9 results (0.004 seconds)

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

Leanote version 2.7.0 allows obtaining arbitrary local files. This is possible because the application is vulnerable to LFR. La versión 2.7.0 de Leanote permite obtener archivos locales arbitrarios. Esto es posible porque la aplicación es vulnerable a LFR. Leanote version 2.7.0 allows obtaining arbitrary local files. • https://fluidattacks.com/advisories/alesso https://github.com/leanote/desktop-app • CWE-20: Improper Input Validation CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE-73: External Control of File Name or Path •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

A vulnerability, which was classified as problematic, has been found in leanote 2.6.1. This issue affects the function define of the file public/js/plugins/history.js. The manipulation of the argument content leads to cross site scripting. The attack may be initiated remotely. The identifier of the patch is 0f9733c890077942150696dcc6d2b1482b7a0a19. • https://github.com/leanote/leanote/commit/0f9733c890077942150696dcc6d2b1482b7a0a19 https://vuldb.com/?ctiid.216461 https://vuldb.com/?id.216461 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 1

Leanote 2.7.0 is vulnerable to Cross Site Scripting (XSS) in the markdown type note. This leads to remote code execution with payload : <video src=x onerror=(function(){require('child_process').exec('calc');})();> Leanote versión 2.7.0, es vulnerable a un ataque de tipo Cross Site Scripting (XSS) en la nota de tipo markdown. Esto conlleva a una ejecución de código remota con carga útil : (video src=x onerror=(function(){require("child_process").exec("calc");})();) • https://github.com/leanote/desktop-app/issues/364 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.6EPSS: 0%CPEs: 1EXPL: 0

Leanote Desktop through 2.6.2 allows XSS because a note's title is mishandled during syncing. This leads to remote code execution because of Node integration. Leanote Desktop versiones hasta 2.6.2, permite un ataque de tipo XSS porque el título de nota es manejado inapropiadamente durante la sincronización.&#xa0;Esto conlleva a una ejecución de código remota debido a una integración de Node • https://github.com/leanote/desktop-app/issues/353 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.6EPSS: 0%CPEs: 1EXPL: 0

Leanote Desktop through 2.6.2 allows XSS because a note's title is mishandled when the batch feature is triggered. This leads to remote code execution because of Node integration. Leanote Desktop versiones hasta 2.6.2, permite un ataque de tipo XSS porque el título de nota es manejado inapropiadamente cuando es activada la funcionalidad batch.&#xa0;Esto conlleva a una ejecución de código remota debido a una integración de Node • https://github.com/leanote/desktop-app/issues/353 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •