Vulnerabilities > Apache > Zeppelin

DATE CVE VULNERABILITY TITLE RISK
2022-12-16 CVE-2021-28655 Unspecified vulnerability in Apache Zeppelin
The improper Input Validation vulnerability in "”Move folder to Trash” feature of Apache Zeppelin allows an attacker to delete the arbitrary files.
network
low complexity
apache
6.5
2022-12-16 CVE-2022-46870 Unspecified vulnerability in Apache Zeppelin
An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Apache Zeppelin allows logged-in users to execute arbitrary javascript in other users' browsers. This issue affects Apache Zeppelin before 0.8.2.
network
low complexity
apache
5.4
2021-09-02 CVE-2019-10095 Command Injection vulnerability in Apache Zeppelin
bash command injection vulnerability in Apache Zeppelin allows an attacker to inject system commands into Spark interpreter settings.
network
low complexity
apache CWE-77
critical
9.8
2021-09-02 CVE-2020-13929 Unspecified vulnerability in Apache Zeppelin
Authentication bypass vulnerability in Apache Zeppelin allows an attacker to bypass Zeppelin authentication mechanism to act as another user.
network
low complexity
apache
7.5
2021-09-02 CVE-2021-27578 Cross-site Scripting vulnerability in Apache Zeppelin
Cross Site Scripting vulnerability in markdown interpreter of Apache Zeppelin allows an attacker to inject malicious scripts.
network
low complexity
apache CWE-79
6.1
2019-04-23 CVE-2018-1328 Cross-site Scripting vulnerability in Apache Zeppelin
Apache Zeppelin prior to 0.8.0 had a stored XSS issue via Note permissions.
network
low complexity
apache CWE-79
6.1
2019-04-23 CVE-2018-1317 Improper Authentication vulnerability in Apache Zeppelin
In Apache Zeppelin prior to 0.8.0 the cron scheduler was enabled by default and could allow users to run paragraphs as other users without authentication.
network
low complexity
apache CWE-287
8.8
2019-04-23 CVE-2017-12619 Session Fixation vulnerability in Apache Zeppelin
Apache Zeppelin prior to 0.7.3 was vulnerable to session fixation which allowed an attacker to hijack a valid user session.
network
low complexity
apache CWE-384
8.1