Update

Evernote

Evernote

to version 10.137.1

View all applications

CVE Vulnerabilities for Evernote

CVEPublishedSeverityDetailsExploitabilityImpact Vector
CVE‑2023‑506432024‑01‑09 01:15:39CRITICAL (10)An issue in Evernote Evernote for MacOS v.10.68.2 allows a remote attacker to execute arbitrary code via the RunAsNode and enableNodeClilnspectArguments components.46NETWORK
CVE‑2020‑177592021‑06‑24 20:15:09HIGH (9)An issue was found in the Evernote client for Windows 10, 7, and 2008 in the protocol handler. This enables attackers for arbitrary command execution if the user clicks on a specially crafted URL. AKA: WINNOTE-19941.36NETWORK
CVE‑2019‑170512019‑09‑30 20:15:11HIGH (8)Evernote before 7.13 GA on macOS allows code execution because the com.apple.quarantine attribute is not used for attachment files, as demonstrated by a one-click attack involving a drag-and-drop operation on a crafted Terminal file.26LOCAL
CVE‑2019‑100382019‑05‑31 22:29:01MEDIUM (4)Evernote 7.9 on macOS allows attackers to execute arbitrary programs by embedding a reference to a local executable file such as the /Applications/Calculator.app/Contents/MacOS/Calculator file.00LOCAL
CVE‑2018‑203512018‑12‑22 00:29:00MEDIUM (4)The Markdown component in Evernote (Chinese) before 8.3.2 on macOS allows stored XSS, aka MAC-832.00NETWORK
CVE‑2018‑200582018‑12‑11 09:29:00MEDIUM (5)In Evernote before 7.6 on macOS, there is a local file path traversal issue in attachment previewing, aka MACOSNOTE-28634.00NETWORK
CVE‑2018‑185242019‑05‑13 14:29:01MEDIUM (4)Evernote 6.15 on Windows has an incorrectly repaired stored XSS vulnerability. An attacker can use this XSS issue to inject Node.js code under Present mode. After a victim opens an affected note under Present mode, the attacker can read the victim's files and achieve remote execution command on the victim's computer.00NETWORK
CVE‑2016‑49002017‑05‑22 16:29:00MEDIUM (7)Untrusted search path vulnerability in Evernote for Windows versions prior to 6.3 allows remote attackers to gain privileges via a Trojan horse DLL in an unspecified directory.00NETWORK
CVE‑2013‑51162020‑01‑31 15:15:11HIGH (7)Evernote prior to 5.5.1 has insecure password change25LOCAL
CVE‑2013‑51122020‑01‑31 14:15:11MEDIUM (5)Evernote before 5.5.1 has insecure PIN storage14PHYSICAL

View OS-specific patching for:
Windows Mac Linux
Logos, products, trade names, and company names are all the property of their respective trademark holders.
The above listing includes products that Lavawall® monitors through public information and/or proprietary statistical analysis.
Although we do have a partner relationship with some of the listed products and companies, they do not necessarily endorse Lavawall® or have integrations with our systems.