| Package | Installed | Affected | Info |
|---|---|---|---|
| kivy | 2.3.0 | <2023.05.21 |
show Kivy 2023.05.21 upgrades its grunt version to be greater than or equal to 1.3.0 carried out in response to the vulnerability addressed in CVE-2020-7729. https://github.com/kivy/python-for-android/pull/2484/commits/f21f9f16bb62a123d7f8000e9a8743f07f5667b7 |
| Package | Installed | Affected | Info |
|---|---|---|---|
| kivy | 2.3.0 | <2023.05.21 |
show Kivy 2023.05.21 upgrades its grunt version to be greater than or equal to 1.3.0 carried out in response to the vulnerability addressed in CVE-2020-7729. https://github.com/kivy/python-for-android/pull/2484/commits/f21f9f16bb62a123d7f8000e9a8743f07f5667b7 |
| Package | Installed | Affected | Info |
|---|---|---|---|
| kivy | 2.3.0 | <2023.05.21 |
show Kivy 2023.05.21 upgrades its grunt version to be greater than or equal to 1.3.0 carried out in response to the vulnerability addressed in CVE-2020-7729. https://github.com/kivy/python-for-android/pull/2484/commits/f21f9f16bb62a123d7f8000e9a8743f07f5667b7 |
| Package | Installed | Affected | Info |
|---|---|---|---|
| kivy | 2.3.0 | <2023.05.21 |
show Kivy 2023.05.21 upgrades its grunt version to be greater than or equal to 1.3.0 carried out in response to the vulnerability addressed in CVE-2020-7729. https://github.com/kivy/python-for-android/pull/2484/commits/f21f9f16bb62a123d7f8000e9a8743f07f5667b7 |
| Package | Installed | Affected | Info |
|---|---|---|---|
| pip | 24.0 | <25.2 |
show Affected versions of the pip package are vulnerable to Arbitrary File Overwrite due to improper validation of symbolic link targets in the fallback tar extraction code. In src/pip/_internal/utils/unpacking.py, the _untar_without_filter routine used when the Python tarfile module lacks PEP 706 (no tarfile.data_filter) extracted symlink members with tar._extract_member without verifying that link destinations resolve under the extraction root, a check later added via the is_symlink_target_in_tar helper. |
| pip | 24.0 | <25.0 |
show Pip solves a security vulnerability that previously allowed maliciously crafted wheel files to execute unauthorized code during installation. |
| kivy | 2.3.0 | <2023.05.21 |
show Kivy 2023.05.21 upgrades its grunt version to be greater than or equal to 1.3.0 carried out in response to the vulnerability addressed in CVE-2020-7729. https://github.com/kivy/python-for-android/pull/2484/commits/f21f9f16bb62a123d7f8000e9a8743f07f5667b7 |
| Package | Installed | Affected | Info |
|---|---|---|---|
| pip | 24.0 | <25.2 |
show Affected versions of the pip package are vulnerable to Arbitrary File Overwrite due to improper validation of symbolic link targets in the fallback tar extraction code. In src/pip/_internal/utils/unpacking.py, the _untar_without_filter routine used when the Python tarfile module lacks PEP 706 (no tarfile.data_filter) extracted symlink members with tar._extract_member without verifying that link destinations resolve under the extraction root, a check later added via the is_symlink_target_in_tar helper. |
| pip | 24.0 | <25.0 |
show Pip solves a security vulnerability that previously allowed maliciously crafted wheel files to execute unauthorized code during installation. |
| kivy | 2.3.0 | <2023.05.21 |
show Kivy 2023.05.21 upgrades its grunt version to be greater than or equal to 1.3.0 carried out in response to the vulnerability addressed in CVE-2020-7729. https://github.com/kivy/python-for-android/pull/2484/commits/f21f9f16bb62a123d7f8000e9a8743f07f5667b7 |
| Package | Installed | Affected | Info |
|---|---|---|---|
| pip | 24.0 | <25.2 |
show Affected versions of the pip package are vulnerable to Arbitrary File Overwrite due to improper validation of symbolic link targets in the fallback tar extraction code. In src/pip/_internal/utils/unpacking.py, the _untar_without_filter routine used when the Python tarfile module lacks PEP 706 (no tarfile.data_filter) extracted symlink members with tar._extract_member without verifying that link destinations resolve under the extraction root, a check later added via the is_symlink_target_in_tar helper. |
| pip | 24.0 | <25.0 |
show Pip solves a security vulnerability that previously allowed maliciously crafted wheel files to execute unauthorized code during installation. |
| kivy | 2.3.0 | <2023.05.21 |
show Kivy 2023.05.21 upgrades its grunt version to be greater than or equal to 1.3.0 carried out in response to the vulnerability addressed in CVE-2020-7729. https://github.com/kivy/python-for-android/pull/2484/commits/f21f9f16bb62a123d7f8000e9a8743f07f5667b7 |
| Package | Installed | Affected | Info |
|---|---|---|---|
| pip | 24.0 | <25.2 |
show Affected versions of the pip package are vulnerable to Arbitrary File Overwrite due to improper validation of symbolic link targets in the fallback tar extraction code. In src/pip/_internal/utils/unpacking.py, the _untar_without_filter routine used when the Python tarfile module lacks PEP 706 (no tarfile.data_filter) extracted symlink members with tar._extract_member without verifying that link destinations resolve under the extraction root, a check later added via the is_symlink_target_in_tar helper. |
| pip | 24.0 | <25.0 |
show Pip solves a security vulnerability that previously allowed maliciously crafted wheel files to execute unauthorized code during installation. |
| kivy | 2.3.0 | <2023.05.21 |
show Kivy 2023.05.21 upgrades its grunt version to be greater than or equal to 1.3.0 carried out in response to the vulnerability addressed in CVE-2020-7729. https://github.com/kivy/python-for-android/pull/2484/commits/f21f9f16bb62a123d7f8000e9a8743f07f5667b7 |
| Package | Installed | Affected | Info |
|---|---|---|---|
| kivy | 2.3.0 | <2023.05.21 |
show Kivy 2023.05.21 upgrades its grunt version to be greater than or equal to 1.3.0 carried out in response to the vulnerability addressed in CVE-2020-7729. https://github.com/kivy/python-for-android/pull/2484/commits/f21f9f16bb62a123d7f8000e9a8743f07f5667b7 |
| Package | Installed | Affected | Info |
|---|---|---|---|
| kivy | 2.3.0 | <2023.05.21 |
show Kivy 2023.05.21 upgrades its grunt version to be greater than or equal to 1.3.0 carried out in response to the vulnerability addressed in CVE-2020-7729. https://github.com/kivy/python-for-android/pull/2484/commits/f21f9f16bb62a123d7f8000e9a8743f07f5667b7 |
| Package | Installed | Affected | Info |
|---|---|---|---|
| kivy | 2.3.0 | <2023.05.21 |
show Kivy 2023.05.21 upgrades its grunt version to be greater than or equal to 1.3.0 carried out in response to the vulnerability addressed in CVE-2020-7729. https://github.com/kivy/python-for-android/pull/2484/commits/f21f9f16bb62a123d7f8000e9a8743f07f5667b7 |
| Package | Installed | Affected | Info |
|---|---|---|---|
| kivy | 2.3.0 | <2023.05.21 |
show Kivy 2023.05.21 upgrades its grunt version to be greater than or equal to 1.3.0 carried out in response to the vulnerability addressed in CVE-2020-7729. https://github.com/kivy/python-for-android/pull/2484/commits/f21f9f16bb62a123d7f8000e9a8743f07f5667b7 |
https://pyup.io/repos/github/sintefneodroid/neo/python-3-shield.svg
[](https://pyup.io/repos/github/sintefneodroid/neo/)
.. image:: https://pyup.io/repos/github/sintefneodroid/neo/python-3-shield.svg
:target: https://pyup.io/repos/github/sintefneodroid/neo/
:alt: Python 3
<a href="https://pyup.io/repos/github/sintefneodroid/neo/"><img src="https://pyup.io/repos/github/sintefneodroid/neo/shield.svg" alt="Python 3" /></a>
!https://pyup.io/repos/github/sintefneodroid/neo/python-3-shield.svg(Python 3)!:https://pyup.io/repos/github/sintefneodroid/neo/
{<img src="https://pyup.io/repos/github/sintefneodroid/neo/python-3-shield.svg" alt="Python 3" />}[https://pyup.io/repos/github/sintefneodroid/neo/]
https://pyup.io/repos/github/sintefneodroid/neo/shield.svg
[](https://pyup.io/repos/github/sintefneodroid/neo/)
.. image:: https://pyup.io/repos/github/sintefneodroid/neo/shield.svg
:target: https://pyup.io/repos/github/sintefneodroid/neo/
:alt: Updates
<a href="https://pyup.io/repos/github/sintefneodroid/neo/"><img src="https://pyup.io/repos/github/sintefneodroid/neo/shield.svg" alt="Updates" /></a>
!https://pyup.io/repos/github/sintefneodroid/neo/shield.svg(Updates)!:https://pyup.io/repos/github/sintefneodroid/neo/
{<img src="https://pyup.io/repos/github/sintefneodroid/neo/shield.svg" alt="Updates" />}[https://pyup.io/repos/github/sintefneodroid/neo/]