cabot
pypiv0.11.12Self-hosted, easily-deployable monitoring and alerts service - like a lightweight PagerDuty
License MITpermissive28 versions1 maintainers50 deps115 weekly dl
40
/ 100
Health
safe to use
[email protected] is safe to use (health: 40/100)
Health breakdown0 – 100
0/25
maintenance
3/20
popularity
23/25
security
12/15
maturity
2/15
community
Vulnerabilities
4
1 medium3 low
Advisories (4)
| Severity | ID | Summary | Fixed in |
|---|---|---|---|
| medium | CVE-2020-25449 | Cabot Cross Site Scripting (XSS) vulnerability via Address column | — |
| low | CVE-2020-7734 | Cabot Cross Site Scripting (XSS) vulnerability via Endpoint column | — |
| unknown | CVE-2020-25449 | Cross Site Scripting (XSS) vulnerability in Arachnys Cabot 0.11.12 can be exploited via the Address column. | — |
| unknown | CVE-2020-7734 | All versions of package cabot are vulnerable to Cross-site Scripting (XSS) via the Endpoint column. | — |
Health History
Dependency Tree
License Audit
Dependencies (50)
amqpanyjsonappdirsbilliardcelerycoreapicoreschemadj-database-urlDjangodjango-appconfdjango-auth-ldapdjango-autocomplete-lightdjango-compressordjango-filterdjango-jsonifydjango-polymorphicdjangorestframeworkgeventgreenletgunicornhttplib2icalendaritypespython-jenkinsJinja2kombuMarkdownMarkupSafepackagingpsycopg2PygmentspyparsingPySockspython-dateutilpytzrcssminredisrequestsrjsminsixsocial-auth-app-djangotwiliouritemplatevinewhitenoisecabot-alert-emailcabot-alert-hipchatcabot-alert-twiliocabot-alert-slackcabot-check-cloudwatch
API access
Get this data programmatically — free, no authentication.
curl https://depscope.dev/api/check/pypi/cabotMore from pypi
Last updated · 2018-03-21T12:02:52.005168Z