Show filters
75 Total Results
Displaying 11-20 of 75
Sort by:
Attacker Value
Unknown

CVE-2022-43778

Disclosure Date: June 12, 2023 (last updated February 25, 2025)
Potential Time-of-Check to Time-of Use (TOCTOU) vulnerabilities have been identified in the HP BIOS for certain HP PC products which may allow arbitrary code execution, denial of service, and information disclosure.
Attacker Value
Unknown

CVE-2022-43777

Disclosure Date: June 12, 2023 (last updated February 25, 2025)
Potential Time-of-Check to Time-of Use (TOCTOU) vulnerabilities have been identified in the HP BIOS for certain HP PC products which may allow arbitrary code execution, denial of service, and information disclosure.
Attacker Value
Unknown

CVE-2022-27541

Disclosure Date: June 12, 2023 (last updated February 25, 2025)
Potential Time-of-Check to Time-of Use (TOCTOU) vulnerabilities have been identified in the HP BIOS for certain HP PC products which may allow arbitrary code execution, denial of service, and information disclosure.
Attacker Value
Unknown

CVE-2022-27539

Disclosure Date: June 12, 2023 (last updated February 25, 2025)
Potential Time-of-Check to Time-of Use (TOCTOU) vulnerabilities have been identified in the HP BIOS for certain HP PC products which may allow arbitrary code execution, denial of service, and information disclosure.
Attacker Value
Unknown

CVE-2023-24217

Disclosure Date: March 06, 2023 (last updated March 07, 2025)
AgileBio Electronic Lab Notebook v4.234 was discovered to contain a local file inclusion vulnerability.
Attacker Value
Unknown

CVE-2022-29238

Disclosure Date: June 14, 2022 (last updated February 23, 2025)
Jupyter Notebook is a web-based notebook environment for interactive computing. Prior to version 6.4.12, authenticated requests to the notebook server with `ContentsManager.allow_hidden = False` only prevented listing the contents of hidden directories, not accessing individual hidden files or files in hidden directories (i.e. hidden files were 'hidden' but not 'inaccessible'). This could lead to notebook configurations allowing authenticated access to files that may reasonably be expected to be disallowed. Because fully authenticated requests are required, this is of relatively low impact. But if a server's root directory contains sensitive files whose only protection from the server is being hidden (e.g. `~/.ssh` while serving $HOME), then any authenticated requests could access files if their names are guessable. Such contexts also necessarily have full access to the server and therefore execution permissions, which also generally grants access to all the same files. So this does n…
Attacker Value
Unknown

CVE-2022-24758

Disclosure Date: March 31, 2022 (last updated February 23, 2025)
The Jupyter notebook is a web-based notebook environment for interactive computing. Prior to version 6.4.9, unauthorized actors can access sensitive information from server logs. Anytime a 5xx error is triggered, the auth cookie and other header values are recorded in Jupyter server logs by default. Considering these logs do not require root access, an attacker can monitor these logs, steal sensitive auth/cookie information, and gain access to the Jupyter server. Jupyter notebook version 6.4.x contains a patch for this issue. There are currently no known workarounds.
Attacker Value
Unknown

CVE-2021-39050

Disclosure Date: December 10, 2021 (last updated February 23, 2025)
IBM i2 Analyst's Notebook 9.2.0, 9.2.1, and 9.2.2 is vulnerable to a stack-based buffer overflow, caused by improper bounds checking. A local attacker could overflow a buffer and gain lower level privileges. IBM X-Force ID: 214440.
Attacker Value
Unknown

CVE-2021-39049

Disclosure Date: December 10, 2021 (last updated February 23, 2025)
IBM i2 Analyst's Notebook 9.2.0, 9.2.1, and 9.2.2 is vulnerable to a stack-based buffer overflow, caused by improper bounds checking. A local attacker could overflow a buffer and gain lower level privileges. IBM X-Force ID: 214439.
Attacker Value
Unknown

CVE-2021-32798

Disclosure Date: August 09, 2021 (last updated February 23, 2025)
The Jupyter notebook is a web-based notebook environment for interactive computing. In affected versions untrusted notebook can execute code on load. Jupyter Notebook uses a deprecated version of Google Caja to sanitize user inputs. A public Caja bypass can be used to trigger an XSS when a victim opens a malicious ipynb document in Jupyter Notebook. The XSS allows an attacker to execute arbitrary code on the victim computer using Jupyter APIs.