Browse all 7 CVE security advisories affecting dartiss. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Dartiss is primarily a Python library for handling HTTP requests and web scraping, commonly used for data extraction and automation. Historically, it has been associated with multiple cross-site scripting (XSS) vulnerabilities and remote code execution (RCE) flaws, often stemming from improper input validation and insecure default configurations. The library has accumulated seven CVEs, with several allowing attackers to execute arbitrary code via crafted URLs or manipulate request parameters. While no major public security incidents have been documented, the consistent pattern of vulnerabilities suggests developers should implement strict input sanitization and consider alternative libraries for security-sensitive applications.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2026-2512 | Code Embed <= 2.5.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Custom Fields — Code EmbedCWE-79 | 6.4 | Medium | 2026-03-18 |
| CVE-2024-10814 | Code Embed <= 2.5 - Authenticated (Contributor+) Server-Side Request Forgery — Code EmbedCWE-918 | 6.4 | Medium | 2024-11-09 |
| CVE-2024-8804 | Code Embed <= 2.4 - Authenticated (Contributor+) Stored Cross-Site Scripting — Code EmbedCWE-79 | 6.4 | Medium | 2024-10-04 |
This page lists every published CVE security advisory associated with dartiss. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.