Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-8h86-6q3w-5h6p

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

static/main-preload.js in Boost Note through 0.22.0 allows remote command execution. A remote attacker may send a crafted IPC message to the exposed vulnerable ipcRenderer IPC interface, which invokes the dangerous openExternal Electron API.

static/main-preload.js in Boost Note through 0.22.0 allows remote command execution. A remote attacker may send a crafted IPC message to the exposed vulnerable ipcRenderer IPC interface, which invokes the dangerous openExternal Electron API.

EPSS

Процентиль: 91%
0.07063
Низкий

Дефекты

CWE-74

Связанные уязвимости

CVSS3: 9.8
nvd
больше 4 лет назад

static/main-preload.js in Boost Note through 0.22.0 allows remote command execution. A remote attacker may send a crafted IPC message to the exposed vulnerable ipcRenderer IPC interface, which invokes the dangerous openExternal Electron API.

EPSS

Процентиль: 91%
0.07063
Низкий

Дефекты

CWE-74