Find, fix and prevent vulnerabilities in your code.
critical severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@13.6.8.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Improper Input Validation via Mojo. If the endpoint's task runner does not match the current task runner (or an equivalent main-thread task runner for the ChannelProxy) when executing a message dispatch task for that endpoint, it dispatches it on the wrong sequence.
Remediation
Upgrade electron to version 13.6.8, 14.2.4, 15.3.5 or higher.
References
critical severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@10.4.4.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Out-of-bounds via the V8 component in Chrome.
Remediation
Upgrade electron to version 11.4.4, 10.4.4, 12.0.6 or higher.
References
critical severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@11.4.10.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Out-of-bounds Write via ANGLE in Chrome.
Remediation
Upgrade electron to version 12.0.13, 11.4.10 or higher.
References
critical severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@12.2.3.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Type Confusion via the V8 module in Chromium.
Remediation
Upgrade electron to version 14.2.1, 13.6.2, 12.2.3 or higher.
References
critical severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@15.5.3.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Type Confusion in V8 Turbofan, exploiting this vulnerability is possible via a crafted HTML page.
Remediation
Upgrade electron to version 15.5.3, 16.2.4, 17.4.2 or higher.
References
critical severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@9.4.1.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free. An unknown vunerability exists in Chrome.
Remediation
Upgrade electron to version 9.4.1, 10.3.2 or higher.
References
critical severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@11.2.2.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free via handling of cookies.
Remediation
Upgrade electron to version 9.4.2, 10.3.1, 11.2.2 or higher.
References
critical severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@27.3.9.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Type Confusion due to a flaw in the WebAssembly component. An attacker can execute arbitrary code on the victim's machine by convincing them to visit a maliciously crafted HTML page.
Remediation
Upgrade electron to version 27.3.9, 28.2.10, 29.2.0 or higher.
References
critical severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@27.3.3.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free via the Mojo interface. An attacker can potentially exploit heap corruption by delivering a crafted HTML page.
Remediation
Upgrade electron to version 27.3.3 or higher.
References
critical severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@27.3.9.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free due to improper handling of objects in memory in the ANGLE graphics engine. An attacker can cause heap corruption and potentially execute arbitrary code by convincing a user to visit a specially crafted HTML page.
Remediation
Upgrade electron to version 27.3.9, 28.2.10, 29.2.0 or higher.
References
critical severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@37.2.5.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Access of Resource Using Incompatible Type ('Type Confusion') via the lack of limitation on max inlining ids in MaglevGraphBuilder. An attacker can achieve heap corruption and potentially execute arbitrary code by enticing a user to visit a specially crafted HTML page.
Remediation
Upgrade electron to version 37.2.5 or higher.
References
critical severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@29.4.6.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Out-of-bounds Read via a crafted HTML page. An attacker can potentially perform a sandbox escape by manipulating the memory outside its intended buffer limits.
Remediation
Upgrade electron to version 29.4.6, 30.4.0 or higher.
References
critical severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@31.7.1.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Type Confusion via crafted HTML content. This can be exploited to escape the v8 sandbox and execute arbitrary code on the operating system.
Remediation
Upgrade electron to version 31.7.1, 32.2.1 or higher.
References
critical severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@31.7.2.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Out-of-Bounds Write via the V8 engine. An attacker can potentially exploit heap corruption by crafting a malicious HTML page.
Remediation
Upgrade electron to version 31.7.2 or higher.
References
critical severity
new
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@39.8.1.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free in the offscreen rendering process when a parent WebContents is destroyed while a child window remains open. An attacker can cause memory corruption or application crash by triggering paint frames on the child window that dereference freed memory.
Note:
This is only exploitable if offscreen rendering is enabled (webPreferences.offscreen: true) and the setWindowOpenHandler permits child windows.
Workaround
This vulnerability can be mitigated by denying child window creation from offscreen renderers in your setWindowOpenHandler, or ensuring child windows are closed before the parent is destroyed.
Remediation
Upgrade electron to version 39.8.1, 40.7.0, 41.0.0 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@11.4.9.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Access of Resource Using Incompatible Type ('Type Confusion'). Type confusion in V8 in Google Chrome allows a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Remediation
Upgrade electron to version 12.0.12, 11.4.9 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@12.2.0.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Access Restriction Bypass in Blink.
Remediation
Upgrade electron to version 13.5.0, 12.2.0 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@10.4.1.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Heap Buffer Overflow via WebAudio.
Remediation
Upgrade electron to version 11.4.0, 10.4.1 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@9.4.0.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Heap-based Buffer Overflow. A heap buffer overflow flaw was found in the UI component of the Chromium browser.
Remediation
Upgrade electron to version 9.4.0, 10.2.0 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@12.2.3.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Heap-based Buffer Overflow via the WebRTC module in Chromium.
Remediation
Upgrade electron to version 14.2.0, 13.5.2, 12.2.3 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@26.6.5.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Heap-based Buffer Overflow in the ANGLE component.
Remediation
Upgrade electron to version 26.6.5, 27.2.2 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@27.3.3.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Heap-based Buffer Overflow via a crafted HTML page. An attacker can potentially exploit heap corruption by deceiving a user to visit a malicious web page.
Remediation
Upgrade electron to version 27.3.3 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@27.3.11.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Heap-based Buffer Overflow in the ANGLE component. An attacker can potentially exploit heap corruption through a crafted HTML page.
Remediation
Upgrade electron to version 27.3.11, 28.3.1, 29.3.1 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@29.4.3.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Heap-based Buffer Overflow through the WebRTC component. An attacker can cause heap corruption and potentially execute arbitrary code by crafting a malicious HTML page.
Remediation
Upgrade electron to version 29.4.3, 30.1.2 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@9.4.0.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Improper Access Control. An insufficient policy enforcement flaw was found in the networking component of chromium.
Remediation
Upgrade electron to version 9.4.0, 10.1.7 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@31.7.4.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Improper Access Control due to an inappropriate implementation in Extensions. An attacker can bypass site isolation.
Remediation
Upgrade electron to version 31.7.4, 32.2.3 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@9.4.0.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Improper Input Validation. An insufficient data validation flaw was found in the WASM component of the Chromium browser.
Remediation
Upgrade electron to version 9.4.0, 10.1.7 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@29.3.0.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Improper Restriction of Operations within the Bounds of a Memory Buffer due to an inappropriate implementation in the V8 engine. An attacker can potentially perform out of bounds memory access by crafting a malicious HTML page.
Remediation
Upgrade electron to version 29.3.0 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@10.4.4.
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@10.4.4.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Integer Overflow or Wraparound via the Mojo component of chromium.
Remediation
Upgrade electron to version 10.4.4, 12.0.6 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@14.2.7.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Integer Overflow or Wraparound due to handle reuse in Mojo.
Remediation
Upgrade electron to version 14.2.7, 15.4.0 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@14.2.5.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Interger Underflow in ANGLE. A remote attacker could potentially exploit heap corruption via a crafted HTML page.
Remediation
Upgrade electron to version 14.2.5, 15.3.6 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@10.4.1.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Out-of-Bounds. Object lifecycle issue in audio.
Remediation
Upgrade electron to version 11.4.0, 10.4.1 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@26.6.7.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Out-of-bounds Read allowing a remote attacker to exploit heap corruption via a crafted HTML page.
Note: The Stable channel has been updated to 120.0.6099.234 for Mac devices.
Remediation
Upgrade electron to version 26.6.7 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@29.4.3.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Out-of-bounds Read through the V8 engine. An attacker can access memory locations outside of the intended boundary by crafting a malicious HTML page.
Remediation
Upgrade electron to version 29.4.3 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@31.7.2.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Out-of-bounds Read via a crafted HTML page. An attacker can access memory locations outside the intended boundary by crafting a malicious HTML page that triggers the flaw.
Remediation
Upgrade electron to version 31.7.2 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@10.4.1.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Out-of-bounds Write via a data race in the audio component. A remote attacker could potentially exploit heap corruption using a crafted HTML page.
Remediation
Upgrade electron to version 10.4.1, 11.4.1 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@29.4.3.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Out-of-Bounds Write through the Streams API. An attacker can execute arbitrary code within a sandboxed environment by crafting a malicious HTML page.
Remediation
Upgrade electron to version 29.4.3 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@29.4.0.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Privilege Context Switching Error in libuv's handling of io_uring operations called before calling setuid(). This allows users to elevate privileges.
PoC
const { spawn } = require('node:child_process');
const process = require('process');
process.env['UV_USE_IO_URING']=1;
process.setuid(400);
const ls = spawn('cmd.exe', [' whoami']);
ls.stdout.on('data', (data) => {
console.log(`stdout: ${data}`);
});
ls.stderr.on('data', (data) => {
console.error(`stderr: ${data}`);
});
ls.on('close', (code) => {
console.log(`child process exited with code ${code}`);
});
console.log("The user identity of the Node.js" + " process:", process.getuid());
Remediation
Upgrade electron to version 29.4.0 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@10.4.7.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Type Confusion in V8.
Remediation
Upgrade electron to version 12.0.10, 11.4.8, 10.4.7 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@11.4.11.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Type Confusion in V8 via Chrome.
Remediation
Upgrade electron to version 12.0.16, 11.4.11 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@12.2.0.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Type Confusion via Blink layout in Chrome.
Remediation
Upgrade electron to version 13.5.0, 12.2.0 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@13.6.3.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Type Confusion in V8. This allows a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Remediation
Upgrade electron to version 13.6.3, 14.2.2, 15.3.3 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@13.6.6.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Type Confusion in loader in Google Chrome. This can lead to heap corruption which is exploited through a crafted HTML page.
Remediation
Upgrade electron to version 13.6.6, 14.2.4, 15.3.5 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@13.6.8.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Type Confusion in V8 in Google Chrome allows a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Remediation
Upgrade electron to version 13.6.8, 14.2.5, 15.3.6 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@17.4.11.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Type Confusion in V8.
Remediation
Upgrade electron to version 17.4.11, 18.3.6 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@19.1.5.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Type Confusion in V8.
Remediation
Upgrade electron to version 19.1.5, 20.3.5 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@29.4.3.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Type Confusion due to the V8 process. An attacker can potentially perform arbitrary read/write by exploiting a crafted HTML page.
Remediation
Upgrade electron to version 29.4.3 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@9.4.0.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free. A use after free flaw was found in the PPAPI component of the Chromium browser.
Remediation
Upgrade electron to version 9.4.0, 10.2.0 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@9.4.4.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free in Media.
Remediation
Upgrade electron to version 11.2.1, 9.4.4 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@9.4.4.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free. It hands sub-queries with both a correlated WHERE clause and a HAVING 0 clause where the parent query is itself an aggregate.
Remediation
Upgrade electron to version 11.2.1, 9.4.4 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@10.4.1.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free. When a LayoutInline is removed, LineBoxList::DirtyLinesFromChangedChild tries to mark affected
RootInlineBox dirty.
When the |LayoutInline| to be removed is culled, it tries to find the RootInlineBox from its previous siblings, then look for its previous and next RootInlineBoxes.
Occasionally, the next next line of the previous sibling is wrapped at the LayoutInline, and that its LineBreakObj() holds the reference to the LayoutInline. This patch marks such RootInlineBox dirty.
Remediation
Upgrade electron to version 11.4.0, 10.4.1 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@10.4.1.
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@10.4.2.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free. It allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Remediation
Upgrade electron to version 10.4.2, 11.4.1 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@10.4.4.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free via a vulnerability that exists in Blink in Chromium. A remote attacker can trick the victim to visit a specially crafted web page, trigger a use-after-free error and execute arbitrary code on the system.
Remediation
Upgrade electron to version 11.4.4, 10.4.4 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@10.4.4.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free via Chrome which allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Remediation
Upgrade electron to version 12.0.5, 11.4.4, 10.4.4 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@10.4.4.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free via chromium which allows a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Remediation
Upgrade electron to version 12.0.5, 11.4.4, 10.4.4 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@10.4.4.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free via Aura in Google Chrome which allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.
Remediation
Upgrade electron to version 12.0.5, 11.4.4, 10.4.4 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@10.4.4.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free via the Navigation component of chromium.
Remediation
Upgrade electron to version 10.4.4, 11.4.4, 12.0.6 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@10.4.4.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free in the chromium extensions resource.
Remediation
Upgrade electron to version 11.4.4, 10.4.4 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@10.4.7.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free in File API.
Remediation
Upgrade electron to version 12.0.10, 11.4.8, 10.4.7 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@10.4.7.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free in Notifications.
Remediation
Upgrade electron to version 12.0.10, 11.4.8, 10.4.7 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@11.4.9.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free. Use after free in Loader in Google Chrome allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Remediation
Upgrade electron to version 12.0.12, 11.4.9 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@11.4.9.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free in BFCache in Google Chrome, which allows a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Remediation
Upgrade electron to version 12.0.13, 11.4.9 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@11.4.10.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free in WebGL.
Remediation
Upgrade electron to version 12.0.13, 11.4.10 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@11.4.10.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free in WebRTC.
Remediation
Upgrade electron to version 12.0.14, 11.4.10 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@11.4.10.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free in WebAudio.
Remediation
Upgrade electron to version 12.0.14, 11.4.10 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@11.4.11.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free in Blink XSLT.
Remediation
Upgrade electron to version 12.0.16, 11.4.11 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@11.4.11.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free in WebSerial via Chrome.
Remediation
Upgrade electron to version 12.0.16, 11.4.11 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@11.4.11.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free in V8 via Chrome.
Remediation
Upgrade electron to version 12.0.16, 11.4.11 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@11.4.11.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free in GPU.
Remediation
Upgrade electron to version 13.1.8, 12.0.16, 11.4.11 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@11.4.11.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free in Autofill.
Remediation
Upgrade electron to version 12.0.16, 11.4.11 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@12.2.0.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free in Indexed DB API.
Remediation
Upgrade electron to version 13.5.0, 12.2.0 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@12.2.2.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free via heap corruption through a crafted HTML page.
Remediation
Upgrade electron to version 14.1.1, 13.5.2, 12.2.2 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@12.2.2.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free in the file system API, through a heap corruption via a crafted HTML page.
Remediation
Upgrade electron to version 14.1.1, 13.5.2, 12.2.2 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@12.2.3.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free via the Garbage Collection module in Chromium.
Remediation
Upgrade electron to version 14.2.1, 13.6.2, 12.2.3 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@13.6.2.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free via the Web Transport module in Chromium.
Remediation
Upgrade electron to version 14.2.1, 13.6.2 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@13.6.3.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free in loader in Google Chrome. This allows a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Remediation
Upgrade electron to version 13.6.3, 14.2.2, 15.3.3 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@16.0.0.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free in the storage foundation, which allows a remote attacker to potentially exploit heap corruption via a crafted HTML page
Remediation
Upgrade electron to version 16.0.0 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@15.3.5.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free in media in Google Chrome which allows a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Remediation
Upgrade electron to version 15.3.5 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@13.6.6.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free via file API in Google Chrome prior to 96.0.4664.93. It allows a remote attacker who have compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.
Remediation
Upgrade electron to version 13.6.6, 14.2.4, 15.3.5 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@14.2.7.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free on context loss.
Remediation
Upgrade electron to version 14.2.7, 15.4.0, 16.0.10 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@14.2.7.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free when the source framebuffer's extents were accidentally used instead of the blit area extents.
Remediation
Upgrade electron to version 14.2.7, 15.4.0, 16.0.10 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@16.2.4.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free in the BFCache, due to the attempts to cache an interstitial which results in a crash.
Remediation
Upgrade electron to version 16.2.4, 17.4.2 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@15.5.3.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free in regular expressions (V8).
Remediation
Upgrade electron to version 15.5.3, 16.2.4, 17.4.2 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@15.5.4.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free in Angle, when pausing XFB then deleting a buffer.
Remediation
Upgrade electron to version 15.5.4, 16.2.6, 17.4.3 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@15.5.6.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free in Vulkan.
Remediation
Upgrade electron to version 15.5.6, 16.2.6, 17.4.4 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@16.2.6.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free in File System API.
Remediation
Upgrade electron to version 16.2.6, 17.4.3, 18.2.2 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@15.5.4.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free in SwiftShader.
Remediation
Upgrade electron to version 15.5.4, 16.2.5, 17.4.3 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@15.5.6.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free due to improper cache state validation after the XFB buffer was deleted.
Remediation
Upgrade electron to version 15.5.6, 16.2.7, 17.4.5 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@17.4.8.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free in Angle.
Remediation
Upgrade electron to version 17.4.8, 18.3.4 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@18.3.11.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free when glBufferData redefines a buffer and the new buffer is smaller than the old buffer.
Remediation
Upgrade electron to version 18.3.11, 19.0.15 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@18.3.11.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free in Blink, when a DisplayLock is unlocked via ForceUnlockIfNeeded.
Remediation
Upgrade electron to version 18.3.11 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@19.0.15.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free in SwiftShader.
Remediation
Upgrade electron to version 19.0.15 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@18.3.14.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free in WebSQL
Remediation
Upgrade electron to version 18.3.14, 20.1.4 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@18.3.12.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free in WebSQL.
Remediation
Upgrade electron to version 18.3.12, 19.0.16, 20.1.2 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@18.3.14.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free in Layout.
Remediation
Upgrade electron to version 19.1.0, 18.3.14 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@18.3.12.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free in Network Service
Remediation
Upgrade electron to version 20.1.2, 19.1.0, 18.3.12 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@18.3.14.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free in Frames, via a crafted HTML page.
Remediation
Upgrade electron to version 18.3.14, 19.1.0 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@19.1.5.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free in Layout.
Remediation
Upgrade electron to version 19.1.5, 20.3.5 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@19.1.7.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free in WebCodecs, which allows a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Remediation
Upgrade electron to version 19.1.7, 20.3.7 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@19.1.7.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free via the Web Workers, which allows a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Remediation
Upgrade electron to version 19.1.7, 20.3.7 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@20.3.9.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free in Mojo, via heap corruption.
Remediation
Upgrade electron to version 20.3.9, 21.4.0 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@20.3.12.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free in WebRTC, causing heap corruption.
Remediation
Upgrade electron to version 20.3.12, 21.4.2 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@26.6.5.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free via the WebAudio component. An attacker can potentially exploit heap corruption by convincing a user to visit a crafted HTML page.
Remediation
Upgrade electron to version 26.6.5, 27.2.2 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@26.6.8.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free via the Web Audio feature. An attacker can potentially exploit heap corruption by crafting a malicious HTML page.
Remediation
Upgrade electron to version 26.6.8, 27.3.1 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@27.3.9.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free due to the improper handling of objects in memory in the Dawn component. An attacker can potentially exploit heap corruption through a crafted HTML page.
Remediation
Upgrade electron to version 27.3.9, 28.2.10, 29.2.0 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@27.3.9.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free due to improper handling in the WebCodecs component. An attacker can achieve arbitrary read/write access by crafting a malicious HTML page.
Remediation
Upgrade electron to version 27.3.9, 28.2.10, 29.2.0 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@27.3.11.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free due to improper handling of objects in memory in the Dawn component. An attacker can cause heap corruption and potentially execute arbitrary code by convincing a user to visit a specially crafted HTML page.
Remediation
Upgrade electron to version 27.3.11, 28.3.1, 29.3.1 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@29.4.3.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free through the Media Session process. An attacker can execute arbitrary code inside a sandbox by crafting a malicious HTML page.
Remediation
Upgrade electron to version 29.4.3 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@29.4.3.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free through the Dawn process. An attacker can potentially exploit heap corruption by crafting a malicious HTML page.
Remediation
Upgrade electron to version 29.4.3 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@29.4.3.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free through the Dawn component. An attacker can potentially exploit heap corruption by crafting a malicious HTML page.
Remediation
Upgrade electron to version 29.4.3 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@29.4.3.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free in the scheduling process. An attacker can execute arbitrary code inside a sandbox by using a crafted HTML page.
Remediation
Upgrade electron to version 29.4.3 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@29.4.3.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free due to the improper handling of memory in the Dawn process. An attacker can cause heap corruption by crafting a malicious HTML page.
Note: 126.0.6478.56 is the fixed version for Windows and Mac. Version 126.0.6478.54 fixes the vulnerability in Linux
Remediation
Upgrade electron to version 29.4.3 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@29.4.3.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free via the Dawn process. An attacker can potentially exploit heap corruption by crafting a malicious HTML page.
Note: 126.0.6478.56 is the fixed version for Windows and Mac. Version 126.0.6478.54 fixes the vulnerability in Linux
Remediation
Upgrade electron to version 29.4.3 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@33.4.6.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Access of Resource Using Incompatible Type ('Type Confusion') in v8.
Remediation
Upgrade electron to version 33.4.6, 34.3.4 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@31.7.2.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to External Control of Assumed-Immutable Web Parameter via a crafted HTML page. An attacker can perform an out of bounds memory write by sending a specially crafted HTML content.
Remediation
Upgrade electron to version 31.7.2 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@31.7.2.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Heap-based Buffer Overflow in Skia
Remediation
Upgrade electron to version 31.7.2 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@31.7.2.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Heap-based Buffer Overflow in Skia.
Remediation
Upgrade electron to version 31.7.2 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@31.7.2.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Heap-based Buffer Overflow in Skia.
Remediation
Upgrade electron to version 31.7.2 or higher.
References
high severity
new
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@38.8.6.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Hidden Functionality via the commandLineSwitches webPreference. An attacker can inject arbitrary command-line switches into the renderer process by supplying untrusted configuration objects, potentially disabling security controls or sandboxing.
Note:
This is only exploitable if external or untrusted input is used to construct webPreferences without an explicit allowlist.
Workaround
This vulnerability can be mitigated by not spreading untrusted input into webPreferences and by using an explicit allowlist of permitted preference keys when constructing options from external configuration.
Remediation
Upgrade electron to version 38.8.6, 39.8.0, 40.7.0, 41.0.0-beta.8 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@37.2.4.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Incorrect Calculation of Buffer Size via insufficient validation of untrusted input in ANGLE and GPU. An attacker can escape the sandbox by submitting a specially crafted HTML page.
Remediation
Upgrade electron to version 37.2.4 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@31.7.7.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Out-of-bounds Write via a crafted HTML page. An attacker can execute arbitrary code inside a sandbox by crafting a malicious HTML page.
Remediation
Upgrade electron to version 31.7.7 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@32.3.0.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Out-of-bounds Write through a crafted HTML page. An attacker can execute arbitrary code inside a sandbox by crafting malicious HTML content.
Remediation
Upgrade electron to version 32.3.0 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@32.3.2.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Out-of-bounds Write via a crafted HTML page. An attacker can potentially exploit heap corruption by sending a specially crafted HTML page to the victim.
Remediation
Upgrade electron to version 32.3.2, 33.4.2 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@32.3.2.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Out-of-bounds Write through crafted HTML pages. An attacker can exploit heap corruption by sending a specially crafted HTML page to the victim.
