Filtered by vendor Joplin Project
Subscriptions
Total
12 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2023-37298 | 1 Joplin Project | 1 Joplin | 2024-11-27 | 6.1 Medium |
Joplin before 2.11.5 allows XSS via a USE element in an SVG document. | ||||
CVE-2023-37299 | 1 Joplin Project | 1 Joplin | 2024-11-27 | 6.1 Medium |
Joplin before 2.11.5 allows XSS via an AREA element of an image map. | ||||
CVE-2023-39517 | 1 Joplin Project | 1 Joplin | 2024-11-21 | 8.2 High |
Joplin is a free, open source note taking and to-do application. A Cross site scripting (XSS) vulnerability in affected versions allows clicking on an untrusted image link to execute arbitrary shell commands. The HTML sanitizer (`packages/renderer/htmlUtils.ts::sanitizeHtml`) preserves `<map>` `<area>` links. However, unlike `<a>` links, the `target` and `href` attributes are not removed. Additionally, because the note preview pane isn't sandboxed to prevent top navigation, links with `target` set to `_top` can replace the toplevel electron page. Because any toplevel electron page, with Joplin's setup, has access to `require` and can require node libraries, a malicious replacement toplevel page can import `child_process` and execute arbitrary shell commands. This issue has been fixed in commit 7c52c3e9a81a52ef1b42a951f9deb9d378d59b0f which is included in release version 2.12.8. Users are advised to upgrade. There are no known workarounds for this vulnerability. | ||||
CVE-2022-45598 | 1 Joplin Project | 1 Joplin | 2024-11-21 | 6.1 Medium |
Cross Site Scripting vulnerability in Joplin Desktop App before v2.9.17 allows attacker to execute arbitrary code via improper santization. | ||||
CVE-2022-23340 | 1 Joplin Project | 1 Joplin | 2024-11-21 | 9.8 Critical |
Joplin 2.6.10 allows remote attackers to execute system commands through malicious code in user search results. | ||||
CVE-2021-37916 | 1 Joplin Project | 1 Joplin | 2024-11-21 | 6.1 Medium |
Joplin before 2.0.9 allows XSS via button and form in the note body. | ||||
CVE-2021-33295 | 1 Joplin Project | 1 Joplin | 2024-11-21 | 5.4 Medium |
Cross Site Scripting (XSS) vulnerability in Joplin Desktop App before 1.8.5 allows attackers to execute aribrary code due to improper sanitizing of html. | ||||
CVE-2020-9038 | 1 Joplin Project | 1 Joplin | 2024-11-21 | 5.4 Medium |
Joplin through 1.0.184 allows Arbitrary File Read via XSS. | ||||
CVE-2020-28249 | 1 Joplin Project | 1 Joplin | 2024-11-21 | 6.1 Medium |
Joplin 1.2.6 for Desktop allows XSS via a LINK element in a note. | ||||
CVE-2020-15930 | 1 Joplin Project | 1 Joplin | 2024-11-21 | 6.1 Medium |
An XSS issue in Joplin desktop 1.0.190 to 1.0.245 allows arbitrary code execution via a malicious HTML embed tag. | ||||
CVE-2018-1000534 | 1 Joplin Project | 1 Joplin | 2024-11-21 | N/A |
Joplin version prior to 1.0.90 contains a XSS evolving into code execution due to enabled nodeIntegration for that particular BrowserWindow instance where XSS was identified from vulnerability in Note content field - information on the fix can be found here https://github.com/laurent22/joplin/commit/494e235e18659574f836f84fcf9f4d4fcdcfcf89 that can result in executing unauthorized code within the rights in which the application is running. This attack appear to be exploitable via Victim synchronizing notes from the cloud services or other note-keeping services which contain malicious code. This vulnerability appears to have been fixed in 1.0.90 and later. | ||||
CVE-2024-40643 | 2 Joplin Project, Joplinapp | 2 Joplin, Joplin | 2024-09-17 | 9.7 Critical |
Joplin is a free, open source note taking and to-do application. Joplin fails to take into account that "<" followed by a non letter character will not be considered html. As such it is possible to do an XSS by putting an "illegal" tag within a tag. |
Page 1 of 1.