dtale@1.4.1 vulnerabilities
Web Client for Visualizing Pandas Objects
-
latest version
3.15.1
-
latest non vulnerable version
-
first published
5 years ago
-
latest version published
6 days ago
-
licenses detected
- [0,)
Direct Vulnerabilities
Known vulnerabilities in the dtale package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
|
[,3.14.1)
|
dtale is a Web Client for Visualizing Pandas Objects Affected versions of this package are vulnerable to Remote Code Execution (RCE) via the Note: This is only exploitable if "Custom Filter" input is turned on, which is the default option. CVE-2024-8862 is a duplicate of this vulnerability. How to fix Remote Code Execution (RCE)? Upgrade |
[,3.14.1)
|
dtale is a Web Client for Visualizing Pandas Objects Affected versions of this package are vulnerable to Improper Input Validation due to the use of a hardcoded Note: This vulnerability can be exploited only if authentication is enabled. How to fix Improper Input Validation? Upgrade |
[,3.13.1)
|
dtale is a Web Client for Visualizing Pandas Objects Affected versions of this package are vulnerable to Server-Side Request Forgery (SSRF) via the "Load From the Web" feature. An attacker can access files on the server by sending crafted requests that exploit improper input validation. How to fix Server-Side Request Forgery (SSRF)? Upgrade |
[,3.9.0)
|
dtale is a Web Client for Visualizing Pandas Objects Affected versions of this package are vulnerable to Cross-site Scripting (XSS) when the 'Custom Filter' input is enabled. An attacker can execute malicious code on the server by exploiting this vulnerability. This is only exploitable if D-Tale is hosted publicly. Mitigation: This vulnerability can be mitigated by turning off 'Custom Filter' input by default or only hosting D-Tale to trusted users. How to fix Cross-site Scripting (XSS)? Upgrade |
[,3.7.0)
|