Remediation
Upgrade electron to version 32.3.2, 33.4.2 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@32.3.0.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Type Confusion in v8 engine.
Remediation
Upgrade electron to version 32.3.0 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@37.2.6.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free via MediaStreamTrackImpl. An attacker can cause heap corruption by enticing a user to visit a specially crafted HTML page.
Remediation
Upgrade electron to version 37.2.6 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@29.4.3.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free via the Dawn component.
Remediation
Upgrade electron to version 29.4.3 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@29.4.5.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free through the Swiftshader process. An attacker can potentially exploit heap corruption by crafting a malicious HTML page.
Remediation
Upgrade electron to version 29.4.5, 30.2.0 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@29.4.5.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free through the Dawn process. An attacker can potentially exploit heap corruption by crafting a malicious HTML page.
Remediation
Upgrade electron to version 29.4.5, 30.2.0 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@29.4.5.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free due to the improper handling of memory in the Dawn component. An attacker can cause heap corruption and potentially execute arbitrary code by crafting a malicious HTML page.
Remediation
Upgrade electron to version 29.4.5, 30.2.0 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@29.4.5.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free through the Dawn component. An attacker can potentially exploit heap corruption by crafting a malicious HTML page.
Remediation
Upgrade electron to version 29.4.5, 30.2.0 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@30.4.0.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free in Dawn component. An attacker can potentially exploit heap corruption by crafting a malicious HTML page.
Remediation
Upgrade electron to version 30.4.0, 31.4.0 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@30.4.0.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free in Loader component. An attacker can potentially exploit heap corruption by crafting a malicious HTML page.
Remediation
Upgrade electron to version 30.4.0, 31.4.0 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@31.7.2.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free via the Dawn component. An attacker can potentially exploit heap corruption by crafting a malicious HTML page.
Remediation
Upgrade electron to version 31.7.2 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@31.7.2.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free via the WebAudio process. An attacker can potentially exploit heap corruption by crafting a malicious HTML page.
Remediation
Upgrade electron to version 31.7.2 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@31.7.5.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free via the Serial process. An attacker can potentially exploit heap corruption.
Remediation
Upgrade electron to version 31.7.5, 32.2.5 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@31.7.7.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free via the Compositing process. An attacker can potentially exploit heap corruption by crafting a malicious HTML page.
Remediation
Upgrade electron to version 31.7.7 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@33.4.3.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free through the V8 engine. An attacker can potentially exploit heap corruption by crafting a malicious HTML page.
Remediation
Upgrade electron to version 33.4.3 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@32.3.3.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free through the V8 engine.
Remediation
Upgrade electron to version 32.3.3, 33.4.3 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@37.2.5.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Access of Resource Using Incompatible Type ('Type Confusion') via lack of support for escapes in PreParserIdentifier V8` process. An attacker can achieve heap corruption by enticing a user to visit a specially crafted HTML page.
Remediation
Upgrade electron to version 37.2.5 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@17.4.11.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Heap-based Buffer Overflow in the WebRTC component.
Remediation
Upgrade electron to version 17.4.11, 18.3.6 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@29.4.6.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Heap-based Buffer Overflow through the V8 engine. An attacker can corrupt memory and potentially execute arbitrary code by crafting a malicious HTML page.
Note: This is only exploitable if the user navigates to or is redirected to a malicious web page.
Remediation
Upgrade electron to version 29.4.6, 30.4.0 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@10.4.2.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Improper Input Validation. It allowed a remote attacker to leak cross-origin data via a crafted HTML page.
Remediation
Upgrade electron to version 10.4.2, 11.4.1 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@10.4.2.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Out-of-Bounds. Out of bounds memory access in V8 in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. This vulnerability relates to an electron component.
Remediation
Upgrade electron to version 10.4.2, 11.4.1 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@22.3.23.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Out-of-Bounds when the V8 engine processes a carefully crafted HTML page. An attacker can perform an out of bounds memory read, thereby potentially gaining unauthorized access to sensitive information.
Remediation
Upgrade electron to version 22.3.23, 24.8.2, 25.8.0 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@27.3.10.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Out-of-Bounds memory access in V8 component. This vulnerability allowed a remote attacker to perform arbitrary read/write via a crafted HTML page.
Remediation
Upgrade electron to version 27.3.10, 28.3.0 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@29.4.6.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Out-of-bounds Read through the V8 engine. An attacker can access memory locations outside of the intended bounds by crafting a malicious HTML page.
Note: This is only exploitable if the user navigates to or is redirected to a malicious web page.
Remediation
Upgrade electron to version 29.4.6, 30.4.0 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@26.6.6.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Out-of-bounds Write allowing a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Note: The Stable channel has been updated to 120.0.6099.234 for Mac devices.
Remediation
Upgrade electron to version 26.6.6, 27.2.3, 28.1.4 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@31.7.4.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Out-of-bounds Write in Dawn.
Remediation
Upgrade electron to version 31.7.4, 32.2.3 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@31.7.1.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Type Confusion in InferHasInPrototypeChain of the V8 engine.
Remediation
Upgrade electron to version 31.7.1, 32.2.1 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@31.7.2.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Type Confusion via the V8 engine.
Remediation
Upgrade electron to version 31.7.2 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@37.2.4.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free via improper handling of possible socket destruction in P2PSocketTcpBase. An attacker can achieve heap corruption and potentially execute arbitrary code by enticing a user to visit a specially crafted HTML page.
Remediation
Upgrade electron to version 37.2.4 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@27.3.4.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free in Mojo runtime libraries collection. This allows an attacker to exploit heap corruption via a crafted HTML page.
Remediation
Upgrade electron to version 27.3.4, 28.2.5 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@29.4.6.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free through the Audio process. An attacker can potentially exploit heap corruption by crafting a malicious HTML page.
Remediation
Upgrade electron to version 29.4.6, 30.4.0 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@29.4.6.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free via the Navigation process. An attacker can exploit heap corruption by convincing a user to install a malicious extension.
Remediation
Upgrade electron to version 29.4.6, 30.4.0 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@29.4.6.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free via specific UI gestures in the Screen Capture feature. An attacker can potentially exploit heap corruption by convincing a user to visit a crafted HTML page.
Remediation
Upgrade electron to version 29.4.6, 30.4.0 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@29.4.6.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free through the Media Stream process. An attacker can potentially exploit heap corruption by convincing a user to perform specific UI gestures on a crafted HTML page.
Remediation
Upgrade electron to version 29.4.6, 30.4.0 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@23.2.3.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Improper Access Control via nested unserializable return value when using contextIsolation and contextBridge are affected.
Exploiting this vulnerability allows code running in the main world context in the renderer to reach into the isolated Electron context and perform privileged actions.
Note
This issue is exploitable under either of two conditions:
If an API exposed to the main world via
contextBridgecan return an object or array that contains a JS object that cannot be serialized, such as a canvas rendering context. This would normally result in anError: object could not be clonedexception being thrown.If an API exposed to the main world via
contextBridgehas a return value that throws a user-generated exception while being sent over the bridge, such as a dynamic getter property on an object that throws an error when being computed.
Workaround
The app-side workaround is to ensure that such a case, as mentioned in the workaround section, is not possible.
Ensure all values returned from a function exposed over the context bridge are supported and that any objects returned from functions do not have dynamic getters that can throw exceptions.
Auditing your exposed API is likely to be quite difficult, so we strongly recommend you update to a patched version of Electron.
Remediation
Upgrade electron to version 23.2.3, 25.0.0-alpha.2 or higher.
References
high severity
- Vulnerable module: @angular/compiler
- Introduced through: @angular/compiler@9.0.7
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › @angular/compiler@9.0.7Remediation: Upgrade to @angular/compiler@19.2.17.
Overview
Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via incomplete sanitization of certain SVG and MathML attributes, including xlink:href, math|href, as well as the attributeName attribute of SVG animation elements when it is bound to href or xlink:href. An attacker can execute arbitrary JavaScript code in the context of the application by injecting a javascript: URL payload into these attributes, which is then triggered either by user interaction or automatically through animation.
Workaround
This vulnerability can be mitigated by:
Ensuring that data bound to the vulnerable attributes is never sourced from untrusted user input
Avoiding affected template bindings
Not binding untrusted data to the
attributeNameattribute of SVG animation elementsEnabling a robust Content Security Policy (CSP) that disallows
javascript:URLs.
Details
Cross-site scripting (or XSS) is a code vulnerability that occurs when an attacker “injects” a malicious script into an otherwise trusted website. The injected script gets downloaded and executed by the end user’s browser when the user interacts with the compromised website.
This is done by escaping the context of the web application; the web application then delivers that data to its users along with other trusted dynamic content, without validating it. The browser unknowingly executes malicious script on the client side (through client-side languages; usually JavaScript or HTML) in order to perform actions that are otherwise typically blocked by the browser’s Same Origin Policy.
Injecting malicious code is the most prevalent manner by which XSS is exploited; for this reason, escaping characters in order to prevent this manipulation is the top method for securing code against this vulnerability.
Escaping means that the application is coded to mark key characters, and particularly key characters included in user input, to prevent those characters from being interpreted in a dangerous context. For example, in HTML, < can be coded as < and > can be coded as > in order to be interpreted and displayed as themselves in text, while within the code itself, they are used for HTML tags. If malicious content is injected into an application that escapes special characters and that malicious content uses < and > as HTML tags, those characters are nonetheless not interpreted as HTML tags by the browser if they’ve been correctly escaped in the application code and in this way the attempted attack is diverted.
The most prominent use of XSS is to steal cookies (source: OWASP HttpOnly) and hijack user sessions, but XSS exploits have been used to expose sensitive information, enable access to privileged services and functionality and deliver malware.
Types of attacks
There are a few methods by which XSS can be manipulated:
| Type | Origin | Description |
|---|---|---|
| Stored | Server | The malicious code is inserted in the application (usually as a link) by the attacker. The code is activated every time a user clicks the link. |
| Reflected | Server | The attacker delivers a malicious link externally from the vulnerable web site application to a user. When clicked, malicious code is sent to the vulnerable web site, which reflects the attack back to the user’s browser. |
| DOM-based | Client | The attacker forces the user’s browser to render a malicious page. The data in the page itself delivers the cross-site scripting data. |
| Mutated | The attacker injects code that appears safe, but is then rewritten and modified by the browser, while parsing the markup. An example is rebalancing unclosed quotation marks or even adding quotation marks to unquoted parameters. |
Affected environments
The following environments are susceptible to an XSS attack:
- Web servers
- Application servers
- Web application environments
How to prevent
This section describes the top best practices designed to specifically protect your code:
- Sanitize data input in an HTTP request before reflecting it back, ensuring all data is validated, filtered or escaped before echoing anything back to the user, such as the values of query parameters during searches.
- Convert special characters such as
?,&,/,<,>and spaces to their respective HTML or URL encoded equivalents. - Give users the option to disable client-side scripts.
- Redirect invalid requests.
- Detect simultaneous logins, including those from two separate IP addresses, and invalidate those sessions.
- Use and enforce a Content Security Policy (source: Wikipedia) to disable any features that might be manipulated for an XSS attack.
- Read the documentation for any of the libraries referenced in your code to understand which elements allow for embedded HTML.
Remediation
Upgrade @angular/compiler to version 19.2.17, 20.3.15, 21.0.2 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@22.3.5.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Out-of-bounds Read in GPU Video in Google Chrome prior to 111.0.5563.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Remediation
Upgrade electron to version 22.3.5 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@9.4.4.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free. Since JavaScript may detach the underlying buffers, they need to be checked to ensure they're still valid before using them for decoding.
Remediation
Upgrade electron to version 10.2.0, 9.4.4 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@10.4.1.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Insecure Defaults. Insufficient policy enforcement in the File System API of chromium allows a remote attacker to bypass filesystem restrictions via a crafted HTML page.
Remediation
Upgrade electron to version 10.4.1, 11.4.1 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@27.3.11.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Out-of-bounds Write in the Compositing process. An attacker can potentially perform a sandbox escape by exploiting specific UI gestures. This is only exploitable if the attacker has already compromised the GPU process.
Remediation
Upgrade electron to version 27.3.11, 28.3.1, 29.3.1 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@26.6.5.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free via the WebGPU process. An attacker can potentially exploit heap corruption by crafting a malicious HTML page.
Remediation
Upgrade electron to version 26.6.5, 27.2.2 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@26.6.5.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free via the ANGLE component. An attacker can potentially exploit heap corruption by convincing a user to visit a crafted HTML page.
Remediation
Upgrade electron to version 26.6.5, 27.2.2 or higher.
References
high severity
- Vulnerable module: @angular/common
- Introduced through: @angular/common@9.0.7
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › @angular/common@9.0.7Remediation: Upgrade to @angular/common@19.2.16.
Overview
Affected versions of this package are vulnerable to Insertion of Sensitive Information Into Sent Data via the HttpClient which has a built-in XSRF protection mechanism. An attacker can obtain sensitive authentication tokens by crafting requests using protocol-relative URLs that cause the token to be sent to domains under the attacker's control.
Note: This is only exploitable if XSRF protection is enabled and the application allows requests to protocol-relative URLs.
Workaround
This vulnerability can be mitigated by avoiding the use of protocol-relative URLs (those starting with //) in requests and ensuring all backend communication URLs are either relative paths or fully qualified, trusted absolute URLs.
Remediation
Upgrade @angular/common to version 19.2.16, 20.3.14, 21.0.1 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@36.3.0.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Function Call with Incorrectly Specified Arguments via an incorrect handle provided in unspecified circumstances in Mojo. An attacker can reflect a broker-initiated transport back to a broker, which ultimately allows for handle leaks if the reflected transport is later used to deserialize another transport containing handles.
Remediation
Upgrade electron to version 36.3.0 or higher.
References
high severity
- Vulnerable module: @angular/core
- Introduced through: @angular/core@9.0.7
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › @angular/core@9.0.7Remediation: Upgrade to @angular/core@19.2.19.
Overview
@angular/core is a package that lets you write client-side web applications as if you had a smarter browser. It also lets you use HTML as your template language and lets you extend HTML’s syntax to express your application’s components clearly and succinctly.
Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the i18n pipeline when HTML from translated content in ICU messages is not properly sanitized. An attacker can execute arbitrary JavaScript in the application origin by compromising the translation file (such as xliff or xtb) and injecting malicious content.
Note:
This is only exploitable if the application uses Angular i18n, includes one or more ICU messages, renders an ICU message, and does not defend against script injection via a strict content security policy.
Workaround
This vulnerability can be mitigated by reviewing and verifying translated content received from untrusted third parties before incorporating it, enabling strict CSP controls to block unauthorized JavaScript, and enabling Trusted Types to enforce proper HTML sanitization.
Details
Cross-site scripting (or XSS) is a code vulnerability that occurs when an attacker “injects” a malicious script into an otherwise trusted website. The injected script gets downloaded and executed by the end user’s browser when the user interacts with the compromised website.
This is done by escaping the context of the web application; the web application then delivers that data to its users along with other trusted dynamic content, without validating it. The browser unknowingly executes malicious script on the client side (through client-side languages; usually JavaScript or HTML) in order to perform actions that are otherwise typically blocked by the browser’s Same Origin Policy.
Injecting malicious code is the most prevalent manner by which XSS is exploited; for this reason, escaping characters in order to prevent this manipulation is the top method for securing code against this vulnerability.
Escaping means that the application is coded to mark key characters, and particularly key characters included in user input, to prevent those characters from being interpreted in a dangerous context. For example, in HTML, < can be coded as < and > can be coded as > in order to be interpreted and displayed as themselves in text, while within the code itself, they are used for HTML tags. If malicious content is injected into an application that escapes special characters and that malicious content uses < and > as HTML tags, those characters are nonetheless not interpreted as HTML tags by the browser if they’ve been correctly escaped in the application code and in this way the attempted attack is diverted.
The most prominent use of XSS is to steal cookies (source: OWASP HttpOnly) and hijack user sessions, but XSS exploits have been used to expose sensitive information, enable access to privileged services and functionality and deliver malware.
Types of attacks
There are a few methods by which XSS can be manipulated:
| Type | Origin | Description |
|---|---|---|
| Stored | Server | The malicious code is inserted in the application (usually as a link) by the attacker. The code is activated every time a user clicks the link. |
| Reflected | Server | The attacker delivers a malicious link externally from the vulnerable web site application to a user. When clicked, malicious code is sent to the vulnerable web site, which reflects the attack back to the user’s browser. |
| DOM-based | Client | The attacker forces the user’s browser to render a malicious page. The data in the page itself delivers the cross-site scripting data. |
| Mutated | The attacker injects code that appears safe, but is then rewritten and modified by the browser, while parsing the markup. An example is rebalancing unclosed quotation marks or even adding quotation marks to unquoted parameters. |
Affected environments
The following environments are susceptible to an XSS attack:
- Web servers
- Application servers
- Web application environments
How to prevent
This section describes the top best practices designed to specifically protect your code:
- Sanitize data input in an HTTP request before reflecting it back, ensuring all data is validated, filtered or escaped before echoing anything back to the user, such as the values of query parameters during searches.
- Convert special characters such as
?,&,/,<,>and spaces to their respective HTML or URL encoded equivalents. - Give users the option to disable client-side scripts.
- Redirect invalid requests.
- Detect simultaneous logins, including those from two separate IP addresses, and invalidate those sessions.
- Use and enforce a Content Security Policy (source: Wikipedia) to disable any features that might be manipulated for an XSS attack.
- Read the documentation for any of the libraries referenced in your code to understand which elements allow for embedded HTML.
Remediation
Upgrade @angular/core to version 19.2.19, 20.3.17, 21.1.6, 21.2.0 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@25.9.4.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Improper Input Validation in the USB component.
Remediation
Upgrade electron to version 25.9.4, 26.5.0, 27.0.4 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@25.9.4.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Integer Overflow or Wraparound in the USB component.
Remediation
Upgrade electron to version 25.9.4, 26.5.0, 27.0.4 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@27.3.8.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to NULL Pointer Dereference in V8, due to an object lifecycle issue involving scope inheritance.
Remediation
Upgrade electron to version 27.3.8, 28.2.9, 29.1.6 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@16.0.10.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free via the Animation component in Chromium.
Remediation
Upgrade electron to version 16.0.10, 17.1.0 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@19.1.7.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free in V8, which allows a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Remediation
Upgrade electron to version 19.1.7, 20.3.7 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@17.4.11.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Denial of Service (DoS) in PDF in Google Chrome, a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Details
Denial of Service (DoS) describes a family of attacks, all aimed at making a system inaccessible to its intended and legitimate users.
Unlike other vulnerabilities, DoS attacks usually do not aim at breaching security. Rather, they are focused on making websites and services unavailable to genuine users resulting in downtime.
One popular Denial of Service vulnerability is DDoS (a Distributed Denial of Service), an attack that attempts to clog network pipes to the system by generating a large volume of traffic from many machines.
When it comes to open source libraries, DoS vulnerabilities allow attackers to trigger such a crash or crippling of the service by using a flaw either in the application code or from the use of open source libraries.
Two common types of DoS vulnerabilities:
High CPU/Memory Consumption- An attacker sending crafted requests that could cause the system to take a disproportionate amount of time to process. For example, commons-fileupload:commons-fileupload.
Crash - An attacker sending crafted requests that could cause the system to crash. For Example, npm
wspackage
Remediation
Upgrade electron to version 17.4.11, 18.3.7 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@18.3.14.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Denial of Service (DoS) due to insufficient validation of untrusted input in V8.
Details
Denial of Service (DoS) describes a family of attacks, all aimed at making a system inaccessible to its intended and legitimate users.
Unlike other vulnerabilities, DoS attacks usually do not aim at breaching security. Rather, they are focused on making websites and services unavailable to genuine users resulting in downtime.
One popular Denial of Service vulnerability is DDoS (a Distributed Denial of Service), an attack that attempts to clog network pipes to the system by generating a large volume of traffic from many machines.
When it comes to open source libraries, DoS vulnerabilities allow attackers to trigger such a crash or crippling of the service by using a flaw either in the application code or from the use of open source libraries.
Two common types of DoS vulnerabilities:
High CPU/Memory Consumption- An attacker sending crafted requests that could cause the system to take a disproportionate amount of time to process. For example, commons-fileupload:commons-fileupload.
Crash - An attacker sending crafted requests that could cause the system to crash. For Example, npm
wspackage
Remediation
Upgrade electron to version 18.3.14 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@19.1.7.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Denial of Service (DoS) due to type confusion in V8, which allows a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Remediation
Upgrade electron to version 19.1.7, 20.3.7 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@27.3.6.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Denial of Service (DoS) via an Out of bounds memory access in V8.
Details
Denial of Service (DoS) describes a family of attacks, all aimed at making a system inaccessible to its intended and legitimate users.
Unlike other vulnerabilities, DoS attacks usually do not aim at breaching security. Rather, they are focused on making websites and services unavailable to genuine users resulting in downtime.
One popular Denial of Service vulnerability is DDoS (a Distributed Denial of Service), an attack that attempts to clog network pipes to the system by generating a large volume of traffic from many machines.
When it comes to open source libraries, DoS vulnerabilities allow attackers to trigger such a crash or crippling of the service by using a flaw either in the application code or from the use of open source libraries.
Two common types of DoS vulnerabilities:
High CPU/Memory Consumption- An attacker sending crafted requests that could cause the system to take a disproportionate amount of time to process. For example, commons-fileupload:commons-fileupload.
Crash - An attacker sending crafted requests that could cause the system to crash. For Example, npm
wspackage
Remediation
Upgrade electron to version 27.3.6, 28.2.7, 29.1.2 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@10.4.4.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Heap-based Buffer Overflow via V8.
Remediation
Upgrade electron to version 10.4.4, 11.4.4, 12.0.6 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@9.4.1.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Out-of-bounds Read. An unknown vunerability exists in Chrome which affects electron.
Remediation
Upgrade electron to version 9.4.1, 10.3.2 or higher.
References
high severity
new
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@38.8.6.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free via the session.setPermissionRequestHandler process. An attacker can cause a crash or memory corruption by triggering a permission request for fullscreen, pointer-lock, or keyboard-lock, and then navigating the requesting frame or closing the window while the permission handler is pending.
Note:
This is only exploitable if an asynchronous permission request handler is registered and invoked while the request is pending.
Workaround
This vulnerability can be mitigated by responding to permission requests synchronously, or by denying fullscreen, pointer-lock, and keyboard-lock requests if an asynchronous flow is required.
Remediation
Upgrade electron to version 38.8.6, 39.8.0, 40.7.0, 41.0.0-beta.8 or higher.
References
high severity
new
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@38.8.6.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Improper Isolation or Compartmentalization in the handling of the nodeIntegrationInWorker configuration in shared renderer processes. An attacker can gain unauthorized access to Node.js integration by exploiting process-sharing scenarios where workers in frames configured with nodeIntegrationInWorker: false still receive Node.js integration.
Note:
This is only exploitable if nodeIntegrationInWorker is enabled in applications that also open child windows or embed content with differing webPreferences.
Workaround
This vulnerability can be mitigated by avoiding the enabling of nodeIntegrationInWorker in applications that open child windows or embed content with different webPreferences.
Remediation
Upgrade electron to version 38.8.6, 39.8.4, 40.8.4, 41.0.0 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@10.4.4.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Out-of-bounds Read via the IPC in chromium.
Remediation
Upgrade electron to version 11.4.4, 10.4.4 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@12.2.0.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Buffer Overflow in ANGLE.
Remediation
Upgrade electron to version 13.5.0, 12.2.0 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@10.4.7.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Heap-based Buffer Overflow in Reader Mode.
Remediation
Upgrade electron to version 12.0.10, 11.4.8, 10.4.7 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@10.4.7.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Heap-based Buffer Overflow in History.
Remediation
Upgrade electron to version 12.0.10, 11.4.8, 10.4.7 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@10.4.7.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Heap-based Buffer Overflow in Media Feeds.
Remediation
Upgrade electron to version 12.0.10, 11.4.8, 10.4.7 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@13.5.2.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Heap-based Buffer Overflow via the Blink module in Chromium.
Remediation
Upgrade electron to version 14.2.0, 13.5.2 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@16.2.5.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Heap-based Buffer Overflow in WebGPU.
Remediation
Upgrade electron to version 16.2.5, 17.4.3 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@15.5.6.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Heap-based Buffer Overflow in V8 Internationalization.
Remediation
Upgrade electron to version 15.5.6, 16.2.7, 17.4.5 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@19.1.7.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Heap-based Buffer Overflow in Crashpad in Google Chrome on Android, which allows a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
Remediation
Upgrade electron to version 19.1.7, 20.3.7 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@20.3.10.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Heap-based Buffer Overflow in Network Service via a crafted HTML page and specific interactions.
Remediation
Upgrade electron to version 20.3.10, 21.3.5 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@21.4.4.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Heap-based Buffer Overflow in Metrics by allowing a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.
Remediation
Upgrade electron to version 21.4.4, 22.3.5 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@22.3.25.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Heap-based Buffer Overflow in vp8 encoding in libvpx.
Remediation
Upgrade electron to version 22.3.25, 24.8.5, 25.8.4, 26.2.4, 27.0.0-beta.8 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@26.6.3.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Heap-based Buffer Overflow in the WebRTC framework, used to provide Real-Time Communications (RTC) capabilities via JavaScript APIs.
Remediation
Upgrade electron to version 26.6.3, 27.2.0, 28.1.0 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@29.4.3.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Heap-based Buffer Overflow in the ANGLE process. An attacker can perform an out of bounds memory read via a crafted HTML page.
Remediation
Upgrade electron to version 29.4.3 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@29.4.3.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Heap-based Buffer Overflow in the Dawn process. An attacker can perform an out of bounds memory write by exploiting a crafted HTML page.
Remediation
Upgrade electron to version 29.4.3 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@14.2.7.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Improper Check or Handling of Exceptional Conditions which returns an invalid handle after ReportBadMessage
Remediation
Upgrade electron to version 14.2.7, 15.4.0, 16.0.10 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@15.5.4.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Improper Input Validation in Blink Editing.
Remediation
Upgrade electron to version 15.5.4, 16.2.6, 17.4.3, 18.2.2 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@9.4.4.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Improper Validation. The value of a node was accessed without prior HasValue check. With WebAssembly this node is not guaranteed to be a value.
Remediation
Upgrade electron to version 10.1.6, 9.4.4 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@15.5.5.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Inappropriate implementation in Input.
Remediation
Upgrade electron to version 15.5.5, 16.2.6, 17.4.4, 18.2.2 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@9.4.0.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Insufficient Validation in V8.
Remediation
Upgrade electron to version 9.4.0, 10.2.0 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@9.4.2.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Insufficient Validation via an unknown issue in chromium.
Remediation
Upgrade electron to version 9.4.2, 10.3.1, 11.2.2 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@12.2.0.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Out-of-Bounds in ANGLE.
Remediation
Upgrade electron to version 13.5.0, 12.2.0 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@10.4.7.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Race Condition in Aura.
Remediation
Upgrade electron to version 12.0.10, 11.4.8, 10.4.7 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@15.5.0.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Type Confusion due to mishandling of interceptors which can lead to out-of-bounds memory access.
Remediation
Upgrade electron to version 15.5.0, 16.2.0 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@15.5.3.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Type Confusion in V8.
Remediation
Upgrade electron to version 15.5.3, 16.2.3, 17.4.1 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@26.6.6.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Type Confusion due to a type confusion in V8. A remote attacker could exploit heap corruption via a crafted HTML page.
Note: The Stable channel has been updated to 120.0.6099.234 for Mac devices.
Remediation
Upgrade electron to version 26.6.6, 27.2.3, 28.1.4 or higher.
References
high severity
new
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@38.8.6.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Unquoted Search Path or Element in the app.setLoginItemSettings function on Windows when the executable path is written to the Run registry key without proper quoting. An attacker can execute arbitrary code at login by placing a malicious executable in an ancestor directory if the application is installed to a path containing spaces and the attacker has write access to that directory.
Note:
This is only exploitable if the application is installed in a non-standard location where ancestor directories are not protected against unauthorized writes.
Workaround
This vulnerability can be mitigated by installing the application to a path without spaces or to a location where all ancestor directories are protected against unauthorized writes.
Remediation
Upgrade electron to version 38.8.6, 39.8.1, 40.8.0, 41.0.0-beta.8 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@13.6.6.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free in V8.
Remediation
Upgrade electron to version 13.6.6, 14.2.4 or higher.
References
high severity
new
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@38.8.6.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Command Injection in the app.moveToApplicationsFolder function on macOS when handling application bundle paths containing certain characters. An attacker can execute arbitrary AppleScript code by crafting a malicious launch path and convincing a user to accept the move-to-Applications prompt.
Note:
This is only exploitable if the application calls app.moveToApplicationsFolder().
Remediation
Upgrade electron to version 38.8.6, 39.8.1, 40.8.0, 41.0.0-beta.8 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@22.3.16.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Out-of-bounds Read in WebRTC, exploitable via a crafted HTML page.
Remediation
Upgrade electron to version 22.3.16 or higher.
References
high severity
new
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@38.8.6.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free in the powerMonitor function. An attacker can cause memory corruption or application crashes by triggering session-change events on Windows or system shutdown events on macOS after the native object has been garbage-collected, leading to dereferencing of freed memory.
Remediation
Upgrade electron to version 38.8.6, 39.8.1, 40.8.0, 41.0.0-beta.8 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@26.6.3.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free via the Media Stream process. An attacker can potentially exploit heap corruption by crafting a malicious HTML page.
Remediation
Upgrade electron to version 26.6.3, 27.2.0 or higher.
References
high severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@31.7.2.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Out-of-bounds Read in Skia.
Remediation
Upgrade electron to version 31.7.2, 32.2.2 or higher.
References
medium severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@31.7.4.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Access of Resource Using Incompatible Type ('Type Confusion') via a crafted HTML page. An attacker can potentially exploit heap corruption.
Remediation
Upgrade electron to version 31.7.4, 32.2.3 or higher.
References
medium severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@32.2.3.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Access of Resource Using Incompatible Type ('Type Confusion') via a crafted HTML page. An attacker can potentially exploit heap corruption.
Remediation
Upgrade electron to version 32.2.3 or higher.
References
medium severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@31.7.5.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Access Restriction Bypass due to an inappropriate implementation in the Extensions feature. An attacker can bypass site isolation.
Remediation
Upgrade electron to version 31.7.5, 32.2.5, 33.2.1 or higher.
References
medium severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@31.7.2.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Heap-based Buffer Overflow in Fonts.
Remediation
Upgrade electron to version 31.7.2 or higher.
References
medium severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@31.7.2.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Heap-based Buffer Overflow through the V8 engine.
Remediation
Upgrade electron to version 31.7.2 or higher.
References
medium severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@32.3.2.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Heap-based Buffer Overflow in v8, when processing a very large number of parameters.
Remediation
Upgrade electron to version 32.3.2, 33.4.2 or higher.
References
medium severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@33.4.8.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Improper Isolation or Compartmentalization that allows an attacker who can convince a user to follow a malicious link to escape sandbox protections, due to a logic error in the Mojo component. This vulnerability does not enable code execution on its own, but is presumed chainable with another vulnerability to achieve code execution and has been observed in the wild.
Note: This vulnerability is only exploitable on Windows.
Remediation
Upgrade electron to version 33.4.8, 34.4.1, 35.1.2 or higher.
References
medium severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@37.2.4.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Integer Overflow or Wraparound via an incorrect count being passed to InstructionAccurateScope in the V8 engine. An attacker can cause heap corruption by enticing a user to visit a specially crafted HTML page.
Remediation
Upgrade electron to version 37.2.4 or higher.
References
medium severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@31.7.2.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Type Confusion. An attacker can access memory locations outside of the intended bounds by crafting a malicious HTML page that triggers type confusion in the V8 engine.
Remediation
Upgrade electron to version 31.7.2 or higher.
References
medium severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@27.3.11.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Integer Overflow or Wraparound when decoding videos with a large frame size. An attacker can cause memory corruption within the AV1 decoder by providing a specially crafted video file.
Remediation
Upgrade electron to version 27.3.11, 28.3.1 or higher.
References
medium severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@16.2.0.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free via Angle, where base level changes may not update FBO completeness check.
Remediation
Upgrade electron to version 16.2.0 or higher.
References
medium severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@15.5.0.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Improper Input Validation which allows attackers who have control over a given app's update server or update storage to serve maliciously crafted update packages that pass the code signing validation check but contain malicious code in some components.
Remediation
Upgrade electron to version 15.5.0, 16.2.0, 17.2.0, 18.0.0 or higher.
References
medium severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@10.4.3.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Access Restriction Bypass. Inappropriate implementation in Referrer in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. This vulnerability relates to an electron component.
Remediation
Upgrade electron to version 10.4.3, 11.4.1 or higher.
References
medium severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@16.0.0.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Domain Spoofing via a crafted HTML page as a result of inappropriate implementation in navigation in Google Chrome.
Remediation
Upgrade electron to version 16.0.0 or higher.
References
medium severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@11.4.11.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Heap-based Buffer Overflow in WebGL via Chrome. This allows a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Remediation
Upgrade electron to version 13.1.8, 12.0.16, 11.4.11 or higher.
References
medium severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@9.4.4.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Improper Input Validation via the File System API.
Remediation
Upgrade electron to version 11.2.1, 9.4.4 or higher.
References
medium severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@17.4.8.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Improper Input Validation in Data Transfer, because the sanitization code only does one round of parsing and serializing.
Remediation
Upgrade electron to version 17.4.8, 18.3.5 or higher.
References
medium severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@13.6.6.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Inappropriate Implementation via cache in Google Chrome. This allows a remote attacker to leak cross-origin data via a crafted HTML page.
Remediation
Upgrade electron to version 13.6.6, 14.2.2, 15.3.3 or higher.
References
medium severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@9.4.1.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Information Exposure. When a BigInt is right-shifted the backing store is not properly cleared, allowing uninitialized memory to be read.
Remediation
Upgrade electron to version 9.4.1, 10.3.2 or higher.
References
medium severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@12.2.2.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Information Exposure via the core module in Chromium.
Remediation
Upgrade electron to version 14.2.0, 13.5.2, 12.2.2 or higher.
References
medium severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@19.1.5.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Improper Input Validation in file system.
Remediation
Upgrade electron to version 19.1.5, 21.2.2 or higher.
References
medium severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@15.5.3.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Type Confusion in V8.
Remediation
Upgrade electron to version 15.5.3, 16.2.4, 17.4.2 or higher.
References
medium severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@11.4.10.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free in Network service.
Remediation
Upgrade electron to version 12.0.13, 11.4.10 or higher.
References
medium severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@11.4.11.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free via sqlite. This can allow a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Remediation
Upgrade electron to version 13.1.8, 12.0.16, 11.4.11 or higher.
References
medium severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@29.4.6.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Race Condition via a crafted Chrome Extension. An attacker who convinced a user to install a malicious extension can inject scripts or HTML into a privileged page.
Remediation
Upgrade electron to version 29.4.6, 30.4.0 or higher.
References
medium severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@27.3.5.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free via the xmlTextReader module. An attacker can cause denial of service by processing crafted XML documents with DTD validation and XInclude expansion enabled.
Remediation
Upgrade electron to version 27.3.5, 28.2.6 or higher.
References
medium severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@22.3.24.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Insufficient Verification of Data Authenticity when the embeddedAsarIntegrityValidation and onlyLoadAppFromAsar fuses are enabled.
An attacker can edit files inside the .app bundle on macOS, which these fuses are supposed to protect against, by gaining write access to the filesystem from which the app is launched.
Note
This is only exploitable if your app is launched from a filesystem the attacker has write access to and is specific to macOS, as these fuses are only supported on macOS.
Remediation
Upgrade electron to version 22.3.24, 24.8.3, 25.8.1, 26.2.1 or higher.
References
medium severity
new
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@38.8.6.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Insufficient Verification of Data Authenticity via the webContents.executeJavaScript function. An attacker can manipulate the main-process promise to resolve with attacker-controlled data by spoofing reply messages on the internal IPC channel.
Note:
This is only exploitable if service workers are registered and the result of webContents.executeJavaScript() or webFrameMain.executeJavaScript() is used in security-sensitive decisions.
Workaround
This vulnerability can be mitigated by not trusting the return value of webContents.executeJavaScript() for security decisions and using dedicated, validated IPC channels for security-relevant communication with renderers.
Remediation
Upgrade electron to version 38.8.6, 39.8.1, 40.8.1, 41.0.0 or higher.
References
medium severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@18.3.9.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Access Control Bypass due to insufficient policy enforcement in Cookies.
Remediation
Upgrade electron to version 18.3.9, 19.0.12 or higher.
References
medium severity
new
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@38.8.6.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to HTTP Response Splitting via the protocol.handle, protocol.registerSchemesAsPrivileged, or webRequest.onHeadersReceived functions. An attacker can manipulate HTTP response headers by injecting attacker-controlled input into a response header name or value, potentially allowing the setting of arbitrary headers that affect cookies, content security policy, or cross-origin access controls.
Note:
This is only exploitable if untrusted external input is reflected into response headers.
Workaround
This vulnerability can be mitigated by validating or sanitizing any untrusted input before including it in a response header name or value.
Remediation
Upgrade electron to version 38.8.6, 39.8.3, 40.8.3, 41.0.3 or higher.
References
medium severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@17.4.9.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Protection Mechanism Failure in File System API.
Remediation
Upgrade electron to version 17.4.9, 18.3.6, 19.0.7 or higher.
References
medium severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@18.3.7.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Information Exposure in that it reveals hashed credentials when the target of a redirect is an SMB URL, such as one using the file:// scheme.
NOTE: This vulnerability is only exploitable on Windows.
Workaround
This vulnerability can be worked around by preventing redirects to file:// URLs in the WebContents.on('will-redirect') event.
Remediation
Upgrade electron to version 18.3.7, 19.0.11, 20.0.1 or higher.
References
medium severity
new
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@38.8.6.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Out-of-bounds Read in the second-instance event handler when parsing a crafted second-instance message via the app.requestSingleInstanceLock process. An attacker can access sensitive memory contents or cause application instability by sending a specially crafted message from another process running as the same user.
Note:
This is only exploitable if the application calls app.requestSingleInstanceLock() and is running on macOS or Linux as the same user.
Remediation
Upgrade electron to version 38.8.6, 39.8.1, 40.8.1, 41.0.0 or higher.
References
medium severity
new
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@38.8.6.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') in the app.setAsDefaultProtocolClient function. An attacker can gain the ability to write to arbitrary registry subkeys by supplying a crafted protocol name derived from untrusted input. This may allow hijacking of existing protocol handlers.
Note:
This is only exploitable if the protocol name passed to app.setAsDefaultProtocolClient is not hardcoded and is instead derived from external or untrusted sources.
Workaround
This vulnerability can be mitigated by validating the protocol name matches the regular expression /^[a-zA-Z][a-zA-Z0-9+.-]*$/ before passing it to app.setAsDefaultProtocolClient().
Remediation
Upgrade electron to version 38.8.6, 39.8.1, 40.8.1, 41.0.0 or higher.
References
medium severity
new
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@38.8.6.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free in the download save dialog callback process. An attacker can cause a crash or memory corruption by triggering session destruction while a native save-file dialog is open and then dismissing the dialog.
Note:
This is only exploitable if the application allows downloads and programmatically destroys sessions at runtime.
Workaround
This vulnerability can be mitigated by avoiding session destruction while a download save dialog may be open and by canceling pending downloads before tearing down sessions.
Remediation
Upgrade electron to version 38.8.6, 39.8.0, 40.7.0, 41.0.0-beta.7 or higher.
References
medium severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@18.3.8.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Buffer Overflow when changing the PDF layout confuses AddFindResult() and causes it to fail a DCHECK()
Remediation
Upgrade electron to version 18.3.8, 19.0.13 or higher.
References
medium severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@13.6.8.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Improper Control of a Resource Through its Lifetime in the FramebufferAttachment::mRenderToTextureSamples method in Angle. It was never updated if the renderbuffer storage was changed after attaching to framebuffer.
Remediation
Upgrade electron to version 13.6.8, 14.2.4, 15.3.6 or higher.
References
medium severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@16.2.5.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Inappropriate implementation in WebGL.
Remediation
Upgrade electron to version 16.2.5, 17.4.3 or higher.
References
medium severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@15.5.4.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Inappropriate implementation in Web Cursor.
Remediation
Upgrade electron to version 15.5.4, 16.2.3, 17.4.1 or higher.
References
medium severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@14.2.2.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Inappropriate Implementation via service workers in Google Chrome. This allows a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page.
Remediation
Upgrade electron to version 14.2.2, 15.3.3 or higher.
References
medium severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@12.2.2.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Sandbox Bypass via chromium, due to a child process's delayed integrity level not being set correctly.
Remediation
Upgrade electron to version 12.2.2, 13.5.2, 14.2.0 or higher.
References
medium severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@15.5.6.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Exposure of Resource to Wrong Sphere which allows a renderer with JS execution to obtain access to a new renderer process even without nodeIntegrationInSubFrames being enabled, that allows effective access to ipcRenderer.
Remediation
Upgrade electron to version 15.5.6, 16.2.6, 17.2.0, 18.0.0 or higher.
References
medium severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@28.3.2.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Heap-based Buffer Overflow. The nativeImage.createFromPath or nativeImage.createFromBuffer APIs in Electron, which make use of Chromium's JPEGCodec::Decode, are vulnerable to a heap-based buffer overflow. An attacker can execute arbitrary code or cause a crash by supplying specially crafted image data.
Remediation
Upgrade electron to version 28.3.2, 29.3.3, 30.0.3 or higher.
References
medium severity
- Vulnerable module: got
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5 › @electron/get@1.14.1 › got@9.6.0Remediation: Upgrade to electron@22.0.0.
Overview
Affected versions of this package are vulnerable to Open Redirect due to missing verification of requested URLs. It allowed a victim to be redirected to a UNIX socket.
Remediation
Upgrade got to version 11.8.5, 12.1.0 or higher.
References
medium severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@12.2.1.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Improper Input Validation. It is possible to kill a renderer if it provides an unexpected FrameOwnerElementType.
Remediation
Upgrade electron to version 13.5.1, 12.2.1 or higher.
References
medium severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@18.3.8.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Improper Input Validation.
in Internals, due to not treating % as a special character in pathname resolution.
NOTE: This vulnerability is only exploitable when running on Windows.
Remediation
Upgrade electron to version 18.3.8, 19.0.13 or higher.
References
medium severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@9.4.0.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Information Exposure. IPC messages sent from the main process to a subframe in the renderer process, through webContents.sendToFrame, event.reply or when using the remote module, can in some cases be delivered to the wrong frame.
Remediation
Upgrade electron to version 9.4.0, 10.2.0, 11.1.0, 12.0.0-beta.9 or higher.
References
medium severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@10.4.1.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Information Exposure. The is a side-channel information leakage in autofill.
Remediation
Upgrade electron to version 11.4.0, 10.4.1 or higher.
References
medium severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@14.2.8.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Information Exposure where ImageBitmaps that is created by webGL contexts will fail to render.
Remediation
Upgrade electron to version 14.2.8, 15.4.2, 16.2.0 or higher.
References
medium severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@18.3.9.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Information Exposure in Background Fetch, by exposing URLs during cross-origin redirects.
Remediation
Upgrade electron to version 18.3.9, 19.0.12 or higher.
References
medium severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@12.1.2.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Out-of-Bounds. An out of bounds write issue exists in engine.
Remediation
Upgrade electron to version 13.5.0, 12.1.2 or higher.
References
medium severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@29.4.3.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Type Confusion via a crafted HTML page in the V8 engine.
**Note: ** This is only exploitable if the user navigates to or is redirected to the malicious page.
Remediation
Upgrade electron to version 29.4.3 or higher.
References
medium severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@35.7.5.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Arbitrary Code Injection via modification of the resources folder when the embeddedAsarIntegrityValidation and onlyLoadAppFromAsar fuses are enabled. An attacker can execute unauthorized code by altering files within the application directory, bypassing ASAR integrity checks.
Note: This is only exploitable if the application is launched from a filesystem to which the attacker has write access.
Remediation
Upgrade electron to version 35.7.5, 36.8.1, 37.3.1, 38.0.0-beta.6 or higher.
References
medium severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@36.3.0.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Information Exposure via the Loader component. An attacker can leak sensitive cross-origin data by crafting a malicious HTML page.
Remediation
Upgrade electron to version 36.3.0 or higher.
References
medium severity
new
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@38.8.6.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Origin Validation Error in the session.setPermissionRequestHandler function. An attacker can gain unauthorized access to permissions such as fullscreen, pointerLock, keyboardLock, openExternal, or media by embedding malicious iframes that exploit the incorrect origin parameter passed to the handler. This may result in third-party content being granted permissions intended only for trusted origins.
Note:
This is only exploitable if the application grants permissions based on the origin parameter or webContents.getURL() rather than details.requestingUrl.
Workaround
This vulnerability can be mitigated by inspecting details.requestingUrl instead of the origin parameter or webContents.getURL() in the setPermissionRequestHandler when deciding whether to grant permissions.
Remediation
Upgrade electron to version 38.8.6, 39.8.1, 40.8.1, 41.0.0 or higher.
References
medium severity
- Vulnerable module: quill
- Introduced through: quill@1.3.7
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › quill@1.3.7
Overview
quill is a modern rich text editor built for compatibility and extensibility.
Affected versions of this package are vulnerable to Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') due to the improper sanitazation in the getHTML() function. An attacker can execute arbitrary JavaScript code in the context of the user's browser by injecting malicious HTML that is not properly validated.
