Package | Installed | Affected | Info |
---|---|---|---|
streamlit | 1.11.0 | <1.37.0 |
show Affected versions of the Fastify package are vulnerable to Prototype Pollution due to improper handling of user-supplied object keys during schema validation. The `validation.compile` method does not adequately restrict the use of `__proto__`, `constructor`, or other special object properties, which allows attackers to inject malicious attributes into the prototype chain. An attacker can exploit this by sending crafted JSON payloads to affected endpoints, resulting in unexpected application behaviour such as denial of service, privilege escalation, or data manipulation. |
streamlit | 1.11.0 | >=0.63.0,<=1.30.0 |
show In Streamlit affected versions, users hosting Streamlit app(s) that use custom components are vulnerable to a directory traversal attack that could leak data from their web server file-system such as: server logs, world-readable files, and potentially other sensitive information. An attacker can craft a malicious URL with file paths and the streamlit server would process that URL and return the contents of that file. This issue has been resolved in version 1.11.1. Users are advised to upgrade. There are no known workarounds for this issue. |
streamlit | 1.11.0 | >=0,<1.27.0 |
show Affected versions of Streamlit are susceptible to a vulnerability where improper output neutralization for logs occurs. This specific issue arises if the function `upload_file_request_handler.py` triggers a 400 error that includes the `session_id` value. |
streamlit | 1.11.0 | <1.37.0 |
show Affected versions of the Fastify package are vulnerable to Prototype Pollution due to improper handling of user-supplied object keys during schema validation. The `validation.compile` method does not adequately restrict the use of `__proto__`, `constructor`, or other special object properties, which allows attackers to inject malicious attributes into the prototype chain. An attacker can exploit this by sending crafted JSON payloads to affected endpoints, resulting in unexpected application behaviour such as denial of service, privilege escalation, or data manipulation. |
streamlit | 1.11.0 | >=0.63.0,<=1.30.0 |
show In Streamlit affected versions, users hosting Streamlit app(s) that use custom components are vulnerable to a directory traversal attack that could leak data from their web server file-system such as: server logs, world-readable files, and potentially other sensitive information. An attacker can craft a malicious URL with file paths and the streamlit server would process that URL and return the contents of that file. This issue has been resolved in version 1.11.1. Users are advised to upgrade. There are no known workarounds for this issue. |
streamlit | 1.11.0 | >=0,<1.27.0 |
show Affected versions of Streamlit are susceptible to a vulnerability where improper output neutralization for logs occurs. This specific issue arises if the function `upload_file_request_handler.py` triggers a 400 error that includes the `session_id` value. |
Package | Installed | Affected | Info |
---|---|---|---|
streamlit | 1.11.0 | <1.37.0 |
show Affected versions of the Fastify package are vulnerable to Prototype Pollution due to improper handling of user-supplied object keys during schema validation. The `validation.compile` method does not adequately restrict the use of `__proto__`, `constructor`, or other special object properties, which allows attackers to inject malicious attributes into the prototype chain. An attacker can exploit this by sending crafted JSON payloads to affected endpoints, resulting in unexpected application behaviour such as denial of service, privilege escalation, or data manipulation. |
streamlit | 1.11.0 | >=0.63.0,<=1.30.0 |
show In Streamlit affected versions, users hosting Streamlit app(s) that use custom components are vulnerable to a directory traversal attack that could leak data from their web server file-system such as: server logs, world-readable files, and potentially other sensitive information. An attacker can craft a malicious URL with file paths and the streamlit server would process that URL and return the contents of that file. This issue has been resolved in version 1.11.1. Users are advised to upgrade. There are no known workarounds for this issue. |
streamlit | 1.11.0 | >=0,<1.27.0 |
show Affected versions of Streamlit are susceptible to a vulnerability where improper output neutralization for logs occurs. This specific issue arises if the function `upload_file_request_handler.py` triggers a 400 error that includes the `session_id` value. |
