Update

Evernote

Evernote

to version 10.137.1

View all applications
Patching for Windows Mac Linux

CVE Vulnerabilities for Evernote

CVEPublishedSeverityDetailsExploitabilityImpact Vector
CVE‑2023‑506432024‑01‑09 01:15:39CRITICAL (10)An issue in Evernote Evernote for MacOS v.10.68.2 allows a remote attacker to execute arbitrary code via the RunAsNode and enableNodeClilnspectArguments components.46NETWORK
CVE‑2020‑177592021‑06‑24 20:15:09HIGH (9)An issue was found in the Evernote client for Windows 10, 7, and 2008 in the protocol handler. This enables attackers for arbitrary command execution if the user clicks on a specially crafted URL. AKA: WINNOTE-19941.36NETWORK
CVE‑2019‑170512019‑09‑30 20:15:11HIGH (8)Evernote before 7.13 GA on macOS allows code execution because the com.apple.quarantine attribute is not used for attachment files, as demonstrated by a one-click attack involving a drag-and-drop operation on a crafted Terminal file.26LOCAL
CVE‑2019‑100382019‑05‑31 22:29:01MEDIUM (4)Evernote 7.9 on macOS allows attackers to execute arbitrary programs by embedding a reference to a local executable file such as the /Applications/Calculator.app/Contents/MacOS/Calculator file.00LOCAL
CVE‑2018‑203512018‑12‑22 00:29:00MEDIUM (4)The Markdown component in Evernote (Chinese) before 8.3.2 on macOS allows stored XSS, aka MAC-832.00NETWORK
CVE‑2018‑200582018‑12‑11 09:29:00MEDIUM (5)In Evernote before 7.6 on macOS, there is a local file path traversal issue in attachment previewing, aka MACOSNOTE-28634.00NETWORK
CVE‑2018‑185242019‑05‑13 14:29:01MEDIUM (4)Evernote 6.15 on Windows has an incorrectly repaired stored XSS vulnerability. An attacker can use this XSS issue to inject Node.js code under Present mode. After a victim opens an affected note under Present mode, the attacker can read the victim's files and achieve remote execution command on the victim's computer.00NETWORK
CVE‑2016‑49002017‑05‑22 16:29:00MEDIUM (7)Untrusted search path vulnerability in Evernote for Windows versions prior to 6.3 allows remote attackers to gain privileges via a Trojan horse DLL in an unspecified directory.00NETWORK
CVE‑2013‑51162020‑01‑31 15:15:11HIGH (7)Evernote prior to 5.5.1 has insecure password change25LOCAL
CVE‑2013‑51122020‑01‑31 14:15:11MEDIUM (5)Evernote before 5.5.1 has insecure PIN storage14PHYSICAL
Windows Mac Linux

What applications does Lavawall® monitor?

Lavawall monitors patches for over 7,500 applications. This is a summary of the most popular applications.
Click here for the full list.
Click the applications below for the current version and known vulnerabilities.
Logos are property of their respective trademark holders and are not affiliated with ThreeShield or Lavawall. We have not audited the security of most of the listed tools.
Logos, products, trade names, and company names are all the property of their respective trademark holders.
The above listing includes products that Lavawall® monitors through public information and/or proprietary statistical analysis.
Although we do have a partner relationship with some of the listed products and companies, they do not necessarily endorse Lavawall® or have integrations with our systems.