Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-34415 | Improper path handling in Typora before 1.7.0-dev on Windows and Linux allows a crafted webpage to access local files and exfiltrate them to remote web servers via "typora://app/typemark/". This vulnerability can be exploited if a user opens a malicious markdown file in Typora, or copies text from a malicious webpage and paste it into Typora. |
| Link | Providers |
|---|---|
| https://starlabs.sg/advisories/23/23-2971/ |
|
Mon, 07 Oct 2024 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: STAR_Labs
Published:
Updated: 2024-10-07T19:54:42.467Z
Reserved: 2023-05-30T07:46:11.004Z
Link: CVE-2023-2971
Updated: 2024-08-02T06:41:03.890Z
Status : Modified
Published: 2023-08-19T06:15:47.037
Modified: 2024-11-21T07:59:40.130
Link: CVE-2023-2971
No data.
OpenCVE Enrichment
No data.
EUVD