Safety vulnerability ID: 54679
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Jinja2 2.10.1 adds 'SandboxedEnvironment' to handle 'str.format_map' in order to prevent code execution through untrusted format strings.
https://github.com/pallets/jinja/commit/a2a6c930bcca591a25d2b316fcfd2d6793897b26
Latest version: 3.1.4
A very fast and expressive template engine.
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application