Compare the version numbers of extra modules in Pythonista with PyPI.
Results:
- https://pyup.io/account/repos/github/cclauss/pythonista-module-versions/
- https://requires.io/github/cclauss/pythonista-module-versions/requirements/
Pythonista version 3.1.1 (311016) running Python 3.6.1 on iOS 10.3.3 on an iPad3,4.
=========================================================
| module | local | PyPI |
| name | version | version |
| ------------- | ----------- | ----------- |
| arrow | 0.10.0 | 0.10.0 |
| bottle | 0.12.5 | 0.12.13 | Upgrade?
| bs4 | 4.4.1 | 4.6.0 | Upgrade?
| certifi | 2016.02.28 | 2017.11.5 | Upgrade?
| Crypto | 2.6 | 2.6.1 | Upgrade?
| cycler | 0.9.0 | 0.10.0 | Upgrade?
| dateutil | 2.2 | 2.2 |
| dropbox | 6.4.0 | 8.4.1 | Upgrade?
| ecdsa | UNKNOWN | 0.13 | Upgrade?
| et_xmlfile | 1.0.1 | 1.0.1 |
| evernote | ????? | 1.25.2 | ?????
| faker | ????? | 0.8.6 | ?????
| feedparser | 5.2.1 | 5.2.1 |
| flask | 0.10.1 | 0.12.2 | Upgrade?
| google | ????? | 1.9.3 | ?????
| html2text | 2014.4.5 | 2017.10.4 | Upgrade?
| html5lib | 0.999 | 0.999999999 | Upgrade?
| httplib2 | 0.9.2 | 0.10.3 | Upgrade?
| images2gif | ????? | 1.0.1 | ?????
| itsdangerous | ????? | 0.24 | ?????
| jdcal | 1.3 | 1.3 |
| jedi | 0.9.0 | 0.11.0 | Upgrade?
| jinja2 | 2.7 | 2.10 | Upgrade?
| libmodernize | 0.5 | Found | Upgrade?
### hasattr(markdown, 'version')
| markdown | 2.6.2 | 2.6.9 | Upgrade?
| markdown2 | 2.2.1 | 2.3.5 | Upgrade?
| markupsafe | ????? | 1.0 | ?????
| matplotlib | 1.4.0 | 2.1.0 | Upgrade?
| mccabe | 0.4.0 | 0.6.1 | Upgrade?
| midiutil | ????? | 1.1.3 | ?????
| mpl_toolkits | ????? | Found | ?????
| mpmath | 0.18 | 1.0.0 | Upgrade?
| numpy | 1.8.0 | 1.13.3 | Upgrade?
| oauth2 | 1.9.0.post1 | 1.9.0.post1 |
| paramiko | 1.16.0 | 2.3.1 | Upgrade?
| parsedatetime | 1.5 | 2.4 | Upgrade?
### hasattr(PIL, 'PILLOW_VERSION')
| PIL | 2.9.0 | 4.3.0 | Upgrade?
| pycparser | 2.10 | 2.18 | Upgrade?
| pyflakes | 1.5.0 | 1.6.0 | Upgrade?
| pygments | 2.1 | 2.2.0 | Upgrade?
| pylab | ????? | Found | ?????
| pyparsing | 2.0.1 | 2.2.0 | Upgrade?
| PyPDF2 | 1.22 | 1.26.0 | Upgrade?
| pytest | 3.0.5 | 3.2.3 | Upgrade?
| pytz | 2015.7 | 2017.3 | Upgrade?
| qrcode | ????? | 5.3 | ?????
### hasattr(reportlab, 'Version')
| reportlab | 3.1.8 | 3.4.0 | Upgrade?
| requests | 2.9.1 | 2.18.4 | Upgrade?
| sgmllib | ????? | Found | ?????
| simpy | 3.0.8 | 3.0.10 | Upgrade?
| six | 1.6.1 | 1.11.0 | Upgrade?
| sqlalchemy | 0.9.7 | 1.2.0b3 | Upgrade?
### hasattr(sqlite3, 'version')
| sqlite3 | 2.6.0 | 2.8.3 | Upgrade?
| sympy | 0.7.4.1 | 1.1.1 | Upgrade?
| thrift | ????? | 0.10.0 | ?????
| turtle | ????? | 0.0.2 | ?????
| twitter | ????? | 1.18.0 | ?????
| wavebender | 0.3 | Found | Upgrade?
| werkzeug | 0.9.4 | 0.12.2 | Upgrade?
| wsgiref | ????? | 0.1.2 | ?????
| xmltodict | 0.8.7 | 0.11.0 | Upgrade?
| yaml | 3.11 | 3.12 | Upgrade?
| yapf | 0.16.1 | 0.19.0 | Upgrade?
| ------------- | ----------- | ----------- |
Pythonista version 3.1.1 (311016) running Python 2.7.12 on iOS 10.3.3 on an iPad3,4.
