Products
yzane vscode-markdown-pdf
- 1.5.0
Source
cna@vuldb.com
Tags
CVE-2024-7738 details
Published : Aug. 13, 2024, 7:15 p.m.
Last Modified : Aug. 13, 2024, 7:15 p.m.
Last Modified : Aug. 13, 2024, 7:15 p.m.
Description
A vulnerability, which was classified as problematic, has been found in yzane vscode-markdown-pdf 1.5.0. Affected by this issue is some unknown functionality of the component Markdown File Handler. The manipulation leads to pathname traversal. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used.
CVSS Score
1 | 2 | 3.3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
---|
Weakness
Weakness | Name | Description |
---|
CVSS Data
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
NONE
Base Score
3.3
Exploitability Score
1.8
Impact Score
1.4
Base Severity
LOW
Vector String : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
References
URL | Source |
---|---|
https://github.com/abhi-ingle/Vulnerability-Research/blob/main/POC/Arbitrary%20File%20Read/file_read_report.md | cna@vuldb.com |
https://github.com/abhi-ingle/Vulnerability-Research/blob/main/POC/Arbitrary%20File%20Read/poc_arbitrary_file_read.mp4 | cna@vuldb.com |
https://vuldb.com/?ctiid.274358 | cna@vuldb.com |
https://vuldb.com/?id.274358 | cna@vuldb.com |
https://vuldb.com/?submit.385634 | cna@vuldb.com |
This website uses the NVD API, but is not approved or certified by it.