PyPi: Neo-Fairy-Client

CVE-2023-32681

Transitive

Safety vulnerability ID: 58925

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at May 26, 2023 Updated at Feb 27, 2025
Scan your Python projects for vulnerabilities →

Advisory

[This advisory has been limited. Please create a free account to view the full advisory.]

Affected package

neo-fairy-client

Latest version: 3.7.5.24

Test & debug your Neo3 smart contracts

Affected versions

[This affected versions has been limited. Please create a free account to view the full affected versions.]

Fixed versions

[This fixed versions has been limited. Please create a free account to view the full fixed versions.]

Vulnerability changelog

More a security patch than a feature upgrade.

- requests>=2.31.0
- A little toy-level websocket features. `pip install tornado` (not specified in `requirements.txt`) to run the example in `neo_fairy_client/websocket/fairy_websocket.py`.
- Minor supplementary error info

Potentially the out-dated dependency neo_mamba==0.9 will be dropped in the future.

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application

Severity Details

CVSS Base Score

MEDIUM 6.1

CVSS v3 Details

MEDIUM 6.1
Attack Vector (AV)
NETWORK
Attack Complexity (AC)
HIGH
Privileges Required (PR)
NONE
User Interaction (UI)
REQUIRED
Scope (S)
CHANGED
Confidentiality Impact (C)
HIGH
Integrity Impact (I)
NONE
Availability Availability (A)
NONE