=========================================================
| module | local | PyPI |
| name | version | version |
| ------------- | ----------- | ----------- |
| arrow | 0.10.0 | 0.10.0 |
| bottle | 0.12.5 | 0.12.13 | Upgrade?
| bs4 | 4.3.2 | 4.6.0 | Upgrade?
| Crypto | 2.6 | 2.6.1 | Upgrade?
| dateutil | 2.2 | 2.2 |
| dropbox | 6.4.0 | 8.4.1 | Upgrade?
| ecdsa | 0.11 | 0.13 | Upgrade?
| et_xmlfile | 1.0.1 | 1.0.1 |
| evernote | ????? | 1.25.2 | ?????
| faker | ????? | 0.8.6 | ?????
| feedparser | 5.1.3 | 5.2.1 | Upgrade?
| flask | 0.10.1 | 0.12.2 | Upgrade?
| google | ????? | 1.9.3 | ?????
| html2text | 2014.4.5 | 2017.10.4 | Upgrade?
| html5lib | 0.999 | 0.999999999 | Upgrade?
| httplib2 | 0.8 | 0.10.3 | Upgrade?
| images2gif | ????? | 1.0.1 | ?????
| itsdangerous | ????? | 0.24 | ?????
| jdcal | 1.3 | 1.3 |
| jedi | 0.9.0 | 0.11.0 | Upgrade?
| jinja2 | 2.7 | 2.10 | Upgrade?
### hasattr(markdown, 'version')
| markdown | 2.2.0 | 2.6.9 | Upgrade?
| markdown2 | 2.2.1 | 2.3.5 | Upgrade?
| markupsafe | ????? | 1.0 | ?????
| matplotlib | 1.4.0 | 2.1.0 | Upgrade?
| midiutil | ????? | 1.1.3 | ?????
| mpl_toolkits | ????? | Found | ?????
| mpmath | 0.18 | 1.0.0 | Upgrade?
| numpy | 1.8.0 | 1.13.3 | Upgrade?
| oauth2 | 1.5.211 | 1.9.0.post1 | Upgrade?
| paramiko | 1.16.0 | 2.3.1 | Upgrade?
| parsedatetime | 1.3 | 2.4 | Upgrade?
### hasattr(PIL, 'PILLOW_VERSION')
| PIL | 2.9.0 | 4.3.0 | Upgrade?
| pycparser | 2.10 | 2.18 | Upgrade?
| pyflakes | 1.5.0 | 1.6.0 | Upgrade?
| pygments | 1.6 | 2.2.0 | Upgrade?
| pylab | ????? | Found | ?????
| pyparsing | 2.0.1 | 2.2.0 | Upgrade?
| PyPDF2 | 1.22 | 1.26.0 | Upgrade?
| pytest | 3.0.5 | 3.2.3 | Upgrade?
| pytz | 2013b | 2017.3 | Upgrade?
| qrcode | ????? | 5.3 | ?????
### hasattr(reportlab, 'Version')
| reportlab | 3.1.8 | 3.4.0 | Upgrade?
| requests | 2.5.1 | 2.18.4 | Upgrade?
| sgmllib | ????? | Found | ?????
| simpy | 3.0.2 | 3.0.10 | Upgrade?
| six | 1.6.1 | 1.11.0 | Upgrade?
| sqlalchemy | 0.9.7 | 1.2.0b3 | Upgrade?
### hasattr(sqlite3, 'version')
| sqlite3 | 2.6.0 | 2.8.3 | Upgrade?
| sympy | 0.7.4.1 | 1.1.1 | Upgrade?
| thrift | ????? | 0.10.0 | ?????
| turtle | ????? | 0.0.2 | ?????
| twitter | ????? | 1.18.0 | ?????
| wavebender | 0.3 | Found | Upgrade?
| werkzeug | 0.9.4 | 0.12.2 | Upgrade?
| wsgiref | ????? | 0.1.2 | ?????
| xmltodict | 0.8.7 | 0.11.0 | Upgrade?
| yaml | 3.09 | 3.12 | Upgrade?
| yapf | 0.16.1 | 0.19.0 | Upgrade?
| ------------- | ----------- | ----------- |
Starting GitHub Action for pyup Safety:safety command
Warning: unpinned requirement 'ecdsa' found in requirements.txt, unable to check.
Warning: unpinned requirement 'evernote' found in requirements.txt, unable to check.
Warning: unpinned requirement 'faker' found in requirements.txt, unable to check.
