{"vulnerability": "CVE-2024-47833", "sightings": [{"uuid": "2ebaa201-5479-402c-8ec6-f25adf54b931", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47833", "type": "seen", "source": "https://t.me/cvedetector/7523", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47833 - Taipy Cookie Insecure Session Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-47833 \nPublished : Oct. 9, 2024, 7:15 p.m. | 35\u00a0minutes ago \nDescription : Taipy is an open-source Python library for easy, end-to-end application development for data scientists and machine learning engineers. In affected versions session cookies are served without Secure and HTTPOnly flags. This issue has been addressed in release version 4.0.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-09T22:21:01.000000Z"}]}