Improper path handling in Typora before 1.6.7 on Windows and Linux allows a crafted webpage to access local files and exfiltrate them to remote web servers via “typora://app/<absolute-path>”.
This vulnerability can be exploited if a user opens a malicious markdown file in Typora, or copies text from a malicious webpage and paste it into Typora.
More Stories
Erlang/OTP RCE (CVE-2025-32433)
What is the Vulnerability? A critical SSH vulnerability has recently been identified in the Erlang/Open Telecom Platform (OTP). The vulnerability,...
digikam-8.6.0-4.fc40
FEDORA-2025-97687e7f68 Packages in this update: digikam-8.6.0-4.fc40 Update description: update internal Libraw to 2025/03/17 snapshot Read More
digikam-8.6.0-4.fc41
FEDORA-2025-5bbbb2df79 Packages in this update: digikam-8.6.0-4.fc41 Update description: update internal Libraw to 2025/03/17 snapshot Read More
digikam-8.6.0-4.fc42
FEDORA-2025-1c1e378468 Packages in this update: digikam-8.6.0-4.fc42 Update description: update internal Libraw to 2025/03/17 snapshot Read More
epiphany-47.5-1.fc41
FEDORA-2025-164c668d6a Packages in this update: epiphany-47.5-1.fc41 Update description: Update to 47.5, notably fixing CVE-2025-3839 Read More
epiphany-48.1-1.fc42
FEDORA-2025-efbe201596 Packages in this update: epiphany-48.1-1.fc42 Update description: Update to 48.1, notably fixing CVE-2025-3839 Read More