streamlit | 1.11.0 | <1.37.0 |
show Affected versions of the Fastify package are vulnerable to Prototype Pollution due to improper handling of user-supplied object keys during schema validation. The `validation.compile` method does not adequately restrict the use of `__proto__`, `constructor`, or other special object properties, which allows attackers to inject malicious attributes into the prototype chain. An attacker can exploit this by sending crafted JSON payloads to affected endpoints, resulting in unexpected application behaviour such as denial of service, privilege escalation, or data manipulation. |
streamlit | 1.11.0 | >=0.63.0,<=1.30.0 |
show In Streamlit affected versions, users hosting Streamlit app(s) that use custom components are vulnerable to a directory traversal attack that could leak data from their web server file-system such as: server logs, world-readable files, and potentially other sensitive information. An attacker can craft a malicious URL with file paths and the streamlit server would process that URL and return the contents of that file. This issue has been resolved in version 1.11.1. Users are advised to upgrade. There are no known workarounds for this issue. |
streamlit | 1.11.0 | >=0,<1.27.0 |
show Affected versions of Streamlit are susceptible to a vulnerability where improper output neutralization for logs occurs. This specific issue arises if the function `upload_file_request_handler.py` triggers a 400 error that includes the `session_id` value. |
Package | Installed | Affected | Info |
---|---|---|---|
streamlit | 1.11.0 | <1.37.0 |
show Affected versions of the Fastify package are vulnerable to Prototype Pollution due to improper handling of user-supplied object keys during schema validation. The `validation.compile` method does not adequately restrict the use of `__proto__`, `constructor`, or other special object properties, which allows attackers to inject malicious attributes into the prototype chain. An attacker can exploit this by sending crafted JSON payloads to affected endpoints, resulting in unexpected application behaviour such as denial of service, privilege escalation, or data manipulation. |
streamlit | 1.11.0 | >=0.63.0,<=1.30.0 |
show In Streamlit affected versions, users hosting Streamlit app(s) that use custom components are vulnerable to a directory traversal attack that could leak data from their web server file-system such as: server logs, world-readable files, and potentially other sensitive information. An attacker can craft a malicious URL with file paths and the streamlit server would process that URL and return the contents of that file. This issue has been resolved in version 1.11.1. Users are advised to upgrade. There are no known workarounds for this issue. |
streamlit | 1.11.0 | >=0,<1.27.0 |
show Affected versions of Streamlit are susceptible to a vulnerability where improper output neutralization for logs occurs. This specific issue arises if the function `upload_file_request_handler.py` triggers a 400 error that includes the `session_id` value. |
streamlit | 1.11.0 | <1.37.0 |
show Affected versions of the Fastify package are vulnerable to Prototype Pollution due to improper handling of user-supplied object keys during schema validation. The `validation.compile` method does not adequately restrict the use of `__proto__`, `constructor`, or other special object properties, which allows attackers to inject malicious attributes into the prototype chain. An attacker can exploit this by sending crafted JSON payloads to affected endpoints, resulting in unexpected application behaviour such as denial of service, privilege escalation, or data manipulation. |
streamlit | 1.11.0 | >=0.63.0,<=1.30.0 |
show In Streamlit affected versions, users hosting Streamlit app(s) that use custom components are vulnerable to a directory traversal attack that could leak data from their web server file-system such as: server logs, world-readable files, and potentially other sensitive information. An attacker can craft a malicious URL with file paths and the streamlit server would process that URL and return the contents of that file. This issue has been resolved in version 1.11.1. Users are advised to upgrade. There are no known workarounds for this issue. |
streamlit | 1.11.0 | >=0,<1.27.0 |
show Affected versions of Streamlit are susceptible to a vulnerability where improper output neutralization for logs occurs. This specific issue arises if the function `upload_file_request_handler.py` triggers a 400 error that includes the `session_id` value. |
Package | Installed | Affected | Info |
---|---|---|---|
streamlit | 1.11.0 | <1.37.0 |
show Affected versions of the Fastify package are vulnerable to Prototype Pollution due to improper handling of user-supplied object keys during schema validation. The `validation.compile` method does not adequately restrict the use of `__proto__`, `constructor`, or other special object properties, which allows attackers to inject malicious attributes into the prototype chain. An attacker can exploit this by sending crafted JSON payloads to affected endpoints, resulting in unexpected application behaviour such as denial of service, privilege escalation, or data manipulation. |
streamlit | 1.11.0 | >=0.63.0,<=1.30.0 |
show In Streamlit affected versions, users hosting Streamlit app(s) that use custom components are vulnerable to a directory traversal attack that could leak data from their web server file-system such as: server logs, world-readable files, and potentially other sensitive information. An attacker can craft a malicious URL with file paths and the streamlit server would process that URL and return the contents of that file. This issue has been resolved in version 1.11.1. Users are advised to upgrade. There are no known workarounds for this issue. |
streamlit | 1.11.0 | >=0,<1.27.0 |
show Affected versions of Streamlit are susceptible to a vulnerability where improper output neutralization for logs occurs. This specific issue arises if the function `upload_file_request_handler.py` triggers a 400 error that includes the `session_id` value. |
streamlit | 1.11.0 | <1.37.0 |
show Affected versions of the Fastify package are vulnerable to Prototype Pollution due to improper handling of user-supplied object keys during schema validation. The `validation.compile` method does not adequately restrict the use of `__proto__`, `constructor`, or other special object properties, which allows attackers to inject malicious attributes into the prototype chain. An attacker can exploit this by sending crafted JSON payloads to affected endpoints, resulting in unexpected application behaviour such as denial of service, privilege escalation, or data manipulation. |
streamlit | 1.11.0 | >=0.63.0,<=1.30.0 |
show In Streamlit affected versions, users hosting Streamlit app(s) that use custom components are vulnerable to a directory traversal attack that could leak data from their web server file-system such as: server logs, world-readable files, and potentially other sensitive information. An attacker can craft a malicious URL with file paths and the streamlit server would process that URL and return the contents of that file. This issue has been resolved in version 1.11.1. Users are advised to upgrade. There are no known workarounds for this issue. |
streamlit | 1.11.0 | >=0,<1.27.0 |
show Affected versions of Streamlit are susceptible to a vulnerability where improper output neutralization for logs occurs. This specific issue arises if the function `upload_file_request_handler.py` triggers a 400 error that includes the `session_id` value. |
https://pyup.io/repos/github/amor71/LiuAlgoTrader/python-3-shield.svg
[](https://pyup.io/repos/github/amor71/LiuAlgoTrader/)
.. image:: https://pyup.io/repos/github/amor71/LiuAlgoTrader/python-3-shield.svg :target: https://pyup.io/repos/github/amor71/LiuAlgoTrader/ :alt: Python 3
<a href="https://pyup.io/repos/github/amor71/LiuAlgoTrader/"><img src="https://pyup.io/repos/github/amor71/LiuAlgoTrader/shield.svg" alt="Python 3" /></a>
!https://pyup.io/repos/github/amor71/LiuAlgoTrader/python-3-shield.svg(Python 3)!:https://pyup.io/repos/github/amor71/LiuAlgoTrader/
{<img src="https://pyup.io/repos/github/amor71/LiuAlgoTrader/python-3-shield.svg" alt="Python 3" />}[https://pyup.io/repos/github/amor71/LiuAlgoTrader/]
https://pyup.io/repos/github/amor71/LiuAlgoTrader/shield.svg
[](https://pyup.io/repos/github/amor71/LiuAlgoTrader/)
.. image:: https://pyup.io/repos/github/amor71/LiuAlgoTrader/shield.svg :target: https://pyup.io/repos/github/amor71/LiuAlgoTrader/ :alt: Updates
<a href="https://pyup.io/repos/github/amor71/LiuAlgoTrader/"><img src="https://pyup.io/repos/github/amor71/LiuAlgoTrader/shield.svg" alt="Updates" /></a>
!https://pyup.io/repos/github/amor71/LiuAlgoTrader/shield.svg(Updates)!:https://pyup.io/repos/github/amor71/LiuAlgoTrader/
{<img src="https://pyup.io/repos/github/amor71/LiuAlgoTrader/shield.svg" alt="Updates" />}[https://pyup.io/repos/github/amor71/LiuAlgoTrader/]