Jupyter ipython Unauthorized Access Scanner
Information disclosed from this page can be used to gain additional information about the target system.
Short Info
Level
Critical
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
5 seconds
Time Interval
2 months 25 days
Scan only one
URL
Toolbox
-
It is possible to obtain an overview of the remote Jupyter ipython instance. By accessing this overview page; a remote, unauthenticated attacker can discover a large amount of information about the remote web server