PyPi: Jageocoder

CVE-2023-30861

Transitive

Safety vulnerability ID: 59431

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at May 02, 2023 Updated at Nov 29, 2024
Scan your Python projects for vulnerabilities →

Advisory

Jageocoder 2.0.2 updates its dependency 'flask' to version '2.2.5' to include a security fix.
https://github.com/t-sagara/jageocoder/commit/d6aae38a75089863c1eae574f2c93027228a6ca8

Affected package

jageocoder

Latest version: 2.1.8

A Japanese-address geocoder for Python.

Affected versions

Fixed versions

Vulnerability changelog

This is a security update.
- Updated Flask version to 2.2.5 to address vulnerabilities.

In addition, the following changes were also made
- Added confirmation of overwriting when installing new dictionary.
- Updated PortableTab to 0.3.3 to improve efficiency when creating dictionary data.

No need to update dictionary data.

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application

Severity Details

CVSS Base Score

HIGH 7.5

CVSS v3 Details

HIGH 7.5
Attack Vector (AV)
NETWORK
Attack Complexity (AC)
LOW
Privileges Required (PR)
NONE
User Interaction (UI)
NONE
Scope (S)
UNCHANGED
Confidentiality Impact (C)
HIGH
Integrity Impact (I)
NONE
Availability Availability (A)
NONE