | mishandle when error should be thrown |
    114. | | | | | | -->avd.aquasec.com/nvd/cve-2019-11324 |
    115. + +------------------+----------+ +------------------------+---------------------------------------+
    116. | | CVE-2019-11236 | MEDIUM | | | python-urllib3: CRLF injection |
    117. | | | | | | due to not encoding the |
    118. | | | | | | '\r\n' sequence leading to... |
    119. | | | | | | -->avd.aquasec.com/nvd/cve-2019-11236 |
    120. + +------------------+ + +------------------------+---------------------------------------+
    121. | | CVE-2020-26137 | | | 1.25.9 | python-urllib3: CRLF injection |
    122. | | | | | | via HTTP request method |