A vulnerability has been found in MarkText up to 0.17.1 on Windows and classified as critical. Affected by this vulnerability is an unknown functionality of the component WSH JScript Handler. The manipulation leads to code injection. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The identifier VDB-221737 was assigned to this vulnerability.
References
Link | Resource |
---|---|
https://github.com/marktext/marktext/issues/3575 | Exploit Issue Tracking Third Party Advisory |
https://vuldb.com/?ctiid.221737 | Permissions Required Third Party Advisory |
https://vuldb.com/?id.221737 | Permissions Required Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2023-02-24 08:15
Updated : 2024-05-17 02:17
NVD link : CVE-2023-1004
Mitre link : CVE-2023-1004
CVE.ORG link : CVE-2023-1004
JSON object : View
Products Affected
marktext
- marktext
microsoft
- windows
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')