Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-33822 | DOM-based XSS in src/muya/lib/contentState/pasteCtrl.js in MarkText 0.17.1 and before on Windows, Linux and macOS allows arbitrary JavaScript code to run in the context of MarkText main window. This vulnerability can be exploited if a user copies text from a malicious webpage and paste it into MarkText. |
Mon, 07 Oct 2024 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: STAR_Labs
Published:
Updated: 2024-10-07T19:56:42.497Z
Reserved: 2023-04-27T04:51:16.289Z
Link: CVE-2023-2318
Updated: 2024-08-02T06:19:14.891Z
Status : Modified
Published: 2023-08-19T06:15:46.883
Modified: 2024-11-21T07:58:22.690
Link: CVE-2023-2318
No data.
OpenCVE Enrichment
No data.
EUVD