pydantic@0.6 vulnerabilities

Data validation using Python type hints

Direct Vulnerabilities

Known vulnerabilities in the pydantic package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Regular Expression Denial of Service (ReDoS)

pydantic is a Data validation and settings management using python 3.6 type hinting

Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) via the validate_email function due to improper limitation of mail length and the usage of an insecure regular expression.

How to fix Regular Expression Denial of Service (ReDoS)?

Upgrade pydantic to version 1.10.13, 2.4.0 or higher.

[,1.10.13) [2.0a1,2.4.0)
  • M
Regular Expression Denial of Service (ReDoS)

pydantic is a Data validation and settings management using python 3.6 type hinting

Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) due to the usage of an insecure regular expression in the networks.py file.

How to fix Regular Expression Denial of Service (ReDoS)?

Upgrade pydantic to version 1.10.13, 2.4.0 or higher.

[,1.10.13) [2.0a1,2.4.0)
  • L
Denial of Service (DoS)

pydantic is a Data validation and settings management using python 3.6 type hinting

Affected versions of this package are vulnerable to Denial of Service (DoS). Use of "infinity" as an input to datetime and date fields causes infinite loop in pydantic. Passing either 'infinity', 'inf' or float('inf') (or their negatives) to datetime or date fields causes validation to run forever with 100% CPU usage (on one CPU).

How to fix Denial of Service (DoS)?

Upgrade pydantic to version 1.6.2, 1.7.4, 1.8.2 or higher.

[,1.6.2) [1.7,1.7.4) [1.8,1.8.2)