Browse all 3 CVE security advisories affecting vnotex. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Vnotex is a note-taking application designed for organizing information and managing documents. Historically, vulnerabilities in this software have included remote code execution, cross-site scripting, and privilege escalation flaws, often stemming from improper input validation and access control issues. The application has recorded three CVEs, with one notable incident involving an RCE vulnerability that allowed attackers to execute arbitrary code through crafted file imports. Security assessments have consistently identified weaknesses in input sanitization and session management, highlighting the importance of regular updates and careful handling of untrusted files.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2024-41662 | VNote vulnerable to Markdown XSS, which leads to RCE — vnoteCWE-79 | 8.6 | High | 2024-07-24 |
| CVE-2024-39904 | Code Execution Vulnerability via Local File Path Traversal in Vnote — vnoteCWE-73 | 8.8 | High | 2024-07-11 |
| CVE-2023-5701 | vnotex vnote Markdown File cross site scripting — vnoteCWE-79 | 4.3 | Medium | 2023-10-23 |
This page lists every published CVE security advisory associated with vnotex. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.