sleepytaco / UnTube

A simple, comprehensive YouTube playlist manager web app powered by YouTube Data API V3. Built with ❤ using Django, htmx and Bootstrap.
50 stars 3 forks source link

[Snyk] Fix for 13 vulnerabilities #37

Closed snyk-bot closed 1 year ago

snyk-bot commented 1 year ago

Snyk has created this PR to fix one or more vulnerable packages in the `pip` dependencies of this project.

Changes included in this PR

⚠️ Warning ``` python3-openid 3.2.0 has requirement defusedxml<=0.4.1, but you have defusedxml 0.7.1. python-jose 3.2.0 requires rsa, which is not installed. google-auth 1.30.1 requires rsa, which is not installed. google-api-core 1.28.0 requires googleapis-common-protos, which is not installed. django-sekizai 2.0.0 requires django, which is not installed. django-polymorphic 3.0.0 requires Django, which is not installed. django-filer 2.0.2 requires django-mptt, which is not installed. django-filer 2.0.2 requires easy-thumbnails, which is not installed. django-filer 2.0.2 requires django, which is not installed. django-cms 3.8.0 requires django-formtools, which is not installed. django-cms 3.8.0 requires Django, which is not installed. django-cms 3.8.0 requires django-treebeard, which is not installed. django-classy-tags 2.0.0 requires django, which is not installed. django-appconf 1.0.4 requires django, which is not installed. django-allauth 0.44.0 requires pyjwt, which is not installed. django-allauth 0.44.0 requires Django, which is not installed. ```

Vulnerabilities that will be fixed

By pinning:
Severity Priority Score (*) Issue Upgrade Breaking Change Exploit Maturity
medium severity 509/1000
Why? Has a fix available, CVSS 5.9
Denial of Service (DoS)
SNYK-PYTHON-CRYPTOGRAPHY-3172287
cryptography:
3.4.7 -> 39.0.1
No No Known Exploit
medium severity 526/1000
Why? Recently disclosed, Has a fix available, CVSS 4.8
Expected Behavior Violation
SNYK-PYTHON-CRYPTOGRAPHY-3314966
cryptography:
3.4.7 -> 39.0.1
No No Known Exploit
medium severity 581/1000
Why? Recently disclosed, Has a fix available, CVSS 5.9
Use After Free
SNYK-PYTHON-CRYPTOGRAPHY-3315324
cryptography:
3.4.7 -> 39.0.1
No No Known Exploit
high severity 656/1000
Why? Recently disclosed, Has a fix available, CVSS 7.4
Access of Resource Using Incompatible Type ('Type Confusion')
SNYK-PYTHON-CRYPTOGRAPHY-3315328
cryptography:
3.4.7 -> 39.0.1
No No Known Exploit
medium severity 551/1000
Why? Recently disclosed, Has a fix available, CVSS 5.3
Timing Attack
SNYK-PYTHON-CRYPTOGRAPHY-3315331
cryptography:
3.4.7 -> 39.0.1
No No Known Exploit
medium severity 581/1000
Why? Recently disclosed, Has a fix available, CVSS 5.9
Denial of Service (DoS)
SNYK-PYTHON-CRYPTOGRAPHY-3315452
cryptography:
3.4.7 -> 39.0.1
No No Known Exploit
medium severity 581/1000
Why? Recently disclosed, Has a fix available, CVSS 5.9
Denial of Service (DoS)
SNYK-PYTHON-CRYPTOGRAPHY-3315972
cryptography:
3.4.7 -> 39.0.1
No No Known Exploit
medium severity 581/1000
Why? Recently disclosed, Has a fix available, CVSS 5.9
Denial of Service (DoS)
SNYK-PYTHON-CRYPTOGRAPHY-3315975
cryptography:
3.4.7 -> 39.0.1
No No Known Exploit
medium severity 581/1000
Why? Recently disclosed, Has a fix available, CVSS 5.9
Denial of Service (DoS)
SNYK-PYTHON-CRYPTOGRAPHY-3316038
cryptography:
3.4.7 -> 39.0.1
No No Known Exploit
high severity 661/1000
Why? Recently disclosed, Has a fix available, CVSS 7.5
Denial of Service (DoS)
SNYK-PYTHON-CRYPTOGRAPHY-3316211
cryptography:
3.4.7 -> 39.0.1
No No Known Exploit
low severity 506/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 3.7
NULL Pointer Dereference
SNYK-PYTHON-NUMPY-2321964
numpy:
1.21.3 -> 1.22.2
No Proof of Concept
low severity 399/1000
Why? Has a fix available, CVSS 3.7
Buffer Overflow
SNYK-PYTHON-NUMPY-2321966
numpy:
1.21.3 -> 1.22.2
No No Known Exploit
low severity 506/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 3.7
Denial of Service (DoS)
SNYK-PYTHON-NUMPY-2321970
numpy:
1.21.3 -> 1.22.2
No Proof of Concept

(*) Note that the real score may have changed since the PR was raised.

Some vulnerabilities couldn't be fully fixed and so Snyk will still find them when the project is tested again. This may be because the vulnerability existed within more than one direct dependency, but not all of the affected dependencies could be upgraded.

Check the changes in this PR to ensure they won't cause issues with your project.


Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information: 🧐 View latest project report

🛠 Adjust project settings

📚 Read more about Snyk's upgrade and patch logic


Learn how to fix vulnerabilities with free interactive lessons:

🦉 Denial of Service (DoS) 🦉 Denial of Service (DoS) 🦉 Denial of Service (DoS) 🦉 More lessons are available in Snyk Learn