CVE-2020-17759

An issue was found in the Evernote client for Windows 10, 7, and 2008 in the protocol handler. This enables attackers for arbitrary command execution if the user clicks on a specially crafted URL. AKA: WINNOTE-19941.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:evernote:evernote:6.17.7:*:*:*:*:windows:*:*
cpe:2.3:a:evernote:evernote:6.18:beta2:*:*:*:windows:*:*
OR cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:*:*

History

21 Nov 2024, 05:08

Type Values Removed Values Added
References () https://evernote.com/intl/zh-cn/security/updates/ - Vendor Advisory () https://evernote.com/intl/zh-cn/security/updates/ - Vendor Advisory

Information

Published : 2021-06-24 20:15

Updated : 2024-11-21 05:08


NVD link : CVE-2020-17759

Mitre link : CVE-2020-17759

CVE.ORG link : CVE-2020-17759


JSON object : View

Products Affected

microsoft

  • windows_7
  • windows_10
  • windows_server_2008

evernote

  • evernote
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')