superset@0.21.1 vulnerabilities
Superset has moved to apache-superset, as of 0.34.0 onwards, please pip install apache-superset
-
latest version
0.30.1
-
first published
8 years ago
-
latest version published
5 years ago
-
licenses detected
- [0,)
Direct Vulnerabilities
Known vulnerabilities in the superset package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
superset is a Superset has moved to apache-superset, as of 0.34.0 onwards, please pip install apache-superset. Affected versions of this package are vulnerable to Access Restriction Bypass where it is possible for all derived FAB How to fix Access Restriction Bypass? Upgrade |
[,0.23.0)
|
superset is a Superset has moved to apache-superset, as of 0.34.0 onwards, please pip install apache-superset. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the markdown library and the How to fix Cross-site Scripting (XSS)? Upgrade |
[,0.23.0)
|
superset is a Superset has moved to apache-superset, as of 0.34.0 onwards, please pip install apache-superset. Affected versions of this package are vulnerable to Deserialization of Untrusted Data. It uses an unsafe load method from the pickle library to deserialize data leading to possible remote code execution. How to fix Deserialization of Untrusted Data? Upgrade |
[,0.23.0)
|
superset is a Superset has moved to apache-superset, as of 0.34.0 onwards, please pip install apache-superset. Affected versions of this package are vulnerable to Open Redirect. Insufficient user input validation of open redirects, the URL shortener functionality allows a malicious user to create a short URL for a dashboard and convince the user to click the link. How to fix Open Redirect? There is no fixed version for |
[0,)
|