Electronjs

Electron

20 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.28%
  • Veröffentlicht 06.10.2020 18:15:14
  • Zuletzt bearbeitet 21.11.2024 05:05:06

Electron before versions 11.0.0-beta.6, 10.1.2, 9.3.1 or 8.5.2 is vulnerable to a context isolation bypass. Apps using both `contextIsolation` and `sandbox: true` are affected. Apps using both `contextIsolation` and `nodeIntegrationInSubFrames: true`...

  • EPSS 0.3%
  • Veröffentlicht 06.10.2020 18:15:14
  • Zuletzt bearbeitet 21.11.2024 05:05:00

In Electron before versions 11.0.0-beta.1, 10.0.1, 9.3.0 or 8.5.1 the `will-navigate` event that apps use to prevent navigations to unexpected destinations as per our security recommendations can be bypassed when a sub-frame performs a top-frame navi...

  • EPSS 0.44%
  • Veröffentlicht 07.07.2020 00:15:10
  • Zuletzt bearbeitet 21.11.2024 05:32:15

In Electron before versions 7.2.4, 8.2.4, and 9.0.0-beta21, there is a context isolation bypass. Code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions. Apps using both `cont...

  • EPSS 0.08%
  • Veröffentlicht 07.07.2020 00:15:10
  • Zuletzt bearbeitet 21.11.2024 05:32:15

In Electron before versions 7.2.4, 8.2.4, and 9.0.0-beta21, there is a context isolation bypass. Code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions. Apps using contextIso...

  • EPSS 0.26%
  • Veröffentlicht 07.07.2020 00:15:10
  • Zuletzt bearbeitet 21.11.2024 05:32:15

In Electron before versions 7.2.4, 8.2.4, and 9.0.0-beta21, arbitrary local file read is possible by defining unsafe window options on a child window opened via window.open. As a workaround, ensure you are calling `event.preventDefault()` on all new-...

  • EPSS 0.24%
  • Veröffentlicht 07.07.2020 00:15:10
  • Zuletzt bearbeitet 21.11.2024 05:04:48

In Electron before versions 6.1.1, 7.2.4, 8.2.4, and 9.0.0-beta21, there is a context isolation bypass, meaning that code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions. A...

Exploit
  • EPSS 13.25%
  • Veröffentlicht 23.08.2018 05:29:00
  • Zuletzt bearbeitet 21.11.2024 03:51:16

GitHub Electron 1.7.15, 1.8.7, 2.0.7, and 3.0.0-beta.6, in certain scenarios involving IFRAME elements and "nativeWindowOpen: true" or "sandbox: true" options, is affected by a WebPreferences vulnerability that can be leveraged to perform remote code...

  • EPSS 2.7%
  • Veröffentlicht 07.06.2018 02:29:04
  • Zuletzt bearbeitet 21.11.2024 03:15:55

Based on details posted by the ElectronJS team; A remote code execution vulnerability has been discovered in Google Chromium that affects all recent versions of Electron. Any Electron app that accesses remote content is vulnerable to this exploit, re...

Exploit
  • EPSS 1.41%
  • Veröffentlicht 23.03.2018 19:29:00
  • Zuletzt bearbeitet 21.11.2024 03:39:45

Electron version 1.7 up to 1.7.12; 1.8 up to 1.8.3 and 2.0.0 up to 2.0.0-beta.3 contains an improper handling of values vulnerability in Webviews that can result in remote code execution. This attack appear to be exploitable via an app which allows e...

  • EPSS 4.55%
  • Veröffentlicht 07.03.2018 14:29:00
  • Zuletzt bearbeitet 21.11.2024 03:39:41

Github Electron version Electron 1.8.2-beta.4 and earlier contains a Command Injection vulnerability in Protocol Handler that can result in command execute. This attack appear to be exploitable via the victim opening an electron protocol handler in t...