Show filters
6 Total Results
Displaying 1-6 of 6
Sort by:
Attacker Value
Unknown
CVE-2023-2110
Disclosure Date: August 19, 2023 (last updated October 08, 2023)
Improper path handling in Obsidian desktop before 1.2.8 on Windows, Linux and macOS allows a crafted webpage to access local files and exfiltrate them to remote web servers via "app://local/<absolute-path>". This vulnerability can be exploited if a user opens a malicious markdown file in Obsidian, or copies text from a malicious webpage and paste it into Obsidian.
0
Attacker Value
Unknown
CVE-2023-33244
Disclosure Date: May 20, 2023 (last updated October 08, 2023)
Obsidian before 1.2.2 allows calls to unintended APIs (for microphone access, camera access, and desktop notification) via an embedded web page.
0
Attacker Value
Unknown
CVE-2023-27035
Disclosure Date: May 01, 2023 (last updated October 08, 2023)
An issue discovered in Obsidian Canvas 1.1.9 allows remote attackers to send desktop notifications, record user audio and other unspecified impacts via embedded website on the canvas page.
0
Attacker Value
Unknown
CVE-2022-36450
Disclosure Date: July 25, 2022 (last updated October 07, 2023)
Obsidian 0.14.x and 0.15.x before 0.15.5 allows obsidian://hook-get-address remote code execution because window.open is used without checking the URL.
0
Attacker Value
Unknown
CVE-2021-42057
Disclosure Date: November 04, 2021 (last updated February 23, 2025)
Obsidian Dataview through 0.4.12-hotfix1 allows eval injection. The evalInContext function in executes user input, which allows an attacker to craft malicious Markdown files that will execute arbitrary code once opened. NOTE: 0.4.13 provides a mitigation for some use cases.
0
Attacker Value
Unknown
CVE-2021-38148
Disclosure Date: August 07, 2021 (last updated November 28, 2024)
Obsidian before 0.12.12 does not require user confirmation for non-http/https URLs.
0