VNote is a note-taking platform. A Cross-Site Scripting (XSS) vulnerability has been identified in the Markdown rendering functionality of versions 3.18.1 and prior of the VNote note-taking application. This vulnerability allows the injection and execution of arbitrary JavaScript code through which remote code execution can be achieved. A patch for this issue is available at commit f1af78573a0ef51d6ef6a0bc4080cddc8f30a545. Other mitigation strategies include implementing rigorous input sanitization for all Markdown content and utilizing a secure Markdown parser that appropriately escapes or strips potentially dangerous content.
{
"cwe_ids": [
"CWE-79"
],
"cna_assigner": "GitHub_M",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/41xxx/CVE-2024-41662.json"
}"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-41662.json"
[
{
"signature_type": "Line",
"signature_version": "v1",
"source": "https://github.com/vnotex/vnote/commit/f1af78573a0ef51d6ef6a0bc4080cddc8f30a545",
"digest": {
"line_hashes": [
"312358259338848447151473066570728379668",
"209557126185678698368457005217280241332",
"173727487065685145523385291557327501648",
"140408642822820227362229914135395016665",
"24043619075886859550884577768049107608",
"119037444669586636418080185999096546565"
],
"threshold": 0.9
},
"id": "CVE-2024-41662-dd2f3748",
"deprecated": false,
"target": {
"file": "src/widgets/framelessmainwindow/framelessmainwindowwin.h"
}
}
]