Package | Installed | Affected | Info |
---|---|---|---|
ujson | 5.1.0 | <=5.1.0 |
show UltraJSON (aka ujson) through 5.1.0 has a stack-based buffer overflow in Buffer_AppendIndentUnchecked (called from encode). Exploitation can, for example, use a large amount of indentation. |
ujson | 5.1.0 | <5.4.0 |
show Ujson 5.4.0 includes a fix for CVE-2022-31116: Incorrect handling of invalid surrogate pair characters. https://github.com/ultrajson/ultrajson/security/advisories/GHSA-wpqr-jcpx-745r |
ujson | 5.1.0 | <5.4.0 |
show Ujson 5.4.0 includes a fix for CVE-2022-31117: In versions prior to 5.4.0 an error occurring while reallocating a buffer for string decoding can cause the buffer to get freed twice. Due to how UltraJSON uses the internal decoder, this double free is impossible to trigger from Python. https://github.com/ultrajson/ultrajson/security/advisories/GHSA-fm67-cv37-96ff |
Package | Installed | Affected | Info |
---|---|---|---|
ujson | 5.1.0 | <=5.1.0 |
show UltraJSON (aka ujson) through 5.1.0 has a stack-based buffer overflow in Buffer_AppendIndentUnchecked (called from encode). Exploitation can, for example, use a large amount of indentation. |
ujson | 5.1.0 | <5.4.0 |
show Ujson 5.4.0 includes a fix for CVE-2022-31116: Incorrect handling of invalid surrogate pair characters. https://github.com/ultrajson/ultrajson/security/advisories/GHSA-wpqr-jcpx-745r |
ujson | 5.1.0 | <5.4.0 |
show Ujson 5.4.0 includes a fix for CVE-2022-31117: In versions prior to 5.4.0 an error occurring while reallocating a buffer for string decoding can cause the buffer to get freed twice. Due to how UltraJSON uses the internal decoder, this double free is impossible to trigger from Python. https://github.com/ultrajson/ultrajson/security/advisories/GHSA-fm67-cv37-96ff |
Package | Installed | Affected | Info |
---|---|---|---|
ujson | 5.1.0 | <=5.1.0 |
show UltraJSON (aka ujson) through 5.1.0 has a stack-based buffer overflow in Buffer_AppendIndentUnchecked (called from encode). Exploitation can, for example, use a large amount of indentation. |
ujson | 5.1.0 | <5.4.0 |
show Ujson 5.4.0 includes a fix for CVE-2022-31116: Incorrect handling of invalid surrogate pair characters. https://github.com/ultrajson/ultrajson/security/advisories/GHSA-wpqr-jcpx-745r |
ujson | 5.1.0 | <5.4.0 |
show Ujson 5.4.0 includes a fix for CVE-2022-31117: In versions prior to 5.4.0 an error occurring while reallocating a buffer for string decoding can cause the buffer to get freed twice. Due to how UltraJSON uses the internal decoder, this double free is impossible to trigger from Python. https://github.com/ultrajson/ultrajson/security/advisories/GHSA-fm67-cv37-96ff |
Package | Installed | Affected | Info |
---|---|---|---|
ujson | 5.1.0 | <=5.1.0 |
show UltraJSON (aka ujson) through 5.1.0 has a stack-based buffer overflow in Buffer_AppendIndentUnchecked (called from encode). Exploitation can, for example, use a large amount of indentation. |
ujson | 5.1.0 | <5.4.0 |
show Ujson 5.4.0 includes a fix for CVE-2022-31116: Incorrect handling of invalid surrogate pair characters. https://github.com/ultrajson/ultrajson/security/advisories/GHSA-wpqr-jcpx-745r |
ujson | 5.1.0 | <5.4.0 |
show Ujson 5.4.0 includes a fix for CVE-2022-31117: In versions prior to 5.4.0 an error occurring while reallocating a buffer for string decoding can cause the buffer to get freed twice. Due to how UltraJSON uses the internal decoder, this double free is impossible to trigger from Python. https://github.com/ultrajson/ultrajson/security/advisories/GHSA-fm67-cv37-96ff |
Package | Installed | Affected | Info |
---|---|---|---|
ujson | 5.1.0 | <=5.1.0 |
