An issue was found in the Evernote client for Windows 10, 7, and 2008 in the protocol handler. This enables attackers for arbitrary command execution if the user clicks on a specially crafted URL. AKA: WINNOTE-19941.
References
Link | Resource |
---|---|
https://evernote.com/intl/zh-cn/security/updates/ | Vendor Advisory |
https://evernote.com/intl/zh-cn/security/updates/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 05:08
Type | Values Removed | Values Added |
---|---|---|
References | () https://evernote.com/intl/zh-cn/security/updates/ - Vendor Advisory |
Information
Published : 2021-06-24 20:15
Updated : 2024-11-21 05:08
NVD link : CVE-2020-17759
Mitre link : CVE-2020-17759
CVE.ORG link : CVE-2020-17759
JSON object : View
Products Affected
microsoft
- windows_7
- windows_10
- windows_server_2008
evernote
- evernote
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')