12 results (0.002 seconds)

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 1

A cross site scripting (XSS) vulnerability in the Markdown Editor component of Typora v1.6.7 allows attackers to execute arbitrary code via uploading a crafted Markdown file. Una vulnerabilidad de tipo Cross Site Scripting (XSS) en un componente del Editor de Markdown en Typora versión v1.6.7 permite a atacantes ejecutar código arbitrario cargando un archivo manipulado de Markdown. • https://c0olw.github.io/2023/07/31/Typora-XSS-Vulnerability • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.5EPSS: 0%CPEs: 3EXPL: 1

Improper path handling in Typora before 1.7.0-dev on Windows and Linux allows a crafted webpage to access local files and exfiltrate them to remote web servers via "typora://app/typemark/". This vulnerability can be exploited if a user opens a malicious markdown file in Typora, or copies text from a malicious webpage and paste it into Typora. El manejo inadecuado de rutas en Typora antes de 1.7.0-dev en Windows y Linux permite que una página web manipulada acceda a archivos locales y los exfiltre a servidores web remotos a través de "typora://app/typemark/". Esta vulnerabilidad puede ser explotada si un usuario abre un archivo markdown malicioso en Typora o copia texto de una página web y lo pega en Typora. • https://starlabs.sg/advisories/23/23-2971 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 9.6EPSS: 0%CPEs: 3EXPL: 1

DOM-based XSS in updater/update.html in Typora before 1.6.7 on Windows and Linux allows a crafted markdown file to run arbitrary JavaScript code in the context of Typora main window via loading typora://app/typemark/updater/update.html in <embed> tag. This vulnerability can be exploited if a user opens a malicious markdown file in Typora, or copies text from a malicious webpage and paste it into Typora. • https://starlabs.sg/advisories/23/23-2317 https://support.typora.io/What's-New-1.6 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.4EPSS: 0%CPEs: 3EXPL: 1

Improper path handling in Typora before 1.6.7 on Windows and Linux allows a crafted webpage to access local files and exfiltrate them to remote web servers via "typora://app/<absolute-path>". This vulnerability can be exploited if a user opens a malicious markdown file in Typora, or copies text from a malicious webpage and paste it into Typora. • https://starlabs.sg/advisories/23/23-2316 https://support.typora.io/What's-New-1.6 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 1

A vulnerability, which was classified as critical, was found in Typora up to 1.5.5 on Windows. Affected is an unknown function of the component WSH JScript Handler. The manipulation leads to code injection. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. • https://github.com/typora/typora-issues/issues/5623 https://vuldb.com/?ctiid.221736 https://vuldb.com/?id.221736 • CWE-94: Improper Control of Generation of Code ('Code Injection') •