Show filters
75 Total Results
Displaying 51-60 of 75
Sort by:
Attacker Value
Unknown
CVE-2018-21030
Disclosure Date: October 31, 2019 (last updated November 27, 2024)
Jupyter Notebook before 5.5.0 does not use a CSP header to treat served files as belonging to a separate origin. Thus, for example, an XSS payload can be placed in an SVG document.
0
Attacker Value
Unknown
CVE-2019-10856
Disclosure Date: April 04, 2019 (last updated November 27, 2024)
In Jupyter Notebook before 5.7.8, an open redirect can occur via an empty netloc. This issue exists because of an incomplete fix for CVE-2019-10255.
0
Attacker Value
Unknown
CVE-2019-10255
Disclosure Date: March 28, 2019 (last updated November 08, 2023)
An Open Redirect vulnerability for all browsers in Jupyter Notebook before 5.7.7 and some browsers (Chrome, Firefox) in JupyterHub before 0.9.5 allows crafted links to the login page, which will redirect to a malicious site after successful login. Servers running on a base_url prefix are not affected.
0
Attacker Value
Unknown
CVE-2019-9644
Disclosure Date: March 12, 2019 (last updated November 08, 2023)
An XSSI (cross-site inclusion) vulnerability in Jupyter Notebook before 5.7.6 allows inclusion of resources on malicious pages when visited by users who are authenticated with a Jupyter server. Access to the content of resources has been demonstrated with Internet Explorer through capturing of error messages, though not reproduced with other browsers. This occurs because Internet Explorer's error messages can include the content of any invalid JavaScript that was encountered.
0
Attacker Value
Unknown
CVE-2018-19351
Disclosure Date: November 18, 2018 (last updated November 08, 2023)
Jupyter Notebook before 5.7.1 allows XSS via an untrusted notebook because nbconvert responses are considered to have the same origin as the notebook server. In other words, nbconvert endpoints can execute JavaScript with access to the server API. In notebook/nbconvert/handlers.py, NbconvertFileHandler and NbconvertPostHandler do not set a Content Security Policy to prevent this.
0
Attacker Value
Unknown
CVE-2018-19352
Disclosure Date: November 18, 2018 (last updated November 27, 2024)
Jupyter Notebook before 5.7.2 allows XSS via a crafted directory name because notebook/static/tree/js/notebooklist.js handles certain URLs unsafely.
0
Attacker Value
Unknown
CVE-2017-2751
Disclosure Date: October 03, 2018 (last updated November 27, 2024)
A BIOS password extraction vulnerability has been reported on certain consumer notebooks with firmware F.22 and others. The BIOS password was stored in CMOS in a way that allowed it to be extracted. This applies to consumer notebooks launched in early 2014.
0
Attacker Value
Unknown
CVE-2018-8768
Disclosure Date: March 18, 2018 (last updated November 26, 2024)
In Jupyter Notebook before 5.4.1, a maliciously forged notebook file can bypass sanitization to execute JavaScript in the notebook context. Specifically, invalid HTML is 'fixed' by jQuery after sanitization, making it dangerous.
0
Attacker Value
Unknown
CVE-2016-8224
Disclosure Date: November 29, 2016 (last updated November 25, 2024)
A vulnerability has been identified in some Lenovo Notebook and ThinkServer systems where an attacker with administrative privileges on a system could install a program that circumvents Intel Management Engine (ME) protections. This could result in a denial of service or privilege escalation attack on the system.
0
Attacker Value
Unknown
CVE-2015-7337
Disclosure Date: September 29, 2015 (last updated October 05, 2023)
The editor in IPython Notebook before 3.2.2 and Jupyter Notebook 4.0.x before 4.0.5 allows remote attackers to execute arbitrary JavaScript code via a crafted file, which triggers a redirect to files/, related to MIME types.
0