Safety vulnerability ID: 50792
The information on this page was manually curated by our Cybersecurity Intelligence Team.
The GitHub Security Lab discovered sixteen ways to exploit a cross-site scripting vulnerability in nbconvert. When using nbconvert to generate an HTML version of a user-controllable notebook, it is possible to inject arbitrary HTML which may lead to cross-site scripting (XSS) vulnerabilities if these HTML notebooks are served by a web server (eg: nbviewer).
https://github.com/jupyter/nbconvert/security/advisories/GHSA-9jmq-rx5f-8jwq
Latest version: 7.16.4
Converting Jupyter Notebooks (.ipynb files) to other formats. Output formats include asciidoc, html, latex, markdown, pdf, py, rst, script. nbconvert can be used both as a Python library (`import nbconvert`) or as a command line tool (invoked as `jupyter nbconvert ...`).
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application