Page 4 of 20 results (0.005 seconds)

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

Joplin before 2.0.9 allows XSS via button and form in the note body. Joplin versiones anteriores a 2.0.9, permite un ataque XSS por medio del button y form en el cuerpo de la nota • https://github.com/laurent22/joplin/commit/feaecf765368f2c273bea3a9fa641ff0da7e6b26 https://github.com/laurent22/joplin/releases/tag/v2.0.9 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 2

Joplin 1.2.6 for Desktop allows XSS via a LINK element in a note. Joplin versión 1.2.6 para Desktop, permite un ataque de tipo XSS por medio de un elemento LINK en una nota • https://www.exploit-db.com/exploits/49024 https://github.com/fhlip0/JopinXSS https://github.com/laurent22/joplin/releases • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 2

An XSS issue in Joplin desktop 1.0.190 to 1.0.245 allows arbitrary code execution via a malicious HTML embed tag. Un problema de tipo XSS en Joplin Desktop versiones 1.0.190 hasta 1.0.245, permite una ejecución de código arbitrario por medio de una etiqueta de inserción HTML maliciosa. Joplin version 1.0.245 suffers from a cross site scripting vulnerability that can lead to allowing for remote code execution. • https://www.exploit-db.com/exploits/48837 http://packetstormsecurity.com/files/159316/Joplin-1.0.245-Cross-Site-Scripting-Code-Execution.html https://github.com/laurent22/joplin/issues/3552 https://github.com/laurent22/joplin/releases/tag/v1.1.4 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 4

Joplin through 1.0.184 allows Arbitrary File Read via XSS. Joplin versiones hasta 1.0.184, permite una Lectura de Archivos Arbitrarios por medio de un ataque de tipo XSS. Joplin Desktop version 1.0.184 suffers from a cross site scripting vulnerability. • https://www.exploit-db.com/exploits/48147 https://github.com/JavierOlmedo/CVE-2020-9038 https://github.com/ossf-cve-benchmark/CVE-2020-9038 http://packetstormsecurity.com/files/156582/Joplin-Desktop-1.0.184-Cross-Site-Scripting.html https://github.com/laurent22/joplin/commit/3db47b575b9cb0a765da3d283baa2c065df0d0bc https://github.com/laurent22/joplin/compare/clipper-1.0.19...clipper-1.0.20 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 1

Joplin version prior to 1.0.90 contains a XSS evolving into code execution due to enabled nodeIntegration for that particular BrowserWindow instance where XSS was identified from vulnerability in Note content field - information on the fix can be found here https://github.com/laurent22/joplin/commit/494e235e18659574f836f84fcf9f4d4fcdcfcf89 that can result in executing unauthorized code within the rights in which the application is running. This attack appear to be exploitable via Victim synchronizing notes from the cloud services or other note-keeping services which contain malicious code. This vulnerability appears to have been fixed in 1.0.90 and later. Joplin en versiones anteriores a la 1.0.90 contiene Cross-Site Scripting (XSS) que evoluciona a una ejecución de código debido a que se habilita nodeIntegration para esa instancia BrowserWindow en concreto en la que se identificó XSS a partir de la vulnerabilidad en el campo de contenido Note. La información sobre la solución se puede encontrar en https://github.com/laurent22/joplin/commit/494e235e18659574f836f84fcf9f4d4fcdcfcf89. • https://github.com/laurent22/joplin/commit/494e235e18659574f836f84fcf9f4d4fcdcfcf89 https://github.com/laurent22/joplin/issues/500 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •