electron@28.0.0-alpha.5 vulnerabilities
Build cross platform desktop apps with JavaScript, HTML, and CSS
-
latest version
30.0.2
-
latest non vulnerable version
-
first published
12 years ago
-
latest version published
4 days ago
-
licenses detected
- >=0
Direct Vulnerabilities
Known vulnerabilities in the electron package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS. Affected versions of this package are vulnerable to Improper Restriction of Operations within the Bounds of a Memory Buffer due to an inappropriate implementation in the V8 engine. An attacker can potentially perform out of bounds memory access by crafting a malicious HTML page. How to fix Improper Restriction of Operations within the Bounds of a Memory Buffer? Upgrade |
<29.3.0
|
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS. Affected versions of this package are vulnerable to Use After Free due to improper handling in the How to fix Use After Free? Upgrade |
<27.3.9
>=28.0.0-alpha.1 <28.2.10
>=29.0.0-alpha.1 <29.2.0
|
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS. Affected versions of this package are vulnerable to Type Confusion due to a flaw in the WebAssembly component. An attacker can execute arbitrary code on the victim's machine by convincing them to visit a maliciously crafted HTML page. How to fix Type Confusion? Upgrade |
<27.3.9
>=28.0.0-alpha.1 <28.2.10
>=29.0.0-alpha.1 <29.2.0
|
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS. Affected versions of this package are vulnerable to Use After Free due to improper handling of objects in memory in the ANGLE graphics engine. An attacker can cause heap corruption and potentially execute arbitrary code by convincing a user to visit a specially crafted HTML page. How to fix Use After Free? Upgrade |
<27.3.9
>=28.0.0-alpha.1 <28.2.10
>=29.0.0-alpha.1 <29.2.0
|
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS. Affected versions of this package are vulnerable to Use After Free due to the improper handling of objects in memory in the How to fix Use After Free? Upgrade |
<27.3.9
>=28.0.0-alpha.1 <28.2.10
>=29.0.0-alpha.1 <29.2.0
|
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS. Affected versions of this package are vulnerable to Denial of Service (DoS) via an Out of bounds memory access in V8. How to fix Denial of Service (DoS)? Upgrade |
<27.3.6
>=28.0.0-alpha.1 <28.2.7
>=29.0.0-alpha.1 <29.1.2
|
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS. Affected versions of this package are vulnerable to Integer Overflow or Wraparound in Skia. An attacker can perform a sandbox escape by using a malicious file. This is only exploitable if the attacker has already compromised the renderer process. How to fix Integer Overflow or Wraparound? Upgrade |
>=25.0.0 <25.9.7
>=26.0.0 <26.6.2
>=27.0.0 <27.1.3
>=28.0.0-alpha.1 <28.0.0-beta.11
|