Taipy is an open-source Python library for easy, end-to-end application development for data scientists and machine learning engineers. In affected versions session cookies are served without Secure and HTTPOnly flags. This issue has been addressed in release version 4.0.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
References
Link | Resource |
---|---|
https://github.com/Avaiga/taipy/security/advisories/GHSA-r3jq-4r5c-j9hp | Exploit Third Party Advisory |
Configurations
History
16 Oct 2024, 16:33
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/Avaiga/taipy/security/advisories/GHSA-r3jq-4r5c-j9hp - Exploit, Third Party Advisory | |
CWE | CWE-732 CWE-319 |
|
First Time |
Avaiga
Avaiga taipy |
|
CPE | cpe:2.3:a:avaiga:taipy:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
10 Oct 2024, 12:51
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
09 Oct 2024, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-10-09 19:15
Updated : 2024-10-16 16:33
NVD link : CVE-2024-47833
Mitre link : CVE-2024-47833
CVE.ORG link : CVE-2024-47833
JSON object : View
Products Affected
avaiga
- taipy