Safety vulnerability ID: 50571
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Dparse 0.5.2 includes a fix for CVE-2022-39280: Versions before 0.5.2 contain a regular expression that is vulnerable to a Regular Expression Denial of Service. All the users parsing index server URLs with dparse are impacted by this vulnerability. Users unable to upgrade should avoid passing index server URLs in the source file to be parsed.
Latest version: 0.6.4
A parser for Python dependency files
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application