Safety vulnerability ID: 59165
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Tatoebatools 0.2.2 includes a fix for CVE-2007-4559: Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.
Latest version: 0.2.3
A library for downloading and reading data from Tatoeba
Breaking change
- Python 3.8+ is now required in place of Python 3.7.1+
Bug fixes
- directory traversal vulnerability in zip extraction
- CSV module issues with python 3.11
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application