Логотип exploitDog
bind: "CVE-2023-39956"
Консоль
Логотип exploitDog

exploitDog

bind: "CVE-2023-39956"

Количество 6

Количество 6

nvd логотип

CVE-2023-39956

почти 2 года назад

Electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS. Electron apps that are launched as command line executables are impacted. Specifically this issue can only be exploited if the following conditions are met: 1. The app is launched with an attacker-controlled working directory and 2. The attacker has the ability to write files to that working directory. This makes the risk quite low, in fact normally issues of this kind are considered outside of our threat model as similar to Chromium we exclude Physically Local Attacks but given the ability for this issue to bypass certain protections like ASAR Integrity it is being treated with higher importance. This issue has been fixed in versions:`26.0.0-beta.13`, `25.4.1`, `24.7.1`, `23.3.13`, and `22.3.19`. There are no app side workarounds, users must update to a patched version of Electron.

CVSS3: 6.1
EPSS: Низкий
msrc логотип

CVE-2023-39956

почти 2 года назад

Electron: CVE-2023-39956 -Visual Studio Code Remote Code Execution Vulnerability

EPSS: Низкий
debian логотип

CVE-2023-39956

почти 2 года назад

Electron is a framework which lets you write cross-platform desktop ap ...

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-7x97-j373-85x5

почти 2 года назад

Electron vulnerable to out-of-package code execution when launched with arbitrary cwd

CVSS3: 6.1
EPSS: Низкий
fstec логотип

BDU:2023-08058

почти 2 года назад

Уязвимость фреймворка для написания приложений Electron, связана с ненадлежащим контролем генерации кода, позволяющая нарушителю выполнить произвольный код

CVSS3: 6.6
EPSS: Низкий
redos логотип

ROS-20231115-04

больше 1 года назад

Множественные уязвимости codium

CVSS3: 8.4
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-39956

Electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS. Electron apps that are launched as command line executables are impacted. Specifically this issue can only be exploited if the following conditions are met: 1. The app is launched with an attacker-controlled working directory and 2. The attacker has the ability to write files to that working directory. This makes the risk quite low, in fact normally issues of this kind are considered outside of our threat model as similar to Chromium we exclude Physically Local Attacks but given the ability for this issue to bypass certain protections like ASAR Integrity it is being treated with higher importance. This issue has been fixed in versions:`26.0.0-beta.13`, `25.4.1`, `24.7.1`, `23.3.13`, and `22.3.19`. There are no app side workarounds, users must update to a patched version of Electron.

CVSS3: 6.1
0%
Низкий
почти 2 года назад
msrc логотип
CVE-2023-39956

Electron: CVE-2023-39956 -Visual Studio Code Remote Code Execution Vulnerability

0%
Низкий
почти 2 года назад
debian логотип
CVE-2023-39956

Electron is a framework which lets you write cross-platform desktop ap ...

CVSS3: 6.1
0%
Низкий
почти 2 года назад
github логотип
GHSA-7x97-j373-85x5

Electron vulnerable to out-of-package code execution when launched with arbitrary cwd

CVSS3: 6.1
0%
Низкий
почти 2 года назад
fstec логотип
BDU:2023-08058

Уязвимость фреймворка для написания приложений Electron, связана с ненадлежащим контролем генерации кода, позволяющая нарушителю выполнить произвольный код

CVSS3: 6.6
0%
Низкий
почти 2 года назад
redos логотип
ROS-20231115-04

Множественные уязвимости codium

CVSS3: 8.4
больше 1 года назад

Уязвимостей на страницу