Total
6 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2023-1004 | 2 Marktext, Microsoft | 2 Marktext, Windows | 2023-03-03 | N/A | 7.8 HIGH |
A vulnerability has been found in MarkText up to 0.17.1 and classified as critical. Affected by this vulnerability is an unknown functionality of the component WSH JScript Handler. The manipulation leads to code injection. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The identifier VDB-221737 was assigned to this vulnerability. | |||||
CVE-2022-21158 | 1 Marktext | 1 Marktext | 2022-03-15 | 3.5 LOW | 5.4 MEDIUM |
A stored cross-site scripting vulnerability in marktext versions prior to v0.17.0 due to improper handling of the link (with javascript: scheme) inside the document may allow an attacker to execute an arbitrary script on the PC of the user using marktext. | |||||
CVE-2022-25069 | 1 Marktext | 1 Marktext | 2022-03-10 | 6.8 MEDIUM | 9.6 CRITICAL |
Mark Text v0.16.3 was discovered to contain a DOM-based cross-site scripting (XSS) vulnerability which allows attackers to perform remote code execution (RCE) via injecting a crafted payload into /lib/contentState/pasteCtrl.js. | |||||
CVE-2022-24123 | 1 Marktext | 1 Marktext | 2022-02-04 | 6.8 MEDIUM | 9.0 CRITICAL |
MarkText through 0.16.3 does not sanitize the input of a mermaid block before rendering. This could lead to Remote Code Execution via a .md file containing a mutation Cross-Site Scripting (XSS) payload. | |||||
CVE-2021-29996 | 1 Marktext | 1 Marktext | 2021-04-12 | 6.8 MEDIUM | 9.6 CRITICAL |
Mark Text through 0.16.3 allows attackers arbitrary command execution. This could lead to Remote Code Execution (RCE) by opening .md files containing a mutation Cross Site Scripting (XSS) payload. | |||||
CVE-2020-27176 | 1 Marktext | 1 Marktext | 2020-10-26 | 6.8 MEDIUM | 9.6 CRITICAL |
Mutation XSS exists in Mark Text through 0.16.2 that leads to Remote Code Execution. NOTE: this might be considered a duplicate of CVE-2020-26870; however, it can also be considered an issue in the design of the "source code mode" feature, which parses HTML even though HTML support is not one of the primary advertised roles of the product. |