Safety vulnerability ID: 37053
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Plotly 1.12.6 includes Plotly.js v1.16.2, which fixes a potential XSS vulnerability in 'text' fields.
https://github.com/plotly/plotly.js/pull/736
https://plotly.com/chart-studio-help/security-advisories/2016-08-08-plotlyjs-xss-advisory/
Latest version: 6.0.1
An open-source interactive data visualization library for Python
Fixed
- Scattergeo and choropleth now correctly fire hover and click events [215]
- Heatmap and contour traces are redrawn in the correct order [194]
- Early returns in `Plotly.plot` now correctly return Promise rejections [226]
- Soon to be deprecated `SVGElement.offsetParent` calls are removed [222]
- Geo zoom in button is now correctly titled `Zoom in` [219]
- All attribute description are correctly stripped from the dist files (bug
introduced in 1.5.0) [223]
- Insecure dev dependencies `ecstatic` and `uglify-js` are bumped [225]
- Outdated karma-browserify dev dependency is bumped [229]
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application