Browse all 7 CVE security advisories affecting dartiss. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Dartiss is primarily a Python library for handling HTTP requests and web scraping, commonly used for data extraction and automation. Historically, it has been associated with multiple cross-site scripting (XSS) vulnerabilities and remote code execution (RCE) flaws, often stemming from improper input validation and insecure default configurations. The library has accumulated seven CVEs, with several allowing attackers to execute arbitrary code via crafted URLs or manipulate request parameters. While no major public security incidents have been documented, the consistent pattern of vulnerabilities suggests developers should implement strict input sanitization and consider alternative libraries for security-sensitive applications.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2026-4006 | Draft List <= 2.6.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via 'display_name' Parameter — Draft ListCWE-79 | 6.4 | Medium | 2026-03-19 |
| CVE-2025-11197 | Draft List <= 2.6.1 - Authenticated (Contributor+) Stored Cross-Site Scripting — Draft ListCWE-79 | 6.4 | Medium | 2025-10-11 |
| CVE-2025-10181 | Draft List <= 2.6 - Authenticated (Contributor+) Stored Cross-Site Scripting — Draft ListCWE-79 | 6.4 | Medium | 2025-09-20 |
This page lists every published CVE security advisory associated with dartiss. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.