Remediation
There is no fixed version for quill.
References
medium severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@9.4.2.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Use After Free via the Blink component in chromium.
Remediation
Upgrade electron to version 9.4.2, 10.3.1, 11.2.2 or higher.
References
medium severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@10.4.4.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Improper Input Validation due to insufficient data validation that exists in V8.
Remediation
Upgrade electron to version 10.4.4, 12.0.6 or higher.
References
medium severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@12.2.2.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Exposure of Resource to Wrong Sphere. Inappropriate implementation in Background Fetch API in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
Remediation
Upgrade electron to version 14.1.1, 13.5.2, 12.2.2 or higher.
References
medium severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@12.2.2.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Improper Access Control. Inappropriate implementation in Background Fetch API in Google Chrome prior to 94.0.4606.54 allowed a remote attacker who had compromised the renderer process to leak cross-origin data via a crafted HTML page.
Remediation
Upgrade electron to version 14.1.1, 13.5.2, 12.2.2 or higher.
References
medium severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@18.3.11.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Improper Authentication by allowing the creation of cookies that have an empty name field and whose value impersonates a cookie name prefix.
Note:
Upgrading to the fixed version will delete any previously stored cookies that meet the conditions by causing them to fail their IsCanonical() check.
Remediation
Upgrade electron to version 18.3.11 or higher.
References
medium severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@15.5.3.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Improper implementation in Compositing.
Remediation
Upgrade electron to version 15.5.3, 16.2.4 or higher.
References
low severity
- Vulnerable module: @angular/core
- Introduced through: @angular/core@9.0.7
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › @angular/core@9.0.7Remediation: Upgrade to @angular/core@11.0.5.
Overview
@angular/core is a package that lets you write client-side web applications as if you had a smarter browser. It also lets you use HTML as your template language and lets you extend HTML’s syntax to express your application’s components clearly and succinctly.
Affected versions of this package are vulnerable to Cross-site Scripting (XSS) in development, with SSR enabled.
Details
Cross-site scripting (or XSS) is a code vulnerability that occurs when an attacker “injects” a malicious script into an otherwise trusted website. The injected script gets downloaded and executed by the end user’s browser when the user interacts with the compromised website.
This is done by escaping the context of the web application; the web application then delivers that data to its users along with other trusted dynamic content, without validating it. The browser unknowingly executes malicious script on the client side (through client-side languages; usually JavaScript or HTML) in order to perform actions that are otherwise typically blocked by the browser’s Same Origin Policy.
Injecting malicious code is the most prevalent manner by which XSS is exploited; for this reason, escaping characters in order to prevent this manipulation is the top method for securing code against this vulnerability.
Escaping means that the application is coded to mark key characters, and particularly key characters included in user input, to prevent those characters from being interpreted in a dangerous context. For example, in HTML, < can be coded as < and > can be coded as > in order to be interpreted and displayed as themselves in text, while within the code itself, they are used for HTML tags. If malicious content is injected into an application that escapes special characters and that malicious content uses < and > as HTML tags, those characters are nonetheless not interpreted as HTML tags by the browser if they’ve been correctly escaped in the application code and in this way the attempted attack is diverted.
The most prominent use of XSS is to steal cookies (source: OWASP HttpOnly) and hijack user sessions, but XSS exploits have been used to expose sensitive information, enable access to privileged services and functionality and deliver malware.
Types of attacks
There are a few methods by which XSS can be manipulated:
| Type | Origin | Description |
|---|---|---|
| Stored | Server | The malicious code is inserted in the application (usually as a link) by the attacker. The code is activated every time a user clicks the link. |
| Reflected | Server | The attacker delivers a malicious link externally from the vulnerable web site application to a user. When clicked, malicious code is sent to the vulnerable web site, which reflects the attack back to the user’s browser. |
| DOM-based | Client | The attacker forces the user’s browser to render a malicious page. The data in the page itself delivers the cross-site scripting data. |
| Mutated | The attacker injects code that appears safe, but is then rewritten and modified by the browser, while parsing the markup. An example is rebalancing unclosed quotation marks or even adding quotation marks to unquoted parameters. |
Affected environments
The following environments are susceptible to an XSS attack:
- Web servers
- Application servers
- Web application environments
How to prevent
This section describes the top best practices designed to specifically protect your code:
- Sanitize data input in an HTTP request before reflecting it back, ensuring all data is validated, filtered or escaped before echoing anything back to the user, such as the values of query parameters during searches.
- Convert special characters such as
?,&,/,<,>and spaces to their respective HTML or URL encoded equivalents. - Give users the option to disable client-side scripts.
- Redirect invalid requests.
- Detect simultaneous logins, including those from two separate IP addresses, and invalidate those sessions.
- Use and enforce a Content Security Policy (source: Wikipedia) to disable any features that might be manipulated for an XSS attack.
- Read the documentation for any of the libraries referenced in your code to understand which elements allow for embedded HTML.
Remediation
Upgrade @angular/core to version 11.0.5, 11.1.0-next.3 or higher.
References
low severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@10.4.4.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Out Of Bounds Read. Blit11 would clip the destination rectangle with the destination size but ignore the result. gl::ClipRectangle returns false when the rectangles do not intersect at all, indicating the blit can be skipped.
Remediation
Upgrade electron to version 10.4.4, 11.4.4, 12.0.6 or higher.
References
low severity
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@13.6.6.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Improper Access Control via the web Bluetooth API, if the app has not configured a custom select-bluetooth-device event handler.
The device that is accessed is random and the attacker would have no way of selecting a specific device.
Workarounds:
Adding this code to your app can workaround the issue.
app.on('web-contents-created', (event, webContents) => {
webContents.on('select-bluetooth-device', (event, devices, callback) => {
// Prevent default behavior
event.preventDefault();
// Cancel the request
callback('');
});
});
Remediation
Upgrade electron to version 13.6.6, 14.2.4, 15.3.5, 16.0.6, 17.0.0-alpha.6 or higher.
References
low severity
new
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@39.8.5.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to NULL Pointer Dereference in the clipboard.readImage() function when processing malformed clipboard image data. An attacker can cause the application to crash by placing invalid image data on the system clipboard and triggering the function.
Remediation
Upgrade electron to version 39.8.5, 40.8.5, 41.1.0, 42.0.0-alpha.5 or higher.
References
low severity
new
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@39.8.5.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Exposure of Resource to Wrong Sphere via the window.open() function. An attacker can gain access to or manipulate the browsing context of a window opened by a different renderer by using the same target name, potentially inheriting elevated permissions such as privileged preload scripts or relaxed security settings. This is only exploitable if multiple top-level windows with differing trust levels are opened and setWindowOpenHandler is used to grant elevated webPreferences to child windows.
Workaround
This vulnerability can be mitigated by denying window.open() in renderers that load untrusted content by returning { action: 'deny' } from setWindowOpenHandler and avoiding granting child windows more permissive webPreferences than their opener.
Remediation
Upgrade electron to version 39.8.5, 40.8.5, 41.1.0, 42.0.0-alpha.5 or higher.
References
low severity
- Vulnerable module: @angular/compiler
- Introduced through: @angular/compiler@9.0.7
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › @angular/compiler@9.0.7Remediation: Upgrade to @angular/compiler@19.2.18.
Overview
Affected versions of this package are vulnerable to Cross-site Scripting (XSS) in the handling of SVG <script> element attributes href and xlink:href when user-controlled data is bound to these attributes. An attacker can execute arbitrary JavaScript code in the victim's browser by supplying a crafted payload through untrusted data sources that are bound to these attributes.
##Workaround
This vulnerability can be mitigated by avoiding dynamic template bindings for SVG <script> elements and strictly validating input against a trusted allowlist before it reaches the template.
Details
Cross-site scripting (or XSS) is a code vulnerability that occurs when an attacker “injects” a malicious script into an otherwise trusted website. The injected script gets downloaded and executed by the end user’s browser when the user interacts with the compromised website.
This is done by escaping the context of the web application; the web application then delivers that data to its users along with other trusted dynamic content, without validating it. The browser unknowingly executes malicious script on the client side (through client-side languages; usually JavaScript or HTML) in order to perform actions that are otherwise typically blocked by the browser’s Same Origin Policy.
Injecting malicious code is the most prevalent manner by which XSS is exploited; for this reason, escaping characters in order to prevent this manipulation is the top method for securing code against this vulnerability.
Escaping means that the application is coded to mark key characters, and particularly key characters included in user input, to prevent those characters from being interpreted in a dangerous context. For example, in HTML, < can be coded as < and > can be coded as > in order to be interpreted and displayed as themselves in text, while within the code itself, they are used for HTML tags. If malicious content is injected into an application that escapes special characters and that malicious content uses < and > as HTML tags, those characters are nonetheless not interpreted as HTML tags by the browser if they’ve been correctly escaped in the application code and in this way the attempted attack is diverted.
The most prominent use of XSS is to steal cookies (source: OWASP HttpOnly) and hijack user sessions, but XSS exploits have been used to expose sensitive information, enable access to privileged services and functionality and deliver malware.
Types of attacks
There are a few methods by which XSS can be manipulated:
| Type | Origin | Description |
|---|---|---|
| Stored | Server | The malicious code is inserted in the application (usually as a link) by the attacker. The code is activated every time a user clicks the link. |
| Reflected | Server | The attacker delivers a malicious link externally from the vulnerable web site application to a user. When clicked, malicious code is sent to the vulnerable web site, which reflects the attack back to the user’s browser. |
| DOM-based | Client | The attacker forces the user’s browser to render a malicious page. The data in the page itself delivers the cross-site scripting data. |
| Mutated | The attacker injects code that appears safe, but is then rewritten and modified by the browser, while parsing the markup. An example is rebalancing unclosed quotation marks or even adding quotation marks to unquoted parameters. |
Affected environments
The following environments are susceptible to an XSS attack:
- Web servers
- Application servers
- Web application environments
How to prevent
This section describes the top best practices designed to specifically protect your code:
- Sanitize data input in an HTTP request before reflecting it back, ensuring all data is validated, filtered or escaped before echoing anything back to the user, such as the values of query parameters during searches.
- Convert special characters such as
?,&,/,<,>and spaces to their respective HTML or URL encoded equivalents. - Give users the option to disable client-side scripts.
- Redirect invalid requests.
- Detect simultaneous logins, including those from two separate IP addresses, and invalidate those sessions.
- Use and enforce a Content Security Policy (source: Wikipedia) to disable any features that might be manipulated for an XSS attack.
- Read the documentation for any of the libraries referenced in your code to understand which elements allow for embedded HTML.
Remediation
Upgrade @angular/compiler to version 19.2.18, 20.3.16, 21.0.7, 21.1.0-rc.0 or higher.
References
low severity
new
- Vulnerable module: @angular/compiler
- Introduced through: @angular/compiler@9.0.7
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › @angular/compiler@9.0.7Remediation: Upgrade to @angular/compiler@19.2.20.
Overview
Affected versions of this package are vulnerable to Cross-site Scripting (XSS) in the handling of internationalized attribute bindings. An attacker can execute arbitrary scripts in the context of the application by injecting malicious input into attributes such as href, src, or similar, when these are marked for internationalization and bound to unsanitized user data.
Note: This is only exploitable if unsanitized user input is bound to a security-sensitive attribute that is also marked with an i18n-<attribute> directive on the same element.
Workaround
This vulnerability can be mitigated by explicitly sanitizing the input using Angular's DomSanitizer.
Details
Cross-site scripting (or XSS) is a code vulnerability that occurs when an attacker “injects” a malicious script into an otherwise trusted website. The injected script gets downloaded and executed by the end user’s browser when the user interacts with the compromised website.
This is done by escaping the context of the web application; the web application then delivers that data to its users along with other trusted dynamic content, without validating it. The browser unknowingly executes malicious script on the client side (through client-side languages; usually JavaScript or HTML) in order to perform actions that are otherwise typically blocked by the browser’s Same Origin Policy.
Injecting malicious code is the most prevalent manner by which XSS is exploited; for this reason, escaping characters in order to prevent this manipulation is the top method for securing code against this vulnerability.
Escaping means that the application is coded to mark key characters, and particularly key characters included in user input, to prevent those characters from being interpreted in a dangerous context. For example, in HTML, < can be coded as < and > can be coded as > in order to be interpreted and displayed as themselves in text, while within the code itself, they are used for HTML tags. If malicious content is injected into an application that escapes special characters and that malicious content uses < and > as HTML tags, those characters are nonetheless not interpreted as HTML tags by the browser if they’ve been correctly escaped in the application code and in this way the attempted attack is diverted.
The most prominent use of XSS is to steal cookies (source: OWASP HttpOnly) and hijack user sessions, but XSS exploits have been used to expose sensitive information, enable access to privileged services and functionality and deliver malware.
Types of attacks
There are a few methods by which XSS can be manipulated:
| Type | Origin | Description |
|---|---|---|
| Stored | Server | The malicious code is inserted in the application (usually as a link) by the attacker. The code is activated every time a user clicks the link. |
| Reflected | Server | The attacker delivers a malicious link externally from the vulnerable web site application to a user. When clicked, malicious code is sent to the vulnerable web site, which reflects the attack back to the user’s browser. |
| DOM-based | Client | The attacker forces the user’s browser to render a malicious page. The data in the page itself delivers the cross-site scripting data. |
| Mutated | The attacker injects code that appears safe, but is then rewritten and modified by the browser, while parsing the markup. An example is rebalancing unclosed quotation marks or even adding quotation marks to unquoted parameters. |
Affected environments
The following environments are susceptible to an XSS attack:
- Web servers
- Application servers
- Web application environments
How to prevent
This section describes the top best practices designed to specifically protect your code:
- Sanitize data input in an HTTP request before reflecting it back, ensuring all data is validated, filtered or escaped before echoing anything back to the user, such as the values of query parameters during searches.
- Convert special characters such as
?,&,/,<,>and spaces to their respective HTML or URL encoded equivalents. - Give users the option to disable client-side scripts.
- Redirect invalid requests.
- Detect simultaneous logins, including those from two separate IP addresses, and invalidate those sessions.
- Use and enforce a Content Security Policy (source: Wikipedia) to disable any features that might be manipulated for an XSS attack.
- Read the documentation for any of the libraries referenced in your code to understand which elements allow for embedded HTML.
Remediation
Upgrade @angular/compiler to version 19.2.20, 20.3.18, 21.2.4, 22.0.0-next.3 or higher.
References
low severity
- Vulnerable module: @angular/core
- Introduced through: @angular/core@9.0.7
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › @angular/core@9.0.7Remediation: Upgrade to @angular/core@19.2.18.
Overview
@angular/core is a package that lets you write client-side web applications as if you had a smarter browser. It also lets you use HTML as your template language and lets you extend HTML’s syntax to express your application’s components clearly and succinctly.
Affected versions of this package are vulnerable to Cross-site Scripting (XSS) in the handling of SVG <script> element attributes href and xlink:href when user-controlled data is bound to these attributes. An attacker can execute arbitrary JavaScript code in the victim's browser by supplying a crafted payload through untrusted data sources that are bound to these attributes.
##Workaround
This vulnerability can be mitigated by avoiding dynamic template bindings for SVG <script> elements and strictly validating input against a trusted allowlist before it reaches the template.
Details
Cross-site scripting (or XSS) is a code vulnerability that occurs when an attacker “injects” a malicious script into an otherwise trusted website. The injected script gets downloaded and executed by the end user’s browser when the user interacts with the compromised website.
This is done by escaping the context of the web application; the web application then delivers that data to its users along with other trusted dynamic content, without validating it. The browser unknowingly executes malicious script on the client side (through client-side languages; usually JavaScript or HTML) in order to perform actions that are otherwise typically blocked by the browser’s Same Origin Policy.
Injecting malicious code is the most prevalent manner by which XSS is exploited; for this reason, escaping characters in order to prevent this manipulation is the top method for securing code against this vulnerability.
Escaping means that the application is coded to mark key characters, and particularly key characters included in user input, to prevent those characters from being interpreted in a dangerous context. For example, in HTML, < can be coded as < and > can be coded as > in order to be interpreted and displayed as themselves in text, while within the code itself, they are used for HTML tags. If malicious content is injected into an application that escapes special characters and that malicious content uses < and > as HTML tags, those characters are nonetheless not interpreted as HTML tags by the browser if they’ve been correctly escaped in the application code and in this way the attempted attack is diverted.
The most prominent use of XSS is to steal cookies (source: OWASP HttpOnly) and hijack user sessions, but XSS exploits have been used to expose sensitive information, enable access to privileged services and functionality and deliver malware.
Types of attacks
There are a few methods by which XSS can be manipulated:
| Type | Origin | Description |
|---|---|---|
| Stored | Server | The malicious code is inserted in the application (usually as a link) by the attacker. The code is activated every time a user clicks the link. |
| Reflected | Server | The attacker delivers a malicious link externally from the vulnerable web site application to a user. When clicked, malicious code is sent to the vulnerable web site, which reflects the attack back to the user’s browser. |
| DOM-based | Client | The attacker forces the user’s browser to render a malicious page. The data in the page itself delivers the cross-site scripting data. |
| Mutated | The attacker injects code that appears safe, but is then rewritten and modified by the browser, while parsing the markup. An example is rebalancing unclosed quotation marks or even adding quotation marks to unquoted parameters. |
Affected environments
The following environments are susceptible to an XSS attack:
- Web servers
- Application servers
- Web application environments
How to prevent
This section describes the top best practices designed to specifically protect your code:
- Sanitize data input in an HTTP request before reflecting it back, ensuring all data is validated, filtered or escaped before echoing anything back to the user, such as the values of query parameters during searches.
- Convert special characters such as
?,&,/,<,>and spaces to their respective HTML or URL encoded equivalents. - Give users the option to disable client-side scripts.
- Redirect invalid requests.
- Detect simultaneous logins, including those from two separate IP addresses, and invalidate those sessions.
- Use and enforce a Content Security Policy (source: Wikipedia) to disable any features that might be manipulated for an XSS attack.
- Read the documentation for any of the libraries referenced in your code to understand which elements allow for embedded HTML.
Remediation
Upgrade @angular/core to version 19.2.18, 20.3.16, 21.0.7, 21.1.0-rc.0 or higher.
References
low severity
new
- Vulnerable module: @angular/core
- Introduced through: @angular/core@9.0.7
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › @angular/core@9.0.7Remediation: Upgrade to @angular/core@19.2.20.
Overview
@angular/core is a package that lets you write client-side web applications as if you had a smarter browser. It also lets you use HTML as your template language and lets you extend HTML’s syntax to express your application’s components clearly and succinctly.
Affected versions of this package are vulnerable to Cross-site Scripting (XSS) in the handling of internationalized attribute bindings. An attacker can execute arbitrary scripts in the context of the application by injecting malicious input into attributes such as href, src, or similar, when these are marked for internationalization and bound to unsanitized user data.
Note: This is only exploitable if unsanitized user input is bound to a security-sensitive attribute that is also marked with an i18n-<attribute> directive on the same element.
Workaround
This vulnerability can be mitigated by explicitly sanitizing the input using Angular's DomSanitizer.
Details
Cross-site scripting (or XSS) is a code vulnerability that occurs when an attacker “injects” a malicious script into an otherwise trusted website. The injected script gets downloaded and executed by the end user’s browser when the user interacts with the compromised website.
This is done by escaping the context of the web application; the web application then delivers that data to its users along with other trusted dynamic content, without validating it. The browser unknowingly executes malicious script on the client side (through client-side languages; usually JavaScript or HTML) in order to perform actions that are otherwise typically blocked by the browser’s Same Origin Policy.
Injecting malicious code is the most prevalent manner by which XSS is exploited; for this reason, escaping characters in order to prevent this manipulation is the top method for securing code against this vulnerability.
Escaping means that the application is coded to mark key characters, and particularly key characters included in user input, to prevent those characters from being interpreted in a dangerous context. For example, in HTML, < can be coded as < and > can be coded as > in order to be interpreted and displayed as themselves in text, while within the code itself, they are used for HTML tags. If malicious content is injected into an application that escapes special characters and that malicious content uses < and > as HTML tags, those characters are nonetheless not interpreted as HTML tags by the browser if they’ve been correctly escaped in the application code and in this way the attempted attack is diverted.
The most prominent use of XSS is to steal cookies (source: OWASP HttpOnly) and hijack user sessions, but XSS exploits have been used to expose sensitive information, enable access to privileged services and functionality and deliver malware.
Types of attacks
There are a few methods by which XSS can be manipulated:
| Type | Origin | Description |
|---|---|---|
| Stored | Server | The malicious code is inserted in the application (usually as a link) by the attacker. The code is activated every time a user clicks the link. |
| Reflected | Server | The attacker delivers a malicious link externally from the vulnerable web site application to a user. When clicked, malicious code is sent to the vulnerable web site, which reflects the attack back to the user’s browser. |
| DOM-based | Client | The attacker forces the user’s browser to render a malicious page. The data in the page itself delivers the cross-site scripting data. |
| Mutated | The attacker injects code that appears safe, but is then rewritten and modified by the browser, while parsing the markup. An example is rebalancing unclosed quotation marks or even adding quotation marks to unquoted parameters. |
Affected environments
The following environments are susceptible to an XSS attack:
- Web servers
- Application servers
- Web application environments
How to prevent
This section describes the top best practices designed to specifically protect your code:
- Sanitize data input in an HTTP request before reflecting it back, ensuring all data is validated, filtered or escaped before echoing anything back to the user, such as the values of query parameters during searches.
- Convert special characters such as
?,&,/,<,>and spaces to their respective HTML or URL encoded equivalents. - Give users the option to disable client-side scripts.
- Redirect invalid requests.
- Detect simultaneous logins, including those from two separate IP addresses, and invalidate those sessions.
- Use and enforce a Content Security Policy (source: Wikipedia) to disable any features that might be manipulated for an XSS attack.
- Read the documentation for any of the libraries referenced in your code to understand which elements allow for embedded HTML.
Remediation
Upgrade @angular/core to version 19.2.20, 20.3.18, 21.2.3, 22.0.0-next.2 or higher.
References
low severity
new
- Vulnerable module: electron
- Introduced through: electron@8.5.5
Detailed paths
-
Introduced through: ng-electron@AhmedMKamal/angular-electron#530b24576ca31c6da7d63baf131b9ce534500107 › electron@8.5.5Remediation: Upgrade to electron@38.8.6.
Overview
electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS.
Affected versions of this package are vulnerable to Missing Authorization in the select-usb-device event callback, which did not validate the chosen device ID against the filtered list presented to the handler. An attacker can gain unauthorized access to USB devices that do not match the intended filters or are listed in exclusion filters by influencing the handler to select a device ID outside the allowed set.
Note:
This is only exploitable if the application implements unusual device-selection logic that can be manipulated.
Remediation
Upgrade electron to version 38.8.6, 39.8.0, 40.7.0, 41.0.0-beta.8 or higher.