Safety vulnerability ID: 54689
The information on this page was manually curated by our Cybersecurity Intelligence Team.
The Jupyter notebook is a web-based notebook environment for interactive computing. In affected versions untrusted notebook can execute code on load. Jupyter Notebook uses a deprecated version of Google Caja to sanitize user inputs. A public Caja bypass can be used to trigger an XSS when a victim opens a malicious ipynb document in Jupyter Notebook. The XSS allows an attacker to execute arbitrary code on the victim computer using Jupyter APIs.
Latest version: 7.2.2
Jupyter Notebook - A web-based notebook environment for interactive computing
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application