Warning: unpinned requirement 'google' found in requirements.txt, unable to check.
Warning: unpinned requirement 'images2gif' found in requirements.txt, unable to check.
Warning: unpinned requirement 'itsdangerous' found in requirements.txt, unable to check.
Warning: unpinned requirement 'markupsafe' found in requirements.txt, unable to check.
Warning: unpinned requirement 'midiutil' found in requirements.txt, unable to check.
Warning: unpinned requirement 'mpl_toolkits' found in requirements.txt, unable to check.
Warning: unpinned requirement 'pylab' found in requirements.txt, unable to check.
Warning: unpinned requirement 'qrcode' found in requirements.txt, unable to check.
Warning: unpinned requirement 'sgmllib' found in requirements.txt, unable to check.
Warning: unpinned requirement 'thrift' found in requirements.txt, unable to check.
Warning: unpinned requirement 'turtle' found in requirements.txt, unable to check.
Warning: unpinned requirement 'twitter' found in requirements.txt, unable to check.
Warning: unpinned requirement 'wsgiref' found in requirements.txt, unable to check.
ââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ
â â
â /$$$$$$ /$$ â
â /$$__ $$ | $$ â
â /$$$$$$$ /$$$$$$ | $$ \__//$$$$$$ /$$$$$$ /$$ /$$ â
â /$$_____/ |____ $$| $$$$ /$$__ $$|_ $$_/ | $$ | $$ â
â | $$$$$$ /$$$$$$$| $$_/ | $$$$$$$$ | $$ | $$ | $$ â
â \____ $$ /$$__ $$| $$ | $$_____/ | $$ /$$| $$ | $$ â
â /$$$$$$$/| $$$$$$$| $$ | $$$$$$$ | $$$$/| $$$$$$$ â
â |_______/ \_______/|__/ \_______/ \___/ \____ $$ â
â /$$ | $$ â
â | $$$$$$/ â
â by pyup.io \______/ â
â â
ââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââĦ
â REPORT â
â checked 46 packages, using default DB â
ââââââââââââââââââââââââââââââ¤ââââââââââââ¤âââââââââââââââââââââââââââ¤âââââââââââĦ
â package â installed â affected â ID â
ââââââââââââââââââââââââââââââ§ââââââââââââ§âââââââââââââââââââââââââââ§âââââââââââĦ
â bottle â 0.12.5 â <0.12.10 â 25642 â
ââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââĦ
â redirect() in bottle.py in bottle 0.12.10 doesn't filter a "\r\n" sequence, â
â which leads to a CRLF attack, as demonstrated by a redirect("233\r\nSet- â
â Cookie: name=salt") call. â
ââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââĦ
â bottle â 0.12.5 â >=0.12,<0.12.6 â 35548 â
ââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââĦ
â Bottle 0.10.x before 0.10.12, 0.11.x before 0.11.7, and 0.12.x before 0.12.6 â
â does not properly limit content types, which allows remote attackers to â
â bypass intended access restrictions via an accepted Content-Type followed by â
â a ; (semi-colon) and a Content-Type that would not be accepted, as â
â demonstrated in YouCompleteMe to execute arbitrary code. â
ââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââĦ
â flask â 0.10.1 â <0.12.3 â 36388 â
ââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââĦ
â flask version Before 0.12.3 contains a CWE-20: Improper Input Validation â
â vulnerability in flask that can result in Large amount of memory usage â
â possibly leading to denial of service. This attack appear to be exploitable â
â via Attacker provides JSON data in incorrect encoding. This vulnerability â
â appears to have been fixed in 0.12.3. â
ââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââĦ
â html5lib â 0.999 â <0.99999999 â 35693 â
ââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââĦ
â The serializer in html5lib before 0.99999999 might allow remote attackers to â
â conduct cross-site scripting (XSS) attacks by leveraging mishandling of the â
â < (less than) character in attribute values. â
ââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââĦ
â html5lib â 0.999 â <0.99999999 â 35694 â
ââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââĦ
â The serializer in html5lib before 0.99999999 might allow remote attackers to â
â conduct cross-site scripting (XSS) attacks by leveraging mishandling of â
â special characters in attribute values, a different vulnerability than â
â CVE-2016-9909. â
ââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââĦ
â html5lib â 0.999 â <0.99999999 â 25846 â
ââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââĦ
â html5lib before 0.99999999 is vulnerable to a XSS attack. Upgrading avoids â
â the XSS bug potentially caused by serializer allowing attribute values to be â
â escaped out of in old browser versions, changing the quote_attr_values â
â option on serializer to take one of three values, "always" (the old True â
â value), "legacy" (the new option, and the new default), and "spec" (the old â
â False value, and the old default). â
ââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââĦ
â httplib2 â 0.9.2 â <=0.9.2 â 25848 â
ââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââĦ
â httplib2 before and including 0.9.2 on "SSL certificate hostname mismatch" â
â it is checked only once: https://github.com/httplib2/httplib2/issues/5 â
ââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââĦ
â jinja2 â 2.7 â <2.7.2 â 25865 â
ââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââĦ
â jinja2 2.7.2 fixes a security issue: Changed the default folder for the â
â filesystem cache to be user specific and read and write protected on UNIX â
â systems. See http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=734747 for â
â more information. â
ââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââĦ
â jinja2 â 2.7 â <2.7.3 â 25866 â
ââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââĦ
â The default configuration for bccache.FileSystemBytecodeCache in Jinja2 â
â before 2.7.2 does not properly create temporary files, which allows local â
â users to gain privileges via a crafted .cache file with a name starting with â
â __jinja2_ in /tmp. â
ââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââĦ
â markdown2 â 2.2.1 â <2.3.5 â 35760 â
ââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââĦ
â An issue was discovered in markdown2 (aka python-markdown2) through 2.3.5. â
â The safe_mode feature, which is supposed to sanitize user input against XSS, â
â is flawed and does not escape the input properly. With a crafted payload, â
â XSS can be triggered, as demonstrated by omitting the final '>' character â
â from an IMG tag. â
ââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââĦ
â pillow â 2.9.0 â <3.1.1 â 33134 â
ââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââĦ
â Buffer overflow in the ImagingLibTiffDecode function in â
â libImaging/TiffDecode.c in Pillow before 3.1.1 allows remote attackers to â
â overwrite memory via a crafted TIFF file. â
ââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââĦ
â pillow â 2.9.0 â <3.1.1 â 33135 â
ââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââĦ
â Buffer overflow in the ImagingFliDecode function in libImaging/FliDecode.c â
â in Pillow before 3.1.1 allows remote attackers to cause a denial of service â
â (crash) via a crafted FLI file. â
ââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââĦ
â pillow â 2.9.0 â <3.1.1 â 33136 â
ââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââĦ
â Buffer overflow in the ImagingPcdDecode function in PcdDecode.c in Pillow â
â before 3.1.1 and Python Imaging Library (PIL) 1.1.7 and earlier allows â
â remote attackers to cause a denial of service (crash) via a crafted PhotoCD â
â file. â
ââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââĦ
â pillow â 2.9.0 â <3.1.1 â 33137 â
ââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââĦ
â Integer overflow in the ImagingResampleHorizontal function in â
â libImaging/Resample.c in Pillow before 3.1.1 allows remote attackers to have â
â unspecified impact via negative values of the new size, which triggers a â
â heap-based buffer overflow. â
ââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââĦ
â pillow â 2.9.0 â <3.1.2 â 25943 â
ââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââĦ
â pillow before 3.1.2 is vulnerable to an integer overflow in Jpeg2KEncode.c â
â causing a buffer overflow. CVE-2016-3076. â
ââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââĦ
â pillow â 2.9.0 â <3.3.2 â 33138 â
ââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââĦ
â Pillow before 3.3.2 allows context-dependent attackers to execute arbitrary â
â code by using the "crafted image file" approach, related to an "Insecure â
â Sign Extension" issue affecting the ImagingNew in Storage.c component. â
ââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââĦ
â pillow â 2.9.0 â <3.3.2 â 33139 â
ââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââĦ
â Pillow before 3.3.2 allows context-dependent attackers to obtain sensitive â
â information by using the "crafted image file" approach, related to an â
â "Integer Overflow" issue affecting the Image.core.map_buffer in map.c â
â component. â
ââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââĦ
â requests â 2.9.1 â <=2.19.1 â 36546 â
ââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââĦ
â The Requests package before 2.19.1 sends an HTTP Authorization header to an â
â http URI upon receiving a same-hostname https-to-http redirect, which makes â
â it easier for remote attackers to discover credentials by sniffing the â
â network. â
ââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââĦ
â werkzeug â 0.9.4 â <0.11.11 â 35661 â
ââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââĦ
â Cross-site scripting (XSS) vulnerability in the render_full function in â
â debug/tbtools.py in the debugger in Pallets Werkzeug before 0.11.11 (as used â
â in Pallets Flask and other products) allows remote attackers to inject â
â arbitrary web script or HTML via a field that contains an exception message. â
ââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