Package | Installed | Affected | Info |
---|---|---|---|
pip | 24.0 | <25.0 |
show Pip solves a security vulnerability that previously allowed maliciously crafted wheel files to execute unauthorized code during installation. |
black | 24.2.0 | <24.3.0 |
show Affected versions of Black are vulnerable to Regular Expression Denial of Service (ReDoS) via the lines_with_leading_tabs_expanded function in the strings.py file. An attacker could exploit this vulnerability by crafting a malicious input that causes a denial of service. |
Package | Installed | Affected | Info |
---|---|---|---|
pip | 24.0 | <25.0 |
show Pip solves a security vulnerability that previously allowed maliciously crafted wheel files to execute unauthorized code during installation. |
black | 24.2.0 | <24.3.0 |
show Affected versions of Black are vulnerable to Regular Expression Denial of Service (ReDoS) via the lines_with_leading_tabs_expanded function in the strings.py file. An attacker could exploit this vulnerability by crafting a malicious input that causes a denial of service. |
Package | Installed | Affected | Info |
---|---|---|---|
pip | 24.0 | <25.0 |
show Pip solves a security vulnerability that previously allowed maliciously crafted wheel files to execute unauthorized code during installation. |
black | 24.2.0 | <24.3.0 |
show Affected versions of Black are vulnerable to Regular Expression Denial of Service (ReDoS) via the lines_with_leading_tabs_expanded function in the strings.py file. An attacker could exploit this vulnerability by crafting a malicious input that causes a denial of service. |
Package | Installed | Affected | Info |
---|---|---|---|
pip | 24.0 | <25.0 |
show Pip solves a security vulnerability that previously allowed maliciously crafted wheel files to execute unauthorized code during installation. |
black | 24.2.0 | <24.3.0 |
show Affected versions of Black are vulnerable to Regular Expression Denial of Service (ReDoS) via the lines_with_leading_tabs_expanded function in the strings.py file. An attacker could exploit this vulnerability by crafting a malicious input that causes a denial of service. |
Package | Installed | Affected | Info |
---|---|---|---|
pip | 24.0 | <25.0 |
show Pip solves a security vulnerability that previously allowed maliciously crafted wheel files to execute unauthorized code during installation. |
black | 24.2.0 | <24.3.0 |
show Affected versions of Black are vulnerable to Regular Expression Denial of Service (ReDoS) via the lines_with_leading_tabs_expanded function in the strings.py file. An attacker could exploit this vulnerability by crafting a malicious input that causes a denial of service. |
Package | Installed | Affected | Info |
---|---|---|---|
pip | 24.0 | <25.0 |
show Pip solves a security vulnerability that previously allowed maliciously crafted wheel files to execute unauthorized code during installation. |
Package | Installed | Affected | Info |
---|---|---|---|
pip | 24.0 | <25.0 |
show Pip solves a security vulnerability that previously allowed maliciously crafted wheel files to execute unauthorized code during installation. |
black | 24.2.0 | <24.3.0 |
show Affected versions of Black are vulnerable to Regular Expression Denial of Service (ReDoS) via the lines_with_leading_tabs_expanded function in the strings.py file. An attacker could exploit this vulnerability by crafting a malicious input that causes a denial of service. |
Package | Installed | Affected | Info |
---|---|---|---|
black | 24.2.0 | <24.3.0 |
show Affected versions of Black are vulnerable to Regular Expression Denial of Service (ReDoS) via the lines_with_leading_tabs_expanded function in the strings.py file. An attacker could exploit this vulnerability by crafting a malicious input that causes a denial of service. |
https://pyup.io/repos/github/hydrosquall/tiingo-python/python-3-shield.svg
[](https://pyup.io/repos/github/hydrosquall/tiingo-python/)
.. image:: https://pyup.io/repos/github/hydrosquall/tiingo-python/python-3-shield.svg :target: https://pyup.io/repos/github/hydrosquall/tiingo-python/ :alt: Python 3
<a href="https://pyup.io/repos/github/hydrosquall/tiingo-python/"><img src="https://pyup.io/repos/github/hydrosquall/tiingo-python/shield.svg" alt="Python 3" /></a>
!https://pyup.io/repos/github/hydrosquall/tiingo-python/python-3-shield.svg(Python 3)!:https://pyup.io/repos/github/hydrosquall/tiingo-python/
{<img src="https://pyup.io/repos/github/hydrosquall/tiingo-python/python-3-shield.svg" alt="Python 3" />}[https://pyup.io/repos/github/hydrosquall/tiingo-python/]
https://pyup.io/repos/github/hydrosquall/tiingo-python/shield.svg
[](https://pyup.io/repos/github/hydrosquall/tiingo-python/)
.. image:: https://pyup.io/repos/github/hydrosquall/tiingo-python/shield.svg :target: https://pyup.io/repos/github/hydrosquall/tiingo-python/ :alt: Updates
<a href="https://pyup.io/repos/github/hydrosquall/tiingo-python/"><img src="https://pyup.io/repos/github/hydrosquall/tiingo-python/shield.svg" alt="Updates" /></a>
!https://pyup.io/repos/github/hydrosquall/tiingo-python/shield.svg(Updates)!:https://pyup.io/repos/github/hydrosquall/tiingo-python/
{<img src="https://pyup.io/repos/github/hydrosquall/tiingo-python/shield.svg" alt="Updates" />}[https://pyup.io/repos/github/hydrosquall/tiingo-python/]