Metrics
Affected Vendors & Products
Link | Providers |
---|---|
https://github.com/apache/zeppelin/pull/4823 |
![]() ![]() |
Tue, 05 Aug 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
ssvc
|
Tue, 05 Aug 2025 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:a:apache:zeppelin:*:*:*:*:*:*:*:* | |
Metrics |
cvssV3_1
|
Mon, 04 Aug 2025 08:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Apache
Apache zeppelin |
|
Vendors & Products |
Apache
Apache zeppelin |
Sun, 03 Aug 2025 10:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Missing Origin Validation in WebSockets vulnerability in Apache Zeppelin. The attacker could access the Zeppelin server from another origin without any restriction, and get internal information about paragraphs. This issue affects Apache Zeppelin: from 0.11.1 before 0.12.0. Users are recommended to upgrade to version 0.12.0, which fixes the issue. | |
Title | Apache Zeppelin: Command Injection via CSWSH | |
Weaknesses | CWE-1385 | |
References |
|

Status: PUBLISHED
Assigner: apache
Published: 2025-08-03T10:13:17.467Z
Updated: 2025-08-05T15:24:11.780Z
Reserved: 2024-11-02T13:39:42.909Z
Link: CVE-2024-51775

Updated: 2025-08-05T15:24:08.234Z

Status : Modified
Published: 2025-08-03T11:15:26.000
Modified: 2025-08-05T16:15:28.490
Link: CVE-2024-51775

No data.