flower@0.8.4 vulnerabilities
Celery Flower
-
latest version
2.0.1
-
latest non vulnerable version
-
first published
12 years ago
-
latest version published
9 months ago
-
licenses detected
- [0.2.0,)
Direct Vulnerabilities
Known vulnerabilities in the flower package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
Affected versions of this package are vulnerable to Timing Attack via the How to fix Timing Attack? Upgrade |
[,2.0.0)
|
Affected versions of this package are vulnerable to Access Restriction Bypass due to an OAuth authentication bypass. An attacker could access the Flower API to discover and invoke arbitrary Celery RPC calls or deny service by shutting down Celery task nodes. How to fix Access Restriction Bypass? Upgrade |
[,1.2.0)
|
Affected versions of this package are vulnerable to Cross-site Scripting (XSS) attacks. User input was not escaped in the tasks page, allowing remote attackers to inject arbitrary web script or HTML. How to fix Cross-site Scripting (XSS)? Upgrade |
[,0.9.2)
|