We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Coroutine-based network library
Library home page: https://files.pythonhosted.org/packages/c9/36/483097f7eae9e984c88cb192b33eca0234eb0bafdc6c9646586b8dbc96b4/gevent-1.3.6-cp37-cp37m-manylinux1_x86_64.whl
Path to dependency file: /embedding/requirements.txt
Path to vulnerable library: /embedding/requirements.txt
Found in HEAD commit: f548525baaf6d16b6a6edc667027ce1b0516e50f
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Dependency Hierarchy:
Found in base branch: main
An issue in Gevent before version 23.9.0 allows a remote attacker to escalate privileges via a crafted script to the WSGIServer component.
Publish Date: 2023-09-25
URL: CVE-2023-41419
Base Score Metrics:
Type: Upgrade version
Release Date: 2023-09-25
Fix Resolution: 23.9.0
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered:
No branches or pull requests
Vulnerable Library - gevent-1.3.6-cp37-cp37m-manylinux1_x86_64.whl
Coroutine-based network library
Library home page: https://files.pythonhosted.org/packages/c9/36/483097f7eae9e984c88cb192b33eca0234eb0bafdc6c9646586b8dbc96b4/gevent-1.3.6-cp37-cp37m-manylinux1_x86_64.whl
Path to dependency file: /embedding/requirements.txt
Path to vulnerable library: /embedding/requirements.txt
Found in HEAD commit: f548525baaf6d16b6a6edc667027ce1b0516e50f
Vulnerabilities
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2023-41419
Vulnerable Library - gevent-1.3.6-cp37-cp37m-manylinux1_x86_64.whl
Coroutine-based network library
Library home page: https://files.pythonhosted.org/packages/c9/36/483097f7eae9e984c88cb192b33eca0234eb0bafdc6c9646586b8dbc96b4/gevent-1.3.6-cp37-cp37m-manylinux1_x86_64.whl
Path to dependency file: /embedding/requirements.txt
Path to vulnerable library: /embedding/requirements.txt
Dependency Hierarchy:
Found in HEAD commit: f548525baaf6d16b6a6edc667027ce1b0516e50f
Found in base branch: main
Vulnerability Details
An issue in Gevent before version 23.9.0 allows a remote attacker to escalate privileges via a crafted script to the WSGIServer component.
Publish Date: 2023-09-25
URL: CVE-2023-41419
CVSS 3 Score Details (9.8)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Release Date: 2023-09-25
Fix Resolution: 23.9.0
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: