Lucene search

K
ElectronjsElectron

4 matches found

CVE
CVE
added 2023/09/06 9:15 p.m.446 views

CVE-2023-39956

Electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS. Electron apps that are launched as command line executables are impacted. Specifically this issue can only be exploited if the following conditions are met: 1. The app is launched with a...

6.6CVSS6.7AI score0.00027EPSS
CVE
CVE
added 2020/07/07 12:15 a.m.45 views

CVE-2020-15096

In Electron before versions 6.1.1, 7.2.4, 8.2.4, and 9.0.0-beta21, there is a context isolation bypass, meaning that code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions. Apps using "contextIsolation" are affected. There ...

6.8CVSS6.4AI score0.00237EPSS
CVE
CVE
added 2020/10/06 6:15 p.m.44 views

CVE-2020-15215

Electron before versions 11.0.0-beta.6, 10.1.2, 9.3.1 or 8.5.2 is vulnerable to a context isolation bypass. Apps using both contextIsolation and sandbox: true are affected. Apps using both contextIsolation and nodeIntegrationInSubFrames: true are affected. This is a context isolation bypass, meanin...

6.8CVSS5.4AI score0.00282EPSS
CVE
CVE
added 2021/01/28 7:15 p.m.37 views

CVE-2020-26272

The Electron framework lets users write cross-platform desktop applications using JavaScript, HTML and CSS. In versions of Electron IPC prior to 9.4.0, 10.2.0, 11.1.0, and 12.0.0-beta.9, messages sent from the main process to a subframe in the renderer process, through webContents.sendToFrame, even...

6.5CVSS5.8AI score0.00965EPSS