prefect@2.10.20 vulnerabilities
Workflow orchestration and management.
-
latest version
2.82
-
first published
5 years ago
-
latest version published
a year ago
-
licenses detected
- [0,)
Direct Vulnerabilities
Known vulnerabilities in the prefect package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
prefect is a Prefect is a new workflow management system, designed for modern infrastructure and powered by the open-source Prefect Core workflow engine. Users organize Tasks into Flows, and Prefect takes care of the rest. Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) in the Note:
When trying to install the latest How to fix Regular Expression Denial of Service (ReDoS)? Upgrade |
[,2.15.0)
|
prefect is a Prefect is a new workflow management system, designed for modern infrastructure and powered by the open-source Prefect Core workflow engine. Users organize Tasks into Flows, and Prefect takes care of the rest. Affected versions of this package are vulnerable to Cross-site Request Forgery (CSRF) due to improper authentication. An attacker can potentially gain remote code execution, steal and alter secrets. How to fix Cross-site Request Forgery (CSRF)? A fix was pushed into the |
[0,)
|
prefect is a Prefect is a new workflow management system, designed for modern infrastructure and powered by the open-source Prefect Core workflow engine. Users organize Tasks into Flows, and Prefect takes care of the rest. Affected versions of this package are vulnerable to Information Exposure. The vulnerability allows for the unintended exposure of sensitive information related to function argument names when an error occurs during parameter binding for a function. How to fix Information Exposure? Upgrade |
[,2.11.1)
|