Typora 0.9.9.21.1 (1913) allows arbitrary code execution via a modified file: URL syntax in the HREF attribute of an AREA element, as demonstrated by file:\\\ on macOS or Linux, or file://C| on Windows. This is different from CVE-2019-12137.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://github.com/typora/typora-issues/issues/2166 |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T23:10:30.856Z
Reserved: 2019-05-17T00:00:00
Link: CVE-2019-12172

No data.

Status : Modified
Published: 2019-05-17T23:29:00.237
Modified: 2024-11-21T04:22:21.890
Link: CVE-2019-12172

No data.