MarkText 0.17.0 Release Candidate 2

CPE Details

MarkText 0.17.0 Release Candidate 2
0.17.0
2022-03-14
13h04 +00:00
2022-04-01
00h11 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:marktext:marktext:0.17.0:rc2:*:*:*:*:*:*

Informations

Vendor

marktext

Product

marktext

Version

0.17.0

Update

rc2

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2023-2318 2023-08-19 05h43 +00:00 DOM-based XSS in src/muya/lib/contentState/pasteCtrl.js in MarkText 0.17.1 and before on Windows, Linux and macOS allows arbitrary JavaScript code to run in the context of MarkText main window. This vulnerability can be exploited if a user copies text from a malicious webpage and paste it into MarkText.
9.6
Critical
CVE-2023-1004 2023-02-24 07h56 +00:00 A vulnerability has been found in MarkText up to 0.17.1 on Windows and classified as critical. Affected by this vulnerability is an unknown functionality of the component WSH JScript Handler. The manipulation leads to code injection. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The identifier VDB-221737 was assigned to this vulnerability.
7.8
High