Логотип exploitDog
bind: "CVE-2023-39956"
Консоль
Логотип exploitDog

exploitDog

bind: "CVE-2023-39956"

Количество 6

Количество 6

nvd логотип

CVE-2023-39956

больше 2 лет назад

Electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS. Electron apps that are launched as command line executables are impacted. Specifically this issue can only be exploited if the following conditions are met: 1. The app is launched with an attacker-controlled working directory and 2. The attacker has the ability to write files to that working directory. This makes the risk quite low, in fact normally issues of this kind are considered outside of our threat model as similar to Chromium we exclude Physically Local Attacks but given the ability for this issue to bypass certain protections like ASAR Integrity it is being treated with higher importance. This issue has been fixed in versions:`26.0.0-beta.13`, `25.4.1`, `24.7.1`, `23.3.13`, and `22.3.19`. There are no app side workarounds, users must update to a patched version of Electron.

CVSS3: 6.1
EPSS: Низкий
msrc логотип

CVE-2023-39956

больше 2 лет назад

Electron: CVE-2023-39956 -Visual Studio Code Remote Code Execution Vulnerability

EPSS: Низкий
debian логотип

CVE-2023-39956

больше 2 лет назад

Electron is a framework which lets you write cross-platform desktop ap ...

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-7x97-j373-85x5

больше 2 лет назад

Electron vulnerable to out-of-package code execution when launched with arbitrary cwd

CVSS3: 6.1
EPSS: Низкий
fstec логотип

BDU:2023-08058

больше 2 лет назад

Уязвимость фреймворка для написания приложений Electron, связана с ненадлежащим контролем генерации кода, позволяющая нарушителю выполнить произвольный код

CVSS3: 6.6
EPSS: Низкий
redos логотип

ROS-20231115-04

около 2 лет назад

Множественные уязвимости codium

CVSS3: 8.4
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-39956

Electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS. Electron apps that are launched as command line executables are impacted. Specifically this issue can only be exploited if the following conditions are met: 1. The app is launched with an attacker-controlled working directory and 2. The attacker has the ability to write files to that working directory. This makes the risk quite low, in fact normally issues of this kind are considered outside of our threat model as similar to Chromium we exclude Physically Local Attacks but given the ability for this issue to bypass certain protections like ASAR Integrity it is being treated with higher importance. This issue has been fixed in versions:`26.0.0-beta.13`, `25.4.1`, `24.7.1`, `23.3.13`, and `22.3.19`. There are no app side workarounds, users must update to a patched version of Electron.

CVSS3: 6.1
0%
Низкий
больше 2 лет назад
msrc логотип
CVE-2023-39956

Electron: CVE-2023-39956 -Visual Studio Code Remote Code Execution Vulnerability

0%
Низкий
больше 2 лет назад
debian логотип
CVE-2023-39956

Electron is a framework which lets you write cross-platform desktop ap ...

CVSS3: 6.1
0%
Низкий
больше 2 лет назад
github логотип
GHSA-7x97-j373-85x5

Electron vulnerable to out-of-package code execution when launched with arbitrary cwd

CVSS3: 6.1
0%
Низкий
больше 2 лет назад
fstec логотип
BDU:2023-08058

Уязвимость фреймворка для написания приложений Electron, связана с ненадлежащим контролем генерации кода, позволяющая нарушителю выполнить произвольный код

CVSS3: 6.6
0%
Низкий
больше 2 лет назад
redos логотип
ROS-20231115-04

Множественные уязвимости codium

CVSS3: 8.4
около 2 лет назад

Уязвимостей на страницу