Количество 6
Количество 6
CVE-2021-32798
The Jupyter notebook is a web-based notebook environment for interactive computing. In affected versions untrusted notebook can execute code on load. Jupyter Notebook uses a deprecated version of Google Caja to sanitize user inputs. A public Caja bypass can be used to trigger an XSS when a victim opens a malicious ipynb document in Jupyter Notebook. The XSS allows an attacker to execute arbitrary code on the victim computer using Jupyter APIs.
CVE-2021-32798
The Jupyter notebook is a web-based notebook environment for interactive computing. In affected versions untrusted notebook can execute code on load. Jupyter Notebook uses a deprecated version of Google Caja to sanitize user inputs. A public Caja bypass can be used to trigger an XSS when a victim opens a malicious ipynb document in Jupyter Notebook. The XSS allows an attacker to execute arbitrary code on the victim computer using Jupyter APIs.
CVE-2021-32798
The Jupyter notebook is a web-based notebook environment for interacti ...
GHSA-hwvq-6gjx-j797
Special Element Injection in notebook
BDU:2022-01679
Уязвимость компонента Caja среды создания документов блокнота Jupyter Notebook, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
openSUSE-SU-2024:0231-1
Security update for python-notebook
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2021-32798 The Jupyter notebook is a web-based notebook environment for interactive computing. In affected versions untrusted notebook can execute code on load. Jupyter Notebook uses a deprecated version of Google Caja to sanitize user inputs. A public Caja bypass can be used to trigger an XSS when a victim opens a malicious ipynb document in Jupyter Notebook. The XSS allows an attacker to execute arbitrary code on the victim computer using Jupyter APIs. | CVSS3: 10 | 0% Низкий | больше 4 лет назад | |
CVE-2021-32798 The Jupyter notebook is a web-based notebook environment for interactive computing. In affected versions untrusted notebook can execute code on load. Jupyter Notebook uses a deprecated version of Google Caja to sanitize user inputs. A public Caja bypass can be used to trigger an XSS when a victim opens a malicious ipynb document in Jupyter Notebook. The XSS allows an attacker to execute arbitrary code on the victim computer using Jupyter APIs. | CVSS3: 10 | 0% Низкий | больше 4 лет назад | |
CVE-2021-32798 The Jupyter notebook is a web-based notebook environment for interacti ... | CVSS3: 10 | 0% Низкий | больше 4 лет назад | |
GHSA-hwvq-6gjx-j797 Special Element Injection in notebook | CVSS3: 10 | 0% Низкий | больше 4 лет назад | |
BDU:2022-01679 Уязвимость компонента Caja среды создания документов блокнота Jupyter Notebook, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании | CVSS3: 9.6 | 0% Низкий | больше 4 лет назад | |
openSUSE-SU-2024:0231-1 Security update for python-notebook | больше 1 года назад |
Уязвимостей на страницу