Obsidian Mind Map v1.1.0 allows attackers to execute arbitrary code via a crafted payload injected into an uploaded document.
References
Link | Resource |
---|---|
https://github.com/JoJenH/Note4SelfVul/blob/main/obsidian-mind-map.md | Exploit |
https://github.com/lynchjames/obsidian-mind-map/issues/87 | Issue Tracking |
https://github.com/JoJenH/Note4SelfVul/blob/main/obsidian-mind-map.md | Exploit |
https://github.com/lynchjames/obsidian-mind-map/issues/87 | Issue Tracking |
Configurations
History
08 May 2025, 22:54
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:lynchjames:obsidian_mind_map:1.1.0:*:*:*:*:*:*:* | |
References | () https://github.com/JoJenH/Note4SelfVul/blob/main/obsidian-mind-map.md - Exploit | |
References | () https://github.com/lynchjames/obsidian-mind-map/issues/87 - Issue Tracking | |
First Time |
Lynchjames
Lynchjames obsidian Mind Map |
Information
Published : 2024-02-29 01:35
Updated : 2025-05-08 22:54
NVD link : CVE-2022-36677
Mitre link : CVE-2022-36677
CVE.ORG link : CVE-2022-36677
JSON object : View
Products Affected
lynchjames
- obsidian_mind_map
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')