Количество 4
Количество 4
CVE-2014-3429
IPython Notebook 0.12 through 1.x before 1.2 does not validate the origin of websocket requests, which allows remote attackers to execute arbitrary code by leveraging knowledge of the kernel id and a crafted page.
CVE-2014-3429
IPython Notebook 0.12 through 1.x before 1.2 does not validate the origin of websocket requests, which allows remote attackers to execute arbitrary code by leveraging knowledge of the kernel id and a crafted page.
CVE-2014-3429
IPython Notebook 0.12 through 1.x before 1.2 does not validate the ori ...
GHSA-75cw-5cgv-g853
IPython Notebook vulnerable to improper validation of the origin of websocket requests
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2014-3429 IPython Notebook 0.12 through 1.x before 1.2 does not validate the origin of websocket requests, which allows remote attackers to execute arbitrary code by leveraging knowledge of the kernel id and a crafted page. | CVSS2: 6.8 | 2% Низкий | больше 11 лет назад | |
CVE-2014-3429 IPython Notebook 0.12 through 1.x before 1.2 does not validate the origin of websocket requests, which allows remote attackers to execute arbitrary code by leveraging knowledge of the kernel id and a crafted page. | CVSS2: 6.8 | 2% Низкий | больше 11 лет назад | |
CVE-2014-3429 IPython Notebook 0.12 through 1.x before 1.2 does not validate the ori ... | CVSS2: 6.8 | 2% Низкий | больше 11 лет назад | |
GHSA-75cw-5cgv-g853 IPython Notebook vulnerable to improper validation of the origin of websocket requests | CVSS3: 9.8 | 2% Низкий | больше 3 лет назад |
Уязвимостей на страницу