The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade jupyter-core
to version 5.8.0 or higher.
Affected versions of this package are vulnerable to Uncontrolled Search Path Element due to the shared %PROGRAMDATA%
directory being searched for configuration files. An attacker can introduce unintended behavior and affect other users by creating malicious configuration files in the shared directory. This is only exploitable if the system is a shared Windows environment with multiple users and an unprotected %PROGRAMDATA%
directory.
Note: The fix version 5.8.0 introduced a regression affecting jupyter-server
. It is advised to update to 5.8.1 to avoid the broken functionality.
This vulnerability can be mitigated by modifying the permissions on the %PROGRAMDATA%
directory so it is not writable by unauthorized users. Alternatively, an administrative user can create the %PROGRAMDATA%\jupyter
directory with appropriately restrictive permissions, or set the %PROGRAMDATA%
environment variable to a directory with appropriately restrictive permissions.