You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The editor in IPython Notebook before 3.2.2 and Jupyter Notebook 4.0.x before 4.0.5 allows remote attackers to execute arbitrary JavaScript code via a crafted file, which triggers a redirect to files/, related to MIME types.
CVE-2015-7337 - Medium Severity Vulnerability
Vulnerable Library - ipython-0.13.1.tar.gz
IPython: Productive Interactive Computing
path: /notejam/flask/requirements.txt
Library home page: https://pypi.python.org/packages/8d/0f/dfc2ec9f09d5612176ad900f3b0b71bf71ff91f78f3b4c9566f2eb7d013c/ipython-0.13.1.tar.gz
Dependency Hierarchy:
Vulnerability Details
The editor in IPython Notebook before 3.2.2 and Jupyter Notebook 4.0.x before 4.0.5 allows remote attackers to execute arbitrary JavaScript code via a crafted file, which triggers a redirect to files/, related to MIME types.
Publish Date: 2015-09-29
URL: CVE-2015-7337
CVSS 2 Score Details (6.8)
Base Score Metrics not available
Suggested Fix
Type: Upgrade version
Origin: https://security.gentoo.org/glsa/201512-02
Release Date: 2015-12-17
Fix Resolution: All IPython users should upgrade to the latest version >= ipython-3.2.1-r1
Step up your Open Source Security Game with WhiteSource here
The text was updated successfully, but these errors were encountered: