{"id":"CVE-2021-41392","details":"static/main-preload.js in Boost Note through 0.22.0 allows remote command execution. A remote attacker may send a crafted IPC message to the exposed vulnerable ipcRenderer IPC interface, which invokes the dangerous openExternal Electron API.","modified":"2026-04-12T02:01:07.587444Z","published":"2021-09-17T22:15:08.163Z","references":[{"type":"REPORT","url":"https://github.com/BoostIO/BoostNote-App/issues/856"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/boostio/boostnote-app","events":[{"introduced":"0"},{"last_affected":"54aad7bb29db26dfbf94b98ac7cbaa911985a413"}],"database_specific":{"cpe":"cpe:2.3:a:boostnote:boostnote:*:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"introduced":"0"},{"last_affected":"0.22.0"}]}}],"versions":["cloud-1.49.0","cloud-1.49.1","cloud-1.49.2","cloud-1.49.3","cloud-1.50.0","v0.1.0","v0.1.0-10","v0.1.0-11","v0.1.0-12","v0.1.0-13","v0.1.0-7","v0.1.0-8","v0.1.0-9","v0.1.0-pre","v0.1.1","v0.1.2","v0.1.3","v0.1.4","v0.10.0","v0.10.1","v0.10.2","v0.11.0","v0.11.1","v0.11.2","v0.11.3","v0.11.4","v0.11.5","v0.11.6","v0.12.0","v0.12.1","v0.12.2","v0.12.3","v0.12.4","v0.12.5-0","v0.12.5-1","v0.13.0","v0.13.1","v0.13.2","v0.14.0","v0.14.0-0","v0.14.0-1","v0.14.1","v0.14.2","v0.14.2-0","v0.14.2-1","v0.14.3","v0.14.3-0","v0.15.0","v0.15.0-0","v0.15.1","v0.16.0","v0.16.0-0","v0.16.1","v0.17.0","v0.17.1","v0.18.0","v0.18.0-1","v0.18.1","v0.19.0","v0.2.0","v0.2.1","v0.20.0","v0.20.1","v0.20.2","v0.21.0","v0.21.1","v0.21.2","v0.22.0","v0.3.0","v0.4.0","v0.4.1","v0.5.0","v0.6.0","v0.6.1","v0.7.0","v0.8.0","v0.8.1","v0.8.2","v0.9.0","v0.9.1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-41392.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}