show UltraJSON (aka ujson) through 5.1.0 has a stack-based buffer overflow in Buffer_AppendIndentUnchecked (called from encode). Exploitation can, for example, use a large amount of indentation. |
ujson | 5.1.0 | <5.4.0 |
show Ujson 5.4.0 includes a fix for CVE-2022-31116: Incorrect handling of invalid surrogate pair characters. https://github.com/ultrajson/ultrajson/security/advisories/GHSA-wpqr-jcpx-745r |
ujson | 5.1.0 | <5.4.0 |
show Ujson 5.4.0 includes a fix for CVE-2022-31117: In versions prior to 5.4.0 an error occurring while reallocating a buffer for string decoding can cause the buffer to get freed twice. Due to how UltraJSON uses the internal decoder, this double free is impossible to trigger from Python. https://github.com/ultrajson/ultrajson/security/advisories/GHSA-fm67-cv37-96ff |
Package | Installed | Affected | Info |
---|---|---|---|
ujson | 5.1.0 | <=5.1.0 |
show UltraJSON (aka ujson) through 5.1.0 has a stack-based buffer overflow in Buffer_AppendIndentUnchecked (called from encode). Exploitation can, for example, use a large amount of indentation. |
ujson | 5.1.0 | <5.4.0 |
show Ujson 5.4.0 includes a fix for CVE-2022-31116: Incorrect handling of invalid surrogate pair characters. https://github.com/ultrajson/ultrajson/security/advisories/GHSA-wpqr-jcpx-745r |
ujson | 5.1.0 | <5.4.0 |
show Ujson 5.4.0 includes a fix for CVE-2022-31117: In versions prior to 5.4.0 an error occurring while reallocating a buffer for string decoding can cause the buffer to get freed twice. Due to how UltraJSON uses the internal decoder, this double free is impossible to trigger from Python. https://github.com/ultrajson/ultrajson/security/advisories/GHSA-fm67-cv37-96ff |
Package | Installed | Affected | Info |
---|---|---|---|
ujson | 5.1.0 | <=5.1.0 |
show UltraJSON (aka ujson) through 5.1.0 has a stack-based buffer overflow in Buffer_AppendIndentUnchecked (called from encode). Exploitation can, for example, use a large amount of indentation. |
ujson | 5.1.0 | <5.4.0 |
show Ujson 5.4.0 includes a fix for CVE-2022-31116: Incorrect handling of invalid surrogate pair characters. https://github.com/ultrajson/ultrajson/security/advisories/GHSA-wpqr-jcpx-745r |
ujson | 5.1.0 | <5.4.0 |
show Ujson 5.4.0 includes a fix for CVE-2022-31117: In versions prior to 5.4.0 an error occurring while reallocating a buffer for string decoding can cause the buffer to get freed twice. Due to how UltraJSON uses the internal decoder, this double free is impossible to trigger from Python. https://github.com/ultrajson/ultrajson/security/advisories/GHSA-fm67-cv37-96ff |
Package | Installed | Affected | Info |
---|---|---|---|
ujson | 5.1.0 | <=5.1.0 |
show UltraJSON (aka ujson) through 5.1.0 has a stack-based buffer overflow in Buffer_AppendIndentUnchecked (called from encode). Exploitation can, for example, use a large amount of indentation. |
ujson | 5.1.0 | <5.4.0 |
show Ujson 5.4.0 includes a fix for CVE-2022-31116: Incorrect handling of invalid surrogate pair characters. https://github.com/ultrajson/ultrajson/security/advisories/GHSA-wpqr-jcpx-745r |
ujson | 5.1.0 | <5.4.0 |
show Ujson 5.4.0 includes a fix for CVE-2022-31117: In versions prior to 5.4.0 an error occurring while reallocating a buffer for string decoding can cause the buffer to get freed twice. Due to how UltraJSON uses the internal decoder, this double free is impossible to trigger from Python. https://github.com/ultrajson/ultrajson/security/advisories/GHSA-fm67-cv37-96ff |
Package | Installed | Affected | Info |
---|---|---|---|
ujson | 5.1.0 | <=5.1.0 |
show UltraJSON (aka ujson) through 5.1.0 has a stack-based buffer overflow in Buffer_AppendIndentUnchecked (called from encode). Exploitation can, for example, use a large amount of indentation. |
ujson | 5.1.0 | <5.4.0 |
