Safety vulnerability ID: 65009
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Deepl version 1.3.2 has updates its "follow-redirects" dependency to address the security vulnerability identified as CVE-2022-0536.
Latest version: 1.20.0
Python library for the DeepL API.
Added
* Add support for `tag_handling=html`.
* `formality` parameter is checked against `target_lang`.
Changed
* Update `package-lock.json`: upgrade `follow-redirects` to 1.14.9 to silence security warnings.
Note: security vulnerability [CVE-2022-0536](https://nvd.nist.gov/vuln/detail/CVE-2022-0536)
affects cross-domain proxying and has no impact here because the proxy server is restricted to
target only the mock server itself.
Fixed
* Raise request body size limits to 50 MiB.
* Fix error response message when attempting to download a document before it has been translated.
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application