You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
mend-for-github-combot
changed the title
CVE-2016-10745 (High) detected in Jinja2-2.8-py2.py3-none-any.whl
CVE-2016-10745 (Medium) detected in Jinja2-2.8-py2.py3-none-any.whl
Dec 20, 2023
mend-for-github-combot
changed the title
CVE-2016-10745 (Medium) detected in Jinja2-2.8-py2.py3-none-any.whl
CVE-2016-10745 (High) detected in Jinja2-2.8-py2.py3-none-any.whl
Feb 29, 2024
CVE-2016-10745 - High Severity Vulnerability
Vulnerable Library - Jinja2-2.8-py2.py3-none-any.whl
A very fast and expressive template engine.
Library home page: https://files.pythonhosted.org/packages/96/a1/c56bc4d99dc2663514a8481511e80eba8994133ae75eebdadfc91a5597d9/Jinja2-2.8-py2.py3-none-any.whl
Path to dependency file: /requirements.txt
Path to vulnerable library: /requirements.txt,/requirements.txt
Dependency Hierarchy:
Found in HEAD commit: 3dfdfe70d4a7420c4a67e0996c14c1cba2f27d98
Found in base branch: master
Vulnerability Details
In Pallets Jinja before 2.8.1, str.format allows a sandbox escape.
Publish Date: 2019-04-08
URL: CVE-2016-10745
CVSS 3 Score Details (8.6)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10745
Release Date: 2019-04-08
Fix Resolution: 2.8.1
The text was updated successfully, but these errors were encountered: