{"id":"CVE-2020-19924","details":"In Boostnote 0.12.1, exporting to PDF contains opportunities for XSS attacks.","modified":"2026-04-11T20:35:02.397521Z","published":"2021-05-18T20:15:07.363Z","references":[{"type":"REPORT","url":"https://github.com/BoostIO/Boostnote/issues/3178"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/BoostIO/BoostNote-Legacy","events":[{"introduced":"0"},{"last_affected":"329066719e3964d5447e4d3d56c4e16f80021d82"}],"database_specific":{"cpe":"cpe:2.3:a:issuehunt:boostnote:0.12.1:*:*:*:*:*:*:*","extracted_events":[{"introduced":"0"},{"last_affected":"0.12.1"}],"source":"CPE_FIELD"}}],"versions":["0.2.1","prototype#1","v.0.8.11","v0.1","v0.1.1","v0.11.11","v0.11.12","v0.11.13","v0.11.14","v0.11.15","v0.11.16","v0.11.17","v0.11.2","v0.11.3","v0.11.4","v0.11.6","v0.11.7","v0.11.8","v0.11.9","v0.12.0","v0.12.1","v0.12.1-0","v0.12.1-1","v0.5.0","v0.5.1","v0.5.10","v0.5.11","v0.5.12","v0.5.2","v0.5.3","v0.5.4","v0.5.5","v0.5.5-pre","v0.5.6","v0.5.7","v0.5.8","v0.5.9","v0.6.0","v0.6.1","v0.6.2","v0.7.0","v0.7.1","v0.7.2","v0.7.3","v0.7.4","v0.7.5","v0.8.1","v0.8.12","v0.8.13","v0.8.14","v0.8.15","v0.8.16","v0.8.17","v0.8.18","v0.8.19","v0.8.2","v0.8.21","v0.8.3","v0.8.4","v0.8.5","v0.8.7","v0.8.8","v0.8.9","v0.9.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-19924.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"}]}