show Ujson 5.4.0 includes a fix for CVE-2022-31116: Incorrect handling of invalid surrogate pair characters. https://github.com/ultrajson/ultrajson/security/advisories/GHSA-wpqr-jcpx-745r |
ujson | 5.1.0 | <5.4.0 |
show Ujson 5.4.0 includes a fix for CVE-2022-31117: In versions prior to 5.4.0 an error occurring while reallocating a buffer for string decoding can cause the buffer to get freed twice. Due to how UltraJSON uses the internal decoder, this double free is impossible to trigger from Python. https://github.com/ultrajson/ultrajson/security/advisories/GHSA-fm67-cv37-96ff |
Package | Installed | Affected | Info |
---|---|---|---|
ujson | 5.1.0 | <=5.1.0 |
show UltraJSON (aka ujson) through 5.1.0 has a stack-based buffer overflow in Buffer_AppendIndentUnchecked (called from encode). Exploitation can, for example, use a large amount of indentation. |
ujson | 5.1.0 | <5.4.0 |
show Ujson 5.4.0 includes a fix for CVE-2022-31116: Incorrect handling of invalid surrogate pair characters. https://github.com/ultrajson/ultrajson/security/advisories/GHSA-wpqr-jcpx-745r |
ujson | 5.1.0 | <5.4.0 |
show Ujson 5.4.0 includes a fix for CVE-2022-31117: In versions prior to 5.4.0 an error occurring while reallocating a buffer for string decoding can cause the buffer to get freed twice. Due to how UltraJSON uses the internal decoder, this double free is impossible to trigger from Python. https://github.com/ultrajson/ultrajson/security/advisories/GHSA-fm67-cv37-96ff |
Package | Installed | Affected | Info |
---|---|---|---|
ujson | 5.1.0 | <=5.1.0 |
show UltraJSON (aka ujson) through 5.1.0 has a stack-based buffer overflow in Buffer_AppendIndentUnchecked (called from encode). Exploitation can, for example, use a large amount of indentation. |
ujson | 5.1.0 | <5.4.0 |
show Ujson 5.4.0 includes a fix for CVE-2022-31116: Incorrect handling of invalid surrogate pair characters. https://github.com/ultrajson/ultrajson/security/advisories/GHSA-wpqr-jcpx-745r |
ujson | 5.1.0 | <5.4.0 |
show Ujson 5.4.0 includes a fix for CVE-2022-31117: In versions prior to 5.4.0 an error occurring while reallocating a buffer for string decoding can cause the buffer to get freed twice. Due to how UltraJSON uses the internal decoder, this double free is impossible to trigger from Python. https://github.com/ultrajson/ultrajson/security/advisories/GHSA-fm67-cv37-96ff |
Package | Installed | Affected | Info |
---|---|---|---|
ujson | 5.1.0 | <=5.1.0 |
show UltraJSON (aka ujson) through 5.1.0 has a stack-based buffer overflow in Buffer_AppendIndentUnchecked (called from encode). Exploitation can, for example, use a large amount of indentation. |
ujson | 5.1.0 | <5.4.0 |
show Ujson 5.4.0 includes a fix for CVE-2022-31116: Incorrect handling of invalid surrogate pair characters. https://github.com/ultrajson/ultrajson/security/advisories/GHSA-wpqr-jcpx-745r |
ujson | 5.1.0 | <5.4.0 |
show Ujson 5.4.0 includes a fix for CVE-2022-31117: In versions prior to 5.4.0 an error occurring while reallocating a buffer for string decoding can cause the buffer to get freed twice. Due to how UltraJSON uses the internal decoder, this double free is impossible to trigger from Python. https://github.com/ultrajson/ultrajson/security/advisories/GHSA-fm67-cv37-96ff |
Package | Installed | Affected | Info |
---|---|---|---|
ujson | 5.1.0 | <=5.1.0 |
show UltraJSON (aka ujson) through 5.1.0 has a stack-based buffer overflow in Buffer_AppendIndentUnchecked (called from encode). Exploitation can, for example, use a large amount of indentation. |
ujson | 5.1.0 | <5.4.0 |
show Ujson 5.4.0 includes a fix for CVE-2022-31116: Incorrect handling of invalid surrogate pair characters. https://github.com/ultrajson/ultrajson/security/advisories/GHSA-wpqr-jcpx-745r |
ujson | 5.1.0 | <5.4.0 |
show Ujson 5.4.0 includes a fix for CVE-2022-31117: In versions prior to 5.4.0 an error occurring while reallocating a buffer for string decoding can cause the buffer to get freed twice. Due to how UltraJSON uses the internal decoder, this double free is impossible to trigger from Python. https://github.com/ultrajson/ultrajson/security/advisories/GHSA-fm67-cv37-96ff |
Package | Installed | Affected | Info |
---|---|---|---|
ujson | 5.1.0 | <=5.1.0 |
show UltraJSON (aka ujson) through 5.1.0 has a stack-based buffer overflow in Buffer_AppendIndentUnchecked (called from encode). Exploitation can, for example, use a large amount of indentation. |
ujson | 5.1.0 | <5.4.0 |
show Ujson 5.4.0 includes a fix for CVE-2022-31116: Incorrect handling of invalid surrogate pair characters. https://github.com/ultrajson/ultrajson/security/advisories/GHSA-wpqr-jcpx-745r |
ujson | 5.1.0 | <5.4.0 |
show Ujson 5.4.0 includes a fix for CVE-2022-31117: In versions prior to 5.4.0 an error occurring while reallocating a buffer for string decoding can cause the buffer to get freed twice. Due to how UltraJSON uses the internal decoder, this double free is impossible to trigger from Python. https://github.com/ultrajson/ultrajson/security/advisories/GHSA-fm67-cv37-96ff |
Package | Installed | Affected | Info |
---|---|---|---|
ujson | 5.1.0 | <=5.1.0 |
show UltraJSON (aka ujson) through 5.1.0 has a stack-based buffer overflow in Buffer_AppendIndentUnchecked (called from encode). Exploitation can, for example, use a large amount of indentation. |
ujson | 5.1.0 | <5.4.0 |
show Ujson 5.4.0 includes a fix for CVE-2022-31116: Incorrect handling of invalid surrogate pair characters. https://github.com/ultrajson/ultrajson/security/advisories/GHSA-wpqr-jcpx-745r |
ujson | 5.1.0 | <5.4.0 |
show Ujson 5.4.0 includes a fix for CVE-2022-31117: In versions prior to 5.4.0 an error occurring while reallocating a buffer for string decoding can cause the buffer to get freed twice. Due to how UltraJSON uses the internal decoder, this double free is impossible to trigger from Python. https://github.com/ultrajson/ultrajson/security/advisories/GHSA-fm67-cv37-96ff |
https://pyup.io/repos/github/spacemanspiff2007/HABApp/python-3-shield.svg
[](https://pyup.io/repos/github/spacemanspiff2007/HABApp/)
.. image:: https://pyup.io/repos/github/spacemanspiff2007/HABApp/python-3-shield.svg :target: https://pyup.io/repos/github/spacemanspiff2007/HABApp/ :alt: Python 3
<a href="https://pyup.io/repos/github/spacemanspiff2007/HABApp/"><img src="https://pyup.io/repos/github/spacemanspiff2007/HABApp/shield.svg" alt="Python 3" /></a>
!https://pyup.io/repos/github/spacemanspiff2007/HABApp/python-3-shield.svg(Python 3)!:https://pyup.io/repos/github/spacemanspiff2007/HABApp/
{<img src="https://pyup.io/repos/github/spacemanspiff2007/HABApp/python-3-shield.svg" alt="Python 3" />}[https://pyup.io/repos/github/spacemanspiff2007/HABApp/]
https://pyup.io/repos/github/spacemanspiff2007/HABApp/shield.svg
[](https://pyup.io/repos/github/spacemanspiff2007/HABApp/)
.. image:: https://pyup.io/repos/github/spacemanspiff2007/HABApp/shield.svg :target: https://pyup.io/repos/github/spacemanspiff2007/HABApp/ :alt: Updates
<a href="https://pyup.io/repos/github/spacemanspiff2007/HABApp/"><img src="https://pyup.io/repos/github/spacemanspiff2007/HABApp/shield.svg" alt="Updates" /></a>
!https://pyup.io/repos/github/spacemanspiff2007/HABApp/shield.svg(Updates)!:https://pyup.io/repos/github/spacemanspiff2007/HABApp/
{<img src="https://pyup.io/repos/github/spacemanspiff2007/HABApp/shield.svg" alt="Updates" />}[https://pyup.io/repos/github/spacemanspiff2007/HABApp/]