Package | Installed | Affected | Info |
---|---|---|---|
pygments | 2.10.0 | <2.15.0 |
show Pygments 2.15.0 includes a fix for CVE-2022-40896: The regular expressions used when parsing Smithy, SQL/SQL+Jinja, and Java properties files were discovered to be vulnerable. As a result, pygmentizing a maliciously-crafted file of these kinds would have resulted in high resources consumption or crashing of the application. https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages-part-2 |
Package | Installed | Affected | Info |
---|---|---|---|
pygments | 2.10.0 | <2.15.0 |
show Pygments 2.15.0 includes a fix for CVE-2022-40896: The regular expressions used when parsing Smithy, SQL/SQL+Jinja, and Java properties files were discovered to be vulnerable. As a result, pygmentizing a maliciously-crafted file of these kinds would have resulted in high resources consumption or crashing of the application. https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages-part-2 |
Package | Installed | Affected | Info |
---|---|---|---|
pygments | 2.10.0 | <2.15.0 |
show Pygments 2.15.0 includes a fix for CVE-2022-40896: The regular expressions used when parsing Smithy, SQL/SQL+Jinja, and Java properties files were discovered to be vulnerable. As a result, pygmentizing a maliciously-crafted file of these kinds would have resulted in high resources consumption or crashing of the application. https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages-part-2 |
Package | Installed | Affected | Info |
---|---|---|---|
pygments | 2.10.0 | <2.15.0 |
show Pygments 2.15.0 includes a fix for CVE-2022-40896: The regular expressions used when parsing Smithy, SQL/SQL+Jinja, and Java properties files were discovered to be vulnerable. As a result, pygmentizing a maliciously-crafted file of these kinds would have resulted in high resources consumption or crashing of the application. https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages-part-2 |
Package | Installed | Affected | Info |
---|---|---|---|
pygments | 2.10.0 | <2.15.0 |
show Pygments 2.15.0 includes a fix for CVE-2022-40896: The regular expressions used when parsing Smithy, SQL/SQL+Jinja, and Java properties files were discovered to be vulnerable. As a result, pygmentizing a maliciously-crafted file of these kinds would have resulted in high resources consumption or crashing of the application. https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages-part-2 |
Package | Installed | Affected | Info |
---|---|---|---|
pygments | 2.10.0 | <2.15.0 |
show Pygments 2.15.0 includes a fix for CVE-2022-40896: The regular expressions used when parsing Smithy, SQL/SQL+Jinja, and Java properties files were discovered to be vulnerable. As a result, pygmentizing a maliciously-crafted file of these kinds would have resulted in high resources consumption or crashing of the application. https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages-part-2 |
Package | Installed | Affected | Info |
---|---|---|---|
pygments | 2.10.0 | <2.15.0 |
show Pygments 2.15.0 includes a fix for CVE-2022-40896: The regular expressions used when parsing Smithy, SQL/SQL+Jinja, and Java properties files were discovered to be vulnerable. As a result, pygmentizing a maliciously-crafted file of these kinds would have resulted in high resources consumption or crashing of the application. https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages-part-2 |
Package | Installed | Affected | Info |
---|---|---|---|
pygments | 2.10.0 | <2.15.0 |
show Pygments 2.15.0 includes a fix for CVE-2022-40896: The regular expressions used when parsing Smithy, SQL/SQL+Jinja, and Java properties files were discovered to be vulnerable. As a result, pygmentizing a maliciously-crafted file of these kinds would have resulted in high resources consumption or crashing of the application. https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages-part-2 |
Package | Installed | Affected | Info |
---|---|---|---|
pygments | 2.10.0 | <2.15.0 |
show Pygments 2.15.0 includes a fix for CVE-2022-40896: The regular expressions used when parsing Smithy, SQL/SQL+Jinja, and Java properties files were discovered to be vulnerable. As a result, pygmentizing a maliciously-crafted file of these kinds would have resulted in high resources consumption or crashing of the application. https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages-part-2 |
Package | Installed | Affected | Info |
---|---|---|---|
pygments | 2.10.0 | <2.15.0 |
show Pygments 2.15.0 includes a fix for CVE-2022-40896: The regular expressions used when parsing Smithy, SQL/SQL+Jinja, and Java properties files were discovered to be vulnerable. As a result, pygmentizing a maliciously-crafted file of these kinds would have resulted in high resources consumption or crashing of the application. https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages-part-2 |
Package | Installed | Affected | Info |
---|---|---|---|
pygments | 2.10.0 | <2.15.0 |
show Pygments 2.15.0 includes a fix for CVE-2022-40896: The regular expressions used when parsing Smithy, SQL/SQL+Jinja, and Java properties files were discovered to be vulnerable. As a result, pygmentizing a maliciously-crafted file of these kinds would have resulted in high resources consumption or crashing of the application. https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages-part-2 |
Package | Installed | Affected | Info |
---|---|---|---|
pygments | 2.10.0 | <2.15.0 |
show Pygments 2.15.0 includes a fix for CVE-2022-40896: The regular expressions used when parsing Smithy, SQL/SQL+Jinja, and Java properties files were discovered to be vulnerable. As a result, pygmentizing a maliciously-crafted file of these kinds would have resulted in high resources consumption or crashing of the application. https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages-part-2 |
Package | Installed | Affected | Info |
---|---|---|---|
pygments | 2.10.0 | <2.15.0 |
show Pygments 2.15.0 includes a fix for CVE-2022-40896: The regular expressions used when parsing Smithy, SQL/SQL+Jinja, and Java properties files were discovered to be vulnerable. As a result, pygmentizing a maliciously-crafted file of these kinds would have resulted in high resources consumption or crashing of the application. https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages-part-2 |
Package | Installed | Affected | Info |
---|---|---|---|
pygments | 2.10.0 | <2.15.0 |
show Pygments 2.15.0 includes a fix for CVE-2022-40896: The regular expressions used when parsing Smithy, SQL/SQL+Jinja, and Java properties files were discovered to be vulnerable. As a result, pygmentizing a maliciously-crafted file of these kinds would have resulted in high resources consumption or crashing of the application. https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages-part-2 |
https://pyup.io/repos/github/apihackers/docker-pelican/python-3-shield.svg
[](https://pyup.io/repos/github/apihackers/docker-pelican/)
.. image:: https://pyup.io/repos/github/apihackers/docker-pelican/python-3-shield.svg :target: https://pyup.io/repos/github/apihackers/docker-pelican/ :alt: Python 3
<a href="https://pyup.io/repos/github/apihackers/docker-pelican/"><img src="https://pyup.io/repos/github/apihackers/docker-pelican/shield.svg" alt="Python 3" /></a>
!https://pyup.io/repos/github/apihackers/docker-pelican/python-3-shield.svg(Python 3)!:https://pyup.io/repos/github/apihackers/docker-pelican/
{<img src="https://pyup.io/repos/github/apihackers/docker-pelican/python-3-shield.svg" alt="Python 3" />}[https://pyup.io/repos/github/apihackers/docker-pelican/]
https://pyup.io/repos/github/apihackers/docker-pelican/shield.svg
[](https://pyup.io/repos/github/apihackers/docker-pelican/)
.. image:: https://pyup.io/repos/github/apihackers/docker-pelican/shield.svg :target: https://pyup.io/repos/github/apihackers/docker-pelican/ :alt: Updates
<a href="https://pyup.io/repos/github/apihackers/docker-pelican/"><img src="https://pyup.io/repos/github/apihackers/docker-pelican/shield.svg" alt="Updates" /></a>
!https://pyup.io/repos/github/apihackers/docker-pelican/shield.svg(Updates)!:https://pyup.io/repos/github/apihackers/docker-pelican/
{<img src="https://pyup.io/repos/github/apihackers/docker-pelican/shield.svg" alt="Updates" />}[https://pyup.io/repos/github/apihackers/docker